Incident: Cyber Heist Attempt via Fraudulent SWIFT Messages at Vietnamese Bank

Published Date: 2016-05-15

Postmortem Analysis
Timeline 1. The software failure incident at Tien Phong Bank happened in the fourth quarter of last year [44133]. 2. The article was published on 2016-05-15. 3. Therefore, the software failure incident at Tien Phong Bank occurred in the fourth quarter of 2015.
System 1. SWIFT bank messaging system [44133, 44160] 2. PDF reader used by customers to review statements summarizing transfers made over SWIFT [44133, 44160] 3. Software application used by the third-party vendor connecting to the SWIFT bank messaging system [44133, 44160]
Responsible Organization 1. Hackers attempted to steal funds using fraudulent SWIFT messages, potentially facilitated by malware installed on a software application used by a third-party vendor [44133, 44160]. 2. The third-party vendor's servers, based overseas, were involved in the incident [44133, 44160].
Impacted Organization 1. Tien Phong Bank (TPBank) [44133, 44160] 2. SWIFT messaging system [44133, 44160] 3. Third-party vendor used by TPBank [44133, 44160]
Software Causes 1. Malware installed on a software application used by a third-party vendor facilitated the cyber heist attempt at Tien Phong Bank [44133, 44160]. 2. The malware targeted a PDF reader used by customers to review statements summarizing transfers made over the SWIFT network [44133, 44160]. 3. The fraudulent messages on the SWIFT network were a key part of the cyber heist attempt [44133, 44160].
Non-software Causes 1. The attempted cyber heist at Tien Phong Bank involved the use of fraudulent messages on the global interbank messaging system Swift, indicating a social engineering aspect to the attack [44133, 44160]. 2. The attack on the bank was facilitated by malware installed on a software application used by a third-party vendor, highlighting potential security vulnerabilities in the supply chain and vendor management practices [44133, 44160]. 3. The bank's reliance on an outside vendor to connect to the SWIFT bank messaging system played a role in the incident, suggesting a potential lack of internal control and oversight in the vendor relationship [44133, 44160].
Impacts 1. The attempted cyber heist at Tien Phong Bank did not cause any losses and had no impact on the SWIFT system or the transaction system between the bank and customers [44133, 44160]. 2. The attack was quickly identified and halted, preventing the movement of funds to criminals [44133, 44160]. 3. The bank switched to a new system with higher security after discontinuing work with the vendor involved in the incident [44133, 44160]. 4. The malware used in the attack targeted a PDF reader used by customers to review statements summarizing transfers made over SWIFT [44133, 44160]. 5. The incident highlighted vulnerabilities in the SWIFT network and the potential risks associated with fraudulent transfer messages [44133, 44160].
Preventions 1. Implementing stronger security measures and protocols within the SWIFT messaging system to detect and prevent fraudulent messages, such as enhancing authentication processes and monitoring for unusual activity [44133, 44160]. 2. Conducting thorough security assessments and audits of third-party vendors' software applications to ensure they are not vulnerable to malware attacks that could be used to facilitate cyber heists [44133, 44160]. 3. Swift taking proactive measures to warn its clients about potential malware threats and vulnerabilities in their systems, as well as providing guidance on how to mitigate these risks [44133, 44160]. 4. Enhancing cybersecurity awareness and training for bank employees to recognize and respond to potential cyber threats, including phishing attempts and malware installations [44133, 44160].
Fixes 1. Enhancing security measures within the SWIFT messaging system to detect and prevent fraudulent messages and cyber heists [44133, 44160]. 2. Implementing stricter vetting processes for third-party vendors providing infrastructure for connecting to the SWIFT system to prevent malware attacks facilitated through vendor software applications [44133, 44160]. 3. Regularly updating and patching software applications, such as PDF readers, used by customers to review statements summarizing transfers made over SWIFT to mitigate vulnerabilities exploited by malware [44133, 44160]. 4. Swift taking proactive measures to warn its clients about potential malware threats and fraudulent activities on the SWIFT network to prevent similar attacks [44133, 44160].
