{"id":904,"date":"2024-11-20T09:01:00","date_gmt":"2024-11-20T09:01:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=904"},"modified":"2024-11-20T09:01:00","modified_gmt":"2024-11-20T09:01:00","slug":"11-biggest-financial-sector-cybersecurity-threats","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=904","title":{"rendered":"11 biggest financial sector cybersecurity threats"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>The financial sector faces a wide array of serious security threats that will only increase as cybercriminals make greater use of AI.<\/p>\n<p>Financial sector firms are uniquely exposed to cyber risk due to the large amounts of sensitive data and transactions they process. Common cyber risks across the sector include phishing, ransomware, data breaches, denial-of-service attacks, and advanced persistent threats.<\/p>\n<p>The shift to hybrid work models, the increasing adoption of cloud computing, and the emergence of novel threats against legacy cryptography heap further pressure on hard-pressed financial sector CISOs \u2014 who already face the burden of achieving compliance with numerous laws, regulations, and standards governing the sector.<\/p>\n<p>Following are the most significant cyber threats financial companies face today.<\/p>\n<h2 class=\"wp-block-heading\">1. Ransomware<\/h2>\n<p>Two-thirds (65%) of financial institutions worldwide <a href=\"https:\/\/www.statista.com\/statistics\/1460896\/rate-ransomware-attacks-global\/\">reported ransomware attacks in 2024<\/a>, a sharp rise from 34% in 2021, according to Statista. The average ransom demand is US$4.2 million, according to <a href=\"https:\/\/www.comparitech.com\/blog\/vpn-privacy\/ransomware-finance-sector\/\">recent research by cybersecurity reviews website Comparitech<\/a>, which found the average ransomware paid out was even higher, at US$7.4 million.<\/p>\n<p>Comparitech identified a total of 395 individual <a href=\"https:\/\/www.csoonline.com\/article\/563507\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\">ransomware<\/a> attacks on financial organizations over recent years with peaks in 2023 (105) and 2021 (104).<\/p>\n<p>\u201cOrganizations need to be mindful that paying a ransom might return access to systems but doesn\u2019t remove attacker access or necessarily prevent them selling the data they\u2019ve successfully targeted,\u201d warns David Higgins, senior director of the field technology office at identity management vendor CyberArk.<\/p>\n<p>More generally, malware attacks against finance sector firms doubled last year, according to <a href=\"https:\/\/www.sonicwall.com\/resources\/white-papers\/2024-sonicwall-cyber-threat-report\">network security vendor SonicWall<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">2. Phishing and social engineering<\/h2>\n<p>The financial services industry is also a prime target for brand impersonation attacks due to its vast amounts of sensitive data, such as banking credentials and <a href=\"https:\/\/www.csoonline.com\/article\/571817\/what-is-pii-examples-laws-and-standards.html\">personally identifiable information (PII)<\/a>.<\/p>\n<p>Two-thirds (68%) of identified phishing pages from August 2023 through July 2024 targeted financial institutions and their customers, according to a <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/financial-services-is-awash-in-attacks\">recent report by cybersecurity and content delivery vendor Akamai<\/a>.<\/p>\n<p>Information obtained via counterfeit banking sites allows cybercriminals to either loot online accounts or sell stolen banking credentials through underground marketplaces.<\/p>\n<p>Credentials for e-wallets and cryptocurrency accounts can be sold on the dark web for anywhere from US$120 to US$400. The high payoff of such schemes makes financial services prime targets of both brand abuse and phishing attacks.<\/p>\n<p>Introducing stronger identity verification and multifactor authentication (MFA) can reduce exposure to phishing attack. Introducing technologies to guard against email fraud and spoofing is also beneficial.<\/p>\n<p>\u201cOrganizations should deploy email authentication protocols such as Domain-based Message Authentication, Reporting &amp; Conformance [<a href=\"https:\/\/www.csoonline.com\/article\/564563\/mastering-email-security-with-dmarc-spf-and-dkim.html\">DMARC<\/a>] protection to prevent cybercriminals from spoofing their identity and reduce the risk of email fraud associated with their brand,\u201d advises Matt Cooke, cybersecurity strategist at email security experts Proofpoint.