Australia's Largest Bank Lost The Personal Financial Histories Of 12m Customers

The Commonwealth Bank lost the personal financial histories of 12 million customers, and chose not to reveal the breach to consumers, in one of the largest financial services privacy breaches ever to occur in Australia.

It has been revealed that the nation’s largest bank lost the banking statements for customers from 2004 to 2014 after a subcontractor lost several tape drives containing the financial information in 2016.

While the bank initially notified the Office of the Australian Information Commissioner (OAIC) of the breach shortly after it became aware of it in 2016, a spokesperson for the OAIC said it was now making further inquiries into the privacy breach, following a damning report into the bank's culture released recently.

Angus Sullivan, Commonwealth Bank’s acting group executive of retail banking services said in a statement: “We take the protection of customer data very seriously and incidents like this are not acceptable. We want to assure our customers that no action is required and we apologise for any concern the incident may cause."

“We undertook a thorough forensic investigation, providing further updates to our regulators after its completion. We also put in place heightened monitoring of customer accounts to ensure no data compromise had occurred."

Personal banking statements contain potentially sensitive personal information, and can paint a detailed portrait of the financial and personal affairs of a person. They could potentially be misused by organised crime groups if they fell into the wrong hands, or exploited by commercial companies that could use the data for illegitimate or unethical purposes.

Sullivan said in his statement the information disclosed in the breach did not contain anything that could directly compromise accounts, such as passwords or PIN numbers.

The revelation of the breach has come at a time when Australia’s financial industry is under unprecedented scrutiny during the financial services royal commission, and a global debate about privacy triggered by Facebook’s handling of user information.
BuzzFeed News has learned the breach occurred in 2016 when the bank’s subcontractor Fuji Xerox was decommissioning a data storage centre where some Commonwealth Bank customer data was stored.

Backup magnetic tape drives of financial statements were believed to have been sent to be destroyed. But when a "destruction certificate" for the data wasn't found on 9 May 2016, the Commonwealth Bank initiated an investigation to find out what happened to the data.

The bank notified the OAIC, which regulates privacy in Australia, on 20 May 2016 and told the regulator what had occurred.
The bank then undertook significant steps to attempt to retrieve the information. BuzzFeed News understands that after the breach was discovered, the company spent a number of weeks formulating a range of potential responses. It formed a remediation task force from within the bank’s ranks and called the team “Project Chesapeake".

The details of the breach were known to around 150 people in the organisation, including members of the senior executive team, data managers, risk specialists, and in-house and external legal services. The bank hired a forensic team from accounting firm KPMG to conduct an exhaustive search to locate the missing tape drives, but they were never recovered.
One possibility that was canvassed by KPMG is that the drives weren’t secured properly and fell from a truck in transit that was carrying the data for destruction. Forensic investigators hired to assess the breach retraced the route of the truck to determine whether they could locate the drives along this route, but were unable to find any trace of them.

Sullivan also said that KPMG's forensic investigation "found the most likely scenario was the tapes were disposed of". The customer data has never been recovered.

BuzzFeed News says the magnetic tape drives were also not encrypted. But the information on the drives was difficult to access due to the age of the magnetic drives and the file type the information was stored in. While the bank considered alerting customers, BuzzFeed News understands it ultimately determined that the risk of the data being discovered and misused was low.

The Commonwealth Bank initially notified the OAIC and the Australian Prudential Regulation Authority (APRA) on 20 May 2016. It later met with the OAIC on 7 June 2016, and provided the OAIC with a further follow-up report into the breach on 20 October 2016 once KPMG's report was complete. The OAIC replied several days later informing the bank that no further action would be taken. The bank also briefed APRA about the incident on 7 December 2016.

The bank ultimately made the decision not to notify customers, in a move that may come under scrutiny in a climate where Australians are increasingly demanding more transparency and oversight over the way large corporations handle customers' personal information.

Sullivan said in his statement: “We concluded, given the results of the investigation, that we would not alert customers. We advised the OAIC who subsequently advised us that it did not intend to take any further action in relation to the matter."

He added: “We can confirm there was no evidence of customer records being compromised or suspicious activity following an incident in 2016. Ongoing monitoring of accounts by CBA confirms customers do not need to take any action."

The Commonwealth Bank’s former CEO Ian Narev, who was in charge when the breach occurred, resigned in August 2017.
The current CEO Matt Comyn assumed the role in April 2018. In a statement released by Comyn in January 2018 he said that “the last six months in particular have been very challenging and I am committed to working with the board, the executive team and our wonderful people to rebuild trust in the Commonwealth Bank together”.

Under Australia’s privacy laws organisations have an obligation to take reasonable steps to protect personal information they hold from “misuse, interference and loss”.

Had the breach occurred after March this year, it is possible the bank would have been required under law to disclose the breach to customers. New mandatory data breach notification laws came into force in Australia this year that require companies to reveal data breaches to affected individuals and to the OAIC where the breach is “likely to result in serious harm".

A spokesperson for the OAIC said in a statement: "The Office of the Australian Information Commissioner was notified of this incident by the CBA in 2016 and based on the information provided by the CBA at the time, decided that no further regulatory action would be taken, in accordance with the OAIC’s Regulatory Action Policy.

"Having regard to the findings in the report by APRA into the CBA released yesterday, the OAIC today made further inquiries in relation to this matter and has sought information from the CBA to satisfy the OAIC that the CBA has taken on board lessons learned from this incident, to ensure the privacy of customers' personal information is adequately protected."
Fuji Xerox declined to comment on its role in the breach. APRA also declined to comment, citing the strict secrecy provisions that set out how it handles matters that are brought to its attention.

The bank is already facing intense scrutiny in public hearings convened by the royal commission. Earlier in April at a hearing an internal document from the bank revealed that Commonwealth Bank financial advisers had been charging dead clients for financial services for up to a decade.

This week APRA released its report into the culture inside the Commonwealth Bank. It found the bank had '"fallen from grace" and had been reactive in dealing with risks.

The report found the bank had "inadequate oversight and challenge by the Board and its gatekeeper committees of emerging non-financial risk" and "weaknesses in how issues, incidents and risks were identified and escalated through the institution and a lack of urgency in their subsequent management and resolution".

APRA accepted a series of enforceable undertakings from the Commonwealth Bank to improve its internal culture. On Tuesday 2nd May, the bank's CEO Matt Comyn agreed to implement all APRA's recommendations. He said in a statement:

"We will establish a higher level of accountability and consequence for our actions and the impact we have on customers."

Buzzfeed

You Might Also Read:

TSB's IT Meltdown Was Evident A Year Before:

Bank Data Breaches Are Up And It's An Inside Job:
 

 

« British Healthcare System Spends £150m Extra On Cybersecurity
Re-Thinking The Threat Of Ransomware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Chatham House Cyber Conference

Chatham House Cyber Conference

14 June 2023 - Connect with cyber security experts and senior policymakers to explore the role of cyber security in the global economy and how to deliver an open and secure internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Association for Uncrewed Vehicle Systems International (AUVSI)

Association for Uncrewed Vehicle Systems International (AUVSI)

AUVSI is the world's largest nonprofit organization dedicated to the advancement of uncrewed systems and robotics. Focus areas include cyber security for uncrewed systems and robotics.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.