Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Finance > The scale of DDoS attacks against the finance industry
    Finance

    The scale of DDoS attacks against the finance industry

    The scale of DDoS attacks against the finance industry

    Published by maria gbaf

    Posted on January 26, 2022

    Featured image for article about Finance

     By Richard Hummel, ASERT Threat Intelligence Lead for NETSCOUT

    Over the last two years, the way in which financial institutions operate has changed significantly. Businesses in the finance industry have had to adapt their operation models and implement remote working policies as a result of the Covid-19 pandemic. By working from home, large volumes of employees’ private and sensitive material has been left exposed to cybercriminals operating outside of the traditional perimeters, owing to the data being accessed from off-site locations. Unsurprisingly, threat actors have taken advantage of the opportunity this has presented to them.

    In its recently published Threat Intelligence Report, NETSCOUT discovered that threat actors had launched approximately 5.4 million Distributed Denial-of-Service (DDoS) attacks during the first half of 2021, an 11 percent increase from the same time period in 2020, with the peak occurring between January and March of 2021.

    This should be significant cause for concern among those responsible for the security of these organisations, as the report also found that in the first half of 2021, more than 50 percent of those targeted by DDoS extortion attacks were in the financial industry. What’s more, NETSCOUT found that more than 7,000 DDoS attacks were launched against commercial banks and payment card processors during the first six months of 2021.

    Although at first it may appear as if this attack activity is relatively minor compared to the overall numbers, many of these attacks succeeded in causing major disruption. This, in turn, had a damaging impact on downstream consumers attempting to use their credit cards as well as the targeted organisations. If a commercial bank or payment card processor is attacked, this can have major consequences, since credit card processors have the capacity to service over 5,000 transactions per second, so even in a scenario in which they suffer from a few minutes of downtime, there is the potential for millions of pounds of revenue to be lost. This can also have an extremely negative effect on the organisation’s brand and customer retention.

    Types of DDoS attacks being launched by threat actors

    As already discussed, financial institutions receive a large number of DDoS extortion attacks. These types of attacks differ from other DDoS attacks as the threat actors run a demonstration DDoS attack against elements of the business’s online infrastructure, either prior to or after sending an email to the company demanding for payment in cryptocurrency, usually Bitcoin.

    One of the main reasons why threat actors target financial institutions using DDoS extortion attacks, is because these organisations are known to have access to large volumes of data and money. For example, the Lazarus Bear Armada (LBA) DDoS extortion campaign targeted financial institutions such as commercial banks and market institutions, including the New Zealand Stock Exchange. Further to this, professional ransomware gangs have added triple extortion attacks to their weaponry. Through a combination of file encryption, data theft and DDoS attacks, cybercriminals have hit a ransomware trifecta with the aim of increasing the payment potential.

    In addition to this, threat actors are utilising increasingly complex techniques when it comes to launching DDoS attacks against financial institutions. Evidence of this can be seen with cybercriminals tailoring the types of attacks that they are using to try and overwhelm the several layers of on-premises and cloud-based DDoS protection, which have been installed in an attempt to penetrate financial organisations’ online infrastructure. An example of this can be seen with an increased usage of TCP ACK flood attacks, which are designed to overload and obstruct connections between servers against commercial banks and payment card processing solutions. As a result, both institutional and end customers utilising these services have been impacted by downtime and outages.

    What can financial institutions do to protect themselves?

    As is the case with numerous aspects of the human condition, the 80/20 rule – also known as the Pareto Principle after its famous expositor, the economist Vilfredo Pareto – can be applied not only to economics but also to internet security and DDoS protection. For around 80 percent of DDoS attacks, businesses that have put into effect the appropriate industry best current practices (BCPs) will be able to ensure availability in the event they’re hit by a DDoS attack. In terms of the remaining 20 percent of attacks, financial institutions need to optimise their DDoS defence systems based on numerous factors, including vector selection and attack behaviour. Nonetheless, the effort and time required to adequately prepare means that defenders need to react in a manner which is deemed situationally appropriate, so that the attacks are thwarted, and the resiliency of their online properties are maximised. As such, there are numerous actions businesses in the finance industry can take to ensure they’ve maximised their ability to defend themselves against DDoS attacks.

    Firstly, for financial institutions to adequately defend their public-facing online infrastructure from this continued threat, it is essential for them to invest in a strong and effective DDoS protection system. Through the implementation of comprehensive DDoS mitigation, the threat posed by cybercriminals will be neutralised. This is because the system will prevent DDoS attacks from causing significant damage, due to the preventative measures which are in place. If organisations with an adequate DDoS defence system are on the receiving end of a DDoS attack, they will have peace of mind and full confidence in the system they’re using.

