All cases

Bangladesh Bank SWIFT Heist

February 2016

HybridPeak: DegradationAttribution: High ConfidenceFinance
Year
2016
Actor country
North Korea
Target regions
Bangladesh, Philippines
Unpeace score
9

Executive Summary

Attackers compromised Bangladesh Bank's SWIFT terminal and issued fraudulent transfer requests totaling $951M from its account at the Federal Reserve Bank of New York. Most transactions were blocked, but $81M was successfully routed to accounts in the Philippines. The operation demonstrated that the global interbank messaging system could be exploited for state-linked financial theft.

Why This Matters

The Bangladesh Bank heist revealed that the global financial messaging system's security depended on its weakest endpoint, and that state actors would exploit that gap to fund sanctioned programs.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2016-01
Intrusion

SWIFT environment compromise

Attackers gained access to Bangladesh Bank's network and SWIFT terminal, studying transfer workflows over several weeks.

2016-02-04
Disruption

Fraudulent SWIFT messages

35 fraudulent transfer requests totaling $951M sent via SWIFT to the NY Fed. Timing exploited the weekend gap between Dhaka and New York.

2016-02-05
Degradation

Partial fund exfiltration

$81M successfully transferred to Philippine bank accounts and laundered through casinos. Remaining $870M blocked by correspondent banks due to anomalies.

Threshold Crossings

  • First confirmed state-linked operation targeting the global interbank financial system
  • Demonstrated that SWIFT endpoint security was a systemic risk across central banks

Restraint Factors

  • A typo in a transfer request triggered manual review, limiting losses
  • SWIFT infrastructure itself was not technically compromised — the endpoint was

Attribution Assessment

High ConfidenceLazarus Group, attributed by the US DOJ and multiple researchers to North Korea's RGB
North Korea
Lazarus GroupAPT38BlueNoroff
1. Technical

Threat actor mapped to North Korea based on infrastructure analysis, malware attribution, and operational patterns.

Evidence: SWIFT: Customer Security Programme overview

2. Political / Legal
IndictmentSanctions Imposed
  • US DOJ indictment of Park Jin Hyok (Sep 2018, alongside Sony and WannaCry charges)
  • SWIFT implemented mandatory Customer Security Programme (CSP) for member institutions
  • UN Panel of Experts documented DPRK cyber-enabled theft as sanctions evasion

Sources: US DOJ: North Korean Regime-Backed Programmer Charged

3. Open Source
  • Reuters: How the New York Fed fumbled over the Bangladesh Bank cyber-heist(2016-07-21)

High Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

9

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak4/6
Threshold crossings2/4
Governance flags4/8
Sectors affected1/6
Entanglement4/10
Country scope2/6

Coercive Function

Hybrid

Combination of multiple coercive functions — blends intelligence, disruption, and economic pressure.

Observed coercive effects

  • First confirmed state-linked operation targeting the global interbank financial system
  • Demonstrated that SWIFT endpoint security was a systemic risk across central banks

Entanglement Risk

Entanglement score4

Sectors affected

Finance

Countries / regions

BangladeshPhilippines

Impact summary

$81M stolen; $870M in additional transfers blocked; systemic confidence in SWIFT endpoint security shaken.

Infrastructure Meaning

Malware / tooling

NESTEGGDYEPACKcustom SWIFT manipulation tools

Capability profile

$81M stolen; $870M in additional transfers blocked; systemic confidence in SWIFT endpoint security shaken.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • Protection of financial infrastructure and the international banking system
  • UN sanctions framework: DPRK revenue generation through illicit cyber means

Policy responses

  • US DOJ indictment of Park Jin Hyok (Sep 2018, alongside Sony and WannaCry charges)
  • SWIFT implemented mandatory Customer Security Programme (CSP) for member institutions
  • UN Panel of Experts documented DPRK cyber-enabled theft as sanctions evasion

Regulatory changes

  • SWIFT Customer Security Programme with mandatory security controls
  • Enhanced central bank cybersecurity standards globally

Governance impact assessment

Forced a fundamental upgrade to global interbank security and established that state-sponsored financial cyber theft could fund weapons programs in violation of UN sanctions.

Sources

J

Reuters: How the New York Fed fumbled over the Bangladesh Bank cyber-heist

Journalistic2016-07-21
L

US DOJ: North Korean Regime-Backed Programmer Charged

Legal2018-09-06
V

SWIFT: Customer Security Programme overview

Vendor Report2017-01

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.