Bangladesh Bank Theft: New York Fed Stands By Transfer ProceduresBangladesh Bank Theft: New York Fed Stands By Transfer Procedures
Bank replies to US lawmaker query whether transfer of funds should have been blocked.
May 16, 2016
The Federal Reserve Bank of New York has said there is no problem with its automated fund-transfer procedures and that it only manually checks credibility of transfers related to individuals or bodies put under sanctions, reports Reuters.
The bank’s executive vice president and general counsel Thomas Baxter was replying to a query from US Represntative Carolyn Maloney with regard to the $81-million Bangladesh Bank heist in February 2016.
Maloney has questioned the procedures used by the New York Fed and whether it should have blocked the transfers which allowed $81 million to be stolen from Bangladesh Bank via the SWIFT network. The New York Fed managed to block 30 of the transfers but after letting five get through.
On April 14 Baxter replied to Maloney saying the bank was dependent on the verification carried out by SWIFT and approved all transfers once they had been authenticated by the network. There are no measures in place at the bank “designed to protect our customers from an unauthorized transfer”, said Baxter.
The lawmaker said she was "concerned that there are critical security gaps in the international payment system”.
More on this story at Reuters.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
Identity Access Management 101