Vous êtes sur la page 1sur 19

Cyber-crime Scenario in Banking Sector

of Bangladesh: An Overview

Sultana Sharmeen Karim


Lecturer, Department of Finance
Bangladesh University of Business and Technology (BUBT)
sharmeen_karim@yahoo.com

Abstra
ct
Cyber and technology related crime is gradually increasing in
Bangladesh. The advancement of e-banking technology has
made banking transactions very convenient. But the misuse
of information technology has brought undesirable
consequences in the form of diverse cybercrimes. This
paper focuses on developing a conceptual framework
regarding the problem of cyber-crime in the banking sector of
Bangladesh by assessing the cyber-crime scenario. One of the
most important aspect in the Bangladesh banking sector is to
make banking transactions free from cyber-crime. The
purpose of this study is to represents the concept of the basic
crimes occurred in banks and financial sector- namely
Automated Teller Machine (ATM) frauds, E-Money Laundering
etc. The study found that by applying the updated technology
and appointing skilled manpower and devices cyber-crime
can be reduced from the banking transactions.

Keywords: Banking sector, Cyber-crime, Internet, ATM, E-


money Laundering.
1 THE COST AND MANAGEMENT
ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-APRIL 2016
1. the light of the objectives mentioned
earlier.
Introduction
In the present global scenario,
information technology is the most 4. Review of Literature:
critical and disputable term. It is the Cyber- crime in Banking
most intense innovation which is quick Sector
and precise in all areas. Expanded use According to Douglas and Loader (2000),
of Information & Communication Cybercrime can be defined as computer
Technology, like computers, mobile facilitated activities accompanied through
phones, Internet, and other related global electric networks either illegally or
developments are responsible for not illicitly by definite entities.
only creative activities but destructive
activities also. The destructive
activities are considered as cyber-
crime, which includes credit card
fraud, spamming, e-money
laundering, ATM fraud, Phishing,
Identity theft, Denial of Service in the
banking sector.

2. Problem
Statement:
The dependency of individual as well
as institutions on internet is raising the
cyber-crime as a growing concern. The
increased use of ICT is boosting the
hazard of cyber-attacks across the
globe. Since the incidents of cyber-
crimes are on the rise, it is essential to
explore the cyber crime scenario.
Although, with the initiation of
technologies, the banking sector has
been able to reach more customers
however, it has also increased the
risk for customers who often feel
hesitant and insecure in opting for such
services. The objective of the study is
to provide a conceptual overview about
the cyber-crimes in the field of finance
and banking sector of Bangladesh.
This paper is an attempt in this
direction to better understand the
electronic crimes in the banking sector
of Bangladesh and to take some
precautionary measures.

