This digital transformation is seeing the financial services industry increasingly turning to online portals, social media, and mobile apps in order to satisfy an ever more demanding customer base – people now expect everything to be done here and now with a minimum of fuss. Paradoxically, these new digital platforms, along with a more competitive landscape where we are seeing lower costs and a lower barrier to entry, are making it even easier for cybercriminals to exploit customers. Indeed, with more and more people turning to online banking and using 3rd party apps, cybercriminals are now able to target an even larger pool of victims.
Open Banking is a great illustration of all of this. Essentially Open Banking is a series of reforms that deal with how banks deal with consumer financial information. What it will effectively do is break the monopoly that banks once had over their customer’s account information. By doing so it will allow a new ‘generation’ of 3rd party businesses to compete with financial services organizations to be able to access customer data. All well and good you might think but there are new security challenges to face with these new organizations suddenly being able to access all of this consumer financial data. Where you now have sensitive data passing via an open interface, it becomes extremely vulnerable to cyberattack.
Book a demo today to see GlobalDots is action.
Optimize cloud costs, control spend, and automate for deeper insights and efficiency.
We have already seen in the UK, customers banking with the likes of Barclays, HSBC and Lloyds Bank to name but a few, being targeted by criminals via the malicious use of banking trojans. Such activity targets customers by spamming them with emails containing a type of virus essentially – clicking on a link within the email effectively allows the hackers in and then they are free to do what they want.
So what do the statistics on financial services cybercrime tell us? Well, for example, a very recent report by ZeroFOX suggested a 56% year-over-year increase in digital threats targeting the financial space. As part of the report, researchers scanned 2.9 billion pieces of content and found more than 8.9 million security events in a 12-month period. Interestingly, the report showed that financial services firms are more prone to corporate social media account takeover. Unsurprisingly, fraud made up 40% of all cyberattack activity against financial services including money-flipping schemes, customer giveaway scams and scams related to cryptocurrency; fake mobile apps also made an appearance.
Another report by Fortinet illustrates the impact that cyber threats have had on several industries, including financial services. It highlighted the massive growth in one particular threat, Coinhive which focuses on Monero cryptocurrency – cybercriminals were able to install JavaScript files onto compromised websites and make illicit gains. And even though the cybercriminals were eventually thwarted by the dismantling of Coinhive, those behind the attacks will be developing new ways of launching successful attacks.
And let us not forget that financial services firms are also under the regulatory microscope; here in the UK, the FCA is able to levy fines on those organizations that are found to be wanting if their customers suffer due to a cyber attack.
There are practices that organizations can put into action, especially those that promote governance and put cyber risk on the board agenda. How many big fines need to be paid before the C-suite understands the importance of proper investment in solutions and training that can help to defend from attack? Organizations need to be identifying and protecting information assets, they need to be alert for emerging threats and they need to be ready to respond. Also, keep testing and refining defenses – cybercrime techniques advance at a rapid pace.
Ultimately, there is no silver bullet to defend against all of these growing and ever-more sophisticated attacks. The potential rewards for cybercriminals targeting financial institutions can be potentially staggering and so those organizations in this industry must rely on threat intelligence in order to identify threats and understand the impact that a cyberattack could have on network security and customer confidence. Such threat intelligence highlights those threats that are perhaps no longer active but where there is still a cycle of risk development; just like a medusa, when one threat is vanquished another quickly fills the void.
If you have any questions about how we can help you optimize you protect your business against cyberattacks, contact us today to help you out with your performance and security needs.
Latest Articles
About the Customer: SuperPlay is a leading Israeli gaming company that develops and publishes mobile games for a global audience. The company specializes in creating engaging social casino and casual gaming experiences, reaching millions of players worldwide. As a technology-driven gaming company, SuperPlay relies on robust cloud infrastructure to deliver seamless gaming experiences to their […]
In January 2024, a misconfigured API exposed 650,000 private messages. These included passwords and internal communications. No exploit chain. No zero-day. Just a public-facing endpoint with no authentication. This wasn’t an isolated incident. From T-Mobile and Twitter (now X) to Kronos Research and the US Treasury, attackers have consistently used APIs as entry points. They […]
APIs are now the top attack vector in enterprise apps. In 2024 alone, breaches tied to APIs cost an average of $4.88 million, and that number is rising fast. Attackers exploit gaps in API authentication, input validation, and outdated endpoints to compromise systems. Legacy controls no longer suffice, and the OWASP API Top 10 outlines […]
APIs are the backbone of today’s interconnected software. They power everything from mobile apps and SaaS platforms to internal microservices and partner integrations. But their rapid growth has left many security teams flat-footed. In 2025, many attackers prefer to exploit API misconfigurations hiding in plain sight. What used to be fringe cases (token leakage, zombie […]