Cyber Theft Interrupted: Vietnam Bank Foils SWIFT Attack

Vietnam's Tien Phong Bank said that it interrupted an attempted cyber heist that involved the use of fraudulent SWIFT messages, the same technique at the heart of February's massive theft from the Bangladesh central bank.

Hanoi-based TPBank said in a statement recently in response to inquiries from Reuters that in the fourth quarter of last year it identified suspicious requests through fraudulent SWIFT messages to transfer more than 1 million euros ($1.1 millions) of funds.

TPBank said it caught the attempt quickly enough to halt movement of funds to criminals by immediately contacting involved parties. The attack "did not cause any losses. It had no impact on the SWIFT system in particular and the transaction system between the bank and customers in general," the bank's statement said.

The bank said the transfers were made using infrastructure of an outside vendor hired to connect it to the SWIFT bank messaging system. Its statement did not name the service provider, though it said TPBank has discontinued working with that vendor and switched to using a new system that offers a higher level of security and enables it to connect directly with SWIFT.

SWIFT, the backbone of global financial transactions, declined comment on TPBank's claims. Recently, it had said an unnamed commercial bank was targeted by a malware attack similar to the one at Bangladesh Bank.

TPBank did not immediately respond to requests from Reuters to elaborate on its statement. Representatives with Vietnam's central bank also did not immediately respond to requests for comment. It was not immediately clear when SWIFT was made aware of the attempted cyber heist at TPBank and whether it took any action to prevent similar attacks or warned other clients.

In February, in one of the world's biggest ever cyber-heists, hackers tried to steal nearly $1 billion from Bangladesh Bank's account at the New York Federal Reserve using fraudulent transfer messages on the SWIFT system.

Most of the orders were blocked but $81 million was transferred to bank accounts in the Philippines. The money was moved to casinos and casino agents and most remain missing.

TPBank said that the attack might have been facilitated using malware installed on a software application used by the third-party vendor. It noted that SWIFT had recently issued a warning about malware used in schemes involving fraudulent transfers ordered over the SWIFT network. Recently, the Brussels-based messaging service sent a warning to all of its customers warning that it was aware of a "small number" of cases of fraud at its customers. It said that malware was used to target a PDF reader used by customers to review statements summarizing transfers made over SWIFT. It was not immediately clear whether TPBank's description referred to the PDF malware.

Cybersecurity firm BAE Systems said malware was used to target a Vietnamese commercial bank using fraudulent messages on the SWIFT network. The malware operated in a similar way to that used by hackers in the Bangladesh cyber heist. BAE did not name the Vietnamese Bank.

TPBank said the servers of the third-party vendor were based overseas, but did not say where. It said the vendor had used a software application that SWIFT had told the bank may have been subject to the malware assault. TPBank, founded in 2008 by Vietnam's top technology firm FPT Corp. considered one of Vietnam's most modern and technologically savvy banks. Just last week it was received the "Best Internet Banking" prize from The Asian Banker.

TPBank's major shareholders include Doji, a local gold and jewelry firm, state-run Vietnam National Reinsurance Corporation  and Singapore-based SBI Ven Holding Pte Ltd, a unit of Japanese financial services conglomerate SBI Holdings Inc  FPT has divested most of its shareholdings and now has a 9 percent stake in TPBank.

After BAE systems said a Vietnamese bank had been targeted, TPBank, when contacted by Reuters, initially denied it had been subject of an attack, saying it "did not have any problems."

Reuters

« Over One Hundred Million LinkedIn Passwords Posted Online
Navigating The Cyber-Threat Landscape »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Korea Information Security Industry Association (KISIA)

Korea Information Security Industry Association (KISIA)

KISIA is a non-profit organization for the information security industry in Korea.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Partnership for Conflict, Crime and Security Research (PaCCS)

Partnership for Conflict, Crime and Security Research (PaCCS)

PaCCS delivers high quality and cutting edge research to improve our understanding of current and future global security challenges in areas including cybersecurity.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.

Redblock

Redblock

Redblock's mission is to eliminate the drudgery and repetitive 'eye on the glass' work done by Security Teams.

Synechron

Synechron

Synechron is a leading global digital consulting firm, providing innovative technology solutions for business.