Wall Street Quietly Tests Cyber Defenses at Treasury's Direction
Some of the nation's largest banks are now working with the Treasury Department, engaging in role play and sharing information they would have guarded closely in the past.
June 24, 2022 at 01:55 PM
7 minute read
With global tensions rising over Ukraine, the cutthroat competitiveness of the U.S. financial sector is yielding to partnership over the conviction that a cyberattack against even a group of minor banks, or a third-party service provider, could imperil everyone in a highly connected system.
Some of the nation's largest banks are now working with the Treasury Department, engaging in role play and sharing information they would have guarded closely in the past.
"You're only as good as your weakest link," said Ron O'Hanley, chief executive officer of State Street Corp., one of the largest U.S. money managers and custody banks. "Networks are put together not just by what you're doing, but the vendors you're relying on, the counter-parties you're dealing with, even regulators you're dealing with," he said in an interview.
As part of a broader move aimed at strengthening defenses, Treasury officials late last month gathered executives of several top banks and practiced how they would reach one another and work together across a range of cyberattack scenarios.
That simulation exercise, which hasn't been reported before, included JPMorgan Chase & Co., Bank of America Corp. and Morgan Stanley. It ran through five hypothetical threat levels, ranging from minor assaults to a full-scale onslaught on multiple banks and critical payment systems.
"You can invest in defenses, but that aspect of practicing over and over again, and continuous improvement, is the critical element in responding to the next threat," said J.F. Legault, global head of cybersecurity at JPMorgan Chase in a phone interview.
Treasury officials have also moved to declassify more intelligence to get it in front of financial executives, and to extend security clearance to more employees within the big banks.
Russia's invasion of Ukraine and the subsequent sanctions against Moscow have upset a fragile equilibrium in financial security. Governments adept at cyber warfare such as China and Russia used to be considered stakeholders in the market for global dollar assets, in effect giving them an incentive to leave financial infrastructure alone.
"What was different about Russia-Ukraine was the potential threats were not only obvious, but you had a player that was reputed to be the best in the world at it in terms of cyber threats," said State Street's O'Hanley. "We take all cyber threats serious, but you start to think about it differently when it's a nation-state and, particularly in connection with an armed conflict."
The Treasury also knew the threat landscape was shifting late last year. As they mapped out the sanctions to be unleashed in the event of an invasion of Ukraine, officials concluded that cyberattack preparation needed to step up.
"Once we knew where we were going to land with some of the initial sanctions packages by the end of 2021 and how severe they were going to be, we knew we had to update our incident-response playbooks and work with the sector to increase intel sharing," said Todd Conklin, a counselor to the Treasury's No. 2 official, Deputy Secretary Wally Adeyemo, in an interview.
It's part of a steady expansion of a public-private partnership around cyberattack response.
The Cybersecurity Infrastructure Security Agency, CISA, part of the Department of Homeland Security, was founded in 2018 as the lead agency for cyber protection. Nevertheless, Adeyemo said Treasury Secretary Janet Yellen instructed him on his first day to make cybersecurity a priority.
Adeyemo has drawn from past financial crises, which made clear how the banks' inter-connectedness makes them vulnerable.
"Telling them 'shields-up' without providing additional support and intel sharing isn't that helpful," Conklin said. "It's making sure, if something does happen, we have a plan in place for a collective response."
When any point in the financial system comes under attack, information about the event must get sent out across the network of firms, regulators and intelligence agencies as quickly as possible, officials say. Instead of hoarding information for competitive advantage and hushing up any unhappy development, firms must think cooperatively, sharing intelligence.
"It's sharing information as soon as possible to ensure that if there's an attack somewhere, you're protecting the rest of the system," Adeyemo said.
The largest banks have known that for some years, but are going further than they have in the past.
