Sector Analysis

Sector Under the Microscope: Cyber Security for Financial Services

> series: sector_under_the_microscope —— part: 02/10 —— sector: financial_services —— threat_level: critical<span class="cursor-blink">_</span>_

Hedgehog Security 4 December 2025 12 min read

Where other people's money is stored, attackers follow.

Financial services firms — independent financial advisers, wealth managers, accountants, and financial planners — occupy a unique position in the threat landscape. They hold direct access to client investments, bank accounts, tax records, and financial planning data. A breach does not just expose information; it provides the keys to move money. This makes financial services one of the highest-priority targets for both financially motivated criminals and state-sponsored espionage groups seeking economic intelligence.

This article examines the specific threats facing UK financial services firms, the regulatory framework they operate within, and the vulnerabilities we consistently discover during penetration testing engagements in the sector.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

The actors targeting financial services.

Authorised Push Payment (APP) Fraud
The dominant financial crime vector. Attackers compromise email accounts or impersonate advisers to redirect client payments, investment transfers, and BACS instructions. The advisory relationship — built on trust and typically conducted via email — is the perfect vector for social engineering.
Ransomware Targeting Client Data
Financial services firms hold data that clients cannot afford to lose — tax returns, investment portfolios, pension details, and estate planning documents. Ransomware operators know that firms handling this data face regulatory reporting obligations, client notification requirements, and reputational consequences that increase the pressure to pay.
Credential Theft and Account Takeover
Financial platforms — portfolio management systems, custodian portals, and back-office applications — are targeted through credential stuffing, phishing, and password spray attacks. A compromised adviser account can authorise transactions, access client portfolios, and exfiltrate financial data.
Supply Chain Compromise
Financial services firms rely on a complex ecosystem of platform providers, custodians, back-office software vendors, and compliance tools. A compromise at any point in this chain — such as the <a href="/blog/apt10">APT10 Cloud Hopper campaign</a> that targeted managed service providers — can cascade into the firms that depend on them.

FCA, PCI DSS, and operational resilience.

Framework What It Requires
FCA Operational Resilience The Financial Conduct Authority expects regulated firms to identify important business services, set impact tolerances, and demonstrate that they can continue to deliver those services during severe disruption — including cyberattack. Penetration testing is an expected component of operational resilience assurance.
PCI DSS Any firm that processes, stores, or transmits cardholder data must comply with PCI DSS — including annual penetration testing. Our PCI DSS penetration testing service is designed specifically for this requirement.
UK GDPR Financial data is personal data. Firms processing client financial information are subject to the same GDPR obligations as any data controller — including the requirement for appropriate technical measures and regular security testing.
SMCR (Senior Managers & Certification Regime) Individual senior managers can be held personally accountable for failures in the areas they are responsible for — including technology and operational resilience. A cyber breach that results from inadequate security controls can have personal regulatory consequences.
Consumer Duty The FCA's Consumer Duty requires firms to deliver good outcomes for retail customers. A data breach or financial loss resulting from inadequate security directly undermines this obligation and can trigger enforcement action.

Common vulnerabilities in financial services.

Our engagements in financial services consistently reveal a pattern: strong front-office security (client-facing portals are typically well-protected) combined with weaker back-office and internal controls where the most sensitive operations actually occur.

Finding Impact
MFA not enforced on back-office platforms Portfolio management systems, custodian portals, and compliance platforms frequently lack MFA — even when client-facing portals have it. An attacker who compromises an adviser's back-office credentials can authorise transactions.
Excessive access to client financial data Role-based access control is frequently too permissive — support staff, paraplanners, and IT administrators often have access to client financial data beyond their operational need. Internal testing reveals lateral access paths to investment portfolios and bank details.
Legacy applications in the back office Financial planning software, compliance tools, and reporting systems running on unsupported frameworks with known vulnerabilities. These systems are rarely included in penetration testing scope — which is precisely why they contain the most serious findings when they are.
Weak email authentication SPF, DKIM, and DMARC misconfigured or absent — enabling domain spoofing that facilitates APP fraud. Combined with weak MFA on email accounts, this creates the exact conditions for business email compromise.

Security priorities for financial services firms.

For financial services firms, we recommend a testing programme that reflects the specific threat model: email compromise, credential theft, and unauthorised access to financial systems. Start with external and cloud configuration testing, then move to internal infrastructure and social engineering. Complement annual testing with continuous monitoring through SOC in a Box for Financial Services, which provides 24/7 detection, dark web monitoring for compromised credentials, and data loss prevention to detect exfiltration of client data.

Cyber Essentials certification is increasingly expected by platform providers, professional indemnity insurers, and larger clients as a baseline. For FCA-regulated firms, penetration testing and Cyber Essentials together provide a defensible compliance posture that demonstrates proactive security investment.


Part 3 preview.

Next week, we examine the healthcare sector — GP surgeries, dental practices, and NHS supply chain organisations. We cover the DSPT, the specific threat actors targeting health data, and why healthcare's unique combination of legacy systems, sensitive data, and operational pressure makes it one of the most challenging sectors to defend.


Testing that satisfies the FCA and protects your clients.

We deliver penetration testing, <a href="/penetration-testing/pci-dss">PCI DSS assessments</a>, and <a href="/cyber-essentials">Cyber Essentials certification</a> for financial services firms across the UK. Our reports are designed for regulatory submission and our testing targets the specific threats your sector faces.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles