SlideShare uma empresa Scribd logo
1 de 25
How to Prevent SWIFT Network
Attacks
Paul Wilson
Product Manager
AGENDA
• Recent attacks on the SWIFT
network
• What are the SWIFT network’s
vulnerabilities?
• Could the attacks on the SWIFT
network have been prevented?
• How to quickly detect and stop
fraudulent financial activity
3
Cybercriminals attempted to
steal US$1 billion in an attack
on a Bangladeshi bank
4
Highly Unusual Malware Used – mscoutc.exe
• Used a vulnerability in a
common pdf reader as attack
vector
• Deleted configuration and log
files
• Uses wipe-out techniques to
prevent files from being
recovered forensically
• File-delete function
• Manipulated printers to prevent
SWIFT network confirmation
messages from being received
• Identical to Sony hack attack
techniques
5
Hackers steal US$9 Million from
Ecuadorean bank via SWIFT
6
These are just the attacks that have been made
public through journalists and court records.
7
The SWIFT network is a messaging
system at its core.
8
SWIFT recently launched a web access portal
• SWIFT has noted that
the network itself
wasn’t compromised
• ”…the attackers have
exploited
vulnerabilities in banks
funds’ transfer
initiation
environments, prior to
messages being sent
over SWIFT.”
What SWIFT Says
9
“Please remember that as a SWIFT
user you are responsible for the
security of your own systems
interfacing with the SWIFT
network and your related
environment – starting with basic
password protection practices – in
much the same way as you are
responsible for your other security
considerations.”
10
• SWIFT has noted that
the network itself
wasn’t compromised
• ”…the attackers have
exploited
vulnerabilities in banks
funds’ transfer
initiation
environments, prior to
messages being sent
over SWIFT.”
Insiders are also a threat
• Malware was designed
just for the bank
attacked in Bangladesh,
defeating systems and
checks
• The SWIFT attacks have
been so sophisticated
and complex that it is
surmised that an
employee must have
collaborated with the
cybercriminals.
11
Could the SWIFT Attacks Have Been Prevented?
12
You may not know what future attacks will look like, but you
can still make them harder for cybercriminals to launch.
13
Multi-Factor Authentication –
The Bare Minimum
14
Malware Detection and Mitigation beyond Blacklists
• Threats are moving faster
than legacy endpoint
detection solutions can
identify and stop them
• Having 100% of end users
covered is crucial
• The goal is disabling
malware, not removing it.
15
Fraud Intelligence – Do you know if there are…
Suspicious connections to your portals?
Similar domains to yours on the web?
Social media profiles using your brands, that you
didn’t create?
Unauthorized applications with your brand imagery
on app stores?
Spoofers of your domains sending fake messages?
16
16
• What if insiders disable all
of your protection
methods?
• What if social engineering
tricks your employees into
enabling an attack?
• What if the problem is at
another less secure bank
processing a transaction
along with yours?
When Every Other Protection Layer Breaks Down
17
All wire transactions
passing from one bank
account to another
through SWIFT must be
recorded, tracked and
contextualized.
18
A spelling mistake in a
transaction order, noticed by a
bank employee, raised a red flag.
It stopped millions of more
dollars from being stolen.
Machine learning can automate
the discovery and alerting of
such errors.
19
Manually updating
lists of known or
suspected fraudulent
destinations, and the
bank accounts tied to
them, is no longer
enough.
20
Rules for what you’ve seen before, machine learning
and heuristic analysis to predict future fraud.
21
Compound Evaluations
Events that might not indicate
fraud by themselves may indicate
it when found together.
Filters and Rules
How to detect fraudulent transactions & activities
First Stage Second Stage Third Stage
Location
Deviation
Time
Deviation
Behavior Heuristic Engine Suspicious Activity Analyzers
Taking a complete approach
• Behavioral Learning to react faster to new fraud
strategies
• Rules and Suspicious Activity Analyzers
• Keep your best performing rules while leveraging
heuristics for everything else
• Complete Solution for Fraud Management
23
In Review
Stopping SWIFT attacks in the future
• Anomaly detection
• Automated predictions through machine-based learning
• Automatic list updates of suspicious fraudulent
accounts/destinations
• Compounded evaluations
• All a part of DetectTA from Easy Solutions
Thank You
Questions?
Paul Wilson
info@easysol.net

