Cyber Attacks

Improved Essays
Cyber Attacks on Financial Institutions Over the past few years the global financial sectors have become victims to an overwhelming increase in cyber security criminal attacks on financial institutions around the world. Hackers are the single most dangerous enemy facing financial institutions today because of their malicious intent to obtain financial gains or harm the reputation of companies. Last year hackers took aim at JPMorgan Chase and a number of other banks, stealing customer and other data in an operation, which sparked concerns at the highest levels of government (Cybersecurity Responding, 2015). We live in a digital world where most transactions and consumer purchases are done online, which put consumers and financial companies …show more content…
In recent years, cyber criminals have used online banking and payment systems to transfer money directly from financial institution accounts to their own accounts. One of the most common malware used by hackers is distributed denial-of-service (DDoS), which floods online systems, such as internet banking sites or online trading, with vast amounts of data in order to overload them and take services offline. Wada, Longe, & Danquah, (2012) states that the growth of e-business and internet usage has made it easier for organized crime gangs to facilitate and cover up their criminal activities which may usually include fraud, money laundering, intimidation, theft and extortion. Banks are increasingly at a disadvantage against cyber criminals because of their abilities to continually discover more sophisticated methods to exploit and disturb banking operations on a daily …show more content…
financial system, these same terrorist groups are prong to attack countries through revealing means in the cyber realm, which is known as cyber terrorism. In 2006 the Untied States Government explored the possibilities of terrorism organizations carrying out cyber attacks against the U.S. financial sector in order to gain funds to support their organizations. The Islamist group Izz ad-Din al-Qassam Cyber Fighters is claimed to have pulled off the biggest cyber attack in history that resulted in the shutdown of online banking websites for JPMorgan Chase, Wells Fargo, U.S. Bank, and PNC Bank in 2012. Also in 2014 Chase and Bank of America were targeted by a DDoS attacks that disrupted online services for customers by a “hacktivist” group called The European Cyber Army. These cyber attacks have cost financial institutions around the world billions of dollars and disrupted online banking services for their

Related Documents

  • Great Essays

    Target Executive Summary

    • 1564 Words
    • 7 Pages

    In 2013, in the days prior to Black Friday, hackers stole credit card information for millions of Target customers. The hackers set their traps and planned the data’s escape course. They uploaded exfiltration malware to move stolen credit card numbers. To cover their tracks, they first moved the stolen numbers to staging points spread around the United States. The information was then moved into the hackers’ computers in Russia.…

    • 1564 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Lloyd Bank Attack

    • 423 Words
    • 2 Pages

    Lloyds Bank – DDoS Attack Lloyd bank in the UK was hit with a 2-day Distributed Denial of Service (DDoS) attack just recently in January. This attack left customers unable to access their online banking and prohibited them from making payments. According to the article, Lloyd Bank was among a pool of banks in the UK that were targeted. Fortunately, the banking information of Lloyd Bank’s clients remained safe as a DDoS attack only brings down a network’s ability to function properly, but it doesn’t usually steal / compromise user data.…

    • 423 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Fraud Under Section 1030

    • 674 Words
    • 3 Pages

    Following the recent events an individual gained unauthorized access and committed fraud against a financial institution causing damage in loss of highly sensitive data. In accordance with The Computer Fraud and Abuse Act Section 1030, whoever having knowingly accessed a computer without authorization or exceeding authorized access shall be punished. Punishment Under Section 1030 subsection A number 7, whoever with intent to extort from person, firm, association, educational institution, financial institution, government entity, or other legal entity, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to…

    • 674 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Target breach ranks one of the worst ever security breaches in history. Not only did someone hack into Target’s security system, but it was during peak holiday months when Target stores are overrun with customers getting ready for the upcoming holiday. In this paper, the reader will learn about the history of cyber security attacks, the Target Security Breach in detail along with the future problems…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Zunis Investments

    • 1339 Words
    • 6 Pages

    It is imperative that we have the proper systems in place to ensure that those attacks don’t take place and even if they do, there are little to no damages. As with any organizations playing on the global stage especially one in the financial services industry, policy is key. I will ensure that there is a creation of an enterprise risk organization, in addition to a risk manager embedded within all of Zunis business unit. Enterprise risk will ensure that there is a framework in place and policies to handles cyber security issues of every nature that may affect the company, there will be updates to the incident and reporting awareness policy, there will be updates to electronic application use policy, there will be quarterly training sessions for all employees to bring them up to speed on how to detect social engineering techniques and email phishing. I will ensure that Zunis works closely with public policy unit to lobby lawmakers on national cyber security policy in the various countries of operations.…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Dos Assault

    • 567 Words
    • 3 Pages

    Singular assailants can likewise abuse weakness, break into target servers, and after that cut down administrations. Since it is troublesome for assailants to over-burden the objective's asset from a solitary PC, numerous current DoS assaults were propelled through countless assaulting has in the Internet. These assaults are called disseminated dissent of administration (DDoS) assaults. In a DDoS assault, on the grounds that the total of the assaulting movement can be enormous contrasted with the casualty's asset, the assault can drive the casualty to altogether minimize its administration execution or even quit conveying any administration. Contrasted and routine DoS assaults that could be tended to by better securing administration frameworks or denying unapproved remote or nearby get to, DDoS assaults are more intricate and harder to counteract.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Think like a Hacker, Defend like a Professional The theme of this article might sounds confusing due to the fact that most people will interpret the word “hacker” as a term used to refer to the malicious guys who always find ways to steal user information and financial details. We are not trying to give you any bad intentions about the actual meaning of “hacker” whatsoever. The original meaning is neutral and does not identify anyone as a bad person. Literally, any technology enthusiasts who enjoy analyzing technology and tricking the process to perform functions that is different from the original function can be referred to as a hacker. Of course, their goals might be different, which is the reason why hackers are categorized into three…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Imagine the complete devastation if a cyber-terrorist was successful at interrupting these financial transactions. The second scenario is one that kept retired Navy Admiral Mike McConnell awake at night when he was the Director of National Intelligence. Behind closed door meetings in the Oval Office with President George W. Bush and later President Barack Obama, Admiral McConnell would refer back to this situation as the ultimate nightmare…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Companies like MasterCard and Visa are threatening banks with large fines if they process deals of illicit drugs. Because of this, online sales of these illegal medicine has lessened. As well as MasterCard and Visa, big technology companies like Microsoft have taken initiative and had success to battle these botnets and lessen spam emails. Although spam emails have lessened, hackers will find different ways to make money. For example, hackers use botnets to steal bank account and credit card information from weak or infected…

    • 967 Words
    • 4 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays

Related Topics