Skip to content

The cyber shield: Empowering the banking industry with strong security system

Md. Saiful Islam Masum :

Banks can be targeted by various types of cyber attacks that aim to exploit vulnerabilities in their security systems. Here are some common methods used by cybercriminals to attack banks:
Phishing Attacks: Phishing attacks involve sending fraudulent emails or messages that appear to be from a legitimate source, such as a bank or a trusted organization.

These messages often trick individuals into revealing their personal information, such as login credentials or financial details. Banks in Bangladesh have reported instances of phishing emails targeting their customers.

These emails typically mimic official bank communications, urging customers to click on malicious links or provide personal information.

If successful, these attacks can lead to unauthorized access to customer accounts or compromise sensitive data.
Malware Attacks: Malware, such as viruses, worms, or ransomware, can be used to gain unauthorized access to a bank’s systems or compromise customer data.

Cybercriminals may use various techniques to distribute malware, such as infected email attachments, malicious websites, or compromised software.

Distributed Denial-of-Service (DDoS) attacks: DDoS attacks overwhelm a bank’s network or website with a massive volume of traffic, causing it to become unavailable to legitimate users.

These attacks can disrupt banking services, impact customer experience, and create opportunities for further exploitation.

Insider Threats: Insider threats involve employees or individuals with authorized access to a bank’s systems intentionally or unintentionally compromising security.

This can occur through actions such as sharing sensitive information, installing unauthorized software, or engaging in fraudulent activities. Cybercriminals may target banks to gain insider information for financial fraud or stock market manipulation.

This can involve hacking into systems to gain unauthorized access to confidential data or manipulating financial transactions.

Social Engineering: Social engineering techniques manipulate individuals into revealing sensitive information or performing actions that compromise security.

This can include impersonating bank officials, tricking employees into providing access credentials, or manipulating customers into sharing personal information.

Social engineering attacks, such as impersonation or manipulation of bank employees or customers, have been used to deceive individuals into revealing sensitive information or performing actions that compromise a security.

These attacks rely on psychological manipulation rather than technical exploits.

Card Skimming: Card skimming involves the use of devices installed on ATMs or point-of-sale terminals to capture card information, including card numbers and PINs.

Criminals then use this information to create counterfeit cards or conduct unauthorized transactions. Banks in Bangladesh have faced instances of card skimming, leading to financial losses for customers and banks alike.

ATM Jackpotting: ATM jackpotting is a method where criminals gain physical access to ATMs and use malware or specialized tools to manipulate the machine, forcing it to dispense cash.

While not as prevalent in Bangladesh as in some other countries, there have been isolated incidents of ATM jackpotting reported.

Website Defacement: In some instances, hackers deface bank websites by altering the content or appearance to send a message or create disruption.

While website defacement does not directly compromise customer data or financial systems, it can undermine customer trust and brand reputation.

Advanced Persistent Threats (APTs): APTs are sophisticated, long-term attacks that target specific banks or financial institutions.

These attacks involve a combination of techniques, including malware, social engineering, and network exploitation, with the goal of gaining access to valuable information or assets.

To counter these attacks, banks employ various cybersecurity measures including firewalls, encryption, employee training, and incident response plans.

Regular monitoring, threat intelligence, and collaboration with industry peers and regulatory authorities are also crucial in detecting and mitigating cyber threats.In recent years, banks in Bangladesh have faced various light security attacks, which are less severe compared to major cyber incidents but still pose a risk to the security of their systems and customer data.

To mitigate these light security attacks, banks in Bangladesh implement measures such as multi-factor authentication, regular security awareness training for employees and customers, monitoring systems for suspicious activities, and strengthening physical security measures for ATMs and branches. Additionally, collaboration with law enforcement agencies and sharing of threat intelligence within the banking industry help in addressing and preventing such attacks.

Bangladesh has recognized the importance of combating cybersecurity threats and has taken several steps to address the issue.

Here are some key strategies and measures implemented by Bangladesh to combat cyber threats:
Cybersecurity Policy and Framework: Bangladesh has developed a comprehensive cybersecurity policy and framework to provide guidelines and best practices for addressing cyber threats.

The policy focuses on areas such as legal and regulatory measures, incident response, capacity building, international cooperation, and public awareness.

Cyber Incident Response Team (CIRT): The Bangladesh Government has established a Cyber Incident Response Team (CIRT) to handle cybersecurity incidents effectively.

CIRT serves as a central point for receiving and responding to incident reports, coordinating incident response efforts, and providing technical support and guidance to organizations.

