While financial services organizations are a perennial favorite target for attackers, the cyberthreat levels have increased significantly over the past few years. Despite massive security investments, the industry remains dangerously exposed, particularly when it comes to identity and access management (IAM) vulnerabilities. Recent statistics and trends show just how bad it’s become:
Financial services and, in particular, their authentication systems, face growing risk for several reasons.
Legacy authentication is highly vulnerable to phishing, credential stuffing and password spraying attacks. Traditional 2FA and MFA are more a nuisance than an obstacle for hackers. Most systems use some form of shared secret as an authentication factor, meaning they can always be scammed, stolen or intercepted. Once attackers get through the authentication challenges, they can escalate these account takeover (ATO) attacks into supplier or CEO fraud. They can also use data stolen through ATO to increase the success of phone banking fraud and authorized push payment (APP) attacks, which cost banking institutions and their customers tens of billions every year.
Multiple phishing-as-a-service (PhaaS) providers rent out sophisticated systems and interfaces for performing authentication attacks. These allow low-skill attackers to pay a small fee and gain all the tools necessary to run and track mass attacks on financial services customers. In addition, these attack kits incorporate several layers of an attack, including smishing and uploading pre-collected personal data, to increase the chances of success and specifically target more vulnerable users. Some kits include MFA bombing services to get around MFA authenticator apps.
Many financial services organizations use multiple IdPs, particularly those that have grown through acquisitions. Each of these may have a different authentication process, with both varying levels of security but also different experiences for the user. This makes users both more likely to fall for attack lures and also more likely to use insecure workarounds, such as keeping their passwords on sticky notes.
While data protection laws such as the GDPR and California’s CCPA apply to all companies, the regulatory burden is even heavier on financial services firms with additional legislation such as New York’s NYDFS Part 500, guidance set by the FFIEC and PSD2 requirements. The possibility of fines and publication of breaches represent a considerable risk for financial services firms and obligates them to harden their authentication procedures.
The current wave of fraudulent activity actively impacts firms’ relationships with their customers. The study of authentication security in the finance industry mentioned earlier found that 32% of financial services organizations that experienced a breach lost customers to a competitor. It’s also a major obstacle in moving customers to mobile and e-banking, with 74% of customers who don’t use those services stating security as their major concern.
The underlying thread through all these issues is the weakness of authentication security. Financial services-specific regulations have been clear about the need for MFA as a minimum authentication system for employees and customers. Here we'll look at how financial services firms can improve their authentication security.
The quantity, sophistication, and severity of cybersecurity threats, especially around authentication, pose major challenges for the financial services industry. HYPR is acutely aware of the struggles of the finance industry to secure customers and employees, meet regulations and reduce organizational risk.
By delivering a supremely flexible FIDO-based solution, HYPR enables passwordless authentication for finance that employees and customers prefer using. Our solution allows fast, seamless desktop-to-cloud login, eliminates security gaps, and creates a phishing-resistant authentication system. To learn more about the state of authentication in the finance industry and how HYPR can help, download the report or schedule a custom demo.