欢迎来到报告吧! | 帮助中心 分享价值,成长自我!

报告吧

换一换
首页 报告吧 > 资源分类 > PDF文档下载
 

金融机构面临的新冠疫情及网络风险(英文版).pdf

  • 资源ID:120065       资源大小:770.21KB        全文页数:9页
  • 资源格式: PDF        下载积分:15金币 【人民币15元】
快捷下载 游客一键下载
会员登录下载
三方登录下载: 微信开放平台登录 QQ登录  
下载资源需要15金币 【人民币15元】
邮箱/手机:
温馨提示:
用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,下载共享资源
 
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

金融机构面临的新冠疫情及网络风险(英文版).pdf

BIS Bulletin No 37 Covid-19 and cyber risk in the financial sector Iaki Aldasoro, Jon Frost, Leonardo Gambacorta and David Whyte 14 January 2021 BIS Bulletins are written by staff members of the Bank for International Settlements, and from time to time by other economists, and are published by the Bank. The papers are on subjects of topical interest and are technical in character. The views expressed in them are those of their authors and not necessarily the views of the BIS. The authors are grateful to Giulio Cornelli for excellent analysis and research assistance, and to Louisa Wagner for administrative support. The editor of the BIS Bulletin series is Hyun Song Shin. This publication is available on the BIS website (bis). Bank for International Settlements 2020. All rights reserved. Brief excerpts may be reproduced or translated provided the source is stated. ISSN: 2708-0420 (online) ISBN: 978-92-9197-451-0 (online) BIS Bulletin 3 Covid-19 and cyber risk in the financial sector Key takeaways The financial sector has been hit by hackers relatively more often than other sectors during the Covid- 19 pandemic. While this has not yet led to significant disruptions or a systemic impact, there are substantial risks from cyber attacks for financial institutions, their staff and their customers going forward. Financial authorities are working to mitigate cyber risks, including through international cooperation. During the Covid-19 pandemic, financial institutions have been at the leading edge of the response to cyber risk. Their already large exposure to cyber risk has been further accentuated by the move towards more working from home (WFH) and other operational challenges. This Bulletin serves as a primer on cyber risk and presents initial findings on how the financial sector has met the challenges of the pandemic. We draw on new data to assess changes in the threat landscape for financial institutions in the pandemic. Cyber risk: a taxonomy As the economy and financial system become more digitised, cyber risk is growing in importance. “Cyber risk” is an umbrella term encompassing a wide range of risks resulting from the failure or breach of IT systems. According to the FSB Cyber Lexicon (2019), cyber risk refers to “the combination of the probability of cyber incidents occurring and their impact”. A “cyber incident”, in turn, is “any observable occurrence in an information system that: (i) jeopardises the cyber security of an information system or the information the system processes, stores or transmits; or (ii) violates the security policies, security procedures or acceptable use policies, whether resulting from malicious activity or not”. Cyber risk is one form of operational risk (Aldasoro et al (2020b), CPMI-IOSCO (2016). Cyber risks can be classified based on their cause/method, actor, intent and consequence (Aldasoro et al (2020a), Curti et al (2019). The causes or methods vary, and include both unintended incidents and intentional attacks. Examples of the former are accidental data disclosure, and implementation, configuration and processing errors. Such incidents are frequent. Yet around 40% of cyber incidents are intentional and malicious, rather than accidental, ie they are cyber attacks (Aldasoro et al (2020c). Some cyber attacks involve threat actors inserting themselves into a trusted data exchange. Malware (ie “malicious software”) is software designed to cause damage to IT devices and/or steal data (for example, so-called Trojans, spyware and ransomware). Man-in-the-middle attacks occur when attackers insert themselves into a two-party transaction (Graph 1, first panel), accessing or manipulating data or transactions. Cross-site scripting is a web security vulnerability that allows attackers to compromise the interactions a victim has with a vulnerable application. Phishing is stealing sensitive data or installing malware with fraudulent emails that appear to be from a trustworthy source (Graph 1, second panel). To gain a victims trust, phishing attacks may imitate trusted senders. After gaining entrance, these may help attackers to gain credentials and entry into a system. Password cracking is the process of recovering secret passwords stored in a computer system or transmitted over a network. Iaki Aldasoro inaki.aldasorobis Jon Frost jon.frostbis Leonardo Gambacorta leonardo.gambacortabis David Whyte david.whytebis 4 BIS Bulletin Some attacks involve professional tools and planning. A zero-day exploit is an attack against a software or hardware vulnerability that has been discovered but not publicly disclosed (Graph 1, third panel). The discovery of a zero-day exploit can result in a situation where both the customers and vendors Selected causes of cyber attacks Graph 1 Man-in-the-middle Phishing