LONDON: British banking executives and security experts are growing frustrated at the dearth of information available more than three months after £2.5 million pounds (US$3.12 million) was stolen from Tesco Bank in the UK’s biggest financial cyberheist. Security officers normally share information on an informal basis immediately after a major cyberincident so that the other banks can check their systems, sources at four of Britain’s biggest lenders said. However, in the case of Tesco Bank, a small lender with annual profits of £162 million, details about exactly how criminals stole the money and what vulnerabilities were exposed have yet to be provided. The case has exposed the lack of proper procedures to share information as well as confusion over which government agency has ultimate responsibility for the issue, lawmakers and executives said. It is very frustrating,” a senior executive at one of Britain’s largest banks told reporters. “The gentlemen’s code has been broken.”
A risk officer at another of Britain’s biggest lenders said a formal regulatory system was essential in a financial center such as London where hundreds of banks of all sizes operate. I am not going to criticize them, the problem is the structure,” he said. The attack, on Nov. 5 and Nov. 6 last year, affected 9,000 Tesco Bank customers. It is the first major case to be investigated by Britain’s new National Cyber Security Centre (NCSC), working with the National Crime Agency (NCA).
The NCSC brings together and replaces a host of UK bodies including the Communications-Electronics Security Group — the information security arm of Government Communications Headquarters — the Centre for Cyber Assessment, the Computer Emergency Response Team UK and the cyberrelated responsibilities of the Centre for the Protection of National Infrastructure. As regulatory authorities for the banking system, the Bank of England’s Prudential Regulation Authority and the Financial Conduct Authority would also be involved in any regulations governing financial cybercrime. The NCSC did not respond to requests for comment on the Tesco case. The investigation is ongoing therefore it would be inappropriate to comment further,” an NCA spokesman said.
The new body is coming under pressure from the financial industry and lawmakers to act quickly. It is up to the NCSC to institutionalize the sharing of information and give some kind of obligation or requirement for feedback after an attack like Tesco Bank,” Barclays PLC chief information security officer Troels Oerting said. A team of academics from the University of Newcastle in December last year said that a relatively unsophisticated method known as “distributed guessing” could have been used to generate usable card payment details in the November attack. A spokesman for the bank, which is owned by leading supermarket chain Tesco PLC, declined to discuss the specifics of the case. We continue to work closely with the authorities and regulators in their investigation of the criminal incident that took place last year. Our priority throughout has been to look after our customers,” the spokesman said on Monday. Bank executives and cybersecurity experts told reporters in October last year that they feared Britain’s banks are not reporting the full extent of cyberattacks to regulators for fear of punishment or bad publicity.





