Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

SWIFT CEO Pushes Information Sharing, Improved Security

Threat Intelligence Sharing Moves Center Stage for SWIFT

Threat Intelligence Sharing Moves Center Stage for SWIFT

SWIFT CEO Gottfried Leibbrandt today revealed a five-point plan designed to harden SWIFT transactions following the $81 million theft via the Bangladesh central bank. Speaking at the 14th annual European Financial Services Conference in Brussels, Leibbrandt focused mostly most on the need for the global financial community to improve its threat intelligence sharing.

This comes as no surprise. A BAE Systems report on the incident indicates that it discovered indications of more than just the Bangladesh attack on SWIFT member banks. It mentioned a bank in Vietnam. It did not name the bank; however it did indicate that the attack took place several months before the attack against the Bangladesh bank. 

Soon after, Hanoi-based Tien Phong Bank (TPBank) released a statement saying that it had interrupted the attempted theft of approximately $1.1 million via fraudulent SWIFT messages.

If TPBank did not report the attack to its own State Bank of Vietnam (after all, it was a failed attack) then it may not have reported it to SWIFT. This leaves an open and purely hypothetical conjecture: if TPBank had shared the information with SWIFT, and if SWIFT had a sharing mechanism with the rest of the member community, could the Bangladesh theft have been prevented?

Whether this conjecture is valid or not, SWIFT is now moving to address the issue. Point one of the five point plan is to ‘drastically improve information sharing’. “We will demand more information of our customers,” said Liebbrandt, “and share that back with the community. The ambition is to do on an international scale what banks in several countries are already doing domestically. We will do it in a confidential way that uses the data while protecting the identity of the institution and customers.”

Not one of the other four points was given more than a single sentence. They are, to “harden security requirements for customer-managed software”; to “develop security audit frameworks for customers”; to “support banks’ increased use of payment pattern controls to identify suspicious behavior”; and to “introduce certification requirements for third party providers”.

None of these intentions affects the SWIFT network itself. Indeed Liebbrandt stressed again (he has done so before) “SWIFT, our network, software and our core messaging services have not been compromised.”

Advertisement. Scroll to continue reading.

“In Bangladesh and the other cases, the thieves compromised the IT environment and worked their way to the bank systems where the SWIFT instructions are generated and the confirmations received,” Liebbrandt said. “And while we (and other providers) give tools and software to our customers, our customers run these in their own environment and need to keep them secure. We cannot secure our customers’ environments and cannot assume responsibility for that.” 

Nevertheless, this five-point plan demonstrates that SWIFT has learned, albeit the hard way, that any network is only as strong as its weakest link. SWIFT is now taking steps to strengthen those weak links.

Related: Learn More at the 2016 CISO Forum, June 1-2, 2016

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

Robert Shaker II has joined application security firm ActiveState as Chief Product and Technology Officer.

MorganFranklin Cyber has promoted Nick Stallone and Ferdinand Hamada into newly created roles.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.