2_cyber finance
π Digital π Geopolitics
Are we prepared for a cyberpandemic?

Cyber-attacks : the financial service sector fights backs

par Sophy Caulier, Independant journalist
On March 3rd, 2021 |
3min reading time
Amanda Creak
Amanda Creak
Head of EMEA technology risk at Goldman Sachs
Key takeaways
  • Some figures show that up to 90% of cyber-attacks are motivated by financial gain: banks must therefore be particularly attentive to “technological risk”.
  • Attackers are interested in all the sensitive information they can find, from simple logins or passwords to patents.
  • As an investment bank, Goldman Sachs holds a lot of confidential, and therefore sensitive, information, which it seeks to protect by correcting areas of vulnerability such as the use of USB keys by employees.
  • According to the firm Wavestone, ransom attacks can expect 746% profitability. Reducing the profitability of cyberattacks is therefore one of the priorities of cybersecurity companies.

His­to­ri­cal­ly high­ly tar­ge­ted by cyber­cri­mi­nals, finan­cial ser­vices are among the most advan­ced in terms of pro­tec­tion. While they are alert to risks as well as being equip­ped to anti­ci­pate and avoid them, com­pa­nies must ensure that their sup­ply chain is as resi­lient their attackers. 

Aman­da Creak is res­pon­sible for tech­no­lo­gy risk in Europe, Middle East, Afri­ca (EMEA) for Gold­man Sachs. This “tech­no­lo­gy risk” refers to all threats incur­red by the invest­ment bank in rela­tion to digi­tal tech­no­lo­gies. Of which there are many – espe­cial­ly for finan­cial ins­ti­tu­tions. Near­ly 90% of cybe­rat­tacks world­wide are moti­va­ted by finan­cial gain. This involves either sim­ply stea­ling money, hol­ding indi­vi­duals and com­pa­nies to ran­som or stea­ling infor­ma­tion from sys­tems that can then be resold – data, patents, contact details, IDs and pass­words, and so on. 

For a finan­cial ins­ti­tu­tion like Gold­man Sachs, cyber-risk is one of the main areas of focus. “Not only are all our pro­cesses digi­ti­sed, but all of our equip­ment is connec­ted, from desk­top com­pu­ters to prin­ters to air condi­tio­ning ! Many of the large finan­cial ins­ti­tu­tions like ours attract cyber­cri­mi­nals,” explains Aman­da Creak. She has been pas­sio­nate about cyber­se­cu­ri­ty since the begin­ning of her career and enjoys the chal­lenge of mana­ging a signi­fi­cant secu­ri­ty pro­gram in a large bank. “As an invest­ment bank, we have a lot of confi­den­tial and the­re­fore sen­si­tive infor­ma­tion ; what we call Mate­rial Non-Public Infor­ma­tion (MNPI). This is infor­ma­tion rela­ting to mer­gers, acqui­si­tions, IPOs, invest­ments, etc. But we are also an online retail bank, so we have to pro­tect our cus­to­mers from all money-rela­ted crimes.” Moreo­ver, risks are evol­ving rapid­ly, and attacks are constant­ly renewed.

Howe­ver, the secu­ri­ty of a finan­cial ins­ti­tu­tion would be use­less if the sup­ply chain was not also high­ly secure. “We are in a regu­la­ted sec­tor and cyber­se­cu­ri­ty is taken into account in regu­la­tions, stress tests, etc. But we need to make sure that our ser­vice pro­vi­ders and part­ners, who are not neces­sa­ri­ly sub­ject to the same regu­la­tions as we are, have the same level of secu­ri­ty as we do,” explains Aman­da Creak. It isn’t always easy to ask a sup­plier to res­pect very res­tric­tive rules when they are just resto­cking the com­pa­ny with office sup­plies or cof­fee… Simi­lar­ly, with the majo­ri­ty of staff wor­king from home at the height of the Covid-19 pan­de­mic, solu­tions had to be made for it to be pos­sible to main­tain the same high level of secu­ri­ty at home as in the office. 

For Gold­man Sachs, secu­ri­ty is achie­ved through defence in depth and layers of controls and focu­sing on good cyber hygiene. “We pay atten­tion to fixing secu­ri­ty vul­ne­ra­bi­li­ties and we strict­ly control the use of USB sticks, which only a few dozen people can use,” says Aman­da Creak. Attack attempts, intru­sion attempts, ran­som attacks, check-ups and patches are regu­lar­ly car­ried out to assess the conse­quences and test the resi­lience of the sys­tem. The goal : that this ins­ti­tu­tion, foun­ded in 1869, will remain a major player in world finance for a long time to come.

Ran­soms are high­ly pro­fi­table attacks !

Waves­to­ne’s CERT (Com­pu­ter Emer­gen­cy Res­ponse Team) has ana­ly­sed the pro­fi­ta­bi­li­ty of two ran­som attack sce­na­rios. They conso­li­da­ted data from CERT-mana­ged attacks and ana­lyses of cyber-crime groups from dif­ferent com­pa­nies and orga­ni­sa­tions. These ana­lyses take into account the costs of set­ting up and mana­ging the attack as well as money laun­de­ring and human resources to cal­cu­late the net gain after laun­de­ring. The first attack, non-tar­ge­ted in gene­ral public, shows a return on invest­ment (ROI) of 746%. The ROI of the second, an attack tar­ge­ted at busi­nesses, is 525%. Waves­tone, asso­cia­ted with the Mon­taigne Ins­ti­tute, is now stu­dying ways to reduce this ROI and make ran­som money less profitable.

Support accurate information rooted in the scientific method.

Donate