<\/p>\n<h2 class=\"wp-block-heading\">3. Distributed denial of service (DDoS)<\/h2>\n<p>Financial organizations rely on high availability, so <a href=\"https:\/\/www.csoonline.com\/article\/571981\/ddos-attacks-definition-examples-and-techniques.html\">DDoS attacks<\/a> pose a severe threat.<\/p>\n<p>The finance industry faces significant threats from hacktivist groups who target financial institutions \u2014 perceived as symbols of economic power \u2014 with DDoS attacks to advance political or social agendas, creating inconvenience and financial loss while drawing public attention to their causes.<\/p>\n<p>DDoS attacks are often driven by geopolitical tensions, including the Israel-Hamas conflict and the war in Ukraine. For example, a recent politically motivated DDoS attack in July <a href=\"https:\/\/www.akamai.com\/blog\/security\/akamai-blocked-419-tb-of-malicious-traffic\">targeted a major financial services company in Israel<\/a>, originating from a globally distributed botnet, and lasted nearly 24 hours, peaking at 798Gbps.<\/p>\n<p>The global financial services industry was more frequently targeted by DDoS attacks than any other business sector in the first half of 2024, according to Akamai.<\/p>\n<p>The issue is far from limited to conflict zones.<\/p>\n<p>In the first half of 2024, insurance agencies and brokerages were among the <a href=\"https:\/\/www.netscout.com\/threatreport\/key-findings\/\">top 10 most targeted sectors<\/a> by cybercriminals in EMEA, according to network performance management vendor NetScout.<\/p>\n<p>\u201cCritical infrastructure sectors, particularly banking and financial services, have experienced a 55% increase in DDoS attack activity over the last four years,\u201d Richard Hummel, threat intelligence lead for NetScout, tells CSO.<\/p>\n<h2 class=\"wp-block-heading\">4. Advanced persistent threats (APTs)<\/h2>\n<p>Financial institutions are frequently targeted by state-sponsored \u2014 mostly by North Korea or Iran \u2014 and other APT attackers who seek to either steal funds, manipulate the financial system, or gain intelligence.<\/p>\n<p>\u201cAPT groups will continue to use sophisticated tactics, including living-off-the-land (LotL) techniques, to remain undetected,\u201d threat intel firm ReliaQuest <a href=\"https:\/\/www.reliaquest.com\/blog\/threat-landscape-report-finance-insurance-sector\/\">warns<\/a>. \u201cSecuring sensitive digital assets and enhancing transaction security are critical for the sector.\u201d<\/p>\n<p>North Korean state-sponsored actors, such as Lazarus, are well known for monetizing cyberattacks \u2014 most notoriously through the <a href=\"https:\/\/www.csoonline.com\/article\/574727\/lazarus-group-infiltrated-south-korean-finance-firm-twice-last-year.html\">February 2016 cyber heist<\/a> of Federal Reserve Bank of New York account belonging to Bangladesh Bank. More recently North Korean cyberspies have targeted cryptocurrency exchanges and wallets to steal or launder cryptocurrency.<\/p>\n<h2 class=\"wp-block-heading\">5. Insider threats<\/h2>\n<p>Insider threats, often exacerbated by overprivileged access and embedded secrets, are a prominent risk in financial organizations.<\/p>\n<p>A disgruntled or mendacious employee with privileged access to systems and data can cause a great deal of harm. \u201cIn the finance industry, insider threats can lead to data breaches, fraud, or theft of sensitive financial information,\u201d security vendor <a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/cyber-security-in-finance\/\">SentinelOne warns<\/a>.<\/p>\n<p>The risk can be mitigated in part by managing access controls and ensuring sensitive information is accessible only to authorized personnel.<\/p>\n<h2 class=\"wp-block-heading\">6. Security debt<\/h2>\n<p>Flaws that remain unfixed for longer than a year exist in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt, according to <a href=\"https:\/\/www.veracode.com\/sites\/default\/files\/2024-10\/Financial-Services-State-of-Software-Security-2024.pdf\">recent research by application risk management vendor Veracode<\/a>.<\/p>\n<p>Veracode researchers found 40% of all applications in the financial sector have security debt, marginally better than a cross-industry average of 42%. Only 5.5% of financial sector applications are flaw free.<\/p>\n<p>The majority (84%) of all security debt affects first-party code, but the majority (78%) of critical security debt comes from third-party dependencies. Researchers found that financial organizations fix half of first-party flaws in the first nine months, compared to 13 months for third-party flaws.<\/p>\n<p>Delays in fixing, or at least remediating, insecure code threaten financial sector security, according to Veracode, which warns that security debt in the financial sector is escalating rather than improving.