Incident: Security Flaw in NatWest Online Banking System Allows Account Raids

Published Date: 2016-03-03

Postmortem Analysis
Timeline 1. The software failure incident happened in March 2016. [Article 42146]
System 1. NatWest's online banking system [42146]
Responsible Organization 1. Criminals who exploited the serious flaw in NatWest's online banking system [42146]
Impacted Organization 1. NatWest bank [42146]
Software Causes 1. Lack of robust authentication processes in the mobile banking system of NatWest, allowing criminals to easily hijack accounts and steal funds [42146]. 2. Vulnerability in the system that allowed criminals to convince mobile phone companies to transfer phone numbers to different handsets, enabling fraudulent activities [42146]. 3. Insufficient security measures in place to prevent unauthorized access to accounts even without having the login details and passwords [42146].
Non-software Causes 1. Lack of proper customer authentication processes: The incident occurred due to a serious flaw in the security systems of NatWest, allowing criminals to raid accounts by taking control of online accounts through stolen mobile phones [42146]. 2. Inadequate customer support: Victims who reported money disappearing from their accounts were often not provided with adequate assistance by the bank and were sometimes blamed for the theft, implying a lack of proper customer support [42146]. 3. Social engineering tactics: Criminals were able to convince mobile phone companies to transfer victims' numbers to different handsets, enabling them to run the fraud, indicating a vulnerability to social engineering tactics [42146].
Impacts 1. Criminals were able to raid accounts and snatch thousands of pounds through stolen mobile phones, leading to financial losses for customers [Article 42146]. 2. Customers experienced money disappearing from their accounts without logical explanations, causing confusion and frustration [Article 42146]. 3. Victims of the scam, like Robert from East Anglia, faced challenges in recovering stolen funds and were initially blamed for the theft by the bank [Article 42146]. 4. The security systems of NatWest were identified to have a serious flaw, raising concerns about the vulnerability of mobile banking services [Article 42146]. 5. The incident highlighted the ease with which criminals could hack into accounts using stolen mobile phones, exposing weaknesses in the authentication processes [Article 42146].
Preventions 1. Implementing stronger authentication measures such as multi-factor authentication could have prevented the software failure incident [42146]. 2. Enhancing customer education on cybersecurity best practices and the risks associated with mobile banking could have helped prevent the incident [42146]. 3. Conducting regular security audits and testing to identify vulnerabilities in the online banking system could have proactively prevented the breach [42146].
Fixes 1. Implementing enhanced customer authentication processes in collaboration with Financial Fraud Action UK and mobile phone providers to prevent unauthorized access to accounts [42146]. 2. Introducing a three-day cooling off period before allowing any financial transactions to take place after re-activation of online banking to provide customers with a window to detect and report any suspicious activity [42146]. 3. Enhancing communication with customers through various channels such as email, text, and phone to alert them of any changes made to their account details [42146]. 4. Providing more detailed information to customers on how to securely manage their online accounts and protect their personal information [42146].
References 1. BBC Radio 4’s You and Yours program 2. Victims of the scam, such as Robert from East Anglia 3. NatWest bank officials, including the managing director of digital, Chris Popple 4. Financial Fraud Action UK 5. Mobile phone providers