    Secondly, finance businesses need to test their DDoS mitigation system on a semi-regular basis. Periodic testing ensures that any changes and tweaks to an organisation’s online systems are incorporated into the comprehensive protection plan, defending the whole of the online infrastructure from DDoS attacks. Finally, financial institutions should also strongly consider employing an on-demand DDoS attack specialist. By utilising the expertise of a specialist, businesses will be able to negotiate unfamiliar circumstances and terrain, which should benefit the entire company, as well as individual teams. So long as financial organisations adhere to BCP procedures and put into effect these aforementioned recommendations, they will be in a strong position to successfully defend their online properties should they be the target of a DDoS attack.

    The continued evolution of DDoS attacks, which are constantly becoming more and more intricate and hard to defend, means financial institutions must implement security capable of preventing these complex attacks from causing serious damage. By doing this, organisations in the financial sector will be well placed to defend themselves from cybercriminals if they so happen to be on the receiving end of a DDoS attack.

     By Richard Hummel, ASERT Threat Intelligence Lead for NETSCOUT

    Over the last two years, the way in which financial institutions operate has changed significantly. Businesses in the finance industry have had to adapt their operation models and implement remote working policies as a result of the Covid-19 pandemic. By working from home, large volumes of employees’ private and sensitive material has been left exposed to cybercriminals operating outside of the traditional perimeters, owing to the data being accessed from off-site locations. Unsurprisingly, threat actors have taken advantage of the opportunity this has presented to them.

    In its recently published Threat Intelligence Report, NETSCOUT discovered that threat actors had launched approximately 5.4 million Distributed Denial-of-Service (DDoS) attacks during the first half of 2021, an 11 percent increase from the same time period in 2020, with the peak occurring between January and March of 2021.

    This should be significant cause for concern among those responsible for the security of these organisations, as the report also found that in the first half of 2021, more than 50 percent of those targeted by DDoS extortion attacks were in the financial industry. What’s more, NETSCOUT found that more than 7,000 DDoS attacks were launched against commercial banks and payment card processors during the first six months of 2021.

    Although at first it may appear as if this attack activity is relatively minor compared to the overall numbers, many of these attacks succeeded in causing major disruption. This, in turn, had a damaging impact on downstream consumers attempting to use their credit cards as well as the targeted organisations. If a commercial bank or payment card processor is attacked, this can have major consequences, since credit card processors have the capacity to service over 5,000 transactions per second, so even in a scenario in which they suffer from a few minutes of downtime, there is the potential for millions of pounds of revenue to be lost. This can also have an extremely negative effect on the organisation’s brand and customer retention.

    Types of DDoS attacks being launched by threat actors

    As already discussed, financial institutions receive a large number of DDoS extortion attacks. These types of attacks differ from other DDoS attacks as the threat actors run a demonstration DDoS attack against elements of the business’s online infrastructure, either prior to or after sending an email to the company demanding for payment in cryptocurrency, usually Bitcoin.

    One of the main reasons why threat actors target financial institutions using DDoS extortion attacks, is because these organisations are known to have access to large volumes of data and money. For example, the Lazarus Bear Armada (LBA) DDoS extortion campaign targeted financial institutions such as commercial banks and market institutions, including the New Zealand Stock Exchange. Further to this, professional ransomware gangs have added triple extortion attacks to their weaponry. Through a combination of file encryption, data theft and DDoS attacks, cybercriminals have hit a ransomware trifecta with the aim of increasing the payment potential.

    In addition to this, threat actors are utilising increasingly complex techniques when it comes to launching DDoS attacks against financial institutions. Evidence of this can be seen with cybercriminals tailoring the types of attacks that they are using to try and overwhelm the several layers of on-premises and cloud-based DDoS protection, which have been installed in an attempt to penetrate financial organisations’ online infrastructure. An example of this can be seen with an increased usage of TCP ACK flood attacks, which are designed to overload and obstruct connections between servers against commercial banks and payment card processing solutions. As a result, both institutional and end customers utilising these services have been impacted by downtime and outages.

    What can financial institutions do to protect themselves?

    As is the case with numerous aspects of the human condition, the 80/20 rule – also known as the Pareto Principle after its famous expositor, the economist Vilfredo Pareto – can be applied not only to economics but also to internet security and DDoS protection. For around 80 percent of DDoS attacks, businesses that have put into effect the appropriate industry best current practices (BCPs) will be able to ensure availability in the event they’re hit by a DDoS attack. In terms of the remaining 20 percent of attacks, financial institutions need to optimise their DDoS defence systems based on numerous factors, including vector selection and attack behaviour. Nonetheless, the effort and time required to adequately prepare means that defenders need to react in a manner which is deemed situationally appropriate, so that the attacks are thwarted, and the resiliency of their online properties are maximised. As such, there are numerous actions businesses in the finance industry can take to ensure they’ve maximised their ability to defend themselves against DDoS attacks.

