Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Finance > COUNTDOWN TO SWIFT SECURITY COMPLIANCE
    Finance

    COUNTDOWN TO SWIFT SECURITY COMPLIANCE

    COUNTDOWN TO SWIFT SECURITY COMPLIANCE

    Published by Gbaf News

    Posted on October 27, 2017

    Featured image for article about Finance

    By David Higgins, Director of Customer Development, EMEA, CyberArk

    The SWIFT network should be considered a part of our critical infrastructure. It is fundamental to the flow of money around the world, enabling 11,000+ financial institutions to send and receive information about financial transactions in a secure, standardised and reliable environment.

    In recent times, however, users of the SWIFT network have been targeted by cybercriminals. With one successful heist having the potential to open the tap on millions of pounds, attackers are looking for any way in. In the last two years, we’ve seen three publicised breaches of organisations utilising the SWIFT network; the most notorious being the Bangladesh Central Bank where attackers made away with $81 million.

    The anatomy of a SWIFT attack

    Just like any other advanced cyberattack, the route to the crown jewels (in this case the SWIFT-connected systems) is by exploiting privileged accounts. After breaking through the perimeter, the attackers can start looking for credentials to move to another area of the network. Using stolen privileged credentials, they can then escalate privileges and move laterally through the host environment until they reach the lucrative SWIFT-connected systems.

    In the case of the Bangladesh bank heist, this was the stage where the attackers started monitoring what the administrators and users of those systems were doing, so they could start to make requests. They also noticed that each time a transaction was issued, it would be sent to the printer too. Using exploited credentials, the attackers disabled the printer, helping them to remain undetected as they issued false transactional requests.

    The SWIFT response

    While the SWIFT network has not been compromised, its users have been, so SWIFT has responded with a robust Customer Security Programme. Some elements are advisory and some are mandatory, but, in total, there are 27 controls to be implemented across the community by January 2018. Not all SWIFT customers will need to adhere to all 27 controls. It all depends on the architecture they have; determining this will be the first step to understanding which of these controls they need to follow to get compliant.

    Prioritising privilege

    Across the 27 controls, whether they are mandatory or advisory, privilege is a common theme. Attackers are looking to perform lateral movement and exploit systems connected to the SWIFT network, and privilege is the path to do that. As the countdown to SWIFT security compliance begins, financial institutions need to recognise the scope of privilege is far broader than simply ‘credential management’ and address it in the following three ways:

    • Lock down credentials: First, it’s about identifying privileged accounts within the SWIFT environment and locking down credentials. ‘Credentials’ isn’t just passwords; there can also be credentials used within applications or SSH keys. One of SWIFT’s required controls talks about managing your administrative level credentials, so let’s say you secure the root password on all your unix devices. If your administrators have SSH keys that they’re using to authenticate this route then you’ve not actually achieved compliance – your administrators will simply bypass that control with SSH keys.
    • Isolate and control: Once you’ve locked credentials down, you need to isolate and control privileged sessions. By introducing a session broker and monitoring those sessions, you can start to understand what administrators and users of the systems are doing. It’s no longer just a case of managing credentials, rotating passwords and making sure that they’re set to a strong value; it’s also about looking at the admin rights and the entitlements users have to get on the systems. If you’ve got a highly privileged account, for example a domain administrator account that can connect to all the Windows servers within your SWIFT secure zone, the attackers are going to target that account. They know if they compromise that one account they’ve got admin access to the organisation’s entire Windows infrastructure. If you were to give out least privilege (i.e. non-administrative access) to the users, and it’s a non-admin account that’s compromised, it makes the attacker’s journey far more difficult.
    • Continual monitoring: Financial institutions need to be able to spot when attackers are trying to exploit credentials and perform behaviour analytics around these users. We know the types of accounts which will be a target for attackers, so putting some detection around their behavior will allow us to spot abnormal patterns when it comes to privileged users.

