As revealed in the 2017 IBM X-Force Threat Intelligence Index, the financial services sector was attacked more than any other industry last year. The average financial services client organization monitored by IBM Security Services experienced 65 percent more attacks than the average client organization across all industries (see Figure 1). Moreover, 2016 saw, on average, a 29 percent increase in attacks against financial services organizations, up from 1,310 attacks in 2015 to 1,684 in 2016.


Figure 1: Average client organization monitored by IBM Security Services, 2016 cross-industry versus financial services comparison.

Open Season for Financial Services Cybercrime

A new report by IBM Managed Security Services (MSS) threat researchers took a closer look at the financial services industry’s cybercrime woes.

There was no shortage of cyberattack-induced financial ruin in 2016. Outages due to distributed denial-of-service (DDoS) shut down online financial institutions’ operations all over the globe. Malware, including ransomware, was responsible for millions in losses. And with over 200 million records compromised in 2016 — a 937 percent increase over 2015 — the financial services sector ranked third among other industries in terms of records breached.

Where were the attacks emanating from in 2016? According to IBM MSS analysis of monitored financial services client data, organizations were more affected by insider than outsider attacks (58 percent versus 42 percent). Within the insider group, many more inadvertent actors (53 percent) unwittingly caused harm than malicious insiders (5 percent) acting against the organization.

Strengthening the Security Immune System

Companies in 2016’s most attacked sector must work harder to stay ahead of cybercrime. Fortunately, financial services organizations can strengthen their cybersecurity immune system by focusing on mitigating notable security pain points such as insider threats and financial malware.

Read the X-Force Research Report: Security trends in the financial industry

More from Banking & Finance

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

DORA and your quantum-safe cryptography migration

5 min read - Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. Unfortunately, this also introduces threats to the digital economy and particularly the financial sector.The Digital Operational Resilience Act (DORA) is a regulatory framework that introduces uniform requirements across the European Union (EU) to achieve a "high level of operational resilience" in the financial services sector. Entities covered by DORA — such as credit institutions, payment institutions, insurance undertakings, information and communication technology…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today