It looks like the application was to blame and an exploit like SQL injection, a code injection technique used to attack data-driven applications, may have been used. The welcome news for customers is that the attacker was not able to get to their internal systems, meaning that the bank must have used a Demilitarized Zone (DMZ) or full system separation for the internal and external systems. This attack is the latest to deliver a clear message to businesses across Europe – to protect information we need to know the full context of the users interaction with the application. We also need to use tools like web application firewall (WAF), proxy functionality, and contextual awareness to understand and separate legitimate users from those with more suspicious motives. Another question to ask is, ‘why isnt all personal information encrypted ‘ In this case, while most of the data was encrypted, parts of the database, including email addresses, street addresses and phone numbers, were not. Although someones credit card number is not exposed, there can still be enough personal information that hackers can put to ‘good’ use. Recently the black market has been flooded with credit card numbers, meaning that there has been a significant drop in the cost for someone to acquire them. The higher value items include packaged whole identity with email address, telephone numbers and street address. This information can be used for many things, such as selling phone numbers to targeted advertisers, spam and identity theft. Over the past couple of years we have seen a rise in the amount of cyber-attacks carried out on banks, including Chinas central bank in 2013 and Russias central bank a few months ago. With the sophistication of cyber-attacks developing at such a vast rate, and with this recent incident in mind, it is now more important than ever that organisations take note and put the stringent processes in place to prevent more attacks like this from happening. The tools are available and straightforward to implement, but it’s down to businesses to prioritise cyber in their planning. Gary Newe, Sr. Systems Engineering Manager, F5 Networks.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.