Connect with us

Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website. .


The scale of DDoS attacks against the finance industry

iStock 919567592 - Global Banking | Finance

Richard Hummel ASERT Threat Intelligence Lead for NETSCOUT - Global Banking | Finance

 By Richard Hummel, ASERT Threat Intelligence Lead for NETSCOUT

Over the last two years, the way in which financial institutions operate has changed significantly. Businesses in the finance industry have had to adapt their operation models and implement remote working policies as a result of the Covid-19 pandemic. By working from home, large volumes of employees’ private and sensitive material has been left exposed to cybercriminals operating outside of the traditional perimeters, owing to the data being accessed from off-site locations. Unsurprisingly, threat actors have taken advantage of the opportunity this has presented to them.

In its recently published Threat Intelligence Report, NETSCOUT discovered that threat actors had launched approximately 5.4 million Distributed Denial-of-Service (DDoS) attacks during the first half of 2021, an 11 percent increase from the same time period in 2020, with the peak occurring between January and March of 2021.

This should be significant cause for concern among those responsible for the security of these organisations, as the report also found that in the first half of 2021, more than 50 percent of those targeted by DDoS extortion attacks were in the financial industry. What’s more, NETSCOUT found that more than 7,000 DDoS attacks were launched against commercial banks and payment card processors during the first six months of 2021.

Although at first it may appear as if this attack activity is relatively minor compared to the overall numbers, many of these attacks succeeded in causing major disruption. This, in turn, had a damaging impact on downstream consumers attempting to use their credit cards as well as the targeted organisations. If a commercial bank or payment card processor is attacked, this can have major consequences, since credit card processors have the capacity to service over 5,000 transactions per second, so even in a scenario in which they suffer from a few minutes of downtime, there is the potential for millions of pounds of revenue to be lost. This can also have an extremely negative effect on the organisation’s brand and customer retention.

Types of DDoS attacks being launched by threat actors

As already discussed, financial institutions receive a large number of DDoS extortion attacks. These types of attacks differ from other DDoS attacks as the threat actors run a demonstration DDoS attack against elements of the business’s online infrastructure, either prior to or after sending an email to the company demanding for payment in cryptocurrency, usually Bitcoin.

One of the main reasons why threat actors target financial institutions using DDoS extortion attacks, is because these organisations are known to have access to large volumes of data and money. For example, the Lazarus Bear Armada (LBA) DDoS extortion campaign targeted financial institutions such as commercial banks and market institutions, including the New Zealand Stock Exchange. Further to this, professional ransomware gangs have added triple extortion attacks to their weaponry. Through a combination of file encryption, data theft and DDoS attacks, cybercriminals have hit a ransomware trifecta with the aim of increasing the payment potential.

In addition to this, threat actors are utilising increasingly complex techniques when it comes to launching DDoS attacks against financial institutions. Evidence of this can be seen with cybercriminals tailoring the types of attacks that they are using to try and overwhelm the several layers of on-premises and cloud-based DDoS protection, which have been installed in an attempt to penetrate financial organisations’ online infrastructure. An example of this can be seen with an increased usage of TCP ACK flood attacks, which are designed to overload and obstruct connections between servers against commercial banks and payment card processing solutions. As a result, both institutional and end customers utilising these services have been impacted by downtime and outages.

What can financial institutions do to protect themselves?

As is the case with numerous aspects of the human condition, the 80/20 rule – also known as the Pareto Principle after its famous expositor, the economist Vilfredo Pareto – can be applied not only to economics but also to internet security and DDoS protection. For around 80 percent of DDoS attacks, businesses that have put into effect the appropriate industry best current practices (BCPs) will be able to ensure availability in the event they’re hit by a DDoS attack. In terms of the remaining 20 percent of attacks, financial institutions need to optimise their DDoS defence systems based on numerous factors, including vector selection and attack behaviour. Nonetheless, the effort and time required to adequately prepare means that defenders need to react in a manner which is deemed situationally appropriate, so that the attacks are thwarted, and the resiliency of their online properties are maximised. As such, there are numerous actions businesses in the finance industry can take to ensure they’ve maximised their ability to defend themselves against DDoS attacks.

Firstly, for financial institutions to adequately defend their public-facing online infrastructure from this continued threat, it is essential for them to invest in a strong and effective DDoS protection system. Through the implementation of comprehensive DDoS mitigation, the threat posed by cybercriminals will be neutralised. This is because the system will prevent DDoS attacks from causing significant damage, due to the preventative measures which are in place. If organisations with an adequate DDoS defence system are on the receiving end of a DDoS attack, they will have peace of mind and full confidence in the system they’re using.

Secondly, finance businesses need to test their DDoS mitigation system on a semi-regular basis. Periodic testing ensures that any changes and tweaks to an organisation’s online systems are incorporated into the comprehensive protection plan, defending the whole of the online infrastructure from DDoS attacks. Finally, financial institutions should also strongly consider employing an on-demand DDoS attack specialist. By utilising the expertise of a specialist, businesses will be able to negotiate unfamiliar circumstances and terrain, which should benefit the entire company, as well as individual teams. So long as financial organisations adhere to BCP procedures and put into effect these aforementioned recommendations, they will be in a strong position to successfully defend their online properties should they be the target of a DDoS attack.

The continued evolution of DDoS attacks, which are constantly becoming more and more intricate and hard to defend, means financial institutions must implement security capable of preventing these complex attacks from causing serious damage. By doing this, organisations in the financial sector will be well placed to defend themselves from cybercriminals if they so happen to be on the receiving end of a DDoS attack.

Global Banking & Finance Review


Why waste money on news and opinions when you can access them for free?

Take advantage of our newsletter subscription and stay informed on the go!

By submitting this form, you are consenting to receive marketing emails from: Global Banking & Finance Review │ Banking │ Finance │ Technology. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Recent Post