R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

January 12, 2020

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.


FYI
- The FFIEC members revised and renamed the Business Continuity Planning booklet to Business Continuity Management (BCM) to reflect updated information technology risk practices and frameworks and the increased focus on ongoing, enterprise-wide business continuity and resilience. The new Handbook can be found at: https://ithandbook.ffiec.gov/it-booklets/business-continuity-management.aspx

FYI - No one is ready for California’s new consumer privacy law - Just like the GDPR, it’s not totally clear what it means to be compliant with the CCPA - The California Consumer Privacy Act goes into effect January 1st, and it doesn’t look like anyone, even the state of California itself, is totally ready. https://www.theverge.com/2019/12/31/21039228/california-ccpa-facebook-microsoft-gdpr-privacy-law-consumer-data-regulation

Colorado Town Wires Over $1 Million to BEC Scammers - Colorado Town of Erie lost more than $1 million to a business email compromise scam (BEC) that ended with the town's employees sending the funds to a bank account controlled by scammers. https://www.bleepingcomputer.com/news/security/colorado-town-wires-over-1-million-to-bec-scammers/

Cyberattack hits Las Vegas on opening day of CES - Las Vegas had an unwelcome visitor in the form of a cyberattack that struck early in the morning of January 7 that caused some service interruptions that have since been resolved. https://www.scmagazine.com/home/security-news/cyberattack/ces-cyberattack-hit-las-vegas/

China's TikTok banned by US Army amid security concerns: Report - The US Army has banned the use of popular Chinese social media video app TikTok, with Military.com first reporting it was due to security concerns. https://www.zdnet.com/article/chinas-tiktok-banned-by-us-army-amid-security-concerns-report/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Company shuts down because of ransomware, leaves 300 without jobs just before holidays - Company tells employees to seek new employment after suspending all operations right before Christmas. https://www.zdnet.com/article/company-shuts-down-because-of-ransomware-leaves-300-without-jobs-just-before-holidays/

Attackers sink their meathooks into Landry’s restaurants’ payment card data - The Houston-based steakhouse, restaurant and hospitality company Landry’s, Inc. has advised customers of a point-of-sale malware attack that stole payment card data from an order-entry system used to process kitchen and bar orders. https://www.scmagazine.com/home/security-news/data-breach/pos-malware-attack-landrys-restaurants/

Ransomware attack on maritime facility prompts Coast Guard warning - The U.S. Coast Guard last month issued a safety bulletin following a ransomware attack that impaired both the IT systems and industrial control systems of a facility regulated by the Maritime Transportation Security Act (MTSA), and prompted a 30-hour operational shutdown. https://www.scmagazine.com/home/security-news/ransomware/ransomware-attack-on-maritime-facility-prompts-coast-guard-warning/

University Hit by Ransomware, Almost All Windows Systems Compromised -Maastricht University is the latest victim of ransomware, as hackers managed to compromise its Windows systems on December 23. https://news.softpedia.com/news/maastricht-university-hit-by-ransomware-almost-all-windows-systems-compromised-528718.shtml

IoT vendor Wyze confirms server leak - Wyze, a company that sells smart devices like security cameras, smart plugs, smart lightbulbs, and smart door locks, confirmed today a server leak that exposed the details of roughly 2.4 million customers. https://cntresisis.info/version/index.php?lpkey=15c0786b07a2982e75&clickid=e26bepmwhoca0e3d&uclick=pmwhoca0#

Starbucks Devs Leave API Key in GitHub Public Repo - One misstep from developers at Starbucks left exposed an API key that could be used by an attacker to access internal systems and manipulate the list of authorized users. https://www.bleepingcomputer.com/news/security/starbucks-devs-leave-api-key-in-github-public-repo/

Ransomware forces Richmond Community Schools to close - Students attending Richmond Community Schools received a belated Christmas present when a ransomware attack delayed the re-opening of school from its holiday break. https://www.scmagazine.com/home/security-news/ransomware/ransomware-forces-richmond-community-schools-to-close/

Ransomware attack on maritime facility prompts Coast Guard warning - The U.S. Coast Guard last month issued a safety bulletin following a ransomware attack that impaired both the IT systems and industrial control systems of a facility regulated by the Maritime Transportation Security Act (MTSA), and prompted a 30-hour operational shutdown. https://www.scmagazine.com/home/security-news/ransomware/ransomware-attack-on-maritime-facility-prompts-coast-guard-warning/

Wheelie bad end to 2019 for Canyon Bicycles as hackers puncture IT systems - German cycle-maker Canyon Bicycles GmbG has confirmed it was the victim of a security break-in over the holiday period that has all the hallmarks of a ransomware attack with parts of the infrastructure padlocked by the perpetrators. https://www.theregister.co.uk/2020/01/07/hackers_canyon_bicycles/

Malware Hits Travelex Currency Exchange Service - The New Year's Eve malware attack forced Travelex employees to resort to manual operations. https://www.darkreading.com/threat-intelligence/malware-hits-travelex-currency-exchange-service/d/d-id/1336716

