February 2017

Is the Tesco Bank hack the wakeup call needed to make mobile security a priority?

The recent Tesco Bank hack has left the retail banking world reeling, searching for answers and more effective ways to secure networks against future attacks. It has been revealed weaknesses in the bank’s mobile applications left the door open for cybercriminals to brute force their way in and take more than £2.5 million of customers’ money. Worse still, the bank had been warned by several security experts of this weakness prior to the attack.

How Tesco got it so wrong

It was the largest ever cyber-attacks on a UK bank. One of the most significant things about the Tesco hack was that customer accounts were penetrated forcefully without any credentials, which hasn't happened before. Cybercriminals broke into Tesco Bank’s computer system and stole £2.5 million from the current accounts of 9,000 customers.

The result of this attack was the scenario many people are most afraid of ‒ waking up one morning and finding your bank account is completely empty. Tesco had a responsibility to protect its customers and, by not doing so, has led to an erosion of trust.

What has tarnished consumer trust is the revelation of vulnerabilities that penetration testers had warned Tesco of several times prior to the hack. While we now know Tesco was aware of the cracks in its security perimeter, it’s clear that it either wasn’t aware of the potential scale of the attack or it simply wasn’t equipped to deal with a cyber-attack at this level. In a moment of malicious compromise, Tesco should have had the appropriate detection and remediation protocols in place to stop the hackers before they could remove actual money from customer accounts.

Keeping pace with multiple threat vectors

With the increasing number of connected devices for cybercriminals to exploit, there are more threat vectors than ever for companies to protect. It has never been so easy for cybercriminals to obtain confidential information. With the proliferation of mobile devices, social media and social engineering, there are now a million and one ways to reach an individual and gain the keys to the kingdom.

Platform firewalls can easily be misconfigured, creating backdoors for hackers to find vulnerabilities and exploit them. The more complex the network, the greater the likelihood they will make it in undetected.

The edgeless perimeter

Risks are now increasingly extending beyond the perimeter to the individual user via social engineering. We have already seen compromised chip sets, backdoors in operating systems, and rogue apps placing malware on the device. The greatest element of concern in 2017 is how expanded attack vectors allow for lateral movement, with the bad guys looking to utilise mobile platforms as a means of gaining access to the core of the network.

While the Tesco Bank breach will elevate security further towards being thought of as a high ticket item, many are left questioning how the industry will act together to resolve the issue. Like the Heartland breach in America in 2015, the company thought it was fully compliant and was still compromised, resulting in a year-long rehabilitation campaign. Instead, we should be asking what the industry is doing wrong? The industry at large has not embraced the notion of hyper-connectivity, which means users and clients alike are all individual vectors of threat.

Mobile platforms must be treated as an extension of the network.

Securing devices and the traffic they create needs to be treated in the same way you would treat devices within the traditional network perimeter. Just like locking your doors every time you leave the house, you would never set up a network without a firewall ‒ but firewalls are no longer enough to protect the 'edgeless perimeter'.

What happened to Tesco could happen to any company, of any size, in any sector.

Financial services are accustomed to being in their own seemingly secure bubble. Now, however, that bubble has well and truly burst. Devices connected to each other via not only mobile networks but the Internet of Things has expanded the risk to all customer devices becoming compromised or attacked. The financial services industry has a great responsibility to safeguard people’s money and it is heavily regulated because of this. It is imperative, therefore, that it goes further than just basic blocking and tackling of threats within the firewall to encompass the new attack vectors associated with the myriad of connected devices.

Kirsten Bay, President and CEO, Cyber adAPT


21/03/2019 Headlines

France Fines Google $57 Million for European Privacy Rule Breach

Google lacked transparency and clarity in the way it informs users about its handling of personal data and failed to properly obtain their consent for personali.....Read More

New Payment Services Laws Passed in Singapore

New payment services laws have been passed by Singapore's parliament in a move that will streamline existing laws while bringing many new fintech providers into.....Read More

Twitter Warns that Private Tweets were Public for Years

Private tweets sent by users of Twitter's Android app could have been exposed publicly for years.

Twitter said it had discovered a security flaw which me.....Read More

Exchange Loses Big over Airdrop Miscue

Computer glitches are never fun, but when they result in the loss of money, they can be completely debilitating. Coinnest, a cryptocurrency exchange out of Sout.....Read More

Name and Shame Firms with Poor Cyber Security, Government Told

The government should name and shame companies whose cyber security measures fail to protect consumers' data and firms should implement Active Cyber Defence, an.....Read More

Sirin Labs Opens First Blockchain Smartphone Store in London

Sirin Labs has opened the first blockchain smartphone store located in London. The intention is to attract crypto enthusiasts passionate for blockchain and dece.....Read More

Video Interviews

Tim Jones talks on the wealth of networks

Christophe Dolique of Gemplus talks about ·SIM

Dominique Brule of Philips Semiconductors talks about Near Field Communication