Swift Says Customers Responsible for Securing Their Own Computers

Advertisement
By Reuters | Updated: 12 May 2016 17:59 IST
Swift has told its bank customers that they are responsible for securing computers used to send messages over its global network, which was used to steal some $81 million from a Bangladesh central bank account at the New York Fed in February.

The theft marked one of the biggest-ever cyber-heists.

"Swift is not, and cannot, be responsible for your decision to select, implement (and maintain) firewalls, nor the proper segregation of your internal networks," the bank-owned cooperative said in a letter to users dated May 3 that advised them to review security protocols.

Advertisement

"As a Swift user you are responsible for the security of your own systems interfacing with the Swift network and your related environments," the letter said. "We urge you to take all precautions."

Reuters reviewed the contents of the letter on Wednesday. A person familiar with its contents said it was the first time Swift had sent such a letter since the Brussels-based group was founded in 1973.

Advertisement

The letter's details first were reported this week by financial news sites The Banker and Payments Cards and Mobile.

Former Swift staffers say the group has always told clients they are responsible for securing their points of access to the Swift system. They added that Swift does not guarantee that criminals will not gain access to clients' Swift keys, encryption devices that are used to identify legitimate users.

Advertisement

A Swift spokeswoman told Reuters on Wednesday that Swift registers and authenticates its customers, issuing them encryption tools including digital signatures, and provides them with public key infrastructure (PKI) certificates that identify authorized users of the network.

"Customers are responsible for all messages signed with their certificates and, of course, for protecting their certificates and ensuring only duly authorized operators can use them to sign messages," she said. "Swift is not, and cannot be, responsible for messages that are created fraudulently within customer firms."

Advertisement

The funds stolen in the February attack had been held for Bangladesh Bank at the Federal Reserve Bank of New York before fraudulent orders arrived requesting a transfer to Bangladesh. A New York Fed official said each central bank that holds an account at the US central bank has agreed that the New York Fed can rely on the Swift messaging protocols to verify the account owner has sent requests for payments.

This agreement, the official said, is binding under US payments law for "authorized and verified payment orders."

The rapid fulfillment of payment instructions received via Swift messages with valid credentials, is the central purpose of the system, former Swift employees and payments industry experts said.

This appears to be Fed's legal basis for its claim that it did nothing wrong, and it could figure into any lawsuit brought by Bangladesh Bank to reclaim funds.

The New York Fed official told Reuters there were legal incentives for banks to use authentication protocols like Swift, and for customers "to safeguard confidential information pertaining to authentication procedures and access to transmitting facilities."

Swift representatives met on Tuesday in Basel, Switzerland, with Federal Reserve Bank of New York President William Dudley and Bangladesh Bank Governor Fazle Kabir to discuss the heist.

The three groups issued a joint statement promising to cooperate to recover the stolen funds, following weeks of accusations over who is to blame.

It was their first face-to-face encounter since the cyber-attack left the three blaming each other over the incident.

© Thomson Reuters 2016

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. US FCC Moves to Bar Chinese Labs From Certifying US-Bound Devices: Report
  2. Top Phones Under Rs. 50,000 in India: iQOO 15R Takes the Lead
  3. Here's How Much the B by Lenskart Smart Glasses Will Cost in India
  4. OnePlus Summer Sale: Deals on OnePlus 15, OnePlus 13 and More Announced
  5. Asus Zenbook S14 (UX5406) Review: Premium, Portable, and Powerful
  6. Xiaomi India Claims Record Performance in Mid-Premium Smartphone Segment
  1. Google to Host The Android Show Ahead of I/O 2026 Developer Conference Next Week
  2. Astronomers Use Webb Telescope to Study Exoplanet Surface Beyond Atmosphere
  3. Temple Wearable Enters Early Access: Zomato Co-Founder Deepinder Goyal Says First 100 Units Ready to Ship
  4. Samsung Galaxy A27 Seemingly Confirmed via Company's Website, Could Launch Soon
  5. Western Union Launches USDPT Stablecoin on Solana Blockchain, Coin Issued by Anchorage Digital
  6. Anthropic Announces New AI Services Company, OpenAI Reportedly Follows Suit
  7. Samsung Galaxy Z Fold 8, Galaxy Z Wide Fold Design Emerges via One UI 9 Leak
  8. Honor Play 80 Plus Launched With 7,500mAh Battery, 13-Megapixel Camera: Price, Specifications
  9. Kuheli OTT Release Date: When and Where to Watch This Bengali Murder Mystery Online?
  10. Thukra Ke Mera Pyaar Season 2 OTT Release Date: When and Where to Watch it Online?
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.