From data theft to ransomware: threats and protection in the financial sector

Hackers pose a threat to companies worldwide. Sven Schaumann and Petra Leclaire, security experts at Deutsche Bank, talk about the evolving threat landscape – and shed a light on how to protect.

Sven, in the video on this page, Petra Leclaire, Regional Head of Corporate Security CEU & Germany, describes the enormous financial damage that cyber attacks cause. How have attacks evolved over time?

Many companies have strengthened their defence measures against cyber attacks and are constantly developing them, just as we do at Deutsche Bank. Nevertheless, we are constantly faced with new methods of attack, such as the current supply chain attack. Here, companies are not attacked directly, but rather partners and suppliers with whom a company works are targeted. The partner or supplier is then used as a springboard to attack the actual target.

Phishing, which is still frequently used, is also a well-known attack pattern that is becoming increasingly sophisticated. Emails are sent that contain a link or attachment that you are supposed to click on. As soon as you click on this link or attachment, the attackers can steal passwords or infect a computer. You could say that the person in front of the computer is under direct attack.

Many companies have strengthened their defence measures against cyber attacks and are constantly developing them, just as we do at Deutsche Bank.Sven Schaumann

In addition to phishing, there is another method called social engineering, or social manipulation, which targets people directly. Hackers also rely on human weaknesses and behaviour. Their aim is to get people to disclose sensitive information or perform certain actions. They build trust, create fear or pose as authority figures.

What role does artificial intelligence (AI) play in this?

That's a good point. AI cannot currently attack us directly, but it can help attackers to improve their methods. By using AI, for example, phishing campaigns can be organised more effectively. Publicly available personal data can be used to create personalised emails that are very convincing. With the help of deepfake, it is even possible to use AI to fake people in video conferences.

AI cannot currently attack us directly, but it can help attackers to improve their methods.Sven Schaumann

But we as defenders can also make use of AI to detect attacks as early as possible and thus counteract them very quickly or initiate automatic countermeasures. The challenge here is that for 100 attacks we need to succeed 100 times, while an attacker only needs to succeed once.

What are the perpetrators' goals when they attack companies and authorities?

To understand the goals of hackers, it is important to understand what motivates them. We often see financial motivation where hackers want to make money by encrypting data, extorting ransom or carrying out fraudulent activities. Or they steal data and intellectual property to gain a market or military advantage. Some hackers act out of purely destructive motives to cause damage or spread chaos.

There are also politically motivated hackers who spread misinformation to cause confusion, manipulate people or achieve specific goals, such as political change or discrediting institutions. There is often an overlap between these motivations and the reasons behind hacker attacks can be complex.

What is the target of attacks on the financial sector and banks? What type of cyber attack is especially dangerous?

Attacks are a serious threat not only to the financial sector, but especially to banks and insurance companies. Their aim is often to steal data or manipulate payment transactions.

Ransomware attacks are particularly dangerous. For example, criminals use malware to gain access to data and encrypt it. An attack often serves to cripple a company’s systems. Both are devastating and so the criminals have leverage to extort ransom money, for example.

Unfortunately, such malware attacks are a well-established business model for criminals and the fastest growing area of ​​cybercrime. It has already affected various large corporations, but also medium-sized companies, hospitals and local authorities. It can even affect private individuals.

The attacks are becoming more and more professional and when criminals are successful, it costs the victims a lot of time and money.

How do financial organisations protect themselves against such attacks – especially Deutsche Bank?

I'd like to come back to the onion principle, which Petra also explained in the video. Deutsche Bank protects itself against cyber attacks by means of various layers. If one layer of defence fails, another is taking over.

There are different measures to counteract different types of attacks, including ways to quickly restore systems and solid defence. Our team, also known as the Security Operations Center (SOC), works around the clock to protect our clients’ data and the bank's systems. Obviously, that’s all I can really say about that – for security reasons.

This interview was conducted by Timo Bergold. 07/2024. 

Petra Leclaire

About Petra Leclaire

Petra is Regional Head of “Corporate Security Germany and Europe” at Deutsche Bank, which means she is responsible for the security of physical assets and people. This includes the operational security (24/7), security systems and infrastructure, travel security, health and safety oversight, security projects, security investigations, crisis and incident management as well as executive and event protection. In her role she works closely with both Infrastructure and Businesses to provide advice and support on any physical security matter. Petra is a member of the Chief Security Office (CSO) Executive Council as well as the Deutsche Bank SPOC (Single Point Of Contact) for several authorities such as BND, BKA , Europol.

Petra joined Deutsche Bank in 1999 as the Deutsche Bank Y2K Project Manager (IT) and has worked in several roles within the IT, Risk and Security department within the Bank. She was leading several IT projects, business projects, outsourcing as well as integration projects.

Petra holds a diploma degree in computer science as well as mathematics from the University of Darmstadt. Before she joined Deutsche Bank she worked for Microsoft, Nestlé, the University of Krems and Darmstadt in and outside Germany.

Sven Schaumann

About Sven Schaumann

Sven is the Global Head of “Information Security Threat Operations” at Deutsche Bank, which means he is responsible for identifying attacks on our information security and responding accordingly. Sven oversees five cyber threat operations centers worldwide, all of them monitoring data and systems, detecting cyber threats, analysing attacks and solving identified problems or managing information security incidents. With this global footprint, the bank can respond to attacks around the clock. Sven is a member of the Chief Security Office (CSO) Executive Council.

Sven joined Deutsche Bank in 2000 and has worked in various roles, supporting numerous departments within the bank and leading several IT projects and business application development programmes. He established the initial Security Operations Centers in Germany and India, and later created the first group-wide standardised process to handle IT security incidents.

Sven holds a degree in Computer Science and is a Certified Information Systems Security Professional (CISSP) and a Certified Google Cloud Digital Leader.

Timo Bergold

Timo Bergold

... is responsible for international communications projects at Deutsche Bank. He is fascinated by how companies have to reposition themselves against cyber attacks. In his view, the use of AI is particularly exciting, both for attackers and defenders.

Recommended content

Digital Disruption | Video Story

“German companies are not well enough protected” “German companies are not well enough protected”

Ralf Wintergerst, Chairman of the Management Board of Giesecke+Devrient, talks about the greatest risks regarding cyber attacks and what we can do to protect against them.

“German companies are not well enough protected” Protecting critical infrastructure

Digital Disruption | Opinion

”We operate in a zero-trust environment.“ ”We operate in a zero-trust environment“

Cyber­criminals look for weak points in value chains and use them as a gateway, for data theft or blackmail. At the same time, the cyber skills gap is growing, warns WEF expert Gretchen Bueermann. 

”We operate in a zero-trust environment.“ What are we facing?

Digital Disruption | Insights

The convenience of digital banking with the assurance of security The convenience of digital banking with the assurance of security

Cyber expert Pinakin Dave explains why cybercrime is on the rise and how his company "OneSpan" is helping reduce risks to consumers and keep financial transactions safe.

The convenience of digital banking with the assurance of security Why cyber hygiene is crucial

What Next: our topics

Link to Responsible Growth
Link to Digital Disruption
Link to Entrepreneurial Success