Swift details plan to toughen cyber defences

Five “strategic initiatives” designed to help global financial community better prepare for future attacks, as Swift says it is "clear" the global community will be targeted again

cybersecurity
Swift is rolling out improvements to its cyber security

Swift unveiled the details of a five-part cyber security plan on May 27, aimed at strengthening its defences and helping its customers improve their own.

The five "strategic initiatives" cover improved information sharing, enhanced tools, better guidelines and cyber audit frameworks, new methods of detecting abnormal activity, and the engagement of third-party firms to help customers build better defences.

Swift has been particularly focused on cyber security since the theft of $101 million from Bangladesh Bank in February. The heist was conducted via the Swift network, though Swift stresses it was not compromised. The security breach appears to have occurred at the central bank.

"While each individual Swift customer is responsible for the security of its own environment, the security of global banking can only be ensured collectively," Swift chief executive Gottfried Leibbrandt said in a statement. "It requires a collaborative approach between Swift, its customers, overseers, and third-party suppliers."

Under the initiatives, Swift will expect customers to provide more information to it as well as sharing intelligence and best practices. Customers will be expected to meet stricter security requirements – tailored to local conditions – while Swift interfaces will be upgraded with heightened security.

Swift also plans to develop audit standards and certification processes for the "secure management" of Swift messages at customer sites. "We will look into if and how customers' compliance to these baselines can be made transparent to, and enforced by, counterparties, regulators and ourselves," it said.

A key concern during the Bangladesh Bank heist was how long it took for authorities to detect the breach. Swift will "explore the feasibility" of tools to detect anomalies in its network, possibly rolling these out as an "opt in" service for customers.

Involving third-party providers of hardware, software, training and auditing will help customers improve their local defences, Swift believes. It suggests it can act as a go-between for many of these relationships – for instance, by bringing parties together at its conferences.

'Wider campaign'

Though banks and regulators have been stressing the importance of cyber risks for some time, a string of sophisticated attacks seems to have instilled a greater sense of urgency.

The Hong Kong Monetary Authority unveiled a cyber strategy with many common elements to the Swift plans earlier in May. Other central banks, including the Bank of England, are examining how to hold financial institutions to higher standards of cyber security.

A spokesperson for Payments UK, an industry body, says it operates its own cyber security team to identify threats and is helping members improve their defences. "Payments UK recognises that cyber threats now represent an academic 'wicked problem', being both complex and novel, that require a collaborative approach," he says.

New evidence in the search for the Bangladesh hackers recently linked the attack with other major cyber crimes, including, potentially, the 2014 attack on Sony and a heist on a Vietnamese commercial bank this year.

Researchers Sergei Shevchenko and Adrian Nish, writing in a blog post for BAE Systems, say the malware used in each attack seems to have a common element, implying the attacks are part of a "wider campaign", possibly by a single hacker.

A section of code, written in the same, somewhat dated, coding language appears in all three attacks. The code contains a feature to overwrite its files with random data and then delete itself, to make recovery of the information impossible. As Shevchenko noted in an earlier post, the perpetrators went to great lengths to cover their tracks and make resistance difficult.

The breadth of the attacks suggests financial firms are still vulnerable. "It is clear that the global community will continue to be targeted," Swift said.

This article originally appeared on Risk.net's sister website, Centralbanking.com.

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact info@risk.net or view our subscription options here: http://subscriptions.risk.net/subscribe

You are currently unable to copy this content. Please contact info@risk.net to find out more.

Most read articles loading...

You need to sign in to use this feature. If you don’t have a Risk.net account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here