Common threats
Knowing banks have some of the highest cybersecurity and compliance standards of any sector, cybercriminals turn to a perennial security weak spot: people. Adversaries prey on the psychological and operational habits of employees, using techniques that blend into normal business processes to get around automated detection. Social engineering is highly effective, with the "human element" playing a part in 60% of all breaches. These attacks are only becoming more sophisticated with the use of AI.
Phishing
An attacker can use phishing tactics, such as posing as an executive, to steal funds or gain access. A common scenario is the "vendor payment change" request. The attacker identifies a legitimate vendor through public data or a compromised inbox. They then interject into an ongoing conversation, sending a PDF invoice that appears identical to previous documents but contains new banking instructions.
This technique leans on creating a sense of urgency, using terms like "quarter-end close" or "overdue penalties" to pressure employees into acting against their training. The FBI’s Internet Crime Complaint Center (IC3) reported $2.77 billion in losses across more than 21,000 BEC incidents in 2024. BEC is a crucial aspect of cybersecurity basics for finance professionals.
Business email compromise
The financial sector is particularly vulnerable to (BEC), a broad form of cyberattack where an adversary compromises an employee's email, then uses that email to do things like create inbox rules, acquire information, or send out mass emails posing as that trusted employee to do things like convince them to wire money to a different bank account.
Credential theft
In this type of phishing, an attacker sends an email that mimics a routine business request, such as a password reset for Microsoft 365. The user clicks on a link that sends them to a fake login screen, where attackers capture their username and password. To get around MFA requirements, they add a second technique: session hijacking.
A "session token" is the digital key that keeps a user logged in on their browser. To steal this token, hackers often use an adversary-in-the-middle (AiTM) attack. In this scenario, the spoofed website forwards the user’s login to the real site. This sends an MFA prompt to their phone. When approved, the real site issues a session token, which the attacker copies before letting it reach you. They can then log in on their own browser.