Operations

5/9/2016
06:30 PM
50%
50%

Reuters: Police Say SWIFT Techs Made Bangladesh Bank More Vulnerable Before Heist

SWIFT rejects 'baseless allegations' that software company's negligent security procedures had anything to do with $81 million wire transfer heist.

Three months before Bangladesh Bank was victim to an $81 million cyber heist, technicians from financial software platform company SWIFT opened the bank up to new vulnerabilities, Bangladeshi police told Reuters.  

Last month, researchers reported that highly customized malware exploited vulnerabilities in the bank's computing environment, then hid its fraudulent behavior by tricking the SWIFT software; but it did not exploit a SWIFT vulnerability, per se. Now, police and a bank official told Reuters that SWIFT's people, if not its platform, may be partly responsible for making the bank's computing environment more vulnerable.

According to police, SWIFT technicians did not follow adequate security procedures when they connected the platform to a new bank transaction system that enables domestic banks and the central bank to transfer large sums between themselves. Their negligence "caused much more risk for Bangladesh Bank," police said. In February, attackers used this system to send fraudulent messages, requesting nearly $1 billion in wire transfers. Most of them were blocked, but $81 million in transfers were successfully carried out. 

Police told Reuters the SWIFT messaging system was "widely accessible, including remote access with only a simple password," partly because technicians left open a wireless connection they had established just for the project, after the job was finished. They also criticized SWIFT for failing to connect the two systems on a private LAN, failing to disable a USB port, choosing to use an outdated networking switch, and failing to install a firewall between the systems.  

Investigators are trying to ascertain whether these actions were a case of negligence, or whether they intentionally made the bank more vulnerable. 

SWIFT rejected the police statements, telling Reuters in a subsequent story they were "baseless allegations" and that Bangladesh Bank, not SWIFT, "is responsible for the security of its own systems interfacing with the SWIFT network and their related environment."

Police did not provide evidence for their allegations and Reuters has not yet obtained third-party confirmation. 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Wesk
50%
50%
Wesk,
User Rank: Apprentice
6/21/2016 | 9:59:01 AM
Re: Yup.
Damage control and diversion of blame.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/10/2016 | 9:27:31 AM
Yup.
Hey, if they can't find the criminals, then finding someone to sue is the next best thing, right?
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-6461
PUBLISHED: 2019-03-21
Remote file inclusion allows an attacker to craft a specific URL referencing the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, or BMXP342030H PLC web server, which, when launched, will result i...
CVE-2015-6462
PUBLISHED: 2019-03-21
Reflected Cross-Site Scripting (nonpersistent) allows an attacker to craft a specific URL, which contains Java script that will be executed on the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, ...
CVE-2018-13798
PUBLISHED: 2019-03-21
A vulnerability has been identified in SICAM A8000 CP-8000 (All versions < V14), SICAM A8000 CP-802X (All versions < V14), SICAM A8000 CP-8050 (All versions < V2.00). Specially crafted network packets sent to port 80/TCP or 443/TCP could allow an unauthenticated remote attacker to cause a D...
CVE-2019-5490
PUBLISHED: 2019-03-21
Certain versions between 2.x to 5.x (refer to advisory) of the NetApp Service Processor firmware were shipped with a default account enabled that could allow unauthorized arbitrary command execution. Any platform listed in the advisory Impact section may be affected and should be upgraded to a fixed...
CVE-2019-8997
PUBLISHED: 2019-03-21
An XML External Entity Injection (XXE) vulnerability in the Management System (console) of BlackBerry AtHoc versions earlier than 7.6 HF-567 could allow an attacker to potentially read arbitrary local files from the application server or make requests on the network by entering maliciously crafted X...