Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Exclusive: Banks face a growing physical security threat
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Exclusive: Banks face a growing physical security threat
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
cybercrimeAnalysisBanking Threats

Exclusive: Banks face a growing physical security threat

Tony Glover
June 27, 2024 at 12:01 PM
By Tony Glover Tony Glover
Share
physical bank security
SHARE

 

Contents
Remote SIM swaps can take over your smartphoneOnline criminality assists in kidnapping, murder and gun-running

physical bank security

Banks, traditionally the main target for cybercriminal groups, are now being attacked not only by new online hacking techniques but also by a growing range of physical hacking tools and techniques. While financial institutions have high levels of cybersecurity and strong physical security, they currently face a growing threat from combined physical and digital assaults.

“Physical security and cybersecurity convergence in the business environment. A favorite weapon in the hacker arsenal is the Flipper Zero, an inexpensive pocketable device that enables you to hack into nearby smartphones and IT systems,” says Tim Grieveson, Senior Vice President of Global Cyber Risk, BitSight.

Billed as the Flipper Zero Multi-tool Device for Geeks, Flipper Zero is a portable multi-tool designed “for pen testers and geeks in a toy-like body.” It is freely available online for £171 (US$217).

“It [The Flipper Zero” loves hacking digital stuff like radio protocols, access control systems, hardware, and more. It’s fully open-source and customizable, so you can extend it in whatever way you like,” claim its makers.

Other physical hacking devices include the “Pineapple,” which is priced online at US $140. These small portable devices enable threat actors to sit in a location such as the lobby of a business hotel or coffee shop and execute “man-in-the-middle” attacks by hijacking users’ Wi-Fi connections. This poses a particular threat to banking staff who are traveling or working remotely.

Another device, the “Bash Bunny,” widely available online at around US$100, is a USB stick that emulates combinations of trusted USB devices such as gigabit Ethernet, flash storage, and keyboards to fool computers into divulging data, exfiltrating documents, installing backdoors and other exploits. A single Bash Bunny inserted into an unguarded PC or laptop can provide access to the bank’s entire systems. A physical intrusion into the bank’s premises by a threat actor becomes all the more dangerous if he or she is equipped with such a device.

Grieveson adds: “Another type of digital attack combined with a physical one would be for a threat actor to set off fire alarms in an office building, as people are generally instructed to leave their PCs and laptops on  their desks and head straight for the exits, which are generally clearly displayed on the wall for the benefit of the threat actor.”

Remote SIM swaps can take over your smartphone

According to Elijah Jackson, Blockchain Industry Commentator at MyChargeBack: “The finance industry is never totally secure. Opening up your internet is never 100 percent safe…A lot of people don’t like two-factor authentication. But even with your phone, you are not 100 percent safe. SIM swaps can take over your phone if your number is out there anywhere and you are targeted by social engineering.”

The combination of online fraud and a respectable physical presence can also be used simultaneously to evade authority while maintaining a credible façade.

According to Jackson: “A couple of years ago, the respected Spanish newspaper El Pais reported that Spain had become one of the world’s main centers of Forex scams. By then, police in Catalonia had identified 407 fake Forex sites that were targeting investors. Forget about geeks operating from their bedrooms. One suspected Forex scam actually sponsored a Spanish football team for three seasons.”

Online criminality assists in kidnapping, murder and gun-running

The convergence of physical and cyber threats is also evident in regions where digital criminality is used to assist and fund a whole range of traditional physical crimes.

“The Golden Triangle in northeastern Myanmar, northwestern Thailand, and northern Laos were identified 50 years ago by INTERPOL as an international crime center that attracted every type of actor that you can imagine. Today, it is a cybercrime capital, and the UN has published credible reports that the crypto scams based there also engage in kidnapping, murder, and drug running,” adds Jackson.

As well as constantly updating their cybersecurity, banks now need to keep equally ahead of increasingly sophisticated threat actors using physical points of entry such as smartphones and laptops to hack into their systems.

TAGGED: physical threats, Cybersecurity, bank, cybercrime, hacking tech, Interpol, hacking tools, hacking techniques, finance, pineapple, bash bunny, pen testing, flipper zero, elijah jackson, two factor authentication, mychargeback, tim grieveson, forex, bitsight, financial scams
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article Levis Breach Levi’s breach exposes 72k customer details
Next Article deepfake threats affecting share prices Exclusive: Deepfakes being used to manipulate share prices
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

SpywareNews

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
Cyber EspionageGovernmentGeopoliticsNews

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
ChinaCyber EspionageSurveillanceSpywareNews

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?