<\/p>\n<h2 class=\"wp-block-heading\">7. Software supply chain risks<\/h2>\n<p>The latest edition of <a href=\"https:\/\/www.verizon.com\/business\/resources\/Te3\/reports\/2024-dbir-data-breach-investigations-report.pdf\">Verizon\u2019s Data Breach Investigations Report<\/a> warned of a 68% surge in breaches resulting from <a href=\"https:\/\/www.csoonline.com\/article\/561323\/supply-chain-attacks-show-why-you-should-be-wary-of-third-party-providers.html\">supply chain attacks<\/a> over the past year, particularly targeting critical vendors in software, data processing, and IT infrastructure.<\/p>\n<p>\u201cSupply chain cyber threats also pose a significant risk to the FSI [financial services and insurance] sector, especially with the increase in reliance on third-party IT services,\u201d Lewis Duke, SecOps and threat intelligence lead at Trend Micro, tells CSO.<\/p>\n<p>Last December a ransomware attack on a service provider left 60 US credit unions facing outages. An earlier <a href=\"https:\/\/www.csoonline.com\/article\/570191\/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html\">2020 supply chain attack on SolarWinds\u2019s Orion<\/a> network monitoring software, widely used in government and industry, served as a wakeup call about the class of threat.<\/p>\n<p>\u201cTo mitigate this risk, FSI organisations must implement rigorous <a href=\"https:\/\/www.csoonline.com\/article\/1305977\/6-best-practices-for-third-party-risk-management.html\">vendor risk management programs<\/a>, and conduct thorough security assessments and audits of third-party providers,\u201d Trend Micro\u2019s Duke advised.<\/p>\n<p>Vulnerabilities in open-source components and third-party libraries are increasingly exploited in sophisticated supply chain attacks, experts warn.<\/p>\n<p>\u201cSBOM [<a href=\"https:\/\/www.csoonline.com\/article\/573185\/what-is-an-sbom-software-bill-of-materials-explained.html\">software bills of materials<\/a>] automation tools scan dependencies to identify and mitigate vulnerabilities early in the development lifecycle, reducing exposure to these threats,\u201d says Philip Pearson, field CISO at cloud-native application security vendor Aqua Security.<\/p>\n<h2 class=\"wp-block-heading\">8. Cryptojacking<\/h2>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/564521\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html\">Cryptojacking<\/a> occurs when malware infiltrates an organization\u2019s network and steals resources to mine cryptocurrency. Threat actors spread this malware through malicious websites, browser extensions, phishing emails, unsecured cloud instances, and by exploiting vulnerabilities.<\/p>\n<p>The scam is on the rise with security researchers reporting a 659% year-on-year rise in global cryptojacking by the end of 2023, according to SonicWall.<\/p>\n<p>ReliaQuest warns both financially motivated cybercriminals and nation-state-backed APT groups pose cryptojacking threats to the finance industry, which they covet for its huge computational resources.<\/p>\n<h2 class=\"wp-block-heading\">9. Emerging quantum threats to encryption<\/h2>\n<p>Quantum computers are advancing toward solving complex mathematical problems that underlie today\u2019s public-key cryptography. Once operational, they could render current encryption obsolete, exposing sensitive financial data to breaches.<\/p>\n<p>\u201cQuantum computers present a threat to RSA or elliptic curve-based public key encryption systems that financial sector organizations rely on to protect sensitive data,\u201d says Dr. Marc Manzano, general manager for cybersecurity at AI and quantum technologies specialist SandboxAQ. \u201cTo mitigate this risk, financial institutions need to establish comprehensive programs to modernize cryptography management.\u201d<\/p>\n<p>Fortunately, the threat has been long-anticipated and development of cryptographic algorithms secure against cryptanalytic attacks by a quantum computer <a href=\"https:\/\/www.csoonline.com\/article\/654887\/11-notable-post-quantum-cryptography-initiatives-launched-in-2023.html\">has been in the works for years<\/a>.<\/p>\n<p>The US National Institute of Standards and Technology (NIST) <a href=\"https:\/\/www.csoonline.com\/article\/3487766\/cisos-urged-to-prepare-now-for-post-quantum-cryptography.html\">released its first set of quantum-resistant algorithms<\/a> in August 2024. Early adoption of these technologies aligns institutions with global best practices and regulatory expectations.<\/p>\n<p>The G7 Cyber Expert Group (CEG) \u2014 chaired by the US Department of the Treasury and the Bank of England \u2014 is <a href=\"https:\/\/home.treasury.gov\/system\/files\/136\/G7-CYBER-EXPERT-GROUP-STATEMENT-PLANNING-OPPORTUNITIES-RISKS-QUANTUM-COMPUTING.pdf\">advising financial authorities and institutions to take proactive measures against quantum risks<\/a>.