R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc., the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and onsite FFIEC IT Security Audits

February 4, 2024

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Gold Standard Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Bank regulatory FFIEC IT audits - I perform annual IT audits required by the regulatory agencies for banks and credit unions. I am a former bank examiner over 30 years of IT auditing experience. Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees. All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

Will the movement to ban ransom payments gain steam in 2024? - Policies and regulations around ransomware payments are widely expected to change in 2024, but how and to what effect remains in flux. https://www.cybersecuritydive.com/news/ransom-payment-ban-outlook/705316/

Who pays, and why: A researcher examines the ransomware victim’s mindset - What makes one ransomware victim more likely to pay up than another? That’s what one Dutch researcher set out to find, analyzing national police and incident response data on hundreds of cases over the last four years. https://therecord.media/ransomware-victim-mindset-dutch-study-tom-meurs

Number of breach victims dropped 16% in 2023, but now the bad news… - The good news is the number of individuals impacted by a data breach in 2023 dropped 16% compared to the previous year. The awful news is the number of data compromises is up 78%, a new all-time percentage increase high. https://www.scmagazine.com/news/breach-victims-dropped-16-in-2023-but-now-the-bad-news

AI developers must now report tests results to the government - The Biden EO on AI used Defense Production Act authorities to compel AI developers to report AI safety test results to the Department of Commerce. Such companies must now share this information on the most powerful AI systems - and must report on large computing clusters capable of training these systems. https://www.scmagazine.com/news/4-takeaways-from-biden-administrations-update-to-ai-security-goals

GAO - Agencies Need to Enhance Oversight of Ransomware Practices and Assess Federal Support - Ransomware software that makes data and systems unusable unless ransom is paid - can severely impact government operations and critical infrastructure. https://www.gao.gov/products/gao-24-106221

Artificial Intelligence: GAO's Work to Leverage Technology and Ensure Responsible Use - Artificial intelligence generally refers to computer systems that can solve problems and perform tasks that have traditionally required human intelligence. https://www.gao.gov/products/gao-24-107237

Microsoft fell victim to OAuth attack it issued warning about - Microsoft disclosed it was also victimized by cyberespionage criminals who abused OAuth applications to access protected corporate accounts. https://www.scmagazine.com/news/microsoft-fell-victim-to-oauth-attack-it-issued-warning-about

Canadian Man Sentenced to Prison for Ransomware Attacks - A Canadian involved in numerous ransomware and other types of cyberattacks against businesses, government entities, and individuals in Canada was sentenced last week to two years in prison. https://www.securityweek.com/canadian-man-sentenced-to-prison-for-ransomware-attacks/

In 2024, the cybersecurity industry awaits more regulation - and enforcement - Private sector companies and critical infrastructure providers will face unprecedented demands for product security, intelligence sharing and transparency on data security. https://www.cybersecuritydive.com/news/cyber-enforcement-regulation/706141/

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Over 340,000 Jason’s Deli customers potentially impacted in credential-stuffing attack - Hackers have an unending appetite to steal and then slice and dice personally identifiable information (PII). https://www.scmagazine.com/news/over-340000-jasons-deli-customers-potentially-impacted-in-credential-stuffing-attack

LoanDepot ransomware attack exposes data on almost 17M customers - The number of individuals impacted makes it the most widespread compromise of customer data in the spree of attacks targeting the real estate sector. https://www.cybersecuritydive.com/news/loandepot-ransomware-exposes-17M-people/705169/

HPE joins the 'our executive email was hacked by Russia' club - HPE has become the latest tech giant to admit it has been compromised by Russian operatives. https://www.theregister.com/2024/01/25/hpe_russia_email_attack/

UK water giant admits attackers broke into system as gang holds it to ransom - Southern Water confirmed this morning that criminals broke into its IT systems, making off with a "limited amount of data." https://www.theregister.com/2024/01/23/southern_water_confirms_cyberattack/

