Interviews

Cyber-attacks against finance

by Mark Rowe

How banks can maintain information security by bolstering internal controls; by Bala Venkatramani – Marketing Manager at ManageEngine Password Manager Pro.

News media in the US are abuzz with stories about cyber-attacks on top banks as financial institutions emerge as the prime targets of cyber-criminals. Reports suggest that since September 2012, cyber-attacks on bank networks have exploded.

Actually, banking and other financial institutions have always been a top target of hackers. During the past few years, renowned banking organisations across the globe have fallen prey to criminal hacks. Beyond huge financial losses, the victims suffer irreparable damage to their trust and credibility, the hallmarks of financial institutions.

The hackers’ predominant activities include spreading malware infections, syphoning of log-in credentials and denial of service attacks that disrupt service to legitimate users. The traditional security attack channels include viruses, key-logger trojans and cross-site scripting. The Trojans monitor keystrokes, log them to a file and send them to remote attackers. Scripting, on the other hand, enables malicious attackers to inject client-side script into web pages viewed by other users and exploit the information to bypass access controls.

Evolving attack patterns

Perimeter security software and traffic analysis solutions help in combating traditional attack vectors. However, hackers are starting to change their modus operandi. Cyber-criminals are now siphoning off log-in credentials of employees and administrative passwords of IT resources, using techniques that include spam and phishing emails, keystroke loggers, and Remote Access Trojans (RAT).

Once the login credential of an employee or an administrative password of a sensitive IT resource is compromised, the institution is vulnerable. The criminal can initiate unauthorised wire transfers, view the transactions of customers, download customer information and/or carry out sabotage.

Another emerging threat is sabotage caused by the insiders at the financial institutions. Disgruntled staff, greedy techies and sacked employees have all been involved in cyber-security incidents. Clearly, breaches of trust can occur anywhere, leading to grave consequences.

In internal and external attacks alike, unauthorised access and misuse of privileged passwords — the ‘keys to the kingdom’ — have emerged as the main activities. Administrative passwords, system default accounts and hard-coded credentials in scripts and applications have all become the prime targets of cyber-criminals.

Overlooking privileged passwords

While internal and external hackers are exploiting administrative passwords with increasing frequency, many financial institutions fail to recognise the importance of this crucial aspect of privileged password management. Passwords of enterprise IT resources are often stored in spreadsheets, text files, home-grown tools, papers or even in physical vaults. Yet these volatile sources are inherently insecure and do little to enhance data security or business reputation.

Passwords are further compromised in IT divisions that deal with thousands of privileged passwords, which are used in a ‘shared’ environment. This is a standard practice, which leaves a group of administrators to use a common privileged account to access a given resource.

Apart from the ‘officially shared’ passwords, users also tend to reveal administrative passwords to their colleagues, unofficially, for some reason or other. The most common reason for unofficial sharing of a password is to handle an emergency, eg, an IT manager may reveal the password to a senior member when the manager is on vacation.

Developers, help desk technicians and even third-party vendors may require access to privileged passwords purely on a temporary basis. The passwords are often supplied via email or over the phone, both of which are highly insecure media. Worse, there is no process to revoke access and reset the password after the temporary usage, leaving an even bigger security hole.

Privileged password negligence often proves costly. Haphazard password management makes the enterprise a paradise for hackers inside and outside the financial organisation. Many security breaches stem from inadequate password management policies, access restrictions and internal controls.

Tightening Internal Controls

Combating sophisticated cyber-attacks demands a multi-pronged strategy incorporating an exhaustive set of activities. Financial institutions need to deploy security devices, enforce security policies, control access to resources, monitor events, analyse logs, detect vulnerabilities, manage patches, track changes, ensure compliance and monitor traffic among other activities.

Of all the combat measures, bolstering internal controls holds special significance in light of the recent attack trends. Access to IT resources should strictly be based on job roles and responsibilities. But access restrictions alone are not enough and must be supplemented with clear-cut trails that reveal ‘who’ accessed ‘what’ and ‘when.’ Likewise, password sharing should be regulated, and a well-established workflow should be in place for release of passwords of sensitive resources. Standard password management policies, including usage of strong passwords and frequent rotation should be enforced.

One of the effective ways to bolster internal controls is automating the entire lifecycle of privileged access management and systematically enforcing best practices. Privileged password managers like ManageEngine’s Password Manager Pro replace manual practices and automatically assist with securely storing privileged identities in a central vault, selectively sharing passwords, enforcing policies and above all, restricting access to and establishing total control over privileged identities. Enterprise-class password managers offer advanced protection of IT resources by helping establish access controls to IT infrastructure, and seamlessly video recording and monitoring all user actions during privileged sessions, providing complete visibility on privileged access.

Bolstering internal controls as detailed above will ensure that privileged identities will not be compromised — even if a hacker manages to penetrate the perimeter. Similarly, the threats due to attacks by malicious insiders are greatly mitigated.

Staying Vigilant

Once internal controls have been tightened, financial institutions must remain vigilant and keep an eye on activities going on inside and around them. Logs from critical systems carry vital information that could prove effective in preventing security incidents. For instance, monitoring activities like user log-ons, failed log-ins, password access, password changes, attempts to delete records and other suspicious activities could help identify hacking attempts, malicious attacks, DoS attacks, policy violations and other incidents. Monitoring network activity to establish real-time situational awareness is essential to enterprise security.

Not all security incidents can be prevented or avoided. Nor can privileged password management thwart all cyber-security incidents. However, too many security incidents occur as a result of lax internal controls — poor password management, in particular — and those violations can certainly be prevented. It’s time for IT organisations to take the bull’s eye off of the financial community networks and data and enforce some enterprise-class password protection.

Visit www.passwordmanagerpro.com

About the firm

ManageEngine is exhibiting at Infosecurity Europe 2012, the industry event on April 24 to 26, at Earl’s Court, London. For further information – visit www.infosec.co.uk

Related News

  • Interviews

    Beware human factor

    by Mark Rowe

    Most UK employers are underestimating the “human factor” of staff behaviour in corporate cyber risk. That is among the findings from a…

  • Interviews

    Complying with PCI DSS 3.0

    by Mark Rowe

    Gavin Watson, a penetration tester and senior security engineer at Accumuli Security company (www.accumuli.com) company, RandomStorm (www.randomstorm.com) writes after the Payment Card…

  • Interviews

    Cyber challenges

    by Mark Rowe

    Modern life is increasingly dependent on a multitude of interconnected and interdependent infrastructures. While sectors such as food, water, health and transportation…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing