April 13, 2018 By Domenico Raguseo 2 min read

The concept of open banking, as structured by the U.K.’s Open Banking and PSD2 regulations, is designed to enable third-party payment service providers (TTPs) to access account information and perform payments under the authorization of the account owner.

This represents both a challenge and a tremendous opportunity for financial institutions and TPPs. On one hand, it makes the overall market more appealing to consumers and expands the services available to them to include a multitude of new players in the financial market. On the other hand, open banking significantly widens the threat surface and puts consumers and financial institutions at greater risk of attack.

New Standards Overlook Device Security

For this reason, the initiative comes with a new set of security standards. However, these mandates deal mostly with authentication, transaction monitoring and API security, and largely ignore the security of the devices from which transactions originate. This is problematic because compromising mobile devices is a popular activity among cybercriminals. By capturing large volumes of devices, threat actors can raise their profile and increase their ability to either attack devices directly or use them to launch distributed denial-of-service (DDoS) campaigns.

Since cybercriminals commonly target the source of a transaction, it is crucial for security teams in the financial industry to consider the consumer’s security first and use whatever threat intelligence they can gather to calculate the risk associated with a given transaction. This means that the risk level of a transaction should be calculated based not only on whether the user’s account is protected by strong authentication, but also whether malware is present on the device.

Open Banking and the Security Immune System

It’s important to note that opening the financial marketplace to third-party providers will drastically increase the attack surface. While it’s still critical to monitor individual transactions, financial institutions must focus on implementing security controls to reduce the risk of an attack. They can then integrate these tools and processes into a holistic security immune system designed to prevent, detect and respond to incidents.

Open banking also increases the criticality of cloud-based security controls. It is no longer a matter of whether an institution will adopt cloud solutions, but a question of who provides what services to whom. Cloud adoption is intrinsic to open banking, and having visibility into the cloud from a cybersecurity perspective is crucial.

Security teams must integrate these controls with processes that focus on detection to enable them to respond more effectively. By applying the security immune system approach to open banking, financial institutions can offer consumers greater flexibility and convenience — all while keeping their devices secure and their money safe from cybercriminals looking to exploit new security gaps.

 

More from Banking & Finance

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

What’s up India? PixPirate is back and spreading via WhatsApp

8 min read - This blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this content. PixPirate malware consists of two components: a downloader application and a droppee application, and both are custom-made and operated by the same fraudster group. Although the traditional role of a downloader is to install the droppee on the victim device, with PixPirate, the downloader also…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today