Nearly 800 GoAnywhere instances are unpatched, exposed to critical CVE - Although patching lags, the number of hosts with publicly exposed and vulnerable admin interfaces are limited. https://www.cybersecuritydive.com/news/goanywhere-unpatched-critical-CVE/705759/

How a mistakenly published password exposed Mercedes-Benz source code - Mercedes-Benz accidentally exposed a trove of internal data after leaving a private key online that gave “unrestricted access” to the company’s source code, according to the security research firm that discovered it. https://techcrunch.com/2024/01/26/mercedez-benz-token-exposed-source-code-github/

Local governments in Colorado, Pennsylvania and Missouri dealing with ransomware - Multiple local governments are dealing with cyberattacks, including ransomware incidents, this week, causing outages and problems for county hospitals, libraries and other local services. https://therecord.media/local-governments-across-us-dealing-with-ransomware

23andMe: Raw genetic data stolen in months-long cyberattack - 23andMe said raw genomic data and health reports were among the data stolen in a breach lasting between late April and late September 2023. https://www.scmagazine.com/news/23andme-raw-genetic-data-stolen-in-months-long-cyberattack

Schneider Electric hit by ransomware attack against its sustainability business division - Cactus ransomware reportedly claimed credit for the mid-January attack, and the company unit hopes to restore operations in the next couple of days. https://www.cybersecuritydive.com/news/schneider-electric-ransomware-sustainability/706006/

Keenan warns 1.5 million people of data breach after summer cyberattack - Keenan & Associates is sending notices of a data breach to 1.5 million customers, warning that hackers accessed their personal information in a recent cyberattack. https://www.bleepingcomputer.com/news/security/keenan-warns-15-million-people-of-data-breach-after-summer-cyberattack/

Johnson Controls reports $27M hit from ransomware attack - The industrial controls conglomerate said a threat actor stole data and deployed ransomware on its internal IT infrastructure. https://www.cybersecuritydive.com/news/johnson-controls-ransomware-costs/706149/

New Jersey School District Shut Down by Cyberattack - Sunday night, Freehold Township district officials notified its staff and parents that school would not be in session Monday due to technical difficulties caused by a cyber incident. https://www.darkreading.com/vulnerabilities-threats/freehold-township-district-closes-due-to-cyber-incident

Kansas City public transportation authority hit by ransomware - The Kansas City Area Transportation Authority (KCATA) announced it was targeted by a ransomware attack on Tuesday, January 23. https://www.bleepingcomputer.com/news/security/kansas-city-public-transportation-authority-hit-by-ransomware/

Timex breach leaks employee Social Security numbers - Timex Group experienced a data breach that leaked the names and Social Security numbers of more than 3,000 people, the watchmaking company disclosed Monday. https://www.scmagazine.com/news/timex-breach-leaks-employee-social-security-numbers

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue our series on the FFIEC interagency Information Security Booklet.  
   
   SECURITY CONTROLS - IMPLEMENTATION - NETWORK ACCESS   

   
Routing (Part 2 of 2)
   
   Routers and switches are sometimes difficult to locate. Users may install their own devices and create their own unauthorized subnets. Any unrecognized or unauthorized network devices pose security risks. Financial institutions should periodically audit network equipment to ensure that only authorized and maintained equipment resides on their network.
   
   DNS hosts, routers and switches are computers with their own operating system. If successfully attacked, they can allow traffic to be monitored or redirected. Financial institutions must restrict, log, and monitor administrative access to these devices. Remote administration typically warrants an encrypted session, strong authentication, and a secure client. The devices should also be appropriately patched and hardened.
   
   Packets are sent and received by devices using a network interface card (NIC) for each network to which they connect. Internal computers would typically have one NIC card for the corporate network or a subnet. Firewalls, proxy servers, and gateway servers are typically dual-homed with two NIC cards that allow them to communicate securely both internally and externally while limiting access to the internal network.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
   
   SECURITY CONTROLS - IMPLEMENTATION
   

   LOGICAL AND ADMINISTRATIVE ACCESS CONTROL 
   
   The goal of logical and administrative access control is to restrict access to system resources. Access should be provided only to authorized individuals whose identity is established, and their activities should be limited to the minimum required for business purposes. Authorized individuals (users) may be employees, TSP employees, vendors, contractors, customers, or visitors.
   