3.
Methodology
:
The study is descriptive in nature. This
study is conducted on the basis of
secondary data. The secondary data
are collected from the journals and
research papers. Newspaper articles
and the internet sources are also used.
But the data has been interpreted in
In the banking sector, Illegal money
The defense system of banking sector
transfer and removal from one to
contains a lot of exposures, so there is
another account are identified as
always a need for investigation for
banking fraud according to Wall
increasing awareness about the
(2001). He has also classified cyber-
procedures that can be undertaken to
crimes into four broad categories i.e.
contest cyber related crimes in the
cyber-deceptions, cyber-violence,
banking sector. (McCullagh,
cyber-trespass,& cyber-pornography.
2005 & Florêncio,
The banking frauds are classified
2011).
under cyber-deception which is termed
as an immoral activities including credit Moore.et al (2009) focused on the subject
card fraud stealing, and intellectual of online crime which generally occur from
property violations (Anderson & Barton, the annoyance came from sloppy
2012). hackers.They found that substantial
developments are possible in the way
ATM frauds, E-money Laundering and
dealing with online fraud and to study the
Credit Card Frauds are the most
online crime it is suggested that to
witnessed cybercrimes in the banking
understand its economic perspective. It
sector. In general, all the frauds are
also revealed the problems that banks and
executed with the goal of accessing
police forces face in governing the
user's bank account, stealing funds and
traditional law enforcement.
transferring it to some other bank
account. In some cases the cyber Nsouli. M and Schaechter. A(2002), states
criminals uses the banking that online banking crime which is
identifications i.e. passwords, e-PIN, committed with the use of online
certificates, etc. to access client's technology to steal money illicitlyfrom a
accounts; whereas in other cases they bank account or means of shifting money.
may want to steal and transfer money Cyber- banking crime can be considered as
the funds into another accounts another method of identity theft which is
illegally. The intention of cybercriminals regularly made imaginable via methods
sometimes is just to harm the image of such as Phishing.
the banking firm and therefore, they
block the bank servers blocking the Liao.Z and Cheung.H,(2008) revealed in
access of clients' accounts (Claessens their study that customer interaction with
et al., 2002; & Hutchinson et al, the internet assisted online banking are
2 the ease of use, security convenience,
0 and also responsiveness to services
0 requirements. They also suggested, for
3) preventing cyber-banking crime: protecting
. antivirus & firewall,
1 THE COST AND MANAGEMENT
ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-APRIL 2016
restricting the amount of personal unsolicited mails or mass e-
information one permit to be in public mails such as chain letters.
domain, making use of low limit distinct ● Cyber Defamation: This occurs
credit card for online buying to minimize when defamation takes place
the possible loss of things go wrong. with the help of computers and or
the internet. e.g. if someone
publishes defamatory matter
5. Cyber-crime - An about someone on a website or
Overview sends e-mails containing
Computers, Internet and other electronic
medium are the tools that make possible
the instant exchange and distribution of
data, images, and materials. The
fraudulent activities of IT are termed as
cyber-crime, e-crime, hi-tech crime, or
electronic crime. These practices involve
the use of computer or internet as a
medium, source, instrument, target, or
place of a crime.
Computer and Internet plays a key role in
various activities, such as, recording
financial transactions, routing telephone
calls, measuring power usage,
monitoring medical treatments, etc.
However, they also contribute to
electronic crime, such as:
● Cyber Stalking: Cyber Stalking means
following every moves of an
individual over internet. It can be
done with the help of many protocols
available such as e- mail, chat
rooms, user net groups etc.
● Phishing: It is a technique of pulling
out confidential information from the
bank/financial institutional account
holders by deceptive means.
● Hacking: Hacking is a simple term
which means illegal intrusion into a
computer system without the
permission of owner/user
● Denial of Services: This is an act by
the criminal, who floods the
bandwidth of the victim's network or
fill his e-mail box with spam mail
depriving him of the services he is
entitled to access or provide, or when
internet server is flooded with
continuous bogus requests so as to
denying legitimate users to use the
server or to crash the server.
● E-mail Spoofing: A spoofed email is
one in which e-mail header is forged
so that mail appears to originate from
one source but actually has been sent
from another source.
● Spamming: Spamming means
sending multiple copies of
defamatory information and by subverting the servers and
Although, Internet and web technologies programs to aid their phishing
are growing at a fast pace and are activities; a method known as
providing new opportunities, they are also infrastructure hijacking.
consisting of certain threats like, email
As indicated by the FBI, the most
espionage, credit card fraud, spams,
recent pattern by cybercriminals is to
software piracy, etc.
pick up employee username/password
