Cybercriminals Pose Threat via Executive Accounts

Executives’ workplace retirement plan accounts provide the authority and access hackers need to attack other databases.

Frank Bitzer

Cybercriminals use computers to target the “top of the organizational pyramid” at workplaces, probing executives’ accounts for weak points, according to a cybersecurity expert focused on the employer-sponsored retirement plan market.

As news reports reinforce on an almost weekly basis, hackers can attack everything from internal databases to benefit plans. But while criminals may infiltrate a wide variety of corporate assets, defined contribution and pension plans are particularly attractive due to the significant sums of money involved, says Frank Bitzer, the national director of ERISA consulting at Marsh McLennan Agency.

Want the latest retirement plan adviser news and insights? Sign up for PLANADVISER newsletters.

“They know that top executives have authority and access to other accounts, and then they burrow down from there,” Bitzer says. “Once they’re in, they can go after everything.”.

These vulnerabilities may arise from easy-to-guess passwords, poor IT security practices or outdated firewalls, he notes. Once hackers gain access to an executive’s account, they can infiltrate the corporation’s broader systems.

“They prefer pension plans over individual 401(k) plans for the simple reason that pension plans have fewer accounts to break into,” Bitzer notes. “Once those accounts are broken into, there are larger dollar amounts seen in those accounts.”

But 401(k) accounts are not immune either. A common vulnerability lies in incomplete participant profiles, Bitzer warns.

Many employees fail to fill out their online 401(k) profiles or neglect to create strong, secure passwords. Hackers exploit these gaps, filling in missing information and locking participants out of their own accounts before siphoning funds through transfers or in-service distributions.

Global Scale

One of the key challenges facing cybersecurity professionals is the global nature of these attacks, Bitzer says. Hackers from regions including Russia, Southeast Asia, Africa and the Middle East are increasingly targeting U.S. corporations. Given their international origins, local, state and federal authorities face significant challenges in pursuing and prosecuting these attackers.

“They’re practically on every continent,” Bitzer says. “There are bases of hackers attacking American corporations.”

Contrary to popular belief, hackers do not always target only the largest corporations. While high-profile firms, particularly Fortune 500 companies, often find themselves in the crosshairs, smaller companies are just as vulnerable, he says. As with larger companies, many hackers try to exploit security weaknesses in key executives’ accounts.

Total DC assets provide a tempting pool of money, representing about $10.4 trillion in total, according to the 2024 Recordkeeping Survey by PLANSPONSOR, a sister publication of PLANADVISER. Meanwhile, vulnerability persists, as only 27% of plan sponsors had implemented a formal cybersecurity policy, according to the most recent Plan Sponsor Council of America’s “65th Annual Survey of Profit Sharing and 401(k) Plans,” which includes data from the 2022 plan year.

To combat these threats, Bitzer stresses the importance of proactive measures. He encourages participants to regularly check and complete their online 401(k) profiles, select strong passwords and monitor their accounts at least quarterly, if not monthly.

“I cannot stress enough that plan sponsors and service providers just have to beat this drum with a lot of consistency,” he says. “If you are a participant and you have an online account, please fill it out completely and monitor it.”

It is clear that hackers are becoming increasingly sophisticated in their approach to breaching corporate defenses, and no organization is too big or too small to be immune.

Fidelity to Limit Third-Party Credential-Sharing for 401(k) Access

Fidelity will soon block financial advisers from using third-party fintech services to access clients’ workplace plans.

Fidelity Investments will soon stop financial advisers from managing participant’s defined contribution assets via third-party technology providers without plan sponsor oversight, according to a security update.

In the update posted Friday, Fidelity wrote that it is seeking to protect customer information by soon blocking third-party financial technology firms that let DC plan participants give their financial advisers account credentials. The firm noted that it does support financial advisers who advise clients on their employer-sponsored retirement accounts with plan sponsor oversight. 

“Fidelity is announcing that the company will begin taking steps to prevent platforms reliant on credential sharing from accessing and taking action in customer accounts held at Fidelity,” it wrote. “This change is with customers’ best interests in mind to enhance security and reduce customer data exposure.”

