Reuters, Dhaka :
Bangladesh’s central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world’s biggest cyber heists said.
The shortcomings made it easier for hackers to break into the Bangladesh Bank system earlier this year and attempt to siphon off nearly $1 billion using the bank’s SWIFT credentials, said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police’s criminal investigation department.
“It could be difficult to hack if there was a firewall,” Alam said in an interview. The lack of sophisticated switches, which can cost several hundred dollars or more, also means it is difficult for investigators to figure out what the hackers did and where they might have been based, he added. Experts in bank security said that the findings described by Alam were disturbing. “You are talking about an organization that has access to billions of dollars and they are not taking even the most basic security precautions,” said Jeff Wichman, a consultant with cyber firm Optiv. Tom Kellermann, a former member of the World Bank security team, said that the security shortcomings described by Alam were “egregious,” and that he believed there were “a handful” of central banks in
developing countries that were equally insecure. Kellermann, now chief executive of investment firm Strategic Cyber Ventures LLC, said that some banks fail to adequately protect their networks because they focus security budgets on physically defending their facilities. Cyber criminals broke into Bangladesh Bank’s system and in early February tried to make fraudulent transfers totaling $951 million from its account at the Federal Reserve Bank of New York. Most of the payments were blocked, but $81 million was routed to accounts in the Philippines and diverted to casinos there. Most of those funds remain missing.
The police believe that both the bank and SWIFT should take the blame for the oversight, Alam said in an interview. “It was their responsibility to point it out but we haven’t found any evidence that they advised before the heist,” he said, referring to SWIFT. A spokeswoman for Brussels-based SWIFT declined comment.
SWIFT has previously said the attack was related to an internal operational issue at Bangladesh Bank and that SWIFT’s core messaging services were not compromised. A spokesman for Bangladesh Bank said SWIFT officials advised the bank to upgrade the switches only when their system engineers from Malaysia visited after the heist. “There might have been a deficiency in the system in the SWIFT room,” said the spokesman, Subhankar Saha, confirming that the switch was old and needed to be upgraded.
“Two (SWIFT) engineers came and visited the bank after the heist and suggested to upgrade the system,” Saha said. The heist’s masterminds have yet to be identified. Bangladesh police said earlier this week they had identified 20 foreigners involved in the heist but they appear to be people who received some of the payments, rather than those who initially stole the money. Bangladesh Bank has about 5,000 computers used by officials in different departments, Alam said. The SWIFT room is roughly 12 feet by 8 feet, a window-less office located on the eight floor of the bank’s annex building in Dhaka. There are four servers and four monitors in the room. All transactions from the previous day are automatically printed on a printer in the room.
The SWIFT facility should have been walled off from the rest of the network. That could have been done if the bank had used the more expensive, “managed” switches, which allow engineers to create separate networks, said Alam, whose institute includes a cyber-crime division. Moreover, considering the importance of the room, the bank should have deployed staff to monitor activity round the clock, including weekends and holidays, he said.
Bangladesh’s central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world’s biggest cyber heists said.
The shortcomings made it easier for hackers to break into the Bangladesh Bank system earlier this year and attempt to siphon off nearly $1 billion using the bank’s SWIFT credentials, said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police’s criminal investigation department.
“It could be difficult to hack if there was a firewall,” Alam said in an interview. The lack of sophisticated switches, which can cost several hundred dollars or more, also means it is difficult for investigators to figure out what the hackers did and where they might have been based, he added. Experts in bank security said that the findings described by Alam were disturbing. “You are talking about an organization that has access to billions of dollars and they are not taking even the most basic security precautions,” said Jeff Wichman, a consultant with cyber firm Optiv. Tom Kellermann, a former member of the World Bank security team, said that the security shortcomings described by Alam were “egregious,” and that he believed there were “a handful” of central banks in
developing countries that were equally insecure. Kellermann, now chief executive of investment firm Strategic Cyber Ventures LLC, said that some banks fail to adequately protect their networks because they focus security budgets on physically defending their facilities. Cyber criminals broke into Bangladesh Bank’s system and in early February tried to make fraudulent transfers totaling $951 million from its account at the Federal Reserve Bank of New York. Most of the payments were blocked, but $81 million was routed to accounts in the Philippines and diverted to casinos there. Most of those funds remain missing.
The police believe that both the bank and SWIFT should take the blame for the oversight, Alam said in an interview. “It was their responsibility to point it out but we haven’t found any evidence that they advised before the heist,” he said, referring to SWIFT. A spokeswoman for Brussels-based SWIFT declined comment.
SWIFT has previously said the attack was related to an internal operational issue at Bangladesh Bank and that SWIFT’s core messaging services were not compromised. A spokesman for Bangladesh Bank said SWIFT officials advised the bank to upgrade the switches only when their system engineers from Malaysia visited after the heist. “There might have been a deficiency in the system in the SWIFT room,” said the spokesman, Subhankar Saha, confirming that the switch was old and needed to be upgraded.
“Two (SWIFT) engineers came and visited the bank after the heist and suggested to upgrade the system,” Saha said. The heist’s masterminds have yet to be identified. Bangladesh police said earlier this week they had identified 20 foreigners involved in the heist but they appear to be people who received some of the payments, rather than those who initially stole the money. Bangladesh Bank has about 5,000 computers used by officials in different departments, Alam said. The SWIFT room is roughly 12 feet by 8 feet, a window-less office located on the eight floor of the bank’s annex building in Dhaka. There are four servers and four monitors in the room. All transactions from the previous day are automatically printed on a printer in the room.
The SWIFT facility should have been walled off from the rest of the network. That could have been done if the bank had used the more expensive, “managed” switches, which allow engineers to create separate networks, said Alam, whose institute includes a cyber-crime division. Moreover, considering the importance of the room, the bank should have deployed staff to monitor activity round the clock, including weekends and holidays, he said.