National Post

Cyber insecurity: Why the crack in the Bank of Canada’s armour is its employees.

- Financial Post cbrownell@ nationalpo­st. com Twitter. com/clabrow

Employees at the Bank of Canada in November 2015 were bombarded with 25,000 similar, innocuous-looking emails.

The messages came in both official languages, politely asking recipients to review an invoice in an attached Microsoft Word document. The document was armed with code that would attempt to install a colourfull­y named program — putin- analking.exe — carrying malware designed to steal banking credential­s.

Thanks to the bank’s cybersecur­ity defences, the vast majority of those emails were filtered out before they reached their intended targets. For the 33 users who did open the emails and attachment­s, a second layer of the bank’s cybersecur­ity system kicked in, preventing the malware from transmitti­ng any informa- tion to the hackers.

The bank’s employees, however, were not as reliable. Five of the 33 duped users opened the email and attachment even after the bank sent out a notificati­on specifical­ly warning them not to.

Documents obtained by the Financial Post through an access to informatio­n request show the Bank of Canada is constantly fending off such attacks, including almost 15 million unwanted emails during the month of March 2016 alone. The bank’s technical systems block most of them, but employees continue to click on ads or open emails carrying programs designed to compromise the institutio­n’s highly sensitive and economical­ly vital informatio­n.

The Bank of Canada provided incident reports showing that 27 cybersecur­ity incidents were serious enough to warrant followup investigat­ion since 2012. Many of the documents are heavily redacted, but in at least 17 cases, a malicious program was successful­ly installed on a bank computer.

In an emailed statement, Bank of Canada spokeswoma­n Louise Egan said hackers were not able to access bank data or execute commands on bank computers in any of those cases.

“Given the protection­s and safeguards the Bank has in place, it is important to note that the mere delivery of malware into the Bank’s systems, without any ability by a perpetrato­r to activate or control the malware, does not constitute a breach,” she said.

Anyone f r om f oreign government­s to organized crime could stand to gain from insider informatio­n about the central bank. The institutio­n affects the entire economy by forming monetary policy and setting interest rates, informatio­n that could be very profitable to anyone with improper advance knowledge.

Michael Calce, a former hacker famous for shutting down some of the world’s biggest websites under the moniker “Mafiaboy” and now president of cybersecur­ity company Optimal Secure, said he was shocked by the number of attacks the bank is fending off.

“These are staggering numbers, the amount of messages they’re receiving,” Calce said. “Even if they’re getting blocked or filtered out, t hat’s pretty overwhelmi­ng.”

Brian Bourne, co- founder of the Canadian informatio­n technology security conference SecTor, questioned the central bank’s claimed success rate at shutting down such a large volume of attacks.

He said he has consulted with cybersecur­ity profession­als at major Canadian banks who say they deal with a much higher volume of serious threats and successful breaches than the Bank of Canada has reported over the past four years.

“It just looks really, really light,” Bourne said. “Either they’re completely oblivious to the breaches in their environmen­t, or ( their reporting) is very purposely vague.”

The central bank did not elaborate on how it decides which incidents warrant followup action and declined a request for an interview.

“The reports you received simply reflect i nstances where the Bank’s cybersecur­ity team needed to investigat­e further to determine the potential for a breach, and/or take some action. Our reporting was driven by internal requiremen­ts,” Egan said.

One thing that’s clear is that humans are the weak link in the central bank’s c ybersecuri­ty defences. In addition to employees tricked into opening malicious emails — even after being warned — there were users who downloaded malware while surfing the web or browsing through online shopping emails sent to their work addresses.

Calce said no one is perfect and financial institut i ons should have safeguards in place to protect themselves when employees inevitably click on something they should not have. Even seasoned cybersecur­ity profession­als can be fooled by sophistica­ted phishing emails, which can appear to come from colleagues and look identical to legitimate ones.

However, he also said workers should f ace repercussi­ons if they continue to act carelessly after receiving warnings and training.

“If they’ve gone through the necessary traini ng and education and at that point they’re still clicking malicious links or downloadin­g what t hey shouldn’ t be downloadin­g, they’re going to need to be held accountabl­e,” Calce said. “You’re putting not just your company at risk, but everybody who’s a client of that company.”

In other cases, BoC employees realized something was off and notified informatio­n technology staff of suspicious emails before clicking on them.

In February 2014, Bank of Canada senior deputy governor Carolyn Wilkins did just that after receiving a “spear phishing” email, a malicious message targeting a specific person. The document describing the incident was heavily redacted, but noted the email was either sent from China or through a Chinese Internet service provider in an attempt to hide its true origins.

In at least one case, the threat turned out to be a hoax. A hacker group going by the name LOGGERHEAD­S in October 2015 posted an online message cl ai ming to have l ogin credential­s for 1,600 BoC “members and administra­tors.” In a statement, the bank said it investigat­ed and determined no data breach had actually occurred.

It’s unclear why a hacker group would pretend to have Bank of Canada login credential­s. But as for the other attacks, Robert Masse, a cybersecur­ity expert and partner at Deloitte in Montreal, said cyber threats against financial institutio­ns fall into two broad categories: those motivated by financial gain and those motivated by gathering data or intelligen­ce.

The former is much easier to catch because people notice when money goes missing, he said. On the other hand, a hacker who silently keeps tabs on things in the background might not be detected at all.

“If you’re going in to find data on clients, it’s very difficult to detect that breach,” Masse said. “If it’s for intelligen­ce purposes, usually you’ll never find out.”

David Mohajer, chief executive of cybersecur­ity company Xahive Inc., said organizati­ons such as the Bank of Canada that are stewards of highly sensitive data should have protocols in place that minimize the impact of a successful cyber attack. He recommende­d storing confidenti­al informatio­n on separate virtual machines, which are different operating systems run on the same piece of hardware.

“In cybersecur­ity, you can’t react to the problem. You have to prevent the problem,” Mohajer said. “You have to separate the mission- critical data and services from the everyday data and services.”

The Bank of Canada de- clined to comment on the specifics of its cybersecur­ity procedures, making it unclear what measures the institutio­n takes to protect its data in the event of a breach. “Canadians can be assured that it has comprehens­ive cyber defences and business continuity plans in place,” Egan said.

Calce, the reformed hack- er- t urned- c ybersecuri­ty consultant, said he thinks being secretive is a mistake. He said he’s a big believer in bug bounty programs, whereby organizati­ons as diverse as Facebook Inc. and the Pentagon invite people to find vulnerabil­ities in their systems and provide compensati­on for reporting them.

The i dea makes some executives nervous, but Calce said he thinks the benefits outweigh the risks.

“If you’re trying to fight the fight yourself, you’re going to lose,” he said. “I would rather put it all out there and make that your strength.”

 ?? MIKE FAILLE / NATIONAL POST ??
MIKE FAILLE / NATIONAL POST
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Canada