Fidelity did not name any firms in the post, but referred to third-party financial firms who allow advisers to trade within an employer-sponsored account with participant approval. Financial Advisor IQ originally reported the news.

Never miss a story — sign up for PLANADVISER newsletters to keep up on the latest retirement plan adviser news.

Fidelity makes the move after a trend has started of financial advisers offering clients the ability to manage their 401(k) or other recordkept assets alongside other investments. Pontera has been the most prominent firm in this space, partnering with registered investment advisories to offer DC plan advisement to clients. The firm has held fundraising rounds totaling at least $160 million, and penned deals with firms including Ameritas, OneDigital, SageView Advisory Group and many more.

“Safety and security are core to our company,” a Pontera spokesperson says in response to Fidelity’s statement. “We are committed to helping Americans make the most of their retirement savings. We maintain strong relationships with recordkeepers and aim to partner with them to deliver the best outcomes for our shared customers.”

Future Capital is another player in the space, though their model until recently has been to manage the RIA advisement for financial adviser partners; as of June it also started offering a direct line to plan management. The firm declined to comment on Fidelity’s announcement.

Largest Recordkeeper

Fidelity is the country’s largest DC recordkeeper by both participants (31.7 million) and assets ($3.5 trillion), according to the PLANSPONSOR 2024 Recordkeeping Survey; PLANSPONSOR is a sister publication of PLANADVISER.

The following largest recordkeepers by assets, Empower, Alight Solutions and Vangaurd did not immediately respond to request for comment about advisers use of third-party DC management systems.

Fidelity said the changes will be “minimally disruptive to participants,” but noted that participants may need to tell their financial adviser about the change, as “accounts may no longer be accessible by advisers via certain third-party platforms.”

The recordkeeper said it is seeking to protect participants from security risks from sharing credentials, particularly when it comes to executing trades for their accounts.

”The financial advisers that have chosen to work with these third-party fintechs have done so independent of their relationship with Fidelity,” a Fidelity spokesperson said via email. “The fintechs in question use credential sharing to access and take action on employer-sponsored retirement accounts without plan sponsor oversight. This type of credential sharing is misaligned with Fidelity’s core principles and beliefs. Fidelity works in partnership to support many advisers who securely advise on employer-sponsored retirement accounts with plan sponsor oversight.” 

The move also follows a change Fidelity made in 2023 to try and stop “screen scraping” by third-party financial service providers. In that case, the firm noted it was seeking to protect customer data by having them use Fidelity’s standardized application programming interface, or API, to access customer accounts.

Security Concerns

Sean Kelly, a financial adviser and vice president with Heffernan Financial Services, says when he saw the letter Fidelity was sending to plan sponsors concerning the change, he saw it as a positive in protecting participant data.

“I saw this as in the best interest of the participant in terms of protecting them from the potential risks that come through sharing credentials,” Kelly says.

The adviser notes that, when considering the various potential hacks and cybersecurity concerns for plan fiduciaries, it makes sense that Fidelity would be concerned with third parties accessing plan participant accounts; he notes having considered similar third-party management programs and declining to use them in part due to security concerns.

Steve Boms, president of Allon Advocacy LLC and executive director of the Financial Data and Technology Association [of which Pontera is a member], takes an opposing view, calling the move by Fidelity similar to security concerns expressed by the banking industry years ago.

He says around 2016, banks sought to block access to consumer data firms third-party financial firms for security issues. Fast-forward to today, and many banks have set up an API for those third-party providers to ensure a secure connection to consumer information.

“There are ways to facilitate this access safely and securely if, at the end of the day, the goal is for stakeholders to have an adviser manage their 401(k) portfolios,” he says. “In the traditional banking world, all of this tension has for the most part been worked out through industry cooperation and coordination. And all of that was done in a heavily regulated environment due in large part to consumer demand for the services.”

Boms notes that the Consumer Financial Protection Bureau is scheduled to soon issue rulemaking regarding Personal Financial Data Rights that requires banks to make third-party services available to consumers regarding their own accounts. Those same rules also do note security concerns around sharing credentials and screen scraping.

«