by utilizing spam and phishing
6. Cyber-crime messages, key loggers, remotely
accessible trojans. Such attacks were
scenario throughout found in September 2012, when the
the world Bank of America and Wells Fargo were
The Global Economic Crime Survey 2016, among those struck.
indicates that cybercrime is the one of the In the course of the most recent
economic crimes that has increased, couple of years, cyber economic crime
jumping from 4th place to 2nd place has developed to a point where it can
globally, which is a sharp rise. Among the be classified into the following two
survey participants worldwide, categories:
reputational harm was viewed as the most
damaging effect of a cyber breach - 1.Cyber fraud. Money related
followed closely by legal, investment, or cyber-crime, like, identity and
enforcement costs. A popular and credit card theft causing huge
effective strategy for targeting banks is to losses. In spite of their
direct email phishing to clients. Mobile prominence, they hardly cause
and online banking has opened new any danger to organizations.
doors for cybercriminals. To counter
2. Transfer-of-wealth/IP attacks.
these attacks, banks have established
The more serious economic
procedures to rapidly respond to any
crime confronting businesses is
attacks and have also started the process
that of internal cyber risk: the
of educating customers on security.
stealing of Intellectual Property -
Consequently, criminals have reacted by
trade secrets, R & D
creating more sophisticated programs
information, company strategies,
intended to breach online bank accounts,
etc.The damage
1 THE COST AND MANAGEMENT
ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-APRIL 2016
could lead to loss of billions of dollars control over the record, skimming, or if
and destroy a company or the card is stolen. The expression
even a large economic system. "Internet fraud" usually refers to any
These attacks are usually not being type of fraud scheme consisting of
anticipated by a company and are various components of the Internet,
difficult to detect. like chat rooms, email, forums, or
websites - to execute fraudulent
7. Cyber-crime in Banking transactions or distribute to other
associated with the plan. Banking
Sector- Concepts criminals are utilizing different
According to Jaleshgari (1999), electronic medium, for example, web,
Banking sector throughout the world was email, and encoded messages for their
simple and reliable till mid-1990s,; fraudulent activities.
however since the initiation of
technology, the banking sector 8. Cyber-crimes in Banking
experienced a paradigm shift in the
phenomenon. In order to enhance their Sector: Across the globe
customer base banks introduced many However, in the last few years, banks all
platforms through which transactions acros the globe have perceived cyber-
could be done effortlessly (Vrancianu crime as among their top five risks
and Popa, 2010). These technologies (Stafford, 2013). Some of the major
enabled the customer to access their incidents of cyber-crime in past few years
bank finances 24/ 7 and year around are as follows:
through, ATMs and Online banking
procedures.Information Technology (IT) ❑ Stealing of personal information
has become a vital part of the banking of almost
system. Just like banking is the backbone 2.9 million credit card
of the economy, IT has become the customers of
backbone of the banking system. It is Barclays and Santander Banks UK
nearly impossible for banks to provide in 2013
new financial products without relying ❑ Missing $ 450,000 from bank
heavily on IT. The banking sector is account of a
coming up with various progressive Pennsylvania school district
changes to transform the "brick-and- in 2008
mortar" bank branches to an advanced ❑ Transfer of approximate $3
framework of "core banking solutions". million from bank account of a
New York school district in
The present contemporary age has
2009.Some transfers were
replaced conventional financial
recovered but $500,000 was
instruments from a paper based currency
withdrawn from the account
to "plastic money" in the form of credit
before the transaction could be
cards, debit cards, etc.This has brought
reversed.
about the vast use of ATM everywhere
❑ Over 400 corporate account
throughout the world. The use of ATM
takeovers in
is convenient but has a negative side,
2011, which cyber criminals
which is manifested in the form of "ATM
initiated through unauthorized
frauds". Credit card fraud has gotten to
ACH and wire transfers from the
be conventional on the internet which
bank accounts of U.S. businesses.
affects card holders as well as online
These cases involve the
sellers.
attempted theft of over $255
Frauds million and have resulted in the
actual loss of approximately $85
million.
❑ Creation of fake debit cards
and
withdrawal of more than $9 million
from automated teller
machines (ATMs)
involvin E-
g money worldwide by breaching the U.S.
electronic Launderi
fund transfer ng payment processor's computer
(EFT)
Credit Telecommunica systems and stealing personal
card
fraud
tion fraud
data in November 2009.
Phon
e (Source: FBI
Bankin
g
Data)
ATM facility
Fraudulent
use of
Credit, Debit
and Smart Frauds related 9. Cyber-crime scenario in
to E-
banking sector of
(ATM) cards Internet
banking Mobile commerce
cards and
Banking SWIFT and EDI
accounts
Network
INFINET
Network
Bangladesh:
In the last few years, the baking sector
Figure:Technology & related was the victim of several security
crimes breaches:

