In January 2008 was an incident in which the bank Société Générale lost approximately €4.9 billion closing out positions over three days of trading beginning January 21, 2008, a period in which the market was experiencing a large drop in equity indices. The bank states these positions were fraudulent transactions created by Jérôme Kerviel, trader with the company. The police stated they lack evidence to charge him with fraud and charged him with abuse of confidence and illegal access to computers. Kerviel states his actions were known to his superiors and that the losses were caused by panic-selling by the bank.
Jérôme Kerviel combined several fraudulent methods to avoid the controls in place [3]:
- firstly, he ensured that the characteristics of the fictitious operations limited the chances of a control: for example he chose very specific operations with no cash movements or margin call and which did not require immediate confirmation;
- he misappropriated the IT access codes belonging to operators in order to cancel certain operations;
- he falsified documents allowing him to justify the entry of fictitious operations.
- he ensured that the fictitious operations involved a different financial instrument to the one he had just cancelled, in order to increase his chances of not being controlled.
How the fraud was uncovered:
Friday January 18th
- Abnormal counterparty risk on a broker is detected several days earlier. The explanations provided by the trader result in additional controls.
- On January 18th, the trader’s superiors are informed and in turn they alert the management of the division.
- In the afternoon of January 18th, it appears that the counterparty for the recorded operations is in fact a large bank, but the confirmation e-mail raises suspicions.
- A team is immediately created to start investigating the situation.
Saturday January 19th
- Management cannot obtain a clear explanation from the trader.
- The large bank in question does not recognise the operations.
- The trader finally acknowledges committing unauthorised acts and, in particular, creating fictitious operations.
- The investigation team starts piecing together his real position.
How global economy potentially impacted:
On January 21, 2008, European stock markets suffered heavy losses of about 6%. The sharp fall, which was followed by an emergency cut in the federal funds rate by the United States Federal Reserve on the following Tuesday (US markets were closed on the Monday for Martin Luther King Jr Day), came as Société Générale tried to close out positions built up by Kerviel.
This has led to speculation that stock market turbulence caused the Federal Reserve Board to cut the rate. A Federal Reserve spokesperson denied the central bank knew of Société Générale's situation when it made its decision.
It is estimated that over the period the total trading in futures and the cash market for the Euro Stoxx 50 was €544 billion. This would make the unwinding of Kerviel’s position account for five per cent or less of overall activity. Société Générale's investment banking chief, Jean-Pierre Mustier, acknowledged that the three days of forced selling played a role in the market's overall decline, but characterized that impact as "minimal".[2]
Jeremy Epstein wrote a good article in IEEE security & Privacy magazine [1] about security lessons learned from Société Générale fraud by Jérôme Kerviel.
Jeremy highlighted security lessons that we should learn from this fraud. Some of them as follows:
- Low tech attacks are easier
- Logs are only useful if they’re examined
“Societe Generale has taken several steps to tighten controls following an internal report into what went wrong in the Kerviel case. The report noted 74 red flags raised on Kerviel's trades that failed to sound the alarm — he was spotted only on the 75th." [4]
- Don’t rely on secrecy for security
- We’re looking at the wrong things
- Rights revocation must be tied to role assignments
- Social engineering is a threat
- Don’t believe everything you read
“Kerviel apparently used his experience working in Société Générale's compliance department to exploit both human and technological weaknesses. He crafted fake e-mails detailing order requests from supposed clients” [5]
- Cutting staffing costs can backfire
- Features without assurance are ineffective
“The bank says Kerviel faked hedging transactions across a range of financial instruments. They weren't spotted because Societe Generale's back office controllers monitored the trading of individual products separately.” [4]
- Insider attacks (usually) have motivation
References:
2. Wikipedia
5. BusinesWeek