Mais conteúdo relacionado

Mais procurados

Malicion software
Malicion softwareMalicion software
Malicion softwareA. Shamel
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessBeyondTrust
 
How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksImperva
 
Security in Computing and IT
Security in Computing and ITSecurity in Computing and IT
Security in Computing and ITKomalah Nair
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local GovDonald E. Hester
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?AariyaRathi
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsDaveEdwards12
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Attacks using local system
Attacks using local systemAttacks using local system
Attacks using local systemArjun Trivedi
 
Man-In-The-Browser attacks
Man-In-The-Browser attacksMan-In-The-Browser attacks
Man-In-The-Browser attacksMário Almeida
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Cyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test themCyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test them24by7Security Inc
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message SecurityNrapesh Shah
 
Overview of Recorded Future Intel Cards
Overview of Recorded Future Intel CardsOverview of Recorded Future Intel Cards
Overview of Recorded Future Intel CardsRecorded Future
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsBeyondTrust
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attackAmna
 

Mais procurados (20)

Malicion software
Malicion softwareMalicion software
Malicion software
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Smartphones' Security
Smartphones' SecuritySmartphones' Security
Smartphones' Security
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling Access
 
How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser Attacks
 
Security in Computing and IT
Security in Computing and ITSecurity in Computing and IT
Security in Computing and IT
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactions
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Attacks using local system
Attacks using local systemAttacks using local system
Attacks using local system
 
Man-In-The-Browser attacks
Man-In-The-Browser attacksMan-In-The-Browser attacks
Man-In-The-Browser attacks
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Cyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test themCyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test them
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Overview of Recorded Future Intel Cards
Overview of Recorded Future Intel CardsOverview of Recorded Future Intel Cards
Overview of Recorded Future Intel Cards
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 

Destaque (11)

Zee internship report
Zee internship reportZee internship report
Zee internship report
 
New project for automotive parts
New project for automotive partsNew project for automotive parts
New project for automotive parts
 
Lesson planning
Lesson planningLesson planning
Lesson planning
 
7 Bishopsgate
7 Bishopsgate7 Bishopsgate
7 Bishopsgate
 
Paddington
PaddingtonPaddington
Paddington
 
ed767a_bdcd3d54444d4dd1944d3166c493db98
ed767a_bdcd3d54444d4dd1944d3166c493db98ed767a_bdcd3d54444d4dd1944d3166c493db98
ed767a_bdcd3d54444d4dd1944d3166c493db98
 
56f8b82ca2598bd78bf4a5af3085e811
56f8b82ca2598bd78bf4a5af3085e81156f8b82ca2598bd78bf4a5af3085e811
56f8b82ca2598bd78bf4a5af3085e811
 
Recommendation Letter Adrián Picazo
Recommendation Letter Adrián PicazoRecommendation Letter Adrián Picazo
Recommendation Letter Adrián Picazo
 
Sepam funciones
Sepam funcionesSepam funciones
Sepam funciones
 
Carbon nanotubes
Carbon nanotubesCarbon nanotubes
Carbon nanotubes
 
Mumbai
MumbaiMumbai
Mumbai
 

Semelhante a Could the Attacks on the SWIFT Network Have Been Prevented?

Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptxAmineRached2
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.pptKaukau9
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryInvincea, Inc.
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.Teri Radichel
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxSohamChakraborty61
 

Semelhante a Could the Attacks on the SWIFT Network Have Been Prevented? (20)

Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Bangladesh Bank Heist.ppt
Bangladesh Bank Heist.pptBangladesh Bank Heist.ppt
Bangladesh Bank Heist.ppt
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 

Último

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Could the Attacks on the SWIFT Network Have Been Prevented?