❑ On January06, 2013, Islami


Bank
Charge card fraud can be conducted by Bangladesh site was hacked by
assuming Human
Mind Cracker.

1 THE COST AND MANAGEMENT


ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-APRIL 2016
❑ In 2015, bank accounts of a The disappointing aspect of this
private bank were hacked and occurrence from the Bangladesh Bank
money was withdrawn from them. was that, while giving necessary advice
❑ On December 2, 2015, Hackers to all concerned, they had forgotten to
breached heed their own suggestions and
the network security of Sonali neglected to take satisfactory safety
Bank and took control of its website measure of their own institution and its
for a couple of hours.The relationship with other associated
programmer distinguished himself financial partners abroad, which lead to
as a 'Muslim Hacker'. the largest e-money laundering in the
❑ In February, 2016, skimming banking sector of Bangladesh.
attacks in six
ATM booths of three commercial
banks. 8.2 Case Study 2:
❑ And the largest e-money laundering Bangladesh Bank
in the history of banking occurred Heis
in February t
2016, when hackers stole $101
In February 2016, the stealing of
million from the Bangladesh bank's
$101 million from the reserves of the
account with the Federal Reserve
Bangladesh Bank has raised question on
Bank of New York.
the exposure of financial institutions to
Evidence of hacking in commercial cyber-crime groups. This incident have
banks demonstrates corruption in the challenged the ability of existing
government's procurement framework mechanisms in preventing such
where unqualified vendors were selected incidents. Besides, this theft signified
without proper evaluation of skills and the need for strengthening the
consultation of IT experts. international co-operation in tackling
cyber-crime.
8.1Case Study 1: ATM card The hackers retrieved the central bank's
skimming transfer codes and sent payment
The initial shock came after the transfer requests worth $1 billion to the
revelation and complaints recorded Federal Reserve Bank of New York. They
because of abuse of ATM machines requested the funds of Bangladesh be
fitting in with some banks and withdrawal transferred to a bank in the Philippines.
from various private accounts of a lot of From there, the cash was transferred to
cash without approval of the record at least three Philipino casinos: At the
holders.14 persons were arrested by the casinos, someone converted the cash
police on 4 March, 2016. It included 12 into chips for betting and then
foreign nationals who were individuals reconverted the chips into cash. This
from worldwide cyber-crime fraud-gang. money was then sent to bank accounts
They had deceitfully utilized online in Hong Kong. An additional fund of
networking media furthermore hacked about US$ 21 million was also
information of individual clients. transferred illegally to a third party in Sri
Lanka.
Skimming is a procedure utilized by
digital lawbreakers to duplicate The attempt could not be fulfilled in
individual information from the totality following a typing error that
magnetic strip on an ATM card. The alerted one of the routing banks and
criminal fits a skimming device in the transaction was stopped. . Instead of
card slot of ATM booth. Once a card is "foundation" the hackers had spelt it
swiped through a skimmer, individual as "fandation". This prompted a
data contained on the magnetic strip is routing Bank- Deutsche Bank to seek
perused and put away on the gadget or clarification from the Bangladesh Bank,
transmitted remotely to the criminals. which stopped the transaction. Spelling
mistake prevented the illegal shifting of
money. But the hackers were successful
in siphoning

16 THE COST AND


ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-
APRIL 2016
MANAGEMENT
$81 million in the initial four transactions.

16 THE COST AND


ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-
APRIL 2016
MANAGEMENT
Copying Stealin The theft of such a large amount from
client's g the Freak
Setting up information on
another chip
PIN
numbers with the
transactio national reserves astonished many in
skimming device ns using
and tiny cameras on a
blank card when a
installed cameras
when people
ATMs
hundreds
Bangladesh and abroad. Doubts are
card is swiped on
the magnetic strip
entered their PIN
numbers on
of
thousands of being expressed about the country's
entry taka
pad readiness to protect its financial
infrastructure, which is undergoing
digitization.
Figure: Assumed incidents of Card skimming at six
ATM booth
Different investigations are being
carried by various enquiry commissions
With the card information, they can like FBI,Bangladesh Banks appointed
lead value- based misrepresentation, committee & CID officials of
make new cards with the stolen Bangladesh.Bangladesh investigators
character and individual data, or offer have identified at least 20 foreign
the cardholder information on the nationals who they claimed were
underground market. involved in the cyber heist till date.