References 1. TPBank statement to Reuters [Article 44133, Article 44160] 2. Swift [Article 44133, Article 44160] 3. BAE Systems [Article 44133, Article 44160] 4. Vietnam's central bank [Article 44133, Article 44160]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: - The software failure incident involving fraudulent SWIFT messages and a cyber heist occurred at Tien Phong Bank (TPBank) in Vietnam [44133, 44160]. - TPBank identified suspicious requests through fraudulent messages on the SWIFT system to transfer funds, similar to the technique used in the Bangladesh central bank cyber heist. - The attack did not cause any losses, and TPBank caught the attempt quickly enough to prevent movement of funds to criminals. - TPBank mentioned that the transfers were made using the infrastructure of an outside vendor hired to connect it to the SWIFT system. - The incident at TPBank involved malware installed on a software application used by the third-party vendor, similar to the malware used in the Bangladesh cyber heist. (b) The software failure incident having happened again at multiple_organization: - The articles mention that SWIFT, the messaging service, sent a warning to all its customers about cases of fraud involving malware targeting a PDF reader used by customers to review statements summarizing transfers made over SWIFT [44133, 44160]. - Cybersecurity firm BAE Systems reported that malware was used to target a Vietnamese commercial bank using fraudulent messages on the SWIFT network, operating similarly to the malware used in the Bangladesh cyber heist. - SWIFT had recently issued a warning about malware used in schemes involving fraudulent transfers ordered over the SWIFT network, indicating a broader concern across multiple organizations using the SWIFT system.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the articles. The incident at Tien Phong Bank involved an attempted cyber heist that utilized fraudulent messages on the global interbank messaging system Swift. The attack was facilitated using malware installed on a software application used by a third-party vendor hired by the bank to connect to the SWIFT system [44133, 44160]. This indicates a failure in the design phase where the software application used by the vendor was vulnerable to malware attacks, leading to the exploitation of the system for fraudulent activities. (b) The software failure incident related to the operation phase is evident in the articles as well. The attack on Tien Phong Bank was detected and halted in time to prevent any financial losses by immediately contacting the involved parties. The bank stated that the attack did not impact the SWIFT system or the transaction system between the bank and its customers [44133, 44160]. This highlights a failure in the operation phase where the attempted cyber heist was a result of misuse or unauthorized access to the system, emphasizing the importance of operational controls and monitoring to prevent such incidents.
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident at Tien Phong Bank was facilitated by malware installed on a software application used by a third-party vendor to connect to the SWIFT bank messaging system [44133, 44160]. This indicates that the failure had contributing factors originating from within the system, specifically related to the software application and its vulnerability to malware attacks. (b) outside_system: The attack on Tien Phong Bank involved the use of fraudulent messages on the global interbank messaging system SWIFT, indicating that the attack originated from outside the bank's system [44133, 44160]. Additionally, the malware used in the attack targeted a PDF reader used by customers to review statements summarizing transfers made over SWIFT, further highlighting an external factor contributing to the software failure incident.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident at Tien Phong Bank was primarily due to non-human actions. The incident involved the use of malware targeting a software application used by a third-party vendor to connect to the SWIFT bank messaging system. This malware facilitated the fraudulent messages on the SWIFT network, similar to the technique used in the Bangladesh cyber heist. SWIFT had issued warnings about such malware being used in fraudulent transfer schemes over its network, indicating a non-human factor contributing to the failure [44133, 44160]. (b) Human actions also played a role in the software failure incident. The bank had hired an outside vendor to connect to the SWIFT system, and it was noted that the attack might have been facilitated by malware installed on a software application used by this third-party vendor. Additionally, the decision to discontinue working with the vendor and switch to a new system with higher security levels was a human action taken in response to the incident [44133, 44160].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The incident at Tien Phong Bank involved an attempted cyber heist that was facilitated by malware installed on a software application used by a third-party vendor, whose servers were based overseas [44133, 44160]. (b) The software failure incident related to software: - The cyber heist incident at Tien Phong Bank was primarily caused by fraudulent SWIFT messages and malware used to target a PDF reader, both of which are software-related issues [44133, 44160].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in the articles is malicious in nature. The incident involved an attempted cyber heist at Tien Phong Bank in Vietnam, where hackers used fraudulent SWIFT messages to try to transfer funds. The attack was similar to the one at Bangladesh Bank and involved the use of malware to target a software application used by a third-party vendor connected to the SWIFT network. The attackers attempted to steal over $1 million, but the bank was able to halt the movement of funds and prevent any losses [44133, 44160].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions [a, b] The software failure incident at Tien Phong Bank involved an attempted cyber heist that utilized fraudulent SWIFT messages. The incident was facilitated by malware installed on a software application used by a third-party vendor connected to the SWIFT bank messaging system. The bank identified suspicious requests through fraudulent messages to transfer funds and caught the attempt quickly to prevent any losses. The bank mentioned discontinuing working with the vendor and switching to a new system with higher security. Additionally, SWIFT had issued a warning about malware used in schemes involving fraudulent transfers over the SWIFT network. The incident highlights both poor decisions in terms of vendor selection and accidental decisions leading to the introduction of malware through the software application used by the vendor [44133, 44160].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the articles through the use of malware installed on a software application used by a third-party vendor. TPBank mentioned that the attack might have been facilitated by the malware, and Swift had issued a warning about malware used in schemes involving fraudulent transfers over the Swift network [44133, 44160]. (b) The software failure incident related to accidental factors is highlighted in the articles through the use of fraudulent SWIFT messages that led to the attempted cyber heist. The attack involved suspicious requests through fraudulent messages to transfer funds, indicating an accidental introduction of fraudulent activities into the system [44133, 44160].