  • 1. How to Prevent SWIFT Network Attacks Paul Wilson Product Manager
  • 2. AGENDA • Recent attacks on the SWIFT network • What are the SWIFT network’s vulnerabilities? • Could the attacks on the SWIFT network have been prevented? • How to quickly detect and stop fraudulent financial activity
  • 3. 3 Cybercriminals attempted to steal US$1 billion in an attack on a Bangladeshi bank
  • 4. 4 Highly Unusual Malware Used – mscoutc.exe • Used a vulnerability in a common pdf reader as attack vector • Deleted configuration and log files • Uses wipe-out techniques to prevent files from being recovered forensically • File-delete function • Manipulated printers to prevent SWIFT network confirmation messages from being received • Identical to Sony hack attack techniques
  • 5. 5 Hackers steal US$9 Million from Ecuadorean bank via SWIFT
  • 6. 6 These are just the attacks that have been made public through journalists and court records.
  • 7. 7 The SWIFT network is a messaging system at its core.
  • 8. 8 SWIFT recently launched a web access portal • SWIFT has noted that the network itself wasn’t compromised • ”…the attackers have exploited vulnerabilities in banks funds’ transfer initiation environments, prior to messages being sent over SWIFT.”
  • 9. What SWIFT Says 9 “Please remember that as a SWIFT user you are responsible for the security of your own systems interfacing with the SWIFT network and your related environment – starting with basic password protection practices – in much the same way as you are responsible for your other security considerations.”
  • 10. 10 • SWIFT has noted that the network itself wasn’t compromised • ”…the attackers have exploited vulnerabilities in banks funds’ transfer initiation environments, prior to messages being sent over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating systems and checks • The SWIFT attacks have been so sophisticated and complex that it is surmised that an employee must have collaborated with the cybercriminals.
  • 11. 11 Could the SWIFT Attacks Have Been Prevented?
  • 12. 12 You may not know what future attacks will look like, but you can still make them harder for cybercriminals to launch.
  • 14. 14 Malware Detection and Mitigation beyond Blacklists • Threats are moving faster than legacy endpoint detection solutions can identify and stop them • Having 100% of end users covered is crucial • The goal is disabling malware, not removing it.
  • 15. 15 Fraud Intelligence – Do you know if there are… Suspicious connections to your portals? Similar domains to yours on the web? Social media profiles using your brands, that you didn’t create? Unauthorized applications with your brand imagery on app stores? Spoofers of your domains sending fake messages?
  • 16. 16 16 • What if insiders disable all of your protection methods? • What if social engineering tricks your employees into enabling an attack? • What if the problem is at another less secure bank processing a transaction along with yours? When Every Other Protection Layer Breaks Down
  • 17. 17 All wire transactions passing from one bank account to another through SWIFT must be recorded, tracked and contextualized.
  • 18. 18 A spelling mistake in a transaction order, noticed by a bank employee, raised a red flag. It stopped millions of more dollars from being stolen. Machine learning can automate the discovery and alerting of such errors.
  • 19. 19 Manually updating lists of known or suspected fraudulent destinations, and the bank accounts tied to them, is no longer enough.
  • 20. 20 Rules for what you’ve seen before, machine learning and heuristic analysis to predict future fraud.
  • 21. 21 Compound Evaluations Events that might not indicate fraud by themselves may indicate it when found together.
  • 22. Filters and Rules How to detect fraudulent transactions & activities First Stage Second Stage Third Stage Location Deviation Time Deviation Behavior Heuristic Engine Suspicious Activity Analyzers
  • 23. Taking a complete approach • Behavioral Learning to react faster to new fraud strategies • Rules and Suspicious Activity Analyzers • Keep your best performing rules while leveraging heuristics for everything else • Complete Solution for Fraud Management 23
  • 24. In Review Stopping SWIFT attacks in the future • Anomaly detection • Automated predictions through machine-based learning • Automatic list updates of suspicious fraudulent accounts/destinations • Compounded evaluations • All a part of DetectTA from Easy Solutions

Notas do Editor

  1. What is the purpose of this slide?
  2. Image - http://www.stellarintelligence.com/wp-content/uploads/2016/01/banner3.jpg
  3. Image- http://www.komaxgroup.com/~/media/Wire/Images/Visuals/slide-1.jpg
  4. Image - https://edc2.healthtap.com/topics/145988154_large.jpg