R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

February 13, 2022

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

A majority of companies hacked in 2021 did not improve MFA controls following attack - A report released Tuesday by HYPR and Cybersecurity Insiders found that even with ongoing industry efforts to embrace zero-trust, many organizations are still highly exposed to credential attacks because of insufficient multi-factor authentication (MFA) and overall lack of urgency about the seriousness of the threat landscape. https://www.scmagazine.com/news/identity-and-access/a-majority-of-companies-hacked-in-2021-did-not-improve-mfa-controls-following-attack

OpenSSF’s Alpha-Omega Project to target vulnerabilities from beginning to end - The Open Source Security Foundation (OpenSSF) announced Tuesday a new two-track initiative to find vulnerabilities in open-source software. https://www.scmagazine.com/analysis/application-security/openssfs-alpha-omega-project-to-target-vulnerabilities-from-beginning-to-end

Judge moves to dismiss Practicefirst breach lawsuit over lack of ‘actual harm’- A federal judge of the U.S. New York Western District has recommended to support a motion to dismiss a potential class-action lawsuit against Practicefirst, as the breach victims who filed the case did not provide evidence of actual harm, as required by a June Supreme Court decision. https://www.scmagazine.com/analysis/policy/judge-moves-to-dismiss-practicefirst-breach-lawsuit-over-lack-of-actual-harm

HHS to providers: Learn from mistakes made in cyberattack that shut down Ireland health system - The Department of Health and Human Services urges healthcare provider organizations to review key mistakes made by the Ireland Health Service Executive prior to, during, and in response to its months-long network outage brought on by systems hack in mid-2021. https://www.scmagazine.com/analysis/incident-response/hhs-to-providers-learn-from-mistakes-made-in-cyberattack-that-shut-down-ireland-health-system

Microsoft plans to kill malware delivery via Office macros - Microsoft announced today that it will make it difficult to enable VBA macros downloaded from the Internet in several Microsoft Office apps starting in early April, effectively killing a popular distribution method for malware. https://www.bleepingcomputer.com/news/microsoft/microsoft-plans-to-kill-malware-delivery-via-office-macros/

CISA Orders Federal Agencies to Fix Actively Exploited Windows Bug - Feb. 18 is the deadline to patch a bug that affects all unpatched versions of Windows 10 and requires zero user interaction to exploit. https://threatpost.com/cisa-orders-federal-agencies-to-fix-actively-exploited-windows-bug/178270/

Government seizes $3.6 billion in stolen cryptocurrency tied to 2016 hack - The Justice Department announced Tuesday the government seized $3.6 billion in stolen cryptocurrency and the arrest of a Manhattan couple for an alleged conspiracy to launder bitcoin stolen during a 2016 hack of virtual currency exchange Bitfinex. https://www.scmagazine.com/news/cryptocurrency/government-seizes-3-6-billion-in-stolen-cryptocurrency-tied-to-2016-hack

GAO - Critical Infrastructure Protection: Agencies Need to Assess Adoption of Cybersecurity Guidance. https://www.gao.gov/products/gao-22-105103

US banks warned of possible cyberattacks amid Russia-Ukraine tensions - In the wake of widespread reports Wednesday that the European Central Bank (ECB) raised its threat level for cybercrime for banks in Europe, U.S. financial firms may soon be feeling the heat from increasingly more sophisticated nation-state hackers. https://www.scmagazine.com/analysis/cybercrime/us-banks-warned-of-possible-cyberattacks-amid-russia-ukraine-tensions

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Wormhole blockchain bridge taken for more than $300 million - Wormhole, a popular bridge to move cryptocurrency from one blockchain to another, saw 120,000 Ether - approximately $325 million - stolen by hackers in a move that could destabilize the bridge. https://www.scmagazine.com/analysis/cryptocurrency/wormhole-blockchain-bridge-taken-for-more-than-300-million

Cyberattacker hits German service station petrol terminal provider - The company this afternoon confirmed to The Register that Oiltanking GmbH's terminals – which provide Shell service stations, among others – are "operating with limited capacity" and that Mabanaft GmbH had "declared force majeure for the majority of its inland supply activities in Germany." https://www.theregister.com/2022/02/01/oiltrading/

State Department sounds alarm over Red Cross breach - The U.S. State Department said the hack of the International Committee of the Red Cross last month was a “dangerous development” that has harmed the organization’s family re-unification mission. https://www.cyberscoop.com/state-department-red-cross-cybarattack-breach-humanitarian/

