A judge in Maine has ruled that a bank that allowed hackers to steal more than $US300,000 from a customer’s online account isn’t responsible for the lost money, saying the customer should have done more to protect the account credentials.
Magistrate Judge John Rich sided with Ocean Bank in recommending that the US District Court in Maine grant the bank’s motions for a summary dismissal of a complaint filed by Patco Construction Company. The ruling was reported Monday by BankInfoSecurity.
The case raises questions about how much security banks and other financial institutions may be reasonably required to provide commercial customers. It could set a precedent for liability in circumstances where customer systems are hacked and banking credentials are stolen. Small and medium-sized businesses around the United States have lost hundreds of millions of dollars in recent years to such activity, known as fraudulent ACH (Automated Clearing House) transfers.
Patco Construction Company, a family-owned business in Sanford Maine, sued Ocean Bank, which is owned by People’s United Bank, after discovering in May 2009 that hackers were siphoning about $US100,000 per day from its online bank account. The hackers had sent a malicious e-mail to employees that allowed them to surreptitiously install the Zeus password-stealing trojan on an employee computer.
After obtaining Patco’s banking credentials and waiting for its account to fill up with money, the hackers used the credentials to initiate a series of electronic money transfers. Nearly $US600,000 worth of transfers were made out of the account before Patco realised it had been hacked.
Ocean Bank, after being notified of the fraud, was able to block about $US240,000 in transfers. But Patco was unable to retrieve the rest.
Patco sued the bank for failing to notice the fraudulent activity and stop it. According to Patco, the out-of-character transactions triggered alarms inside the bank, but the bank didn’t notice them and let the transfers go through. Patco also accused the bank of failing to implement “best” security practices of requiring customers to use multifactor authentication.
Ocean maintained that it had done its due diligence in verifying that the ID and password used were authentic.
Judge Rich agreed that Ocean Bank could have done more to authenticate that the person initiating the transfers was indeed an authorised party.
“It is apparent, in the light of hindsight, that the Bank’s security procedures in May 2009 were not optimal,” he wrote in his ruling. “The Bank would have more effectively harnessed the power of its risk-profiling system, if it had conducted manual reviews in response to red flag information instead of merely causing the system to trigger challenge questions.”
But he nonetheless concluded that the law does not require the bank to implement the “best” security measures available, and that the bank is clear to customers when they sign up about the level of security it provides and the amount of liability it will assume if money is stolen from a customer account. The judge also noted that Ocean’s level of security was comparable to that offered by other banks. Ultimately, he determined that Patco was responsible for the loss, because it had not better secured its account credentials.
Patco is not the first company to sue its bank over fraudulent money transfers. Experi-Metal sued its bank, Comerica, in 2009 after losing more than $US550,000 in fraudulent wire transfers. Other cases are wending their way through courts around the country.
The FBI announced last October that it had managed to disrupt a multinational cybertheft ring involving fraudulent ACH transfers. The thieves, using the Zeus malware, targeted small and medium-sized businesses, municipalities, churches and individuals. The scammers were able to steal more than $US70 million from victims.