16 THE COST AND


ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-
APRIL 2016
MANAGEMENT
10. Is it an Alarming
issues for banking
sector?
Recurrence of such incidents will affect
the economy. Protecting financial
sectors from future cyber-crimes is of
greatest concern at this moment. Given
the rising occurrences of cyber- crimes
in Bangladesh, there is critical
requirement for redesigning the nation's
monetary groundwork offering
administrations over the electronic
network.

17 THE COST AND


ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-
APRIL 2016
MANAGEMENT
Installing Learnin Gaining
malware in Stealing
g remote Exploitation of
the BB's BB's
the control of "zero-day" flaw
computer credentials
processeing the bank's as they were
systems and for the
of money,sent computer unknown to
observeing and SWIFT
through transaction parties
transaction process received by messaging
Remote as
from its US Software system
Access Trojan well.
accoun
includeing (RAT)
t
spying
programs
that

Figure1: Assumed incidents what the hackers did to


steal the reserve

SWIFT

Federal Reserve

Bank Intermediary

Bank Destination

Total Amount of Stolen Money

Figure2: How Bangladesh Bank's reserve


was stolen
The government has also formulated a
cyber security law. Despite that, there 11. Ensuring Cyber
are uncertainties over preventing the
culprits of such violations may be
Security
difficult unless it gets assistance from Governance:
international community. The global
This incidents persuaded the
cooperation can be focused on areas like
Bangladesh Bank recommending to all
international safety standard, training
Banks and financial institutions to
and information sharing. An
ensure cyber-security governance
international Cyberpol can be
i.e.:
established more in the line of the
Interpol. Unfortunately, it appears that ● Taking measures for ascertaining
the regulatory regime regarding control existing technical gap
of cybercrime or server management (in assessment and vulnerability
the case of e-commerce) is weak in through a comprehensive cyber
Bangladesh. For this, easily exploitable security risk study.
laws, cyber-criminals use developing ● Treating cyber security as a

countries like Bangladesh in order to collective


evade detection and prosecution from responsibility by all financial
law enforcement. Laws against cyber- institutions.
crime in our country is weak or ● Installing Anti-skimming devices

sometimes nonexistent. to the


ATM booths.
● Use of EMV (Europay, Mastercard

& Visa) Standard card to avoid


skimming.

18 THE COST AND


ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-
APRIL 2016
MANAGEMENT
Such measures were recommended by Figure 3: Cyber threats & mitigations (Source: Global
Economic Crime Survey 2016)
the Bangladesh Bank because such
cyber-attacks were seen as being
capable of causing financial loss and
creating a reputational risk. They
should also emphasize on:

● Provide IT related training


for skill development
● Monitoring over the IT related

issues
● Testing hazard incident
● Mandatory adoption of IT

related precaution to avoid


such incidents.
● Creating customer awareness

A model can be followed for cyber risk


identification and mitigation. Any
organization as well as banks can follow
this model:

Executive Level Audit & Risk

• Institute sound • understanding and


cybersecurity coverage of
strategy technology risks

• Conduct up-front
• Ensure quality due diligence to
information is eliminate 3rd party
received and risk
assimilated

• Addressing
• Implement user risks associated
security awareness with operational
programs systems

• Address basic IT
• Support strategy- audit issues
12.
Conclusion
The present conceptual framework
has provided a brief overview of
ongoing efforts to prevent and
control technology and computer
related crime, highlighting general
trends and development within
and outside the banking sector of
Bangladesh.The banking industry
is constantly experiencing cyber-
crimes like ATM fraud, E-money
laundering, Credit card fraud,
Phishing etc. Since there was no
noteworthy incidents of cyber-
crime took place in the banking
sector of Bangladesh before 2016,
Lega IT
there was no l
• Be aware of the
changing threat
landscape and
• Track the evolving attack vectors
cyber- regulatory
environment • Test incident
response plans