    Firstly, for financial institutions to adequately defend their public-facing online infrastructure from this continued threat, it is essential for them to invest in a strong and effective DDoS protection system. Through the implementation of comprehensive DDoS mitigation, the threat posed by cybercriminals will be neutralised. This is because the system will prevent DDoS attacks from causing significant damage, due to the preventative measures which are in place. If organisations with an adequate DDoS defence system are on the receiving end of a DDoS attack, they will have peace of mind and full confidence in the system they’re using.

    Secondly, finance businesses need to test their DDoS mitigation system on a semi-regular basis. Periodic testing ensures that any changes and tweaks to an organisation’s online systems are incorporated into the comprehensive protection plan, defending the whole of the online infrastructure from DDoS attacks. Finally, financial institutions should also strongly consider employing an on-demand DDoS attack specialist. By utilising the expertise of a specialist, businesses will be able to negotiate unfamiliar circumstances and terrain, which should benefit the entire company, as well as individual teams. So long as financial organisations adhere to BCP procedures and put into effect these aforementioned recommendations, they will be in a strong position to successfully defend their online properties should they be the target of a DDoS attack.

    The continued evolution of DDoS attacks, which are constantly becoming more and more intricate and hard to defend, means financial institutions must implement security capable of preventing these complex attacks from causing serious damage. By doing this, organisations in the financial sector will be well placed to defend themselves from cybercriminals if they so happen to be on the receiving end of a DDoS attack.

    Related Posts
    Germany removes dividend ban for Uniper, paving way for IPO
    Germany removes dividend ban for Uniper, paving way for IPO
    Golden Goose gets new majority owner as China's HSG buys stake from Permira
    Golden Goose gets new majority owner as China's HSG buys stake from Permira
    ECB's Escriva expects monetary policy to remain steady
    ECB's Escriva expects monetary policy to remain steady
    French government to appeal court ruling on Shein
    French government to appeal court ruling on Shein
    Russian central bank governor Nabiullina speaks after rate cut
    Russian central bank governor Nabiullina speaks after rate cut
    Strategy and bitcoin-buying firms face wider exclusion from stock indexes
    Strategy and bitcoin-buying firms face wider exclusion from stock indexes
    Carnival Corp sees strong annual profit, resumes dividend as bookings rise
    Carnival Corp sees strong annual profit, resumes dividend as bookings rise
    UK stocks muted near multi-week highs as retail sales, consumer sentiment sag
    UK stocks muted near multi-week highs as retail sales, consumer sentiment sag
    Italy sells digital payment unit PagoPA to Poste, state mint for up to 500 million euros
    Italy sells digital payment unit PagoPA to Poste, state mint for up to 500 million euros
    Court in Brazil's Minas Gerais slaps down Nestle copyright lawsuit
    Court in Brazil's Minas Gerais slaps down Nestle copyright lawsuit
    German court jails man for drugging, raping wife, posting assaults online
    German court jails man for drugging, raping wife, posting assaults online
    UniCredit issues its first tokenised structured note
    UniCredit issues its first tokenised structured note

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Finance

    Explore more articles in the Finance category

    UK competition watchdog to probe AB Foods' Hovis purchase

    UK competition watchdog to probe AB Foods' Hovis purchase

    Trump said he has no bigger healthcare plans: Obamacare will 'repeal itself'

    Trump said he has no bigger healthcare plans: Obamacare will 'repeal itself'

    Analysis-Spanish consumer credit hits near 18-year high on economic boom

    Analysis-Spanish consumer credit hits near 18-year high on economic boom

    NATO sees positive signs Czech ammunition scheme for Kyiv may continue

    NATO sees positive signs Czech ammunition scheme for Kyiv may continue

    Maersk tests Red Sea route as Gaza ceasefire offers hope

    Maersk tests Red Sea route as Gaza ceasefire offers hope

    Russia's tax proceeds from oil may fall in January to the lowest since 2022, Reuters calculations show

    Russia's tax proceeds from oil may fall in January to the lowest since 2022, Reuters calculations show

    French court rules against Shein suspension over sex doll sales, government to appeal

    French court rules against Shein suspension over sex doll sales, government to appeal

    No drop in military aid to Kyiv since US policy shift, NATO official says

    No drop in military aid to Kyiv since US policy shift, NATO official says

    How is Britain's government doing on its housing targets?

    How is Britain's government doing on its housing targets?

    Factbox-What are shipping companies' plans for return to Suez Canal?

    Factbox-What are shipping companies' plans for return to Suez Canal?

    Big central banks signal rate-cut cycle is ending

    Big central banks signal rate-cut cycle is ending

    Embraer's Eve makes maiden flight of 'flying car' prototype

    Embraer's Eve makes maiden flight of 'flying car' prototype

    View All Finance Posts
    Previous Finance PostFive trends for the finance team to be aware of in 2022
    Next Finance PostSterling at three-week low as equity slide hurts riskier currencies