Natwest changes website security following heated exchange with cyber experts

The bank's website wasn't served over an encrypted connection

Natwest bank

Natwest bank has said it will update the security of its website following a heated online exchange with a number of security experts who spotted the vulnerability.

Liam Blizzard, a web developer, found that Natwest's customer-facing website wasn't secure, then security researchers Troy Hunt and Stephen Kellett pointed out that this meant the login link on their website couldn't be trusted.

"The homepage is insecure so you can't trust anything on it. The link to the login page is on it. You can't trust the link to the login page. Make sense?," said Hunt.

Natwest responded with a curt tweet telling Hunt "sorry you feel this way" which in turn prompted Hunt to state that the bank was "fundamentally misunderstanding the technology".

Hunt explained in a blog post that since the website is served over HTTP it's not an encrypted connection and data flowing to and from it can be intercepted, read, and modified, and requests could be redirected to other locations.

Hunt was also frustrated with the fact that although the online banking service, which is linked but separate from Natwest's main site, was secure, an attacker could still intercept the traffic between the two sites and redirect visitors trying to access the online banking service via the homepage from its official address to something similar such as

After publishing the initial blog post, Hunt revealed: "NatWest went and registered that domain in what I assume is an attempt to stop a man in the middle intercepting their traffic and making a visually trivial change to a URL. Alarmingly though, is still available as is and"

A spokesperson for Natwest told IT Pro: "We have now fixed the issue which was affecting some of our customer facing websites. It has now been fixed -- see blog below" and linked to Hunt's blog post.

The bank later added: "Our websites now enforce the HTTPS protocol so that customers visiting the website via either http:// or https:// will be sent to the protected site."

Hunt did praise NatWest's rapid response to the issue, but it still serves to highlight how even some of the largest companies don't always have the processes and oversight in place to ensure their security is up-to-date and resilient to cyber attacks and opportunistic hackers. 

Image source: Shutterstock

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020