Hacker-Hedge Funds, Hiding in Plain Sight

Pairing cyber with insider trading is a nasty business, and apparently not always a profitable one.

bourgaize-murray

Earlier this year, Waters published an entire issue dedicated to cyber crime — and with the US government considering sanctions against China for a recent uptick in breaches, the subject is worth revisiting once again.

Reporting in the last month has also shown that a number of hedge fund traders, using illicit means to gain non-public data on listed companies, traded on inside information using contracts-for-difference (CFDs), instruments that would potentially obscure the crime ... or so they thought.

The US Securities and Exchange Commission announced this week the results of an investigation into the matter, with punitive fines (relative to profits) in the millions levied against a number of small hedge funds found to be executing that new classic trick: the hack-and-trade.

I point this out for a couple reasons. First, these weren't bankers or sales traders who are usually in the enforcement crosshairs; nor are the crimes of the typical white-collar, headline-making variety, like the botched SAC Capital insider trading case.

Instead, they're murky hedge funds — several of which possess connections to one of hacking's great meccas, Ukraine.

This year we've heard multiple times that trading algorithms are being hacked and either manipulated or lifted for ransom ... so it's not too difficult to imagine a hacker of that sophistication breaking into a company's files (or its private equity parent's systems) undetected, looking for quarterly performance numbers a day or two early.

Second, Waters has organized a special cyber briefing next week. Investment management representation for this one is strong, with mainstay firms Lazard, Pine River Capital, New York Life, Mackay Shields, and Blackstone all joining us for the discussion. Evidence enough, then, that cyber is an issue on the buy side as much as it is anywhere else in financial services. [Other end-users are still welcome to register if they're interested.]

Raising the Stakes

Why is this particular case important?

Well, to start with, it demonstrates the evolution of cyber — and not just in the sense that investment managers are now aware of it, whether as targets or (these days) participating in it.

For our dedicated issue this spring, I profiled Blackstone CISO Jay Leek, and one of his strongest points was around the changing nature of the threat his firm faces.

It's not an enemy looking to make a political point with a disruption or ruin some hardware, so much as one stealthily trolling around for actionable information.

Indeed, this year we've heard multiple times that trading algorithms are being hacked and either manipulated or lifted for ransom ... so it's not too difficult to imagine a hacker of that sophistication breaking into a company's files (or its private equity parent's systems) undetected, looking for quarterly performance numbers a day or two early.

So far as the CFDs are concerned, the case also illustrates the lengths traders are willing to go in their attempts at masking these crimes.

Insider trading, of course, has long been a securities law violation in search of genuine definition — the SAC case demonstrated that.

But once it is detected, stealing information electronically (as opposed to, say, overhearing a CFO whispering to a colleague) is a fairly black-and-white case. While the hackers had no problem heisting the information, it seems that this time around, sloppiness on the part of hedge fund owners and their method of actually procuring the information broke the investigation open.

Mild Relief ... For Now

The contour of this case will do nothing to dissuade CISOs of the need to modernize their cyber defenses. Hopefully another finance-meets-cyber headline gets their board members' attention. Meanwhile, for those who worry about the regulators' ability to uncover these kinds of crimes, it comes as perhaps is a mild relief.

But ultimately, it leaves me wondering: if these are the lengths bad actors are willing to go — combining not one but two lurid activities in an attempt at securing a windfall, what's next?

To what extent is cyber going to be at the heart of financial crime of all kinds in 2020, and should we be thinking about ways of dealing with it now, rather than waiting for the other shoe to drop?

  

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe

You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.

Systematic tools gain favor in fixed income

Automation is enabling systematic strategies in fixed income that were previously reserved for equities trading. The tech gap between the two may be closing, but differences remain.

Why recent failures are a catalyst for DLT’s success

Deutsche Bank’s Mathew Kathayanat and Jie Yi Lee argue that DLT's high-profile failures don't mean the technology is dead. Now that the hype has died down, the path is cleared for more measured decisions about DLT’s applications.

You need to sign in to use this feature. If you don’t have a WatersTechnology account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here