Cyber Theft Interrupted: Vietnam Bank Foils SWIFT Attack

Vietnam's Tien Phong Bank said that it interrupted an attempted cyber heist that involved the use of fraudulent SWIFT messages, the same technique at the heart of February's massive theft from the Bangladesh central bank.

Hanoi-based TPBank said in a statement recently in response to inquiries from Reuters that in the fourth quarter of last year it identified suspicious requests through fraudulent SWIFT messages to transfer more than 1 million euros ($1.1 millions) of funds.

TPBank said it caught the attempt quickly enough to halt movement of funds to criminals by immediately contacting involved parties. The attack "did not cause any losses. It had no impact on the SWIFT system in particular and the transaction system between the bank and customers in general," the bank's statement said.

The bank said the transfers were made using infrastructure of an outside vendor hired to connect it to the SWIFT bank messaging system. Its statement did not name the service provider, though it said TPBank has discontinued working with that vendor and switched to using a new system that offers a higher level of security and enables it to connect directly with SWIFT.

SWIFT, the backbone of global financial transactions, declined comment on TPBank's claims. Recently, it had said an unnamed commercial bank was targeted by a malware attack similar to the one at Bangladesh Bank.

TPBank did not immediately respond to requests from Reuters to elaborate on its statement. Representatives with Vietnam's central bank also did not immediately respond to requests for comment. It was not immediately clear when SWIFT was made aware of the attempted cyber heist at TPBank and whether it took any action to prevent similar attacks or warned other clients.

In February, in one of the world's biggest ever cyber-heists, hackers tried to steal nearly $1 billion from Bangladesh Bank's account at the New York Federal Reserve using fraudulent transfer messages on the SWIFT system.

Most of the orders were blocked but $81 million was transferred to bank accounts in the Philippines. The money was moved to casinos and casino agents and most remain missing.

TPBank said that the attack might have been facilitated using malware installed on a software application used by the third-party vendor. It noted that SWIFT had recently issued a warning about malware used in schemes involving fraudulent transfers ordered over the SWIFT network. Recently, the Brussels-based messaging service sent a warning to all of its customers warning that it was aware of a "small number" of cases of fraud at its customers. It said that malware was used to target a PDF reader used by customers to review statements summarizing transfers made over SWIFT. It was not immediately clear whether TPBank's description referred to the PDF malware.

Cybersecurity firm BAE Systems said malware was used to target a Vietnamese commercial bank using fraudulent messages on the SWIFT network. The malware operated in a similar way to that used by hackers in the Bangladesh cyber heist. BAE did not name the Vietnamese Bank.

TPBank said the servers of the third-party vendor were based overseas, but did not say where. It said the vendor had used a software application that SWIFT had told the bank may have been subject to the malware assault. TPBank, founded in 2008 by Vietnam's top technology firm FPT Corp. considered one of Vietnam's most modern and technologically savvy banks. Just last week it was received the "Best Internet Banking" prize from The Asian Banker.

TPBank's major shareholders include Doji, a local gold and jewelry firm, state-run Vietnam National Reinsurance Corporation  and Singapore-based SBI Ven Holding Pte Ltd, a unit of Japanese financial services conglomerate SBI Holdings Inc  FPT has divested most of its shareholdings and now has a 9 percent stake in TPBank.

After BAE systems said a Vietnamese bank had been targeted, TPBank, when contacted by Reuters, initially denied it had been subject of an attack, saying it "did not have any problems."

Reuters

« Over One Hundred Million LinkedIn Passwords Posted Online
Navigating The Cyber-Threat Landscape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

ETAS

ETAS

ETAS (formerly Escrypt) is a pioneer and one of today’s leading solution providers for embedded IT security.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

Torsion Information Security

Torsion Information Security

Torsion is an innovative information security and compliance engine, which runs either in the cloud or your data centre.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

PPC Protect

PPC Protect

PPC Protect is an entirely automated click fraud prevention solution.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.