Legal and Regulatory Measures: Bangladesh has enacted the Digital Security Act in 2018, which provides legal provisions to combat cybercrimes.

The act criminalizes various cyber offenses, including unauthorized access, data theft, identity theft, and cyberbullying.

It also establishes specialized tribunals to handle cybercrime cases.

Capacity Building and Training: Bangladesh has emphasized capacity building initiatives to enhance cybersecurity expertise within the country.

Training programs, workshops, and seminars are conducted to educate government officials, law enforcement agencies, and IT professionals on cybersecurity best practices, incident response, and emerging threats.

Public-Private Partnerships: Collaboration between the public and private sectors is crucial for effective cybersecurity.

Bangladesh has established partnerships with various stakeholders, including banks, telecom operators, and IT companies, to share information, collaborate on threat intelligence, and implement cybersecurity measures collectively.

National Data Center: The Bangladesh Government has set up a National Data Center (NDC) to consolidate and secure government data.

The NDC ensures the protection of sensitive information and provides a secure infrastructure for government operations, reducing the risk of cyber threats.

International Cooperation: Bangladesh actively participates in international forums and collaborations to strengthen its cybersecurity capabilities.

It engages with regional and global organizations such as the International Telecommunication Union (ITU) and the Cybersecurity Alliance for Mutual Progress (CAMP) to share knowledge, collaborate on capacity building, and benefit from international expertise.

Public Awareness Campaigns: Bangladesh conducts public awareness campaigns to educate individuals about cybersecurity threats, safe online practices, and the importance of protecting personal information.

These campaigns aim to create a cybersecurity-conscious society and promote responsible digital behavior.

Defending against cyber attacks in the banking sector requires a multi-layered approach that combines technical measures, robust policies and procedures, and continuous monitoring. Here are also some other key steps that can help defend against cyber attacks in the banking sector in Bangladesh:

Implement Strong Firewalls and Intrusion Detection Systems: Deploying robust firewalls and intrusion detection systems can help protect banking networks from unauthorized access and potential cyber threats. These systems help identify and block malicious activities, ensuring the security of sensitive banking data.

Regularly Update and Patch Systems: Keeping banking systems, software, and applications up to date with the latest security patches is crucial. Regular updates help address vulnerabilities and protect against known exploits, reducing the risk of successful cyber attacks.

Secure Network Perimeters: Implementing network segmentation and access controls can help protect critical banking systems. By dividing the network into segments and restricting access based on user roles and privileges, unauthorized access and lateral movement of attackers can be limited.

Multi-Factor Authentication (MFA): Enforce the use of multi-factor authentication for accessing banking systems, particularly for privileged accounts. MFA adds an extra layer of security by requiring users to provide additional authentication factors, such as biometrics or tokens, in addition to passwords.

Employee Training and Awareness: Conduct regular cybersecurity training programs for bank employees to educate them about potential threats, safe browsing practices, and social engineering techniques used by attackers.

Awareness campaigns can help create a cybersecurity-conscious workforce that actively contributes to the defense against cyber attacks.

Incident Response and Business Continuity Planning: Develop a robust incident response plan and business continuity strategy to effectively respond to cyber incidents. This involves establishing procedures for identifying, containing, and mitigating cyber threats, as well as ensuring the availability of backup systems and data recovery mechanisms.

Regular Security Assessments and Penetration Testing: Conduct regular security assessments and penetration tests to identify vulnerabilities in banking systems and networks. This helps proactively address weaknesses and strengthen security controls.

Establish Cybersecurity Partnerships: Collaborate with industry peers, government agencies, and cybersecurity organizations to share threat intelligence, best practices, and collaborate on cybersecurity initiatives.

This collective approach can enhance the overall cybersecurity posture of the banking sector in Bangladesh.

Compliance with Regulatory Guidelines: Stay updated with regulatory guidelines and requirements related to cybersecurity in the banking sector. Compliance with industry-specific regulations helps ensure that appropriate security measures are in place to protect customer data and financial transactions.

Continuous Monitoring and Threat Intelligence: Implement a robust monitoring system that continuously analyzes network traffic, logs, and other security events to detect anomalies and potential cyber threats.

Integration of threat intelligence feeds can provide real-time information about emerging threats, enabling proactive defense measures.

By implementing these strategies and measures, Bangladesh is striving to enhance its cybersecurity posture, protect critical infrastructure, and safeguard the interests of its citizens and businesses in the digital landscape.

By adopting these measures, the banking sector in Bangladesh can strengthen its cybersecurity defenses, detect and respond to cyber threats effectively, and safeguard customer trust and financial stability.

The writer is a banker and a certified expert in credit management.