<\/p>\n<p>Organizations should plan for a <a href=\"https:\/\/www.csoonline.com\/article\/3552701\/the-cisos-guide-to-establishing-quantum-resilience.html\">phased migration of their IT infrastructure<\/a> to quantum-resistant encryption, ensuring continued data security in a post-quantum era.<\/p>\n<h2 class=\"wp-block-heading\">10. Emerging AI-assisted attacks<\/h2>\n<p>AI speeds up credential stuffing and <a href=\"https:\/\/www.csoonline.com\/article\/569513\/brute-force-attacks-explained-and-why-they-are-on-the-rise.html\">brute-force attacks<\/a>, allowing cybercriminals to test passwords at a rate no human could match. Gen AI tools can also be abused to create <a href=\"https:\/\/www.csoonline.com\/article\/656698\/generative-ai-phishing-fears-realized-as-model-develops-highly-convincing-emails-in-5-minutes.html\">much more convincing phishing scams<\/a>.<\/p>\n<p>\u201cThe misuse of AI has stepped up phishing efforts,\u201d according to Megha Kumar, chief product officer at global cyber consultancy CyXcel. \u201cForget those obvious, typo-filled scam emails. Now, cybercriminals can send highly tailored, professional-looking messages that are much more likely to trick people.\u201d<\/p>\n<p>\u201cWhile commercial generative AI tools, such as ChatGPT, have attempted to build guardrails to prevent bad actors from using the technology for malicious purposes, adversarial tools such as WormGPT have emerged to fill the gap for attackers,\u201d adds Keiron Holyome, VP of UKI and emerging markets at BlackBerry Cyber.<\/p>\n<p>Research has shown <a href=\"https:\/\/www.vice.com\/en\/article\/how-i-broke-into-a-bank-account-with-an-ai-generated-voice\/\">gen AI can be abused to create fraudulent voice imprints<\/a> capable of circumventing biometric identification tools used by banks.<\/p>\n<p>That\u2019s just the start of it.<\/p>\n<p>Criminals might use AI to comb through huge data sets quickly, identifying valuable targets for data theft, among other malicious applications.<\/p>\n<p>\u201cMalware empowered by AI can learn typical user or network behaviors, enabling attacks or data exfiltration that evades detection by better mimicking normal activity,\u201d Holyome says. \u201cAI-powered reconnaissance tools may facilitate autonomous scanning of networks for vulnerabilities, choosing the most effective exploit automatically.\u201d<\/p>\n<h2 class=\"wp-block-heading\">11. Tougher regulatory regimes<\/h2>\n<p>Not a cyber threat per se, but banks, insurance, and investment firms in particular are subject to an increasingly wide range of regulations and compliance requirements, with new cybersecurity strictures upcoming.<\/p>\n<p>\u201cFailing to implement appropriate cybersecurity measures may expose [finance sector organizations] to reputational as well as enforcement risks, including severe fines under the GDPR,\u201d warns Sarah Pearce, partner at law firm Hunton Andrews Kurth. \u201cWe are seeing an increased focus on operational resilience with upcoming legal frameworks on cybersecurity evolving and becoming more prescriptive.\u201d<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/570091\/eus-dora-regulation-explained-new-risk-management-requirements-for-financial-firms.html\">DORA (Digital Operational Resilience Act) regulations<\/a> are set to take effect across the EU in January 2025, bringing with them a requirement for banks to establish comprehensive risk management frameworks.<\/p>\n<p>\u201cWithin the next year, banks will, for example, be required to comply with considerable cybersecurity obligations under DORA,\u201d according to Pearce. \u201cObligations will vary depending on the specific type of products and services they offer.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The financial sector faces a wide array of serious security threats that will only increase as cybercriminals make greater use of AI. Financial sector firms are uniquely exposed to cyber risk due to the large amounts of sensitive data and transactions they process. Common cyber risks across the sector include phishing, ransomware, data breaches, denial-of-service [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":905,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-904","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/904"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=904"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/904\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/905"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}