The Role of Threat Intelligence in Preventing Financially Motivated Cyberattacks

Authors

  • Sanjida Alam Eshra Trine University, USA Author
  • Fatema Tuz Zohora Wilmington University, USA Author
  • Sonia Akter Mercy University, USA Author
  • Iftekhar Rasul St. Francis College, USA Author
  • Amjad Hossain Mercy University, USA Author

Keywords:

Threat intelligence, Financially Motivated Cyberattacks, Cybersecurity, Collaboration, Artificial Intelligence, U.S. Organizations, Cyber Defense, Organizational Factors

Abstract

The escalating prevalence of financially motivated cyberattacks poses critical risks to global financial institutions, driving urgent demand for proactive defense mechanisms (Haruna et al., 2022). This study employs a quantitative analysis of cyber incidents (2018-2023) across 50 financial entities to evaluate the efficacy of threat intelligence (TI) in mitigating attacks. We develop a predictive logistic model to assess breach probability, offering a robust framework for risk assessment in an increasingly digital financial landscape. Our analysis correlates TI maturity with 33.7% reduced breach likelihood (p < 0.01) and 28% faster incident response. The model further quantifies how regulatory compliance (e.g., GDPR/PSD2) and advanced authentication mechanisms amplify TI’s protective effect (Ali et al., 2024). Results demonstrate that institutions with TI maturity > 0.8 experienced ≥45% lower financial losses versus peers (p = 0.003). This research provides a validated framework for financial entities to prioritize TI investments, optimize cyber-resilience, and preempt evolving threats (Bouveret, 2018; Moon et al., 2022). To enhance the model’s applicability, we incorporated additional variables such as the frequency of security audits, the diversity of threat intelligence feeds and the integration of artificial intelligence-driven analytics. These factors significantly bolster the predictive power, enabling institutions to anticipate emerging threats with greater precision. Furthermore, the study highlights the importance of continuous training for cybersecurity teams, ensuring they can effectively leverage TI tools in real-time scenarios. The analysis also considers the impact of geopolitical factors and economic conditions, which can influence the sophistication and frequency of cyberattacks. By addressing these multifaceted dimensions, the framework offers a comprehensive approach to cybersecurity strategy development. Future research could explore the long-term effects of TI adoption on organizational culture and the scalability of the model across different sectors, providing a broader perspective on global cyber defense.

References

[1] N. H. Al-Kumaim and S. K. Alshamsi, "Determinants of cyberattack prevention in UAE financial organizations: assessing the mediating role of cybersecurity leadership," Appl. Sci., vol. 13, no. 10, p. 5839, 2023.

[2] A. Alqudhaibi, M. Albarrak, A. Aloseel, S. Jagtap, and K. Salonitis, "Predicting cybersecurity threats in critical infrastructure for industry 4.0: a proactive approach based on attacker motivations," Sensors, vol. 23, no. 9, p. 4539, 2023.

[3] N. Banerjee, "Exploring the future of AI in cyber threat intelligence," in AI-Enabled Threat Intelligence and Cyber Risk Assessment, CRC Press, 2025, pp. 126–148.

[4] D. A. Brooks, Cyber Threat Intelligence Driven Phishing Awareness Programs: A Qualitative Exploratory Study, Capitol Technology University, 2023.

[5] M. Colajanni and M. Marchetti, "Cyber-attacks and defenses: current capabilities and future trends," in Technology and International Relations, Edward Elgar Publishing, 2021, pp. 132–151.

[6] B. Cinar, "Cyber threat intelligence: Current trends and future perspectives," J. Eng. Res. Rep., vol. 25, no. 4, pp. 91–105, 2023.

[7] G. Cascavilla, "The rise of cybercrime and cyber-threat intelligence: Perspectives and challenges from law enforcement," IEEE Secur. Priv., vol. 23, no. 1, pp. 17–26, 2024.

[8] Y. Arafat, "Business Intelligence as a Strategic Asset: Measuring Its Role in Enhancing US National Interests across Defense, Trade, and Cyber Domains," J. Bus. Insight Innov., vol. 4, no. 1, pp. 1–20, 2025.

[9] O. Eltayeb, "The Crucial Significance of Cyber Threat Intelligence in Mitigating Cyber Attacks," J. Ecohumanism, vol. 3, no. 4, pp. 2422–2434, 2024.

[10] F. Fatima, A Qualitative Exploratory Study of Cyber Threats to Financial Organizations, University of the Cumberlands, 2024.

