There's a fresh undercurrent of worry among security experts that the U.S. payments infrastructure is a prime target for nation-state attackers.
The payments network is an alluring target because while an attack on it could wreak a lot of havoc, it wouldn't necessarily trigger a military response from the U.S. government. It wouldn't be considered as threatening as an attack on our electric or communications grids, for instance. And the network itself is fragmented, with widely varying levels of security at each point.
-
The Obama administration announced a new cybersecurity strategy on Tuesday, calling for a 35% increase in funding to bolster private and public defenses and the creation of a new chief information security officer position for the government.
February 9 -
Subtly altered versions of popular apps are appearing more often on smartphones. These rogue apps, often available for free, can steal mobile banking passwords or redirect text messages containing passcodes.
January 21 -
Kaspersky Lab has unveiled a cyber-heist in which hackers have already stolen $1 billion from banks across the world. Here's what banks should know about how the hackers did it and what institutions can do to protect themselves.
February 17 -
At least two financial services groups say none of their U.S. bank members have reported the existence of Carbanak malware in their networks, suggesting the threat may not be significant.
February 19
"If Russian attackers hacked it, our payments network would go down like that," said one payments security expert, snapping his fingers.
Alex Jimenez, a digital banking and payments consultant based in Providence, R.I., agreed that the network is vulnerable to nation-state attacks.
"Who's to say it's not already happening?" he said. "The merchants don't really care because outside the PR risk, the risk is owned by the banks. So it's entirely a big mess that could easily be attacked."
Part of the problem, Jimenez said, is that people don't think of the payments system as a critical network.
"We worry about air traffic, we worry about drinking water, we worry about the electric grid," he said. "There's nobody worrying about the payments networks."
Gary McAlum, chief security officer at USAA in San Antonio, said the vulnerability of the overall financial system to sophisticated attacks "has long been a general concern among others, like power generation facilities and other components of critical infrastructure."
The payments ecosystem is very complex, very federated and it looks a lot like a subset of the Internet, McAlum said. "Who's in charge of security on the Internet? The answer is: no one," he said.
"There's no cybercop out there controlling the financial system, looking for threats. What it really depends on is a neighborhood watch model — 'If you see something, say something.' But in terms of the interconnection points, whether it's card payments systems, global money movement or ACH, there's nobody specifically tasked or given the authority or responsibility to monitor those transaction points."
Aging, Fragmented Network
One reason the U.S. payments infrastructure is vulnerable is its fragmented nature —
"As an industry, we're very siloed," Jimenez noted. "There are the people looking at credit cards, debit cards, ACH, wires. Each network is a silo and there aren't many that are looking across for risk management. We don't do it at a specific bank. We could do it industrywide." The vendors and payment processors are siloed as well, he said. There's no one point of visibility into incoming threats.
But fragmentation can be an advantage as well.
"You have multiple targets, and if you lose access or have issues with one payments system we have redundancy," said Al Pascual, senior vice president, research director and head of fraud and security at Javelin Strategy & Research. "It's not as though you could target one system and we couldn't render payments in a comparable way."
The older technology in some cogs of the payments infrastructure is also an advantage, he said.
"These systems are not publicly accessible and they're very much legacy," Pascual said. "You'd have to have intimate knowledge of the platforms on which these systems are built" to infiltrate them. How many hooded young hackers know COBOL or the AS/400?
Hence, "as far as the whole catastrophic idea of taking down the system, I'm not alarmed," Pascual said. "I do think we have problems. We have breaches. We have the potential for individual organizations that accept payments to be brought to a standstill." But "a nationwide disruption in payments is extremely unlikely."
Nation-State Exploits
Russia and China are the two countries most capable of attacking the U.S. payments network.
Russia has "a lot of Cold War stealth that they transferred into code," said James Scott, co-founder and senior fellow at the Institute for Critical Infrastructure Technology, a Washington-based forum of federal agency executives, legislative community members and industry leaders focused on solving critical infrastructure problems.
Its hackers tend to be so precise they can often launch successful cyberattacks with just a few emails, said Scott, who recently co-wrote a report entitled "
"They'll do enough
China's hackers are less sophisticated, but there are more of them, Scott said. "What they're doing is almost like digital smash and grab. They're hacking into a ton of systems at once using
"What China lacks in technological capacity and sophistication, they make up by sheer volume of attack attempts," Scott said.
Still, Scott doesn't see either Russia or China going after U.S. payment systems.
"It's too easy to go after our dams," he said. "If they wanted to do something catastrophic, they can go after dams, car hacking, air traffic control. That's where the scary stuff is."
He does see the financial sector as a whole as a mark. "I think we're such an easy target in so many other ways because our entire country and economy is run off all kinds of technology," he said.
Who's Protecting Us?
The Treasury Department and Federal Reserve work on interagency cybersecurity committees and guidelines for banks and major infrastructure providers. But Jimenez says they are taking an overly granular approach.
"Regulators worry about individual banks and what control they have, what recovery methods, but they're really going bank to bank and they're not looking at the overall network," Jimenez said.
Banks and other participants in payment networks obviously have to defend their own networks and have state-of-the-art backup and disaster recovery, so when the worst happens they can make a quick recovery.
Government agencies could take a proactive role here to help protect the payment network along with other critical infrastructure. A true national cybercop would not only warn of danger and set rules for cybersecurity, but track down the international bad actors and block them from attacking people and companies in the U.S. It would also help the payment networks get back up and running in the wake of an attack.
Editor at Large Penny Crosman welcomes feedback at