Remote work Infographic

Listen to The Threat Talks on:

Deep Dive – Bangladesh Bank SWIFT attack

Your cybersecurity experts

Lieuwe Jan Koning

Co-Founder and CTO ON2IT Group

Luca Cipriano

Threat Intel Specialist ON2IT

Rob Maas Field CTO

Rob Maas

Field CTO ON2IT

Remote work Infographic

Bangladesh Bank: SWIFT attack

Swift Gateway vulnerabilities

This audacious heist involved a nearly billion-dollar theft, which was almost executed to perfection if not for a crucial spelling error. Hosted by Lieuwe Jan Koning, this episode features cybersecurity experts Rob Maas, ON2IT’s field CTO, and Luca Cipriano, a threat intel specialist.

They dissect the multi-layered attack, from spear phishing to sophisticated malware exploitation. Learn how the attackers infiltrated the bank’s network, manipulated SWIFT transactions, and managed to stay undetected for over a year. What essential cybersecurity measures could have prevented such a breach? 

Don’t forget the infographic, providing a comprehensive visual overview of the attack steps and the defenses that failed. This resource is perfect for presentations and enhancing your understanding of complex cyber threats. 

Download the infographic for the complete overview

Episode details:

In this Threat Talks Deep Dive, the dramatic and meticulously planned Bangladesh Bank SWIFT attack is explored. This cyber heist, orchestrated by sophisticated criminals, nearly resulted in the theft of a billion dollars. The episode is hosted by Lieuwe Jan Koning and features cybersecurity experts Rob Maas and Luca Cipriano, who delve into how this breach was executed and what it reveals about vulnerabilities in banking cybersecurity.

The attack began with spear phishing, leading to the installation of advanced malware that allowed attackers to forge SWIFT transactions. The discussion highlights the importance of cybersecurity hygiene, the role of behavioral analysis in detecting anomalies, and the critical measures banks must implement to protect their systems.

An infographic detailing each step of the attack is available for download, providing a visual guide that complements the in-depth analysis.

This episode is essential for anyone involved in cybersecurity or interested in understanding modern cyberattacks and prevention methods. Subscribe and download to stay informed and secure.

Make sure to follow the Threat Talks on our Spotify channel and stay up to date with every cybersecurity treat.