Timeline of zero-day vulnerabilities Distributed denial-of-service (DDoS) attack Source: Authors elaboration. BIS Bulletin 5 of the IT asset are now subject to cyber attacks for which no predefined detection signatures or remedial patches are available. Exacerbating this situation are commercial firms that conduct research to sell zero- day exploits on the open market. Some of these firms, such as Zerodium, pay large cash rewards (up to $2.5 million) for high-risk vulnerabilities. Finally, distributed denial of service (DDoS) attacks flood servers with traffic to exhaust bandwidth or consume finite resources (Graph 1, fourth panel). These attacks may require renting computing capacity, or hacking third-party devices, to participate in an attack. Actors include outright criminal and terrorist organisations, industrial spies, “hacktivists”, or state and state-sponsored players. The damage they can cause depends on their sophistication and resources. For example, in 2016, hackers associated with North Korea carried out a notable attack by breaching the systems of Bangladesh Bank and using the SWIFT network to send fraudulent money transfer orders (Bangladesh Bank-FRBNY (2019). The attack highlighted rising cyber risks for payment systems and associated infrastructures. 1 The ultimate purpose can be for profit (eg ransomware, industrial spying), geopolitical (state-sponsored attacks on critical infrastructures) or general discontent (hacktivism). The consequences of cyber attacks can be severe. Business disruptions and IT system failures can damage the integrity and availability of assets and services. Data breaches compromise the confidentiality of sensitive data, with financial and reputational losses. Fraud and theft include the loss of funds or any information (eg intellectual property) that may or may not be personally identifiable. In some circumstances, cyber attacks could have systemic implications and cause serious economic dislocations. Covid-19, remote working and changes in the cyber threat landscape Covid-19 has precipitated a move to working from home (WFH). Financial institutions like other organisations have temporarily shifted to remote working to protect their workers. Moving the majority of activities to the digital world could increase the risk of cyber attacks. For instance, the use of remote access technologies such as the remote desktop protocol (RDP) and virtual private network (VPN) increased by 41% and 33%, respectively, in the first two months of the Covid-19 outbreak (ZDNet (2020). Unless well managed, this may allow new opportunities for threat actors to penetrate IT systems and carry out cyber attacks, along with other types of financial crime (Crisanto and Prenio (2020). WFH may also challenge business continuity plans and the response to an operational or cyber incident. The recent SolarWinds hack underscores risks from third-party vendors. In December 2020, it was reported that hackers had inserted malware into the company SolarWinds product Orion, used by thousands of companies and government agencies around the world (FBI-CISA-ODNI (2020). Software supply chain attacks are one of the hardest types of threat to mitigate, as they take advantage of established trust relationships and the machine-to-machine communications used to provide essential software updates. While the financial sector was not a primary target, the hackers gained access in March 2020 and remained undetected for many months. The full scale of the attack has not been fully disclosed. 2 The financial sector has been hit relatively more often by cyber attacks than most other sectors since the pandemic started. Data on attacks can be obtained from Advisen, a for-profit organisation that collects information from reliable and publicly verifiable sources (mostly in the United States), covering date, actor, loss amount and other features. There is a strong link between the prevalence of WFH arrangements as measured by the WFH index by sector from Dingel and Neiman (2020) and the incidence of cyber attacks between the end of February and June 2020 (Graph 2, left-hand panel). The financial sector ranks high on both accounts (red square). Outside the health sector, the financial sector has the largest share of cyber events classified as Covid-19-related in recent months (right-hand panel). Examples are phishing attacks that explicitly use the uncertainty around Covid-19 to entice users to open fraudulent attachments or grant attackers access to networks. 1 In response to ever more sophisticated attacks, SWIFT launched a Customer Security Programme (CSP) in 2016 (SWIFT (2019). 2 Separately, in January 2021, the Reserve Bank of New Zealand (RBNZ) reported that a third-party file sharing service that the Bank used to share and store some sensitive information was illegally accessed (RBNZ (2021). 