{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
Conditions are ripe for cyber threat actors and fraudsters to exploit opportunities during this period of bank stress. Customers seeking safety are moving substantial funds and engaging in numerous transactions. They’re often operating outside their usual conventions and relationships. And they are the target of fraudulent schemes perpetrated via phishing or mis/disinformation.
Systems at banks enmeshed in these adjustments due to bank stress are likely experiencing a capacity surge. Meanwhile, cyber and anti-fraud teams are busy implementing temporary rule changes in transaction monitoring and surveillance systems. The wave of activity and the temporary rule changes raise the probability that malicious activities by cyber adversaries could go undetected.
We see five key areas of heightened risk exposure where organizations should consider taking proactive action.
Impact:
With thousands of businesses potentially changing their banking relationships, cyber criminals are taking advantage of the environment by inserting themselves into the process and posing as legitimate users. Financially-motivated cyber criminals have been observed leveraging phishing campaigns and malicious domain registrations to impersonate financial institutions and banking consumers in an attempt to steal personal and financial information. In an uncertain and urgent environment, financial institutions can be extra-vigilant and take additional precautions to mitigate the risk of fraud via phishing attacks or compromised business email. (See PwC’s Strengthen bank fraud and financial crime defenses amid activity surge report.)
Key actions to consider:
Trust but verify - Enable multi-factor authentication (MFA) to prompt two forms of verification prior to authenticating users into the network and business systems. Prior to initiating payment transactions, it is important for financial teams to be cognizant of possible fraud and to take precautions, such as assessing multiple methods of verification. For areas where third-parties support execution, include additional monitoring of vendor-executed changes to payment/transaction source files to track any anomalous activity.
Prevent malicious spam - Enable advanced email threat protection capabilities such as filtering to protect against email spoofing and spearfishing and to help reduce the risk of spam emails ever reaching someone’s inbox.
Network hardening - Confirm network security protocols are configured to ‘deny by default,’ meaning all internet traffic is assumed to be malicious unless proven legitimate.
Inform users - Advise financial and accounting employees, executives and customers to be on the lookout for suspicious activity or unusual forms of communication urging them to take action. Reassure and inform customers of secure methods for engaging with financial institutions and conducting business transactions. Provide additional guidance to agents at call centers and help desks to flag and report suspicious activity.
Domain active monitoring - To help reduce the risk of domain spoofing, organizations should adopt a multi-pronged strategy that includes collecting domain intelligence, analyzing domain strings and content and mitigating risks through domain takedowns.
Impact:
Financial institutions experiencing a capacity surge should be prepared to manage people, process and technology expectations. A surge could affect a number of important processes and systems, including network infrastructure, security operations centers and cloud-based applications and severely disrupt business operations that could impact organizations and the financial markets at large.
Key actions to consider:
Capacity planning - Develop a capacity planning strategy that takes into account your business’s current and future needs with regards to infrastructure and resources. The strategy should include an incident response plan that outlines required steps in the event of a capacity surge.
Internal collaboration - Collaboration between security and IT teams is critical to determine if the infrastructure and resources required to manage capacity surges are in place. This may include reviewing network and system capacity, identifying potential gaps and evaluating backup resources. Additionally, close collaboration between fraud, insider threat and threat intelligence teams could be required to support development of new detection patterns to identify and block anomalous behavior.
External collaboration - Work closely with your Managed Security Service Providers (MSSPs) to confirm cyber operations resume their Business-as-Usual (BAU) mode with previously defined Service Level Agreements (SLA). Collaborate with your Cloud and SaaS vendors to manage and handle capacity surges and scale at short-notice during a crisis event.
Increase licenses - Assume that there will be a capacity surge and procure necessary licenses and required storage space in advance, especially for networking and security operations. Historically, license acquisition/approval processes are known to take a few days to weeks - this will likely need to be accelerated to adapt to the immediate capacity needs.
Impact:
Turbulent market conditions and significant customer transaction activity increases the risk of not detecting insider threats. Malicious intent or compromised insider access could be used as an avenue to take advantage of the situation to commit an act of fraud for personal gain and/or to manipulate existing technology and business controls. Additionally, waiving of certain monitoring activities could embolden individuals with privileged access to transfer confidential information via email or their personal devices.
Key actions to consider:
Impact:
Malicious actors may be taking advantage of recent events by using digital dis- or mis-information to amplify customer distrust and prey on fear. While misinformation might be spread with no ill intent, disinformation is intentionally distributed or presented in a false context to damage corporate reputations, to lower social and customer trust and, potentially, to cause financial loss. In addition, threat actors may send anxious employees fake recruitment offers that include malicious links; one click of the mouse can compromise a corporate network.
Key actions to consider:
Impact:
Cyber criminals use stolen credentials, social security numbers and personal data to hijack legitimate accounts and execute fraudulent activities such as diverting funds, changing shipping addresses, increasing spending limits. This can impact consumer and corporate account holders alike, who may be responsible for increased transaction disputes, chargebacks, reputational damage, loss of consumer trust and potentially high customer churn.
Key actions to consider: