Story image

Securing SWIFT networks vitally important for cyber attack prevention

11 May 18

Businesses that use the SWIFT network must comply with SWIFT’s Customer Security Programme (CSP) or face the risk of attacks.

Those attacks, which can cost both organisations and their customers money, can be prevented with a strong security posture and absolute visibility, says ForeScout. The company believes that visibility should be non-negotiable.

ForeScout CMO Steve Redman explains that SWIFT is a banking communications platform that manages most financial transfers between banks and organisations.

“The number and severity of cyber attacks targeting SWIFT networks is growing. However, attacks happen entirely through the customer enterprise, as opposed to the infrastructure that SWIFT owns and operates, putting the onus for security squarely on banks and businesses,” he says.

The SWIFT Customer Security Programme (CSP) is designed to drive security improvement and transparency for the world’s financial community, and also to help customers prevent cyber fraud.

“SWIFT hacks happen when cybercriminals get in between the customer’s network and the SWIFT network. There, they can change or reroute messages and even currency, making a successful SWIFT hack highly lucrative for cybercriminals,” Redman continues.

“It is therefore absolutely critical to gain 100 per cent visibility into all SWIFT components. 99.999999%  isn’t good enough. From clients and servers to gateway devices and network fabric, no part of the network should remain invisible. Many of these devices can’t or shouldn’t run agents but that shouldn’t prevent customers from gaining visibility into them. They simply need to run an agentless solution to get that visibility. Anything left unseen is a potential attack vector.”

ForeScout says the CSP provides a common set of security standards and requirements, not just a technology solution. It includes three key objectives: secure the environment; know and limit access; and detect and respond to threats. 

There are also eight principles that govern the CSP:

1.  Restrict internet access
2.  Protect critical systems from the general IT environment
3.  Reduce attack surface and vulnerabilities. 
4.  Physically secure the environment
5.  Prevent compromise of credentials
6.  Manage identities and segregate privileges
7.  Detect anomalous activity
8.  Plan for incident response and information sharing

“It’s also essential to understand the context and severity of risks and potential consequences so the customer can take intelligent action to mitigate that risk. Customers need to be able to control how risks are dealt with so the entire system doesn’t come to a stop just because someone forgot their password, for example,” Redman says.

“There is no silver bullet to prevent SWIFT attacks but organisations can make themselves very unattractive targets by hardening their security and gaining that complete visibility,” he concludes.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.
Google Cloud, Palo Alto Networks extend partnership
Google Cloud and Palo Alto Networks have extended their partnership to include more security features and customer support for all major public clouds.