[11] E. Gaitan, Developing and Sharing Threat Intelligence: Strategies for Small and Medium-Sized Businesses, Doctoral dissertation, Capella University, 2022.

[12] M. A. Joyner, Strategies Using Threat Intelligence to Detect Advanced Persistent Threats: A Qualitative Case Study, Doctoral dissertation, Walden University, 2022.

[13] I. Alim, "The impact of Artificial Intelligence on the accounting profession: technological advancements and employment perspectives," Int. J. Sci. Res. Arch., vol. 15, no. 3, pp. 1173–1187, 2025. DOI: 10.30574/ijsra.2025.15.3.1873

[14] M. O. Ijiga, H. S. Olarinoye, F. A. B. Yeboah, and J. N. Okolo, "Integrating Behavioral Science and Cyber Threat Intelligence (CTI) to Counter Advanced Persistent Threats (APTs) and Reduce Human-Enabled Security Breaches," Int. J. Sci. Res. Mod. Technol., vol. 4, no. 3, pp. 1–15, 2025.

[15] M. Danish and M. M. Siraj, "AI and Cybersecurity: Defending Data and Privacy in the Digital Age," J. Eng. Comput. Intell. Rev., vol. 3, no. 1, pp. 25–35, 2025.

[16] Z. Lanz, "Cybersecurity risk in US critical infrastructure: An analysis of publicly available US government alerts and advisories," Int. J. Cybersecurity Intell. Cybercrime, vol. 5, no. 1, pp. 43–70, 2022.

[17] A. Shaheen, "Cybersecurity in the Modern Era: An Overview of Recent Trends," J. Eng. Comput. Intell. Rev., vol. 1, no. 1, pp. 39–50, 2023.

[18] V. Mavroeidis, R. Hohimer, T. Casey, and A. Jesang, "Threat actor type inference and characterization within cyber threat intelligence," in Proc. 2021 13th Int. Conf. Cyber Conflict (CyCon), 2021, pp. 327–352.

[19] E. R. Ndukwe and B. Baridam, "A graphical and qualitative review of literature on AI-based cyber-threat intelligence (CTI) in banking sector," Eur. J. Eng. Technol. Res., vol. 8, no. 5, pp. 59–69, 2023.

[20] I. V. Patel, The Necessity of Cyber Threat Intelligence, Master's thesis, Utica College, 2021.

[21] N. Rahimi and H. Jones, "Cyber Warfare: Strategies, Impacts and Future Directions in the Digital Battlefield," J. Inf. Secur., vol. 16, no. 2, pp. 252–269, 2025.

[22] N. Arshad, "A Comprehensive Review of Emerging Challenges in Cloud Computing Security," J. Eng. Comput. Intell. Rev., vol. 2, no. 1, pp. 27–37, 2024.

[23] M. Z. Afshar and D. M. H. Shah, "Strategic evaluation using PESTLE and SWOT frameworks: Public sector perspective," ISRG J. Econ. Bus. Manag., vol. 3, pp. 108–114, 2025.

[24] N. Sun et al., "Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives," IEEE Commun. Surv. Tutor., vol. 25, no. 3, pp. 1748–1774, 2023.

[25] M. Z. Afshar and M. H. Shah, "A Narrative Review for Revisiting BCG Matrix Application in Performance Evaluation of Public Sector Entities," J. Res. Rev., vol. 2, no. 2, pp. 325–337, 2025.

[26] M. Tahmasebi, "Beyond defense: Proactive approaches to disaster recovery and threat intelligence in modern enterprises," J. Inf. Secur., vol. 15, no. 2, pp. 106–133, 2024.

[27] C. Yatagan, Interaction between the US Intelligence Community and the Private Sector in Sharing Cyber Threat Intelligence, American University, 2022.

[28] M. Asif, M. A. Pasha, A. Mumtaz, and B. Sabir, “Causes of Youth Unemployment in Pakistan”, IJSS, vol. 2, no. 1, pp. 41–50, Mar. 2023.

[29] M. Asif, “Integration of Information Technology in Financial Services and its Adoption by the Financial Sector in Pakistan”, IJSS, vol. 1, no. 2, pp. 23–35, Dec. 2022.

Downloads

Published

05-08-2025

How to Cite

The Role of Threat Intelligence in Preventing Financially Motivated Cyberattacks. (2025). Journal of Engineering and Computational Intelligence Review, 3(2), 20-37. https://jecir.com/index.php/jecir/article/view/24

Share

Similar Articles

1-10 of 24

You may also start an advanced similarity search for this article.