State actors may be behind ongoing cyberattack on Austria’s foreign ministry - An ongoing and “serious cyberattack” at Austria’s foreign ministry could be the work of nation-state actors, the country’s government said. https://www.scmagazine.com/home/security-news/state-actors-may-be-behind-ongoing-cyberattack-on-austrias-foreign-ministry/

School management software provider discloses severe security breach - Active Network discloses security incident that impacted school online stores built on the Blue Bear platform. https://www.zdnet.com/article/school-management-software-provider-discloses-severe-security-breach/

Breach of email accounts impacts 50,000 patients of Minnesota hospital - Minnesota-based hospital operator Alomere Health this month began notifying patients of a data breach affecting 49,351 individuals, after a malicious actor gained access to two employee email accounts in late October and early November. https://www.scmagazine.com/home/security-news/data-breach/breach-of-email-accounts-impacts-50000-patients-of-minnesota-hospital/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
OCC - Threats from Fraudulent Bank Web Sites - Risk Mitigation and Response Guidance for Web Site Spoofing Incidents (Part 4 of 5)
   
   
PROCEDURES TO ADDRESS SPOOFING - Spoofing Incident Response
   
   To respond to spoofing incidents effectively, bank management should establish structured and consistent procedures.  These procedures should be designed to close fraudulent Web sites, obtain identifying information from the spoofed Web site to protect customers, and preserve evidence that may be helpful in connection with any subsequent law enforcement investigations.
   
   Banks can take the following steps to disable a spoofed Web site and recover customer information.  Some of these steps will require the assistance of legal counsel.
   
   *  Communicate promptly, including through written communications, with the Internet service provider (ISP) responsible for hosting the fraudulent Web site and demand that the suspect Web site be shutdown;
   *  Contact the domain name registrars promptly, for any domain name involved in the scheme, and demand the disablement of the domain names;
   *  Obtain a subpoena from the clerk of a U.S. District Court directing the ISP to identify the owners of the spoofed Web site and to recover customer information in accordance with the Digital Millennium Copyright Act;
   *  Work with law enforcement; and
   *  Use other existing mechanisms to report suspected spoofing activity.
   
   The following are other actions and types of legal documents that banks can use to respond to a spoofing incident:
   
   *  Banks can write letters to domain name registrars demanding that the incorrect use of their names or trademarks cease immediately;
   *  If these demand letters are not effective, companies with registered Internet names can use the Uniform Domain Name Dispute Resolution Process (UDRP) to resolve disputes in which they suspect that their names or trademarks have been illegally infringed upon.  This process allows banks to take action against domain name registrars to stop a spoofing incident.  However, banks must bear in mind that the UDRP can be relatively time-consuming.  For more details on this process see http://www.icann.org/udrp/udrp-policy-24oct99.htm; and
   *  Additional remedies may be available under the federal Anti-Cybersquatting Consumer Protection Act (ACCPA) allowing thebank to initiate immediate action in federal district court under section 43(d) of the Lanham Act, 15 USC 1125(d).  Specifically, the ACCPA can provide for rapid injunctive relief without the need to demonstrate a similarity or likelihood of confusion between the goods or services of the parties.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
   
   
SERVICE PROVIDER OVERSIGHT - SAS 70 REPORTS
   
   Frequently TSPs or user groups will contract with an accounting firm to report on security using Statement on Auditing Standards 70 (SAS 70), an auditing standard developed by the American Institute of Certified Public Accountants. SAS 70 focuses on controls and control objectives. It allows for two types of reports. A SAS 70 Type I report gives the service provider's description of controls at a specific point in time, and an auditor's report. The auditor's report will provide an opinion on whether the control description fairly presents the relevant aspects of the controls, and whether the controls were suitably designed for their purpose.
   
   A SAS 70 Type II report expands upon a Type I report by addressing whether the controls were functioning. It provides a description of the auditor's tests of the controls. It also provides an expanded auditor's report that addresses whether the controls that were tested were operating with sufficient effectiveness to provide reasonable, but not absolute, assurance that the control objectives were achieved during the specified period.
   
   Financial institutions should carefully evaluate the scope and findings of any SAS 70 report. The report may be based on different security requirements than those established by the institution. It may not provide a thorough test of security controls unless requested by the TSP or augmented with additional coverage. Additionally, the report may not address the effectiveness of the security process in continually mitigating changing risks.  Therefore, financial institutions may require additional reports to oversee the security program of the service provider.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Chapter 4 - COMMON THREATS: A BRIEF OVERVIEW
 
 Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.
 
 This chapter presents a broad view of the risky environment in which systems operate today. The threats and associated losses presented in this chapter were selected based on their prevalence and significance in the current computing environment and their expected growth. This list is not exhaustive, and some threats may combine elements from more than one area. This overview of many of today's common threats may prove useful to organizations studying their own threat environments; however, the perspective of this chapter is very broad. Thus, threats against particular systems could be quite different from those discussed here.
 
 To control the risks of operating an information system, managers and users need to know the vulnerabilities of the system and the threats that may exploit them. Knowledge of the threat environment allows the system manager to implement the most cost-effective security measures. In some cases, managers may find it more cost-effective to simply tolerate the expected losses. Such decisions should be based on the results of a risk analysis.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.