/security

News and resources on cyber and physical threats to banks and fintechs worldwide.

Bank security flaws leaving customers open to scammers

Consumer group Which? has uncovered flaws in online banking security systems that could leave customers exposed to fraud, with some banks failing to use the latest protections for their websites and allowing users to set insecure passwords.

  7 1 comment

Bank security flaws leaving customers open to scammers

Editorial

This content has been selected, created and edited by the Finextra editorial team based upon its relevance and interest to our community.

With cases of internet banking fraud up 97% in the first half of 2021, the consumer champion is concerned too many banks are still neglecting important security protections.

Which? conducted an investigation with independent security experts 6point6, testing the online and mobile app security of the 15 largest current account providers on a range of criteria including encryption and protection, login, and account management and navigation.

Metro Bank received the lowest score for online security in Which?’s testing, with an overall score of just 53%. It was joined in the bottom three by Virgin Money (56%) and TSB (59%).

Banks must now carry out extra checks to verify customer identity as passwords can be easily guessed or stolen, but Which? found security flaws at several banks during the login process.

Triodos Bank allows customers to set insecure security words, including ‘password’, ‘1234567’ and ‘admin’. The risk is mitigated by a two-factor authentication at login using its physical ‘Digipass’ device, but "there is no excuse for a bank to allow such weak credentials", says Which?.

Six banks - HSBC, NatWest, Santander, Starling, The Co-operative Bank, and Virgin Money - let users choose passwords that include their first name and/or surname. Santander told Which? this is being phased out and NatWest and Virgin Money said they might increase password limitations after the investigation.

TSB, Lloyds, Metro, Nationwide, Santander and The Co-operative Bank also all still use SMS texts to verify individuals at log in, leaving messages at risk of being hijacked by cybercriminals. Santander and The Co-operative Bank told Which? that they are looking to move away from SMS.

Which? identified potential weaknesses in subdomains of Metro Bank’s website which could allow hackers to compromise the server. Testers found similar issues with First Direct and Lloyds. First Direct addressed the vulnerability as soon as Which? reported it and Lloyds said its subdomain was in the process of being decommissioned and ‘poses no security risk’.

Testers also found two security headers missing from Metro Bank’s website. These are important as they protect against a range of cyberattacks by telling browsers how to behave when communicating with the website.

Which? found that Nationwide, TSB and Virgin Money were failing to use software that ensures spoof messages sent by potential scammers are blocked or quarantined by email providers. TSB told Which? it has since introduced this protection. Virgin Money said this is in the works. Nationwide said it operates ‘a range of email security controls’ to protect members.

At the other end of the table HSBC came out on top, with a score of 81 per cent. It was the only bank to score five stars for both website encryption and account management. It was rated A+ for cipher strength because it supports the latest encryption standards.

Which? also asked 6point6 to test each provider’s banking app to identify potential flaws. Monzo was the lowest-scoring app it tested by some margin. It is the only provider that does not ask the user to log in every time. It said this is a ‘conscious design decision to strike a balance between risk and customer experience’.

Lloyds, Nationwide, Santander, and TSB dropped points because online and mobile banking require the same login credentials.

Jenny Ross, Which? Money Editor, says: "Our security tests have revealed worrying flaws when it comes to keeping people safe from the threat of having their account compromised.

“Our research reinforces the need for banks to up their game on tackling fraud by using the latest protections for their websites and not allowing customers to set insecure passwords. We also want banks to stop sending sensitive data to customers via SMS texts as this could leave the door open to fraudsters.”

Sponsored [On-Demand Webinar] AI in Banking: Building Compliant and Safe Enterprise AI at Scale

Related Company

Comments: (1)

A Finextra member 

I find this a little extreme. As a Nationwide customer of more than 20 years to access my account I need to verify my account number, name and date of birth. I then have to type in three random numbers from my six digit security code and they then send an SMS text to my mobile phone which I need to enter. For a fraudster to acquire all of the information needed to access my account they need access to five pieces of information - name, date of birth, account number, security code and my mobile telephone number. If I have been foolish enough to give away all of this information, then I must expect to be hacked.

[Webinar] Reaping the benefits of Hyper-Personalisation with AI and Application ModernisationFinextra Promoted[Webinar] Reaping the benefits of Hyper-Personalisation with AI and Application Modernisation