ÃÊ·Ï ¿­±â/´Ý±â ¹öư

±ÝÀ¶ »ê¾÷Àº µðÁöÅÐ Àüȯ°ú ÇÔ²² Ŭ¶ó¿ìµå ȯ°æ µµÀÔ, API ±â¹Ý ¼­ºñ½º È®»ê, ¿ÜºÎ Çù·Â»ç¹× °³¹ß ÀηÂÀÇ »ó½ÃÀû ³»ºÎ¸Á Á¢±Ù µî ±¸Á¶Àû º¯È­¸¦ °Þ°í ÀÖ´Ù. ÀÌ·¯ÇÑ º¯È­´Â ±ÝÀ¶ ¼­ºñ½ºÀÇ È¿À²¼º°ú È®À强À» Á¦°íÇÏ´Â ÇÑÆí, ³»ºÎ¸Á°ú ¿ÜºÎ¸ÁÀÇ °æ°è¸¦ ¾àÈ­½Ã۰í ÇÕ¹ýÀû ±ÇÇÑÀ» ¾Ç¿ëÇÑ ³»ºÎ ÇØÅ· À§ÇùÀ» Çö½ÇÈ­½Ã۰í ÀÖ´Ù. ƯÈ÷ Á¤»ó °èÁ¤°ú ½Ã½ºÅÛ °ü¸® µµ±¸¸¦ Ȱ¿ëÇÏ´Â ±â¼úÀû ³»ºÎ ÇØÅ·Àº ±âÁ¸ÀÇ ¾Ç¼ºÄÚµå Áß½É Å½Áö ü°è³ª »çÈÄ ·Î±× ºÐ¼® ¹æ½ÄÀ¸·Î´ÂÈ¿°úÀûÀÎ ´ëÀÀÀÌ ¾î·Æ´Ù´Â ÇѰ踦 µå·¯³»°í ÀÖ´Ù. ±âÁ¸ ±ÝÀ¶±Ç º¸¾È ü°è´Â SIEM(Security Information and Event Management)À»Áß½ÉÀ¸·Î ÇÑ »çÈÄ Å½Áö ü°è¿Í FDS(Fraud Detection System)¸¦ ÅëÇÑ °Å·¡ ÀÌ»ó ŽÁö¿¡ÁßÁ¡À» µÎ¾î ¿Ô´Ù. ±×·¯³ª ÀÌ·¯ÇÑ Ã¼°è´Â ³»ºÎÀÚ°¡ Á¤»ó ±ÇÇÑÀ» ±â¹ÝÀ¸·Î ¼öÇàÇÏ´Â ±ÇÇÑ»ó½Â, ³»ºÎ È®»ê, Áö¼Ó¼º È®º¸¿Í °°Àº °ø°Ý ´Ü°è¿¡ ´ëÇØ ±¸Á¶ÀûÀΠŽÁö °ø¹éÀ» °¡Áø´Ù. ½ÇÁ¦·Î ³óÇù Àü»ê¸Á ¸¶ºñ »çÅÂ, ¹æ±Û¶óµ¥½Ã Áß¾ÓÀºÇà SWIFT ÇØÅ· »ç°Ç, ±Û·Î¹ú ±ÝÀ¶±â°ü ´ë»óAPT °ø°Ý »ç·Ê µîÀº ³»ºÎ ÇØÅ·ÀÌ Àå±â°£ Àº´ÐµÈ ÈÄ ÇÇÇØ°¡ ¹ß»ýÇÑ ÀÌÈÄ¿¡¾ß ÀÎÁöµÇ¾ú´Ù´Â°øÅëÁ¡À» º¸ÀδÙ. ÀÌ¿¡ º» ¿¬±¸´Â ±ÝÀ¶±Ç ³»ºÎ ÇØÅ·À» ´Ü¼øÇÑ ³»ºÎÀÚ ºÎÁ¤ÇàÀ§°¡ ¾Æ´Ñ, MITRE ATT&CK ÇÁ·¹ÀÓ¿öÅ©·Î ±¸Á¶È­ °¡´ÉÇÑ ±â¼úÀû °ø°Ý ÇàÀ§·Î ÀçÁ¤ÀÇÇÑ´Ù. ³ª¾Æ°¡ ³»ºÎ ÇØÅ· °ø°ÝÀÌ Ç¥ÁØÈ­µÈ Àü¼ú°ú ±â¹ý(TTP)¿¡ µû¶ó ¹Ýº¹ÀûÀ¸·Î ¹ß»ýÇÑ´Ù´Â Á¡¿¡ ÁÖ¸ñÇÏ¿©, ÇØ´ç °ø°Ý ±¸Á¶°¡½ÇÁ¦ ±ÝÀ¶±Ç ³»ºÎ ȯ°æ¿¡¼­ ¼º¸³ °¡´ÉÇÑÁö¸¦ »çÀü¿¡ °ËÁõÇÏ´Â ¼±Á¦Àû ´ëÀÀ ¹æ½ÄÀÇ Çʿ伺À» Á¦±âÇÑ´Ù. º» ¿¬±¸´Â MITRE ATT&CK ±â¹Ý °ø°Ý üÀÎÀ» ÀԷ°ªÀ¸·Î ÇÏ¿©, BAS(Breach and Attack Simulation)¸¦ Ȱ¿ëÇÑ ³»ºÎ ÇØÅ· ¼±Á¦Àû °ËÁõ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦¾ÈÇÑ´Ù. Á¦¾ÈµÈ ÇÁ·¹ÀÓ¿öÅ©´Â °ø°Ý ½Ã³ª¸®¿À ¸ðµ¨¸µ, °ø°Ý ½Ã¹Ä·¹ÀÌ¼Ç ¹× ¿¡¹Ä·¹À̼Ç, À¯È¿ °ø°Ý °æ·Î(Valid Attack Path) ½Äº°, Á¤Ã¥ ¹× ÅëÁ¦ °³¼±, Àç°ËÁõÀ¸·Î À̾îÁö´Â ¼øÈ¯Àû ±¸Á¶¸¦ °¡Áø´Ù. À̸¦ÅëÇØ ±âÁ¸ SIEM¡¤FDS Áß½ÉÀÇ »çÈÄ Å½Áö ü°è¸¦ º¸¿ÏÇϰí, ³»ºÎ ÇØÅ· ¹ß»ý °¡´É¼º ÀÚü¸¦»çÀü¿¡ Á¦°ÅÇÏ´Â ¿¹¹æ Á᫐ º¸¾È ÆÐ·¯´ÙÀÓÀ¸·ÎÀÇ ÀüȯÀ» µµ¸ðÇÑ´Ù. º» ¿¬±¸´Â ±ÝÀ¶±Ç ³»ºÎ ÇØÅ· ´ëÀÀÀ» ±â¼úÀûÀ¸·Î Á¤ÀÇ¡¤°ËÁõ¡¤°³¼± °¡´ÉÇÑ ¿µ¿ªÀ¸·Î È®ÀåÇÏ¿´´Ù´Â Á¡¿¡¼­ ÇмúÀû ÀÇÀǸ¦ °¡Áö¸ç, µ¿½Ã¿¡ ±ÝÀ¶È¸»ç º¸¾È ¿î¿µ ¹× ÄÄÇöóÀ̾𽺠ÀÌÇà¿¡½ÇÁúÀûÀÎ ½Ã»çÁ¡À» Á¦°øÇÑ´Ù.

