Illustration depicting cybersecurity threats in banking - Global Banking & Finance Review
An image representing the cybersecurity challenges faced by the European Central Bank following a recent hacking incident. This highlights the importance of data protection and encryption in banking applications.
Banking

EUROPEAN CENTRAL BANK HACKING: WHAT ARE THE LEARNINGS?

Published by Gbaf News

Posted on July 29, 2014

3 min read
Add as preferred source on Google

By Gary Newe, Sr. Systems Engineering Manager, F5 Networks

European Central Bank Data Breach Details

In the news yesterday, we saw that the European Central Bank has been hacked, with attackers stealing email addresses and contact data from the bank’s public website. Worryingly, the theft came to light after an anonymous email was sent to the bank seeking financial compensation for the data.

Possible Attack Methods and Vulnerabilities

In this instance without the full information, it looks like the application was to blame and an exploit like SQL injection, a code injection technique used to attack data-driven applications, may have been used. The welcome news for customers is that the attacker was not able to get to their internal systems, meaning that the bank must have used a Demilitarized Zone (DMZ) or full system separation for the internal and external systems – something that all organisations holding sensitive data should have in place.

Gary Newe

Gary Newe

This attack is the latest to deliver a clear message to businesses across Europe – the assets we protect are no longer the infrastructure or the networks, it is the information contained in the applications that we need to address. To protect this information we need to have the full context of the user’s interaction with the application. We need to use tools like web application firewall (WAF), proxy functionality, and contextual awareness to understand and separate legitimate users from those with more suspicious motives and better protect our data using these insights in real-time.

Encryption Practices and Data Exposure

Another question to ask is, why isn’t all personal information encrypted? In this case, while most of the data was encrypted, parts of thedatabase included email addresses, some street addresses and phone numbers were not. The database also contained data on downloads from the website in encrypted form. With this information, we have to ask why we are still only encrypting the bare minimum of information. Just because someone’s credit card number is not exposed, there can still be enough personal information available which proves valuable to hackers.

Identity Data Versus Credit Card Data

Recently the black market has been flooded with credit card numbers, meaning that there has been a significant drop in the cost for someone to acquire them. The higher value items are a whole identity, such as the combination of an email address, telephone number and street address. With this information there is a lot more it can be used for, including selling phone numbers to targeted advertisers, spam and identity theft.

Rising Trends in Banking Cyber-Attacks

Over the past couple of years we have seen a rise in the amount of cyber-attacks carried out on banks, including China’s central bank in 2013 and Russia’s central bank a few months ago. With the sophistication of cyber-attacks developing at such a vast rate, and with this recent incident in mind, it is now more important than ever that organisations take note and put stringent processes in place to prevent more attacks like this from happening. The tools are available and straightforward to implement, but it’s down to businesses to prioritise cyber in their planning.

Key Takeaways

  • The ECB suffered a breach of a public-facing database, exposing unencrypted email addresses and contact data.
  • The compromised database was isolated from internal systems, protecting internal and market-sensitive data.
  • Attackers attempted blackmail via anonymous email demanding compensation for the stolen data.
  • Partial encryption was applied but not for all personal data, underscoring the need for comprehensive encryption.
  • Use of WAFs, proxies, contextual awareness, and full encryption is critical to prevent similar attacks.

References

Frequently Asked Questions

What data was stolen in the ECB hack?
Hackers accessed email addresses, some street addresses and phone numbers from the ECB’s public website database; other data like download information was encrypted.
Were internal systems or market-sensitive data affected?
No. The breached database was physically separate, and no internal or market-sensitive systems were compromised.
How was the breach discovered?
ECB discovered the breach only after receiving an anonymous email demanding financial compensation for the stolen data.
What security measures does this incident highlight?
It underscores the need for full data encryption, web application firewalls, proxy protection, and contextual monitoring for user interactions.
Why encrypt more than credit card data?
Because combinations of email, phone numbers and addresses are valuable to criminals for identity theft, spam, or targeted advertising, even without credit card details.

Tags

Related Articles

More from Banking

Explore more articles in the Banking category