Data sabotage is being seen as the latest threat impacting the financial/banking industry. It involves manipulating data such as financial records, bank account data, stock market information or companies’ financial results for financial gain.

Such attacks are sophisticated and can be hard to spot. Both Admiral Michael Rogers, director of the National Security Agency (NSA), and Director of National Intelligence James R. Clapper recently warned about the dangers of the emerging sabotage threat.

Speaking at the 2016 RSA Conference earlier this year, Rogers stated that data tampering is No. 2 on his list of his top three security nightmares, behind only a cyberattack against critical infrastructure.

Financial/Banking Industry Ups Security Spending

At present, there is a high level of concern about theft in the financial/banking industry. In the face of increasingly sophisticated attacks, the industry is upping its spend on security.

A recent article in The Wall Street Journal stated that financial firms are planning to increase spending on cybersecurity by $2 billion in the next two years. They’re doing so to prevent a number of cyberattacks, but sabotage remains a concern: According to data from the New York State Department of Financial Services, 9.3 percent of financial firms reported data integrity breaches in 2013.

Data can be manipulated in many sectors, however, including critical infrastructure, health care and any industry that collects large swathes of personal information.

Access Controls, Monitoring Are Key

It’s vital to implement granular levels of access control to prevent unauthorized access to data. Cybercriminals are increasingly targeting privileged users with access to financial data. This necessitates strict enforcement of access policies, especially those of privileged users.

Access control policies and systems are a must, and all activity should be continuously monitored to detect anomalous activity. Strong encryption is essential for protecting data, both when data is at rest in storage and in transmission, to prevent data theft, modification, disclosure or destruction.

It’s also important to monitor all data for unauthorized access using data activity monitoring technology. These tools provide alerts regarding all changes of data and help ensure data integrity, which is key to detecting when data has been altered. A data activity monitoring solution should monitor all data wherever it is on the network or connected devices, providing visibility into all activity.

Education Is Essential

Education is key in fighting any type of cyberthreat, and data sabotage is no different. Many attackers looking to obtain privileged credentials begin with a spear phishing attack, temping their targets to open malicious attachments or click tainted links. Employees should be educated in the dangers of doing so.

Kaspersky Lab uncovered a massive cyberattack targeting the financial/banking industry that started with a spear phishing attack. Once they had gained entry to the targeted institutions, the attackers burrowed into the hearts of the accounting systems, inflating account balances and siphoning off money. It is estimated that around $1 billion was stolen from some 100 financial institutions worldwide.

Attackers are always trying to stay one step ahead of the game, looking for new ways to achieve financial gain. Rather than merely steal data to sell off, more and more cybercriminals are now looking to steal money through sabotage and falsification of data records or transactions. The onus is on the financial/banking industry to ensure that it is on top of this latest threat vector.

More from Banking & Finance

How to Spot a Nefarious Cryptocurrency Platform

Do you ever wonder if your cryptocurrency platform cashes in ransomware payments? Maybe not, but it might be worth investigating. Bitcoin-associated ransomware continues to plague companies, government agencies and individuals with no signs of letting up. And if your platform gets sanctioned, you may instantly lose access to all your funds. What exchanges or platforms do criminals use to cash out or launder ransomware payments? And what implications does this have for people who use exchanges legitimately? Blacklisted Exchanges and Mixers…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

Why Cybersecurity Risk Assessment Matters in the Banking Industry

When customers put money in a bank, they need to trust it will stay there. Because of the high stakes involved for the customer, such as financial loss, and how long it takes to resolve fraud and potential identity theft, customers are sensitive to the security of the bank as well as fraud prevention measures. Banks that experience high volumes of fraud are likely to lose customers and revenue. The key is to protect customers and their accounts before problems…

Cost of a Data Breach: Banking and Finance

The importance of cybersecurity has touched almost every industry. Beyond that, robust cybersecurity is table stakes for several sectors, particularly health care and the banking and finance industry. Not only is financial data at risk, but so is customer trust. In banking and finance, trust means everything. Yet, consumers are hesitant to share their confidential data. A recent McKinsey survey revealed that no industry achieved a trust rating of 50% for data protection. Here’s the most sobering stat: 87% of…