Swift Says Customers Responsible for Securing Their Own Computers

Advertisement
By Reuters | Updated: 12 May 2016 17:59 IST
Swift has told its bank customers that they are responsible for securing computers used to send messages over its global network, which was used to steal some $81 million from a Bangladesh central bank account at the New York Fed in February.

The theft marked one of the biggest-ever cyber-heists.

"Swift is not, and cannot, be responsible for your decision to select, implement (and maintain) firewalls, nor the proper segregation of your internal networks," the bank-owned cooperative said in a letter to users dated May 3 that advised them to review security protocols.

"As a Swift user you are responsible for the security of your own systems interfacing with the Swift network and your related environments," the letter said. "We urge you to take all precautions."

Advertisement

Reuters reviewed the contents of the letter on Wednesday. A person familiar with its contents said it was the first time Swift had sent such a letter since the Brussels-based group was founded in 1973.

The letter's details first were reported this week by financial news sites The Banker and Payments Cards and Mobile.

Former Swift staffers say the group has always told clients they are responsible for securing their points of access to the Swift system. They added that Swift does not guarantee that criminals will not gain access to clients' Swift keys, encryption devices that are used to identify legitimate users.

Advertisement

A Swift spokeswoman told Reuters on Wednesday that Swift registers and authenticates its customers, issuing them encryption tools including digital signatures, and provides them with public key infrastructure (PKI) certificates that identify authorized users of the network.

"Customers are responsible for all messages signed with their certificates and, of course, for protecting their certificates and ensuring only duly authorized operators can use them to sign messages," she said. "Swift is not, and cannot be, responsible for messages that are created fraudulently within customer firms."

Advertisement

The funds stolen in the February attack had been held for Bangladesh Bank at the Federal Reserve Bank of New York before fraudulent orders arrived requesting a transfer to Bangladesh. A New York Fed official said each central bank that holds an account at the US central bank has agreed that the New York Fed can rely on the Swift messaging protocols to verify the account owner has sent requests for payments.

This agreement, the official said, is binding under US payments law for "authorized and verified payment orders."

Advertisement

The rapid fulfillment of payment instructions received via Swift messages with valid credentials, is the central purpose of the system, former Swift employees and payments industry experts said.

This appears to be Fed's legal basis for its claim that it did nothing wrong, and it could figure into any lawsuit brought by Bangladesh Bank to reclaim funds.

The New York Fed official told Reuters there were legal incentives for banks to use authentication protocols like Swift, and for customers "to safeguard confidential information pertaining to authentication procedures and access to transmitting facilities."

Swift representatives met on Tuesday in Basel, Switzerland, with Federal Reserve Bank of New York President William Dudley and Bangladesh Bank Governor Fazle Kabir to discuss the heist.

The three groups issued a joint statement promising to cooperate to recover the stolen funds, following weeks of accusations over who is to blame.

It was their first face-to-face encounter since the cyber-attack left the three blaming each other over the incident.

© Thomson Reuters 2016

 

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. Here's How Much the Motorola Signature Could Cost in India
  2. Top Deals on JBL, Sony Speakers During Amazon Great Republic Day Sale
  3. Redmi Note 15 Pro Series Might Launch in India With These Storage Options
  4. Xbox Cloud Gaming to Get Free Access 'This Year' With Ads
  5. Realme 15T Review
  6. Samsung Galaxy S26 Ultra May Arrive in Six Colourways
  7. Oppo A6 5G Launched in India With 7,000mAh Battery at This Price
  8. Here Are 5 Things You Should Know About Sony's New Deal With TCL
  9. Moto G67, Moto G77 Specifications Leaked; Could Launch Soon
  10. OpenAI's Age Prediction System to Detect Underage Users Is Rolling Out
  1. The Art of Sarah OTT Release Date: When and Where to Watch This Korean Mystery Thriller Series Online?
  2. Ram Charan’s Peddi OTT Release Confirmed: What You Need to Know
  3. Microsoft Will Reportedly Launch Ad-Supported Free Xbox Cloud Gaming Tier This Year
  4. Bitcoin Price Drops Under $90,000 as US Inflation Concerns Weigh on Sentiment
  5. Redmi Note 15 Pro, Redmi Note 15 Pro+ 5G India Launch Delayed, Tipster Claims
  6. Oppo Reno 15 FS 5G Launched With 6,500mAh Battery, 80W Fast Charging and Snapdragon 6 Gen 1 SoC
  7. Samsung Qi2 Power Bank for Galaxy S26 Series With 15W Wireless Charging Leaked Online
  8. Oppo Find X9 Ultra Design Spotted in Real-Life Images With Bigger Telephoto Kit
  9. OpenAI’s First Mystery AI Device Is Reportedly an Audio Headset, Not an AI Pen
  10. Motorola Signature Price in India Tipped Ahead of January 23 Launch in India: Expected Specifications
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.