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to security flaws in mobile banking systems has happened again at NatWest, which is part of RBS. The incident involved a serious flaw in the online banking system that allowed criminals to raid accounts by exploiting vulnerabilities in the mobile banking services provided by NatWest [42146]. (b) The articles also mention that there are reports of similar problems with other banks, indicating that the software failure incident related to security vulnerabilities in mobile banking systems is not unique to NatWest but may have occurred at multiple organizations offering similar services [42146].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The incident at NatWest's online banking system allowed criminals to raid accounts due to a serious flaw in the security systems. The flaw enabled fraudsters to take control of online accounts and snatch thousands of pounds through stolen mobile phones. This flaw in the design of the system allowed unauthorized access and fraudulent activities to occur [42146]. (b) The software failure incident related to the operation phase is also highlighted in the article. Customers reported money disappearing from their accounts without explanation, and when seeking help from the bank, they were often blamed for not keeping their bank details secure. This indicates a failure in the operation phase where customers' concerns were not adequately addressed, and the system's security measures were not effectively operational in preventing unauthorized access and fraudulent activities [42146].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident reported in the articles is primarily within the system. The failure was due to a serious flaw in the online banking system of NatWest, which allowed criminals to raid accounts by exploiting vulnerabilities in the mobile and internet banking services provided by the bank [42146]. The security systems of NatWest were found to be inadequate, allowing fraudsters to take control of online accounts and transfer money without the need for all the log-in details and passwords. The incident highlighted weaknesses in the authentication processes and security measures implemented within the bank's online banking system. (b) outside_system: The software failure incident also involved contributing factors that originated from outside the system. Criminals were able to exploit vulnerabilities in the mobile phone system, such as hijacking mobile phone numbers and convincing mobile phone companies to transfer numbers to different handsets, in order to carry out fraudulent activities on the online banking accounts [42146]. This external factor of mobile phone vulnerabilities played a significant role in enabling the fraudsters to bypass the security measures within the NatWest online banking system.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: - The article reports a serious flaw in the online banking system of NatWest that allowed criminals to raid accounts, indicating a failure in the security systems of the bank [42146]. - Criminals were able to take control of online accounts and snatch money through stolen mobile phones, highlighting a vulnerability in the system that was exploited [42146]. - Thieves were able to take data from stolen mobile phones to drain funds from accounts, indicating a flaw in the system's security measures [42146]. (b) The software failure incident occurring due to human actions: - The investigation revealed that it was possible to hack into an account using a stolen mobile phone, suggesting a potential oversight in the design or implementation of the security measures by the bank [42146]. - The article mentions that criminals were able to convince a mobile phone company to transfer a victim's number to a different handset, which was then used to run the fraud, indicating a social engineering aspect to the attack [42146]. - The fraud reporter was able to access a colleague's online bank account by pretending to have lost all login details and convincing the bank to send an activation code to the stolen phone, highlighting a vulnerability in the bank's verification process [42146].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The incident involved a serious flaw in the online banking system of NatWest, which allowed criminals to raid accounts through stolen mobile phones [42146]. - Criminals were able to convince a mobile phone company to transfer a victim's number to a different handset, which was used to run the fraud [42146]. (b) The software failure incident related to software: - The security systems of NatWest were identified to have a serious failure, allowing fraudsters to take control of online accounts and snatch money [42146]. - Researchers were able to show it is possible to raid someone else’s bank account without having any of the log-in details and passwords [42146]. - The bank's system involved sending a unique authorization code to a customer's mobile phone by text, which could be exploited by criminals to set up new payees and transfer money [42146]. - The incident highlighted vulnerabilities in mobile banking services run by NatWest, indicating a software-related security issue [42146].
Objective (Malicious/Non-malicious) malicious, non-malicious (a) The software failure incident reported in Article 42146 is malicious in nature. Criminals were able to exploit a serious flaw in NatWest's online banking system to raid accounts, allowing them to take control of online accounts and snatch thousands of pounds through stolen mobile phones. The fraudsters were able to manipulate the system to transfer money and gamble with stolen funds, indicating a deliberate intent to harm the system and its users [42146]. (b) Additionally, the incident involved non-malicious factors such as vulnerabilities in the security systems of NatWest's mobile banking services. These vulnerabilities allowed for unauthorized access and fraudulent activities to take place, highlighting failures in the system's design and implementation that were not intentionally introduced to harm the system but nonetheless led to security breaches and financial losses [42146].