Threat actors appear to have broken new ground with an attack on the UK's Tesco Bank where they managed to steal money from more than 20,000 accounts at nearly the same time in automated fashion.
Details of the weekend attack are still just emerging, but Tesco has confirmed the breach and suspended the ability for current account customers to use their debit card for online transactions.
So far the company has not put any restrictions on the ability for affected customers to use their cards for cash withdrawals, direct debit, and bill payments. Current account customers are also still able to use their debit cards for chip-and-PIN payments.
In the statement announcing the incident, Tesco Bank CEO Benny Higgins reassured customers that any money stolen from their accounts would be reimbursed by end of day Tuesday.
The BBC Monday quoted Higgins as describing the theft as a systematic, sophisticated attack. The bank has already figured out exactly what happened but is unable to disclose details because of the ongoing investigation, Higgins told BBC. So far, the bank has not used the word “hack” in connection with the attack, BBC added.
In total, about 40,000 current accounts experienced suspicious transactions over the weekend and money was illegally withdrawn from about half of them.
Tesco has not revealed how much money the attackers managed to steal from its customers. But it has stressed that only relatively small amounts were stolen from consumer accounts the BBC said.
However, comments posted on Tesco bank’s community forum by irate customers suggest that at least some of them suffered substantial losses. One customer for example complained about a £2,400 loss while another spoke of a £600 dent in his or her account.
The Tesco attack is of course not the first attack on a major bank and it likely may not be the biggest in terms of losses, either. What makes it different is the sheer number of consumer accounts that were looted in what appears to be near-simultaneous fashion.
Typically, online bank heists have either involved individual account takeovers or attacks like those involving the SWIFT network earlier this year. Thousands of US individuals, small businesses, local governments, and school districts, for instance, have cumulatively lost hundreds of millions of dollars in recent years to account takeovers where attackers steal account credentials and use them to initiate illegal wire transfers.
The fact that attackers in the Tesco case somehow had simultaneous access to over 20,000 accounts suggests an inside job, says Greg Salyards, principal sales consultant at Identity Automation.
“I doubt a third-party gained access to and logged on with 20,000 plus client credentials to process transfers externally,” Salyards says. Instead, what likely happened is an IT administrator, bank processor, or contractor with the right credentials to either change client passwords or log on as the client, was somehow involved, Salyards says. But without more information, he notes, this is pure speculation.
“Some type of batch process was probably run internally by someone who has now boarded a flight to a country with no extradition agreement with the UK,” Salyards says.
Mark Wilson, director of product management at STEALTHbits Technologies, says it's highly unlikely the attacks were compromised in a single attack by an external attacker.
It is possible that an attacker managed to infiltrate malware past Tesco’s perimeter security and propagated it across the enterprise. Even so, unless there had been a serious breach of internal policies and processes, it is unlikely an external attacker would have acquired the privileges needed to access so customer accounts.
“If Tesco's data was secured as required by PCI and the various compliance bodies, then the likeliest candidate is a rogue administrator—or administrators,” Wilson says.
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio