A recent heist robbed two Egyptian banks of $45 million, involved a yet-unknown number of actors in 27 cities around the world, contained 40,500 fraudulent ATM transactions, and left no fingerprints.
Two Dutch citizens were caught by German authorities last week for their alleged involvement in an elaborate cyber-scheme that tapped the United Arab Emirate's National Bank of Ras Al Khaimah PSC (RAKBANK) for nearly five million dollars and Oman's Bank of Muscat for $40 million.
“I don't know why these banks were targeted in particular, but the methodology behind these kinds of attacks is to canvass hundreds or thousands of institutions and find the ones with the most accessible vulnerabilities,” says Brian Kenyon, vice president and chief technology officer of Security Connected at software-safety company McAfee.
While the banks state that their customers won't suffer a financial loss as a result of the crime, experts say liability for the theft could fall on the processors of the debit cards used to perpetrate the crime, and make it difficult for other financial institutions to get cyber coverage.
“From what I've researched and read, the algorithms used by the processing companies on these prepaid cards were simplistic and easy to get,” says Jim Fidler, vice president of Mobile Technology for mobile-device security company Parabal. “With basic software and a couple pieces of inexpensive hardware, you can duplicate cards and alter their magnetic data strips.”
To perpetrate the scheme, hackers tampered with prepaid and debit MasterCards processed by two companies with locations in India, which Reuters identified as EnStage Inc. and ElectraCard Services. They manipulated the card's codes to increase their available balances and eliminate withdrawal limits, and then passed the infected codes to thousands of “cashers” who used them to suck funds from ATM machines.
The attacks were carried out in December and in February, with each long chain of thefts lasting less than 24 hours each. The members most likely communicated via aliases on message boards that are locked-out to the public, says Kenyon.
Earlier this year, eight men were accused by the U.S. Justice Department of being members of one of the crime scheme's cells. Another alleged member of that cell was found dead in the Dominican Republic in April.
The plan's ultimate ringleaders are still at large.
Verizon reports that cyber attacks against financial institutions represent 37 percent of all breaches, manifesting as stolen debit-card information, personal bank account information and even customer's names, addresses and social security numbers.
According to the company's 2013 Data Breach Investigations Report, 61 percent of breaches involve planting skimming devices on ATMs to steal magnetic stripe data from payment cards; 16 percent involve using stolen usernames and passwords to gain unauthorized access to web accounts; and 15 percent of breaches were carried out by employees abusing access to intranet systems to sell fraudsters private information.
As a result, more companies than ever are opting for cyber liability insurance – Marsh reports that it saw a 33 percent increase in clients choosing the coverage in 2012 than in 2011.
However, according to Kevin P. Kalinich, Cyber Insurance global practice leader at Aon Risk Solutions, the terms of that coverage become fuzzier each time the industry suffers a significant loss. He says that cyber breaches can even extend into Property coverage if business is interrupted as a result of a website shut-down.
“If this was any other industry, like retail, healthcare or hospitality, it would be easier to answer how this event can impact the availability for cyber coverage in the future; from a financial institution standpoint, it can affect crime, professional liability, general liability and also cyber,” he says.
He adds, “Underwriters didn't anticipate what kind of a world we would have in 2013 when they wrote traditional property and general liability policies. They're now scrutinizing policies to exclude perils like hacks…and will tighten up and add exclusions for intangible perils.”
Kalinich concludes, “What companies need to do is take a step back, and instead of only worrying about what kind of insurance we will need, get our IT people together with our legal, financial and product people to discuss the technical defenses for cyber breach, the liability of a breach, the impact of a breach and how to safely offer new services.”
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.