0% found this document useful (0 votes)
36 views4 pages

Ransomware Threats to Financial Services

Uploaded by

dont.judge.me176
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views4 pages

Ransomware Threats to Financial Services

Uploaded by

dont.judge.me176
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Ransomware Attack to Service

Providers of
Financial Institutions
[This page is intentionally left blank]
TLP: CLEAR
Distribution: Public
Type of Threat: Ransomware
Date: 01 August 2024

Executive Summary

The BGD e-GOV CIRT team has observed a significant increase in global cyber-attacks target
service providers that exclusively serve financial institutions. A recent ransomware attack on
a technology service provider has led to the temporary shutdown of payment systems across
nearly 300 financial institutions in a neighboring country. This alarming trend highlights the
critical need for enhanced cybersecurity measures.

Targeted Sectors:
 Banking and Non-Banking Financial Institutions of Bangladesh
 Corresponding Service Providers to Financial Institutions

Actions Required:
To mitigate the risk of potential cyber-attacks, BGD e-GOV CIRT recommends the following
measures:

1. Update and Patch Systems: Ensure all systems, applications, and devices are up-to-
date with the latest security patches.
2. Enhance Network Security: Implement robust firewalls and intrusion
detection/prevention systems (IDS/IPS) and monitor network traffic for unusual
activities.
3. Backup Critical Data: Maintain regular, secure backups of critical data. Ensure backups
are stored offline and tested for integrity and availability and regularly test backup
restoration procedures and store backups in a separate, secure location.
4. Employee Awareness and Training: Conduct regular cybersecurity awareness training
for employees. Educate staff on recognizing phishing attempts and other social
engineering tactics.
5. Collaboration and Information Sharing: Collaborate with industry peers and
cybersecurity organizations. Share threat intelligence and stay informed about the
latest cyber threats.
6. Access Control Policies: Define clear access control policies specifying what resources,
systems, and data third-party employees can access. Use role-based access controls
(RBAC) to assign permissions based on specific job responsibilities and isolate third-
party access to specific segments or VLANs required for their tasks.

Page 1 of 2
7. VPN and Remote Access Policies: Implement a Virtual Private Network (VPN) for
third-party employees requiring remote access and enforce MFA for accessing
sensitive systems and data.
8. Device Management: Enforce policies for devices used by third-party employees,
including up-to-date security software and endpoint protection and ensure
compliance with the organization's security standards.
9. Temporary Credentials: Issue temporary credentials to third-party employees with
limited validity periods. Regularly review and renew these credentials based on the
duration of their engagement.
10. Monitoring and Auditing: Implement monitoring and auditing mechanisms to track
the activities of third-party employees on the network. Log access attempts,
configuration changes, and any suspicious behavior.
11. Contractual Agreements: Clearly define security requirements in contractual
agreements with third-party vendors. Specify the security measures they must adhere
to and the consequences for non-compliance.
12. Third-Party Incident Response Plan: Develop and communicate an incident response
plan to perform in case of a security incident/breach in a third party and ensure
awareness of reporting procedures.
13. Report Incidents: Report or inform BGD e-GOV CIRT regarding any cyber incident or
suspicious activities within your infrastructure, through mail id: [email protected]

Previous Alert and Guideline:

BGD e-GOV CIRT has previously published reports and advisories aiming at raising the
awareness to combat such security incidents. You can find them in the following links:
1. Ransomware Prevention & First Response Guideline
https://www.cirt.gov.bd/ransomware-prevention-first-response-guideline-english-
version-1/
2. Surge in Attacks via Compromised Third-Party Service Providers
https://www.cirt.gov.bd/alert-attacks-via-service-providers/

Page 2 of 2

You might also like