    In this highly secure environment, financial institutions need to make sure they’re giving the right users the right access at the right time. By making sure privileged activity is locked, monitored and trusted, it will not only be far more difficult for attackers to get into the SWIFT environment in the first place, but any insider threats will quickly be detected and stopped in their tracks.

    By David Higgins, Director of Customer Development, EMEA, CyberArk

    The SWIFT network should be considered a part of our critical infrastructure. It is fundamental to the flow of money around the world, enabling 11,000+ financial institutions to send and receive information about financial transactions in a secure, standardised and reliable environment.

    In recent times, however, users of the SWIFT network have been targeted by cybercriminals. With one successful heist having the potential to open the tap on millions of pounds, attackers are looking for any way in. In the last two years, we’ve seen three publicised breaches of organisations utilising the SWIFT network; the most notorious being the Bangladesh Central Bank where attackers made away with $81 million.

    The anatomy of a SWIFT attack

    Just like any other advanced cyberattack, the route to the crown jewels (in this case the SWIFT-connected systems) is by exploiting privileged accounts. After breaking through the perimeter, the attackers can start looking for credentials to move to another area of the network. Using stolen privileged credentials, they can then escalate privileges and move laterally through the host environment until they reach the lucrative SWIFT-connected systems.

    In the case of the Bangladesh bank heist, this was the stage where the attackers started monitoring what the administrators and users of those systems were doing, so they could start to make requests. They also noticed that each time a transaction was issued, it would be sent to the printer too. Using exploited credentials, the attackers disabled the printer, helping them to remain undetected as they issued false transactional requests.

    The SWIFT response

    While the SWIFT network has not been compromised, its users have been, so SWIFT has responded with a robust Customer Security Programme. Some elements are advisory and some are mandatory, but, in total, there are 27 controls to be implemented across the community by January 2018. Not all SWIFT customers will need to adhere to all 27 controls. It all depends on the architecture they have; determining this will be the first step to understanding which of these controls they need to follow to get compliant.

    Prioritising privilege

    Across the 27 controls, whether they are mandatory or advisory, privilege is a common theme. Attackers are looking to perform lateral movement and exploit systems connected to the SWIFT network, and privilege is the path to do that. As the countdown to SWIFT security compliance begins, financial institutions need to recognise the scope of privilege is far broader than simply ‘credential management’ and address it in the following three ways:

    • Lock down credentials: First, it’s about identifying privileged accounts within the SWIFT environment and locking down credentials. ‘Credentials’ isn’t just passwords; there can also be credentials used within applications or SSH keys. One of SWIFT’s required controls talks about managing your administrative level credentials, so let’s say you secure the root password on all your unix devices. If your administrators have SSH keys that they’re using to authenticate this route then you’ve not actually achieved compliance – your administrators will simply bypass that control with SSH keys.
    • Isolate and control: Once you’ve locked credentials down, you need to isolate and control privileged sessions. By introducing a session broker and monitoring those sessions, you can start to understand what administrators and users of the systems are doing. It’s no longer just a case of managing credentials, rotating passwords and making sure that they’re set to a strong value; it’s also about looking at the admin rights and the entitlements users have to get on the systems. If you’ve got a highly privileged account, for example a domain administrator account that can connect to all the Windows servers within your SWIFT secure zone, the attackers are going to target that account. They know if they compromise that one account they’ve got admin access to the organisation’s entire Windows infrastructure. If you were to give out least privilege (i.e. non-administrative access) to the users, and it’s a non-admin account that’s compromised, it makes the attacker’s journey far more difficult.
    • Continual monitoring: Financial institutions need to be able to spot when attackers are trying to exploit credentials and perform behaviour analytics around these users. We know the types of accounts which will be a target for attackers, so putting some detection around their behavior will allow us to spot abnormal patterns when it comes to privileged users.

    In this highly secure environment, financial institutions need to make sure they’re giving the right users the right access at the right time. By making sure privileged activity is locked, monitored and trusted, it will not only be far more difficult for attackers to get into the SWIFT environment in the first place, but any insider threats will quickly be detected and stopped in their tracks.

