Incident Analysis

Tesco Bank Cyber Attack: How 9,000 Accounts Were Drained and the £16.4M FCA Fine That Followed

On the weekend of 5–6 November 2016, attackers drained £2.26 million from 9,000 Tesco Bank current accounts in a single overnight attack. It was the first cyber-enabled mass fraud against a UK retail bank, and the FCA's response set a precedent that every regulated firm must understand: in 2018, Tesco Bank was fined £16.4 million — not because the attack was unforeseeable, but because the bank's defences were inadequate and its incident detection and response were too slow. The fine was not for the fraud. The fine was for the failure to have controls proportionate to a foreseeable risk.

FCA fined Tesco Bank £16.4M in 2018 — 9,000 accounts drained of £2.26M overnight in November 2016. The largest cyber-related fine in UK financial services at the time.

What Happened: The Attack Sequence

The November 2016 attack exploited vulnerabilities in Tesco Bank's debit card system that the FCA subsequently determined should have been identified and remediated. The key events:

  • Saturday 5 November: Attackers initiated fraudulent transactions across 9,000 accounts, predominantly using contactless and online payment channels
  • The transactions appeared in the bank's systems during Saturday night — but monitoring and response were inadequate to detect the pattern at scale in real time
  • By Sunday morning, £2.26M had been drained. Tesco Bank halted online transactions for all 136,000 current account holders — affecting innocent customers for days
  • The FCA investigation revealed the attack used a vulnerability in the bank's algorithm for generating debit card numbers that had been previously flagged but not remediated
  • The vulnerability was not new — similar attacks had been seen in other markets. Tesco Bank had not assessed whether the same attack methodology applied to its own card system

Why the FCA Fined Tesco Bank

The FCA's Final Notice (October 2018) made clear that the fine was not for suffering a cyber attack — attacks are foreseeable in financial services. The FCA found that Tesco Bank:

  • Failed to exercise due skill, care and diligence in the design of its debit card algorithm — the vulnerability that attackers exploited was an identifiable weakness
  • Had inadequate fraud detection systems that failed to identify and block the pattern of fraudulent transactions as they occurred at scale overnight
  • Failed to implement adequate controls that would have detected and limited the fraud in real time rather than only after significant losses had accumulated
  • Took too long to respond once the fraud was identified — the response delay increased losses and customer impact
  • FCA Principle 2 (due skill, care and diligence) and FCA Principle 6 (treating customers fairly) were both violated

The Regulatory Precedent: What Every Firm Must Understand

The Tesco Bank case established several principles that the FCA has applied consistently since 2018. First, foreseeable attack vectors that are not mitigated are a regulatory failure, not just a technical gap. Second, incident detection capability — real-time monitoring of transaction patterns — is an expected control, not an optional enhancement. Third, the speed of incident response is assessed: firms that detect an incident hours after it begins and respond slowly face additional regulatory sanction. Fourth, the FCA takes the view that firms serving retail customers must implement controls that protect those customers from foreseeable fraud. The bank bears this obligation even when the fraud is technically sophisticated.

What Controls Would Have Prevented or Limited the Attack

With the benefit of the FCA's investigation, several controls emerge as directly relevant to preventing or limiting the Tesco Bank attack:

  • Card algorithm security review: Independent assessment of debit card number generation for known attack patterns — a specific control that Tesco Bank did not have in place
  • Real-time transaction monitoring: Anomaly detection across all accounts capable of identifying a coordinated attack pattern overnight — not just individual transaction fraud alerts
  • Velocity rules: Automated blocks on abnormal transaction patterns per account and across the portfolio — preventing mass drainage before losses accumulate
  • Incident response testing: Tested escalation procedures for overnight and weekend incidents — Tesco Bank's response was slow partly due to gaps in out-of-hours escalation
  • Threat intelligence: Awareness of similar attacks in other markets — the attack methodology was not novel; it had been seen elsewhere and should have been on Tesco Bank's radar

The Lessons for FCA-Regulated Firms in 2025

Seven years on, the Tesco Bank case is more relevant than ever. The FCA's operational resilience framework (PS21/3) now requires all regulated firms to identify important business services and set impact tolerances — explicitly including protection of retail customers from financial harm. Any firm that processes client payments, holds client money, or operates client accounts must be able to answer: what would happen if our payment systems were attacked overnight? Do we have real-time monitoring? Would we detect it in minutes or hours? What is our escalation procedure at 2am on a Saturday? The FCA expects these questions to have tested, documented answers.

Frequently Asked Questions

Did Tesco Bank customers get their money back?

Yes. Tesco Bank reimbursed all affected customers the £2.26M that was fraudulently taken. The FCA fine of £16.4M was separate from the customer reimbursement — it was a regulatory sanction for the firm's control failures, not compensation for losses. The reimbursement itself was a condition of retaining FCA authorisation and demonstrating that Tesco Bank had treated its customers fairly.

Is the Tesco Bank fine still the benchmark for FCA cyber enforcement?

The £16.4M Tesco Bank fine was the largest FCA cyber-related fine at the time and remains a significant benchmark. Since 2018, the FCA has issued further cyber-related fines and has developed a more detailed operational resilience framework through PS21/3. The principle established in the Tesco Bank case — that the FCA will fine firms not just for suffering attacks but for failing to implement adequate controls — remains the foundation of FCA cyber enforcement.

What does the Tesco Bank case mean for operational resilience compliance?

PS21/3 requires firms to identify important business services and set impact tolerances for disruption. Retail payment processing is a core important business service for any firm that handles client money. The Tesco Bank case illustrates exactly what happens when a firm cannot sustain that service under attack: £16.4M fine, days of service disruption for 136,000 customers, and lasting reputational damage. Firms setting impact tolerances must take account of cyber attack scenarios, not just system outages.

Assess your firm's cyber controls against FCA expectations

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Featured Product

Coro

Learn more

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.