In 2016, the eight biggest players, led by JPMorgan and Bank of America, formed the Analysis and Resilience Center for Systemic Risk (ARC), aimed at ramping up collaboration in monitoring and protecting critical systems exposed to the internet, with a focus on early-warning capabilities. It's since grown to include exchanges and clearing houses as well as several big energy companies.
The group set up its headquarters just outside Washington because bank executives wanted ARC to work closely with the government, according to Scott DePasquale, ARC's president and chief executive officer. A Treasury official co-chairs the group's risk committee.
There's also a wider counterpart to the ARC, the Financial Services Information Sharing and Analysis Center, whose members include a broad array of firms ranging from banks and insurers to fintechs, from more than 70 countries.
Worries remain, especially over third-party service providers.
In the 2020 SolarWinds attack, according to U.S. officials, a compromised piece of software was used by Russian hackers to gain access to nearly 18,000 computer systems at more than 100 companies and nine federal government agencies, including the Treasury, Homeland Security and the State Department.
But the targets need not be so high-profile to cause damage. In 2021, Kaseya, a U.S. firm that provides IT management and security software services, with a customer base that included many small banks, found itself the target of a ransomware attack.
The issue, later blamed on the Russia-based group REvil, was resolved within days and without a ransom payment. But it forced officials to ponder what would happen if thousands of small banks across the country were paralyzed, and to ask how extensive an attack needed to be before it might provoke a larger run on bank deposits and a wider liquidity crisis across the financial system.
"One of the reasons this community is ahead of others is that they are constantly being probed by cyber criminals," said James Andrew Lewis, director of the strategic technologies program at the Center for Strategic and International Studies in Washington.
"The top 20 banks — I am pretty comfortable they are a really hard target," he added. "If you were to pick the bottom 20 financial institutions and even some of the service providers in the plumbing, I don't know if I would be as confident."
There are also concerns about the government itself. The Treasury and other agencies aren't just regulatory supervisors. The Treasury issues U.S. government debt and the Fed is an interbank payments provider, and their systems can be subject to attack.
After SolarWinds, the Treasury began shoring up its own defenses. It has since invested significantly to modernize its IT, advance encryption technology and rebuild its entire email system, officials said. Russia's preparation for invading Ukraine kicked the project into a higher gear, turning a three-year timeline into a six-month sprint.
For the upcoming fiscal year, the Treasury has asked for an increase of $135 million for department-wide investments in cybersecurity.
Staff fatigue has emerged as a challenge. Like other employers, the Treasury has struggled somewhat to find and hire as many skilled IT professionals as it would like, and the strain is only growing.
So far, Russia has not responded to sanctions with a concerted attack on the U.S., opting instead to focus on firms and government operations in Ukraine.
Adeyemo warns that risks are always present.
"There are, every day, actors of all kinds who are trying to penetrate or trying to take advantage of our financial system, or the regulatory system," he said. "Regardless of what happened yesterday, we have to be equally as vigilant as we were the day before."
Christopher Condon and Craig Torres report for Bloomberg News.
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllData Breaches, Increased Regulatory Risk and Florida’s New Digital Bill of Rights
7 minute readSecond Circuit Ruling Expands VPPA Scope: What Organizations Need to Know
6 minute readScammers Target Lawyers Across Country With Fake Court Notices
Confusion Over New SEC Cyber Rules Leading Firms to Overstate Attack Readiness
Law Firms Mentioned
Trending Stories
- 1'Largest Retail Data Breach in History'? Hot Topic and Affiliated Brands Sued for Alleged Failure to Prevent Data Breach Linked to Snowflake Software
- 2Former President of New York State Bar, and the New York Bar Foundation, Dies As He Entered 70th Year as Attorney
- 3Legal Advocates in Uproar Upon Release of Footage Showing CO's Beat Black Inmate Before His Death
- 4Longtime Baker & Hostetler Partner, Former White House Counsel David Rivkin Dies at 68
- 5Court System Seeks Public Comment on E-Filing for Annual Report
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250