Swift Says Customers Responsible for Securing Their Own Computers

Advertisement
By Reuters | Updated: 12 May 2016 17:59 IST
Swift has told its bank customers that they are responsible for securing computers used to send messages over its global network, which was used to steal some $81 million from a Bangladesh central bank account at the New York Fed in February.

The theft marked one of the biggest-ever cyber-heists.

"Swift is not, and cannot, be responsible for your decision to select, implement (and maintain) firewalls, nor the proper segregation of your internal networks," the bank-owned cooperative said in a letter to users dated May 3 that advised them to review security protocols.

Advertisement

"As a Swift user you are responsible for the security of your own systems interfacing with the Swift network and your related environments," the letter said. "We urge you to take all precautions."

Reuters reviewed the contents of the letter on Wednesday. A person familiar with its contents said it was the first time Swift had sent such a letter since the Brussels-based group was founded in 1973.

Advertisement

The letter's details first were reported this week by financial news sites The Banker and Payments Cards and Mobile.

Former Swift staffers say the group has always told clients they are responsible for securing their points of access to the Swift system. They added that Swift does not guarantee that criminals will not gain access to clients' Swift keys, encryption devices that are used to identify legitimate users.

Advertisement

A Swift spokeswoman told Reuters on Wednesday that Swift registers and authenticates its customers, issuing them encryption tools including digital signatures, and provides them with public key infrastructure (PKI) certificates that identify authorized users of the network.

"Customers are responsible for all messages signed with their certificates and, of course, for protecting their certificates and ensuring only duly authorized operators can use them to sign messages," she said. "Swift is not, and cannot be, responsible for messages that are created fraudulently within customer firms."

Advertisement

The funds stolen in the February attack had been held for Bangladesh Bank at the Federal Reserve Bank of New York before fraudulent orders arrived requesting a transfer to Bangladesh. A New York Fed official said each central bank that holds an account at the US central bank has agreed that the New York Fed can rely on the Swift messaging protocols to verify the account owner has sent requests for payments.

This agreement, the official said, is binding under US payments law for "authorized and verified payment orders."

The rapid fulfillment of payment instructions received via Swift messages with valid credentials, is the central purpose of the system, former Swift employees and payments industry experts said.

This appears to be Fed's legal basis for its claim that it did nothing wrong, and it could figure into any lawsuit brought by Bangladesh Bank to reclaim funds.

The New York Fed official told Reuters there were legal incentives for banks to use authentication protocols like Swift, and for customers "to safeguard confidential information pertaining to authentication procedures and access to transmitting facilities."

Swift representatives met on Tuesday in Basel, Switzerland, with Federal Reserve Bank of New York President William Dudley and Bangladesh Bank Governor Fazle Kabir to discuss the heist.

The three groups issued a joint statement promising to cooperate to recover the stolen funds, following weeks of accusations over who is to blame.

It was their first face-to-face encounter since the cyber-attack left the three blaming each other over the incident.

© Thomson Reuters 2016

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Toaster OTT Release: When and Where to Watch Rajkummar Rao's Comedy Thriller
  2. Poco X8 Pro Max vs iQOO 15R vs Vivo V70 Elite
  3. Top 7 Laser Printers for Students to Buy in India Right Now
  4. Here's How Much the Vivo Y21 5G, Vivo Y11 5G Could Cost in India
  5. Samsung Galaxy M17e Goes on Sale in India: See Price, Offers
  1. Prime Video Announces Farzi Season 2: All You Need to Know About This Show
  2. Samathi Sakatham Now Available for Streaming Online: What You Need to Know
  3. The Taj Story Out on OTT: Know Where to Watch This Intense Courtroom Drama Online
  4. NASA Astronauts Complete 7-Hour Spacewalk to Prepare ISS Power System Upgrade
  5. Samsung Reportedly Plans to Introduce AirDrop Support on Galaxy S26 Series Later This Year
  6. Vivo Y21 5G, Vivo Y11 5G Price in India and Colourways Leaked a Month After Global Launch
  7. Toaster OTT Release: When and Where to Watch Rajkummar Rao’s Comedy Thriller
  8. FBI Warns Tron Blockchain Users of Phishing Attack Using Fake Tokens Impersonating the Agency
  9. Amazon Said to Be Working on New Smartphone Equipped With Alexa Assistant and AI Features
  10. Border 2 Now Streaming Online: Where to Watch Sunny Deol, Varun Dhawan Starrer Movie Online?
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.