Duration temporary The software failure incident reported in the articles appears to be temporary rather than permanent. The incident involved an attempted cyber heist at Tien Phong Bank in Vietnam, where suspicious requests through fraudulent SWIFT messages were identified and halted in the fourth quarter of the previous year [44133, 44160]. The bank caught the attempt quickly enough to prevent any losses and stated that it had no impact on the SWIFT system or the transaction system between the bank and customers in general. Additionally, the bank took immediate action by discontinuing work with the third-party vendor and switching to a new system with higher security measures [44133, 44160]. This indicates that the software failure incident was temporary and was resolved by addressing specific contributing factors introduced by certain circumstances.
Behaviour value, other (a) crash: The software failure incident did not involve a crash as the system did not lose its state and was able to identify and halt the suspicious requests quickly enough to prevent the movement of funds to criminals [44133, 44160]. (b) omission: The incident does not seem to be related to omission as the system was able to catch the fraudulent messages and prevent the unauthorized transfers, indicating that it did not omit its intended functions [44133, 44160]. (c) timing: The timing of the incident does not suggest a timing failure as the system responded promptly to the suspicious requests and prevented the movement of funds to criminals in a timely manner [44133, 44160]. (d) value: The software failure incident could be categorized under the value failure as the attackers attempted to transfer funds using fraudulent messages, which would have resulted in the system performing its intended functions incorrectly by transferring funds to unauthorized parties [44133, 44160]. (e) byzantine: The incident does not align with a byzantine failure as there is no mention of inconsistent responses or interactions within the system. The system's response to the fraudulent messages was consistent in identifying and halting the unauthorized transfers [44133, 44160]. (f) other: The behavior of the software failure incident could be classified as a security breach or vulnerability exploitation, where the attackers used malware to target the system and attempt fraudulent transfers. This behavior is not explicitly covered in the options provided [44133, 44160].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, non-human, theoretical_consequence (a) unknown (b) unknown (c) unknown (d) The software failure incident involving fraudulent SWIFT messages at Tien Phong Bank did not cause any losses or impact on the SWIFT system or the transaction system between the bank and customers. The bank caught the attempt quickly enough to halt movement of funds to criminals, and most of the money remained secure [44133, 44160]. (e) unknown (f) The software failure incident impacted non-human entities such as the bank's systems, the global interbank messaging system Swift, and the infrastructure of an outside vendor hired to connect the bank to the SWIFT bank messaging system [44133, 44160]. (g) The software failure incident did not have any observed real consequences as it was foiled by the bank before any funds were transferred to criminals, and there were no reported losses [44133, 44160]. (h) The articles discuss potential consequences of the software failure incident, such as the possibility of funds being transferred to criminals if the attempt was not caught in time. However, in this case, the incident was detected early, and no actual losses occurred [44133, 44160]. (i) unknown
Domain finance (a) The failed system was related to the finance industry, specifically involving a cyber heist attempt at a Vietnamese bank using fraudulent messages on the SWIFT system [44133, 44160]. The incident highlighted vulnerabilities in the global financial transaction system and the need for enhanced security measures to prevent such attacks in the future.

Sources

Back to List