As financial institutions undergo rapid digital transformation, the expansion of cloud infrastructure, API-based services, and continuous access by external vendors and developers have fundamentally altered traditional security boundaries. While these changes enhance operational efficiency, they also increase exposure to internal hacking threats that exploit legitimate credentials and system management tools. Such technical internal hacking attacks are particularly difficult to detect using conventional malware-focused or reactive security monitoring approaches. Existing security architectures in the financial sector primarily rely on SIEM for post-event log analysis and FDS for detecting anomalous financial transactions. However, these systems exhibit structural limitations in identifying technical attack stages such as privilege escalation, lateral movement, and persistence when conducted through valid accounts and trusted administrative tools. Major financial incidents, including the NH Bank system outage and the Bangladesh Bank SWIFT heist, demonstrate that internal hacking activities often remain undetected until significant damage has already occurred. This study redefines internal hacking threats in the financial sector as structured technical attacks that can be systematically modeled using the MITRE ATT&CK framework. Based on the observation that such attacks follow repeatable tactics, techniques, and procedures (TTPs), this research argues for a proactive security approach that validates the feasibility of attack paths before real-world exploitation occurs. To address this challenge, the study proposes a proactive internal hacking validation framework utilizing Breach and Attack Simulation (BAS). The proposed framework consists of ATT&CK-based attack scenario modeling, controlled simulation and emulation of attack behaviors, identification of valid attack paths, remediation and policy optimization, and continuous re-validation. Rather than replacing existing SIEM and FDS infrastructures, the framework enhances their effectiveness by feeding empirically validated insights back into security controls. The proposed approach shifts financial security operations from reactive detection to proactive validation, enabling organizations to eliminate structurally viable attack paths in advance. This study contributes to academic research by extending the conceptual scope of insider threats and offers practical implications for improving security governance and compliance in financial institutions.



Ű¿öµå¿­±â/´Ý±â ¹öư

, , , , , , , ,
, ,

Internal Hacking, Insider Threat, MITRE ATT&CK, Breach and Attack, Simulation, Proactive Security, Financial Security, SIEM, FDS, Attack, Validation