6 BIS Bulletin Payment firms, insurers and credit unions have been especially affected. A survey among financial institutions by the Financial Services Information Sharing and Analysis Center (FS-ISAC) finds a substantial rise in phishing, suspicious scanning and malicious activity against webpages for WFH staff to access the network. Payment firms, insurance companies and credit unions have seen the strongest increase in hacks (Graph 3, left-hand panel). Covid-19-related attacks grew with the spread of the pandemic, from fewer than 5,000 per week in February to more than 200,000 per week in late April. They rose further by around one third in May and June compared with March and April (Check Point Research (2020). The survey highlighted that, in 45% of cases, staff WFH overwhelmed virtual desktop infrastructure (VDI)/VPN processes. In one third of cases, business continuity IT plans were not prepared for a long-term at-home work force (right-hand panel). One fifth of the financial firms reported that their network operation activities were interrupted during the pandemic. Mass migration to WFH can make financial institutions staff more vulnerable. As staff work from home through firm-issued and private devices and networks, new risks may arise. In a household, multiple family members could be logging on to the same network, potentially exposing devices to malware that could then enter a firms enterprise environment. Some videoconferencing facilities have been shown to have suboptimal security standards. Trader surveillance may also be subject to unintended consequences. Regulatory rules require that traders calls are recorded and monitored, but traders have been working from home and calls may go unrecorded. Another factor at play is the expansion of the range of self- service options available to customers online for wealth management trades, mortgage, loan applications, etc. Ensuring robust security controls becomes even more essential. Evidence so far suggests the same threat actors, intent and methods as before the pandemic, but new opportunities given Covid-19-related uncertainty. Phishing ploys are not new, but the volume of such attempts has spiked. A recent report found that a quarter of cyber incidents responded to in the United Kingdom over August 2019August 2020 involved criminals and hostile states exploiting the Covid- 19 pandemic (NCSC (2020). In the European Union (EU), threat actors compromised the VPN services of EU institutions that allow staff to work from home (CERT-EU (2020). In other cases, threat actors imitated trusted sources such as the World Health Organization to get users to open malicious links and files (Microsoft (2020). In one case, a DDoS attack was able to disrupt trading at a major stock exchange for four consecutive days (Hope (2020), underscoring the risks of hacking to critical infrastructures. The financial sector has been hit by cyber attacks during the pandemic Graph 2 WFH index versus cyber events during Covid-19 1 Covid-19-related cyber events by sector 2 Per cent 1 Excludes the health sector. 2 Based on cases classified by Advisen as Covid-19-related. Includes data up to 9 September 2020. The sample in the graph excludes the health sector (57 Covid-related cases) and affecting health-related items of the manufacturing sector (163 cases). Sources: Dingel and Neiman (2020); Advisen; authors calculations. Real estate Retail trade services Educational services Information Manufacturing technical services scientific and Professional, Wholesale trade 40 20 0 1.00.80.60.40.2 sector Financial Frequency of cyber events by industry, MarJun 2020 Financial sector Trend line Other sectors 90% confidence interval Work from home index by industry 5.3 5.6 8.9 15.6 12.3 24.4 25.3 Finance those that answered “somewhat” receive a score of 0.5. The index ranges between 1 and 1. A positive value indicates an increase in cyber attacks. 3 The first question (results reported on the left) is: “Did staff working from home overpower your VDI/VPN process?”. The second question (results reported on the right) is: “Were business continuity IT plans prepared for a long-term, at-home workforce?”. The panel gives the share of firms that answered “yes”. Source: FS-ISAC (2020). investments Securities & banks Commercial Community banks Credit unions Insurers Payments Lenders 0.35 0.30 0.25 0.20 0.15 0.60.50.40.3 Change in suspicious scanning and low-sophistication cyber activity level Change in overall malicious phishing 60 45 30 15 0 long-term, at-home workforceprocess were not prepared for aoverpowered the VDI/VPN Business continuity IT plansStaff working from home _ _ _ _ _ Securities & investments Community bank Insurance Lender Commercial bank Credit union Payments Average 8 BIS Bulletin References Aldasoro, I, J Frost, L Gambacorta, T Leach and D Whyte (2020a): “Cyber risk in the financial sector”, SUERF Policy Notes, no 206, November. Aldasoro, I, L Gambacorta, P Giudici and T Leach (2020b): “Operational and cyber risks in the financial sector”, BIS Working Papers, no 840, February. - (2020c): “The drivers of cyber risk”, BIS Working Papers, no 865, May. Bangladesh Bank and Federal Reserve Bank of New York (FRBNY) (2019): “Joint Statement”, 1 Fe

注意事项

本文(金融机构面临的新冠疫情及网络风险(英文版).pdf)为本站会员(幸福)主动上传,报告吧仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知报告吧(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2017-2022 报告吧 版权所有
经营许可证编号:宁ICP备17002310号 | 增值电信业务经营许可证编号:宁B2-20200018  | 宁公网安备64010602000642号


收起
展开