   An effective control mechanism includes numerous controls to safeguard and limit access to key information system assets. This section addresses logical and administrative controls, including access rights administration and authentication through network, operating system, application, and remote access. A subsequent section addresses physical security controls.
   
   ACCESS RIGHTS ADMINISTRATION (1 of 5)
   
   Action Summary - Financial institutions should have an effective process to administer access rights. The process should include the following controls:
   
   1)  Assign users and system resources only the access required to perform their required functions,
   
   2)  Update access rights based on personnel or system changes,
   
   3)  Periodically review users' access rights at an appropriate frequency based on the risk to the application or system, and
   
   4)  Design appropriate acceptable-use policies and require users to sign them.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 8 - SECURITY AND PLANNING IN THE COMPUTER SYSTEM LIFE CYCLE


8.4 Security Activities in the Computer System Life Cycle

This section reviews the security activities that arise in each stage of the computer system life cycle.

8.4.1 Initiation

The conceptual and early design process of a system involves the discovery of a need for a new system or enhancements to an existing system; early ideas as to system characteristics and proposed functionality; brainstorming sessions on architectural, performance, or functional system aspects; and environmental, financial, political, or other constraints. At the same time, the basic 
security aspects of a system should be developed along with the early system design. This can be done through a sensitivity assessment.


8.4.1.1 Conducting a Sensitivity Assessment


A sensitivity assessment looks at the sensitivity of both the information to be processed and the system itself. The assessment should consider legal implications, organization policy (including federal and agency policy if a federal system), and the functional needs of the system. Sensitivity is normally expressed in terms of integrity, availability, and confidentiality. Such factors as the importance of the system to the organization's mission and the consequences of unauthorized modification, unauthorized disclosure, or unavailability of the system or data need to be examined when assessing sensitivity. To address these types of issues, the people who use or own the system or information should participate in the assessment.

A sensitivity assessment should answer the following questions:

1)  What information is handled by the system? 

2)  What kind of potential damage could occur through error, unauthorized disclosure or modification, or unavailability of data or the system? 

3)  What laws or regulations affect security (e.g., the Privacy Act or the Fair Trade Practices Act)? 

4)  To what threats is the system or information particularly vulnerable? 

5)  Are there significant environmental considerations (e.g., hazardous location of system)? 

6)  What are the security-relevant characteristics of the user community (e.g., level of technical sophistication and training or security clearances)? 

7)  What internal security standards, regulations, or guidelines apply to this system?

The sensitivity assessment starts an analysis of security that continues throughout the life cycle. The assessment helps determine if the project needs special security oversight, if further analysis is needed before committing to begin system development (to ensure feasibility at a reasonable cost), or in rare instances, whether the security requirements are so strenuous and costly that system development or acquisition will not be pursued. The sensitivity assessment can be included with the system initiation documentation either a separate document or as a section of another planning document. The development of security features, procedures, and assurances, described in the next section, builds on the sensitivity assessment.

A sensitivity assessment can also be performed during the planning stagers of system upgrades (for either upgrades being procured or developed in house).  In this case, the assessment focuses on the affected areas. If the upgrade significantly affects the original assessment, steps can be taken to analyze the impact on the rest of the system. For example, are new controls needed? Will some controls become necessary?

The definition of sensitive is often misconstrued. Sensitive is synonymous with important or valuable. Some data is sensitive because it must be kept confidential. Much more data, however, is sensitive because its integrity or availability must be assured. The Computer Security Act and OMB Circular A-130 clearly state that information is sensitive if its unauthorized disclosure, modification (i.e., loss of integrity), or unavailability would harm the agency. In general, the more important a system is to the mission of the agency, the more sensitive it is.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.