Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/7/2016
03:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Was Theft Of Money From 20,000 Tesco Bank Customers An Inside Job?

UK bank confirms attack, but so far has not used the word 'hack.'

Threat actors appear to have broken new ground with an attack on the UK's Tesco Bank where they managed to steal money from more than 20,000 accounts at nearly the same time in automated fashion.

Details of the weekend attack are still just emerging, but Tesco has confirmed the breach and suspended the ability for current account customers to use their debit card for online transactions.

So far the company has not put any restrictions on the ability for affected customers to use their cards for cash withdrawals, direct debit, and bill payments. Current account customers are also still able to use their debit cards for chip-and-PIN payments.

In the statement announcing the incident, Tesco Bank CEO Benny Higgins reassured customers that any money stolen from their accounts would be reimbursed by end of day Tuesday.

The BBC Monday quoted Higgins as describing the theft as a systematic, sophisticated attack. The bank has already figured out exactly what happened but is unable to disclose details because of the ongoing investigation, Higgins told BBC. So far, the bank has not used the word “hack” in connection with the attack, BBC added.

In total, about 40,000 current accounts experienced suspicious transactions over the weekend and money was illegally withdrawn from about half of them.

Tesco has not revealed how much money the attackers managed to steal from its customers. But it has stressed that only relatively small amounts were stolen from consumer accounts the BBC said.

However, comments posted on Tesco bank’s community forum by irate customers suggest that at least some of them suffered substantial losses. One customer for example complained about a £2,400 loss while another spoke of a £600 dent in his or her account.

The Tesco attack is of course not the first attack on a major bank and it likely may not be the biggest in terms of losses, either. What makes it different is the sheer number of consumer accounts that were looted in what appears to be near-simultaneous fashion.

Typically, online bank heists have either involved individual account takeovers or attacks like those involving the SWIFT network earlier this year. Thousands of US individuals, small businesses, local governments, and school districts, for instance, have cumulatively lost hundreds of millions of dollars in recent years to account takeovers where attackers steal account credentials and use them to initiate illegal wire transfers.

The fact that attackers in the Tesco case somehow had simultaneous access to over 20,000 accounts suggests an inside job, says Greg Salyards, principal sales consultant at Identity Automation.

“I doubt a third-party gained access to and logged on with 20,000 plus client credentials to process transfers externally,” Salyards says. Instead, what likely happened is an IT administrator, bank processor, or contractor with the right credentials to either change client passwords or log on as the client, was somehow involved, Salyards says. But without more information, he notes, this is pure speculation.

“Some type of batch process was probably run internally by someone who has now boarded a flight to a country with no extradition agreement with the UK,” Salyards says.

Mark Wilson, director of product management at STEALTHbits Technologies, says it's highly unlikely the attacks were compromised in a single attack by an external attacker.

It is possible that an attacker managed to infiltrate malware past Tesco’s perimeter security and propagated it across the enterprise. Even so, unless there had been a serious breach of internal policies and processes, it is unlikely an external attacker would have acquired the privileges needed to access so customer accounts.

“If Tesco's data was secured as required by PCI and the various compliance bodies, then the likeliest candidate is a rogue administrator—or administrators,” Wilson says.

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
filthychats
50%
50%
filthychats,
User Rank: Apprentice
11/7/2016 | 8:14:41 PM
That's a lot of money
Even if only a third of the potentially affected accounts had money withdrawn with a mere $50 average, that is still well over half a million dollars lost. Ridiculous. 
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7914
PUBLISHED: 2020-02-21
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
CVE-2016-4606
PUBLISHED: 2020-02-21
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
CVE-2020-5243
PUBLISHED: 2020-02-21
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent hea...
CVE-2019-14688
PUBLISHED: 2020-02-20
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produc...
CVE-2019-19694
PUBLISHED: 2020-02-20
The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the ...