Travelex still offline after discovering malware on New Year’s Eve, and other banks’ currency services are also affected

Graham Cluley @gcluley

Travelex still offline after discovering malware on New Year's Eve
On New Year’s Eve foreign currency exchange service Travelex took its systems offline after it discovered a “software virus” (as opposed, presumably, to a common cold) had compromised some of its systems.

The company, which claims to be the world’s largest foreign exchange bureau, is still offline today – as anyone visiting its website can see for themselves:

Travelex website

The holding page, which offers apologies in a variety of languages, has a title of “Purchase Funnel down” – hardly the friendliest customer-facing way to describe the issue, but I guess they have other problems on their plate at the moment.

Email Sign up to our newsletterSign up to Graham Cluley’s newsletter - "GCHQ"
Security news, advice, and tips.

Travelex source

According to BBC News, other banks including Barclays, HSBC, Sainsbury’s Bank, First Direct, and Virgin Money have been unable to offer online currency services due to the problems at Travelex.

The Travelex smartphone app has also suspended while the firm’s IT team attempts to resolve the issue, and purchasers of Travelex’s pre-paid currency cards have been complaining online that they have not been notified that services have been disrupted.

Complaints

Customers needing foreign currency for their overseas trips are being advised to visit a Travelex store in person where staff can conduct transactions manually.

So, we know that the cyber attack against Travelex has been enormously disruptive. But what we don’t know at the moment is the nature of the malware involved – although some are suggesting it is likely to be ransomware-related.

Whatever the nature of the attack, there clearly needs to be a proper investigation as to whether Travelex’s systems were properly resilient and if enough resources were being put into ensuring that systems were being properly secured.

Disturbingly, security researcher Troy Mursch shared on Twitter details of security vulnerabilities he discovered on Travelex’s infrastructure back in September 2019, but for which he claims he never received a response.

Further reading: “Planned maintenance”? Travelex’s masterclass in how not to respond to cyberattack

Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.

Graham Cluley Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy. Follow him on Twitter at @gcluley, or drop him an email.