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The software failure incident related to poor_decisions is evident in the case of the NatWest online banking system. The incident allowed criminals to raid accounts by exploiting a serious flaw in the security systems of NatWest's online banking system. The bank's decision to implement a system where a unique authorization code is sent to a customer's mobile phone for setting up new payees and transferring money proved to be vulnerable to theft through details hacked from stolen mobile phones [42146]. This poor decision contributed to the security breach that enabled fraudsters to take control of online accounts and snatch thousands of pounds. (b) The software failure incident related to accidental_decisions is seen in the oversight and unintended consequences of the security measures implemented by NatWest. The investigation revealed that criminals were able to exploit stolen mobile phones to access accounts without having the login details and passwords. This unintended consequence of the security measures, such as sending activation codes to mobile phones for account access, led to unauthorized access and fraudulent activities [42146]. The incident highlighted how mistakes or unintended decisions in the design and implementation of security measures can lead to significant vulnerabilities in the system.
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the article as it highlights a serious flaw in the security systems of NatWest's online banking system that allowed criminals to raid accounts. The bank admitted that the incident occurred due to a failure in their security systems, indicating a lack of professional competence in ensuring robust security measures [42146]. (b) The software failure incident related to accidental factors is also apparent in the article. For example, the incident where criminals managed to convince a mobile phone company to transfer a victim's number to a different handset, which was then used to run the fraud, showcases how accidental vulnerabilities in the system can be exploited by malicious actors [42146].
Duration temporary The software failure incident reported in the articles can be categorized as a temporary failure. The incident was due to contributing factors introduced by certain circumstances but not all. The failure was related to a serious flaw in the security systems of NatWest's online banking system, which allowed criminals to raid accounts by exploiting vulnerabilities in the mobile banking services [42146]. The bank acknowledged the failure and took immediate steps to enhance security measures, such as implementing a three-day cooling off period for online banking transactions and improving customer authentication processes to prevent similar incidents in the future.
Behaviour crash, omission, value, other (a) crash: The software failure incident in the article can be related to a crash behavior where the system loses state and does not perform its intended functions. This is evident from the fact that criminals were able to raid accounts due to a serious flaw in NatWest's online banking system, allowing them to take control of online accounts and snatch thousands of pounds through stolen mobile phones [42146]. (b) omission: The incident can also be linked to an omission behavior where the system omits to perform its intended functions at an instance(s). This is highlighted by the fact that fraudsters were able to raid accounts without having any of the log-in details and passwords, indicating a failure in the system to properly authenticate and authorize transactions [42146]. (c) timing: The timing behavior is not explicitly mentioned in the articles as a specific type of failure related to the software incident. (d) value: The incident can be associated with a value behavior where the system performs its intended functions incorrectly. This is demonstrated by the fact that criminals were able to transfer money and set up new payees on existing accounts using stolen mobile phone data, leading to unauthorized transactions and financial losses for customers [42146]. (e) byzantine: The byzantine behavior, characterized by inconsistent responses and interactions, is not directly mentioned in the articles as a specific type of failure related to the software incident. (f) other: The other behavior observed in this software failure incident is a security vulnerability that allowed criminals to exploit the system's authentication and authorization mechanisms. This vulnerability enabled unauthorized access to accounts, fraudulent transactions, and the potential hijacking of mobile phone numbers to carry out fraudulent activities [42146].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure - The software failure incident allowed criminals to raid accounts and snatch thousands of pounds through stolen mobile phones [42146]. - Victims reported money disappearing from accounts without any logical explanation, with one victim having £3,000 taken from his account [42146]. - Thieves were able to take data from stolen mobile phones to drain funds from accounts [42146]. - Criminals were able to convince a mobile phone company to transfer a victim's number to a different handset, which was then used to run the fraud [42146]. - A BBC journalist was able to open and access a colleague's online bank account without having any of the login details, demonstrating the vulnerability of the system [42146].
Domain finance [a42146] The software failure incident reported in the news article is related to the finance industry. NatWest, a high street bank, admitted a serious flaw in its online banking system that allowed criminals to raid accounts, indicating a failure in the security systems of the bank. The incident involved theft from accounts through stolen mobile phones and highlighted vulnerabilities in mobile banking services. The bank acknowledged the need to enhance customer authentication processes and improve security measures to protect customers from fraudsters who exploit weaknesses in the online and mobile banking systems.

Sources

Back to List