Story image

Securing SWIFT networks vitally important for cyber attack prevention

11 May 18

Businesses that use the SWIFT network must comply with SWIFT’s Customer Security Programme (CSP) or face the risk of attacks.

Those attacks, which can cost both organisations and their customers money, can be prevented with a strong security posture and absolute visibility, says ForeScout. The company believes that visibility should be non-negotiable.

ForeScout CMO Steve Redman explains that SWIFT is a banking communications platform that manages most financial transfers between banks and organisations.

“The number and severity of cyber attacks targeting SWIFT networks is growing. However, attacks happen entirely through the customer enterprise, as opposed to the infrastructure that SWIFT owns and operates, putting the onus for security squarely on banks and businesses,” he says.

The SWIFT Customer Security Programme (CSP) is designed to drive security improvement and transparency for the world’s financial community, and also to help customers prevent cyber fraud.

“SWIFT hacks happen when cybercriminals get in between the customer’s network and the SWIFT network. There, they can change or reroute messages and even currency, making a successful SWIFT hack highly lucrative for cybercriminals,” Redman continues.

“It is therefore absolutely critical to gain 100 per cent visibility into all SWIFT components. 99.999999%  isn’t good enough. From clients and servers to gateway devices and network fabric, no part of the network should remain invisible. Many of these devices can’t or shouldn’t run agents but that shouldn’t prevent customers from gaining visibility into them. They simply need to run an agentless solution to get that visibility. Anything left unseen is a potential attack vector.”

ForeScout says the CSP provides a common set of security standards and requirements, not just a technology solution. It includes three key objectives: secure the environment; know and limit access; and detect and respond to threats. 

There are also eight principles that govern the CSP:

1.  Restrict internet access
2.  Protect critical systems from the general IT environment
3.  Reduce attack surface and vulnerabilities. 
4.  Physically secure the environment
5.  Prevent compromise of credentials
6.  Manage identities and segregate privileges
7.  Detect anomalous activity
8.  Plan for incident response and information sharing

“It’s also essential to understand the context and severity of risks and potential consequences so the customer can take intelligent action to mitigate that risk. Customers need to be able to control how risks are dealt with so the entire system doesn’t come to a stop just because someone forgot their password, for example,” Redman says.

“There is no silver bullet to prevent SWIFT attacks but organisations can make themselves very unattractive targets by hardening their security and gaining that complete visibility,” he concludes.

Comms providers hit by most DDoS attacks in Q3 2018
New data indicates attackers preyed on the large attack surface of ASN-level communications service providers with a ‘bit-and-piece’ approach.
Check Point launches hyperscale network security solution
With Check Point Maestro, organisations can scale up their existing Check Point security gateways on demand.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
Trend Micro’s telecom security solution certified as VMware-ready
Certification by VMware allows communications service providers who prefer or have already adopted VMware vCloud NFV to add network security services from Trend Micro.
Frost & Sullivan honours Honeywell's IIoT value creation
Frost & Sullivan has awarded Honeywell with the 2018 Global Customer Value Leadership Award for its work protecting industrial internet of things (IIoT) customers.
Top cybersecurity threats of 2019 – Carbon Black
Carbon Black chief cybersecurity officer Tom Kellermann combines his thoughts with those of Carbon Black's threat analysts and security strategists.
Google's €50m fine a wake up call for big data analytics
Data analytics are essential to company growth, competitive differentiation, and innovation. But there’s now a huge challenge.
UK security startup Barac sets sights on America
“Malware hidden in encrypted traffic is one of the biggest threats organisations are facing today,” says new EVP global sales.