• cyber-attack
simulations,
gamification of
security
• Monitor decisions
made by regulators • Training and
in response to cyber awareness
incidents sessions and
security data
analytics
three banks" a v a i l a b l e
urge for such protective measures
at
against those crimes. But now it is :
high time for the banks to http://bdnews24.com/business/201
concentrate on cyber risk 6/02/14/card- skimming-at-six-atm-
management and mitigation. So, booths-from-three-banks
new technologies and services "Cyber-Crime in Bangladesh :A
growing threat in d i g i t a l
must be adopted to cope with the
m a r ke t " av a i l a b l e
situation as well as competition at
and security governance must be :
complied with. Technological and http://www.risingbd.com/english/cy
legal advancement in the area of ber-crime-in- b a n g l a d e s h - a -
growing-threat-in-digi
banking sector is necessary to t a l - marketplace/28940
overcome the cyber-threats in
Douglas, T., & Loader, B. D. (2000).
banking industry. Bangladesh Bank Cybercrime: Security and
should take necessary steps surveillance in the information age:
discussed above to create Routledge
awareness among the banks and
their clients as well as
making the application of the laws
more rigorous to check crime. As
the regulatory authority of the
banking sector, Bangladesh Bank
should also ensure mandatory
compliance of cyber risk
management and cyber security
governance for the operating
banks. There is also a need to bring
changes in the Information
Technology (ICT) Act to make it
more effective to combat cyber-
crime.

Referenc
es:
Anderson, R., Barton, C., Böhme,
R.,Clayton, R., van Eeten, M. J. G., Levi,
M., Moore, T., & Savage, S. (2012).
Measuring the cost of cybercrime.
Alam, S (2015),Cybercrime and legal
fabric of Bangladesh,Bangladesh Law
Digest-available at-
http://www.bdlawdigest.org
Claessens, J., Dem, V., De Cock, D.,
Preneel, B.,
&Vandewalle, J. (2002). On the security
of today s online electronic banking
systems. Computers & Security, 213:
253-265
"Card skimming at six ATM booths from
Florêncio, D., &Herley, C. (2010). Phishing Wall, D. 2001. 1 Cybercrimes and the
and money mules. In Information Internet. Crime and the Internet: 1
Forensics and Security WIFS, IEEE Z. Liao and M. T. Cheung (2008),
International Workshop on pp. 1-5. IEEE "Measuring customer satisfaction in
Federal Bureau of Investigation, Statement internet banking; A core framework,"
before the House Financial Services Communications of the ACM, vol. 51,
Committee, Subcommittee on Financial no. 4, pp. 47-51.
Institutions and Consumer Credit
Washington, D.C. September
14, 2011
Global economic crime survey,2016,
"How cyber-criminals targeted almost $1 bn
in Bangladesh Bank Heist",available at
https://next.ft.com/content/39ec1e84-
ec45-
11e5-bb79-
2303682345c8#axzz46NHKzCwH

Jaleshgari, R. (1999). Document trading


online.
Information Week, 755:
12. Moore.T, Clayton.R&Anderson.R (2009).
"The Economics of Online Crime" ,
Journal of Economic Perspectives,
Volume 23, Issue no.3, Summer 2009,
pp.3-20
Maruf,M.A, Islam, R, Ahmed,
B(2010),Emerging Cyber Threats in
Bangladesh: In Quest of EffectiveLegal
Remedies,The Nor thern University
Journal of Law,ISSN 2218-
2578,Volume I (2010)

Perumal, A.S,(2008) Impact of cyber


crime on virtual Banking,SSRN
Electronic Journal 10/2008
S. M. Nsouli and A. Schaechter,
(2002)"Challenges of the e-banking
revolution: Finance and development,"
International Monetary Fund, vol.
39, no. 3, pp. 231-254.
Shewangu D.(2015), Cyber-banking fraud
risk mitigation- conceptual model,Banks
and Bank Systems, Volume 10, Issue 2,
2015.

Siddique,I&Rehman S.(2011), Impact of


Electronic crime in Indian Banking Sector
- An Overview, International Journal of
Business Information Technology, Vol-1
No. 2 September 2011
Vrancianu, M., &Popa, L. A. (2010).
Considerations Regarding the Security
and Protection of E- Banking Services
Consumers Interests. The Amfiteatru
Economic Journal,pp- 1228: 388-403

Vous aimerez peut-être aussi