June 6, 2016 By Douglas Bonderud 2 min read

Another day, another SWIFT attack. That’s the word from SecurityWeek, which detailed a string of fraudulent transactions between Wells Fargo and Ecuador’s Banco del Austro (BDA). Now, BDA is suing Wells Fargo while SWIFT is looking for speedy ways to safeguard its money moving service. Both the initial response and ultimate responsibility are under scrutiny as companies hope to fast-track worry-free transfers.

Third Time’s the Charm?

This is the third big SWIFT breach reported. The Vietnamese Tien Phone Bank suffered losses in 2015, and the Bangladesh Central Bank (BCB) lost $81 million in February 2016.

BDA’s attack goes further back: On Jan. 12, 2015, at least 12 fraudulent transfer requests were made to Wells Fargo, supposedly from BDA, asking the company to move $12 million to accounts in Hong Kong, Dubai and the U.S. SWIFT wasn’t in the loop until a Reuters investigation turned up court documents of the BDA/Wells Fargo lawsuit.

Unlike BCB, which blamed its losses on SWIFT, BDA is suing Wells Fargo directly. For its part, Wells Fargo said it “properly processed the wire instructions received via authenticated SWIFT messages” and therefore isn’t responsible, SecurityWeek stated.

SWIFT, meanwhile, makes the point that it can’t help anyone if companies don’t report these frauds directly. According to ITProPortal, SWIFT is adamant that the network has not been compromised.

Walk of Blame

So who’s responsible for the BDA SWIFT attack? What about Bangladesh, Vietnam or others that haven’t been reported? SC Magazine noted that there’s some evidence pointing to North Korea: It’s likely that the country’s Lazarus Group is responsible for the BCB attack and possibly other high-value SWIFT breaches. According to CNN, a federal probe has been launched to determine the extent of North Korean involvement.

Of course, pinning down attackers doesn’t patch security holes. SWIFT argued that banks need to beef up network defenses, watch more carefully for fraudulent activity and always report any SWIFT-related issues. Banks, meanwhile, are calling on SWIFT to do a better job of protecting the system from malicious access, which would in turn negate the need for increased bank oversight of the process.

Learning From the SWIFT Attack

Bottom line? It’s a chicken-and-egg scenario, but being right doesn’t really matter if millions are rapidly disappearing. As noted by Bloomberg, SWIFT is taking action to solve the problem at its end. But while CEO Gottfried Leibbrandt said it’s aiming for some “quick wins” in the near future, “the full rollout, the full shore-up, will be a matter of years.”

SWIFT is trying, but it won’t happen overnight. Response and responsibility rest with banks — at least in the near term. For BDA, suing Wells Fargo might provide some temporary relief, but with new and historic SWIFT attacks emerging, time and effort may be better spent hunting down fraudulent transactions and providing SWIFT the data it needs to slow attacker progress.

More from

Skills shortage directly tied to financial loss in data breaches

2 min read - The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM's 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.And that's expensive. This skills deficit adds an average of $1.76 million in additional breach costs.The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today