    Related Posts
    UK's Starmer and EU's von der Leyen discuss Ukraine peace plan, frozen Russian assets
    UK's Starmer and EU's von der Leyen discuss Ukraine peace plan, frozen Russian assets
    Thousands march in Hungary in protest over child abuse scandal
    Thousands march in Hungary in protest over child abuse scandal
    Ukraine says Russian drone attack hit civilian Turkish vessel
    Ukraine says Russian drone attack hit civilian Turkish vessel
    Who are the most prominent prisoners released by Belarusian president Lukashenko?
    Who are the most prominent prisoners released by Belarusian president Lukashenko?
    Spanish police bust gang that used helicopters to fly drugs from Morocco
    Spanish police bust gang that used helicopters to fly drugs from Morocco
    Lukashenko frees Nobel winner Bialiatski and key Belarus opposition figures in deal with US
    Lukashenko frees Nobel winner Bialiatski and key Belarus opposition figures in deal with US
    EU countries agree 2026 fishing quotas, avoid tighter Mediterranean curbs
    EU countries agree 2026 fishing quotas, avoid tighter Mediterranean curbs
    New Czech prime minister rejects guarantees for Ukraine loan
    New Czech prime minister rejects guarantees for Ukraine loan
    Ukraine's Odesa suffers major blackouts after Russian attack
    Ukraine's Odesa suffers major blackouts after Russian attack
    Bitcoin hoarding company Strategy remains in Nasdaq 100
    Bitcoin hoarding company Strategy remains in Nasdaq 100
    North Korean leader Kim hails troops returning from Russia mission, state media says
    North Korean leader Kim hails troops returning from Russia mission, state media says
    Spain urges EU not to weaken 2035 combustion engine ban, letter shows
    Spain urges EU not to weaken 2035 combustion engine ban, letter shows

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Finance

    Explore more articles in the Finance category

    EU vote on Mercosur trade deal set for next week, Denmark says

    EU vote on Mercosur trade deal set for next week, Denmark says

    King Charles says his treatment for cancer can be reduced in the new year

    King Charles says his treatment for cancer can be reduced in the new year

    Juventus 'not for sale' say Agnellis, rejecting crypto giant Tether's bid

    Juventus 'not for sale' say Agnellis, rejecting crypto giant Tether's bid

    Ukraine hits Russian oil infrastructure in Caspian for second time

    Ukraine hits Russian oil infrastructure in Caspian for second time

    EU, India unlikely to finalize trade agreement by end of year, Bloomberg News reports

    EU, India unlikely to finalize trade agreement by end of year, Bloomberg News reports

    Explainer-What are the legal risks of EU's 'reparations loan' for Ukraine?

    Explainer-What are the legal risks of EU's 'reparations loan' for Ukraine?

    Ice-cream spin-off turns up heat on Unilever to deliver on growth, margins

    Ice-cream spin-off turns up heat on Unilever to deliver on growth, margins

    Google faces $129 million French asset freeze after Russian ruling, documents show

    Google faces $129 million French asset freeze after Russian ruling, documents show

    Hundreds of storks found dead near Madrid amid wider bird flu surge

    Hundreds of storks found dead near Madrid amid wider bird flu surge

    EIB to boost lending for EU defence projects in 2026

    EIB to boost lending for EU defence projects in 2026

    Austrian former tycoon Benko will appeal fraud conviction, lawyer says

    Austrian former tycoon Benko will appeal fraud conviction, lawyer says

    Israel gives legal status to 19 West Bank settlements, media reports

    Israel gives legal status to 19 West Bank settlements, media reports

    View All Finance Posts
    Previous Finance PostBUILDING A FINTECH – “ROADMAP TO A SUCCESSFUL FUTURE”
    Next Finance PostMIFID II: UK FINANCIAL SERVICES SECTOR RISKS NON-COMPLIANCE AND €5M FINES THROUGH LACK OF AWARENESS, ACCORDING TO RESEARCH FROM NPL