UnitedHealthcare tied to RIPTA data theft incident as breach tally rises to 22K - New information has come to light in the ongoing investigation into the Rhode Island Public Transportation Authority (RIPTA), after it was revealed that the data of 5,015 health plan beneficiaries was stolen during an August hack. https://www.scmagazine.com/analysis/breach/unitedhealthcare-tied-to-ripta-data-theft-incident-as-breach-tally-rises-to-22k

More than $4 million stolen in latest bridge cryptocurrency hack - Yet another bridge cryptocurrency has been hacked, making it at least the third such hack in recent weeks. https://www.scmagazine.com/news/cryptocurrency/more-than-4-million-stolen-in-latest-bridge-cryptocurrency-hack

Ireland HSE Cyberattack is a Cautionary Tale For US Healthcare Orgs - The Health Sector Cybersecurity Coordination Center (HC3) encouraged US healthcare organizations to learn from the large-scale May 2021 cyberattack against the Ireland Health Service Executive (HSE) that immobilized the country’s health IT systems and cost hundreds of millions of dollars in recovery efforts. https://healthitsecurity.com/news/ireland-hse-cyberattack-is-a-cautionary-tale-for-us-healthcare-orgs

Dallas ISD cyber breach. And it’s not who you think. - A year and a half before the breach, consultants told DISD its systems were vulnerable, but then COVID hit and it’s unclear if fixes were made. https://www.wfaa.com/article/news/local/investigates/wfaa-reveals-masterminds-behind-dallas-isd-cyber-breach/287-15b22b82-b226-424d-9b27-a7d5b5120ac3 

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
   

   
Sound Practices for Managing Outsourced E-Banking Systems and Services (Part 3 of 3)
   

   4. Banks should ensure that periodic independent internal and/or external audits are conducted of outsourced operations to at least the same scope required if such operations were conducted in-house.
   
   a)   For outsourced relationships involving critical or technologically complex e-banking services/applications, banks may need to arrange for other periodic reviews to be performed by independent third parties with sufficient technical expertise.
   
   5. Banks should develop appropriate contingency plans for outsourced e-banking activities.
   
   a)  Banks need to develop and periodically test their contingency plans for all critical e-banking systems and services that have been outsourced to third parties.
   
   b)  Contingency plans should address credible worst-case scenarios for providing continuity of e-banking services in the event of a disruption affecting outsourced operations.
   
   c)   Banks should have an identified team that is responsible for managing recovery and assessing the financial impact of a disruption in outsourced e-banking services.
   
   6. Banks that provide e-banking services to third parties should ensure that their operations, responsibilities, and liabilities are sufficiently clear so that serviced institutions can adequately carry out their own effective due diligence reviews and ongoing oversight of the relationship.
   
   a)   Banks have a responsibility to provide serviced institutions with information necessary to identify, control and monitor any risks associated with the e-banking service arrangement.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
 
 SECURITY CONTROLS - IMPLEMENTATION - NETWORK ACCESS

 
 Firewall Policy (Part 1 of 3)
 

 A firewall policy states management's expectations for how the firewall should function and is a component of the overall security policy. It should establish rules for traffic coming into and going out of the security domain and how the firewall will be managed and updated. Therefore, it is a type of security policy for the firewall, and forms the basis for the firewall rules. The firewall selection and the firewall policy should stem from the ongoing security risk assessment process. Accordingly, management needs to update the firewall policy as the institution's security needs and the risks change. At a minimum, the policy should address:
 
 ! Firewall topology and architecture,
 ! Type of firewall(s) being utilized,
 ! Physical placement of the firewall components,
 ! Monitoring firewall traffic,
 ! Permissible traffic (generally based on the premise that all traffic not expressly allowed is denied, detailing which applications can traverse the firewall and under what exact circumstances such activities can take place),
 ! Firewall updating,
 ! Coordination with intrusion detection and response mechanisms,
 ! Responsibility for monitoring and enforcing the firewall policy,
 ! Protocols and applications permitted,
 ! Regular auditing of a firewall's configuration and testing of the firewall's effectiveness, and
 ! Contingency planning.
 
 Financial institutions should also appropriately train and manage their staffs to ensure the firewall policy is implemented properly. Alternatively, institutions can outsource the firewall management, while ensuring that the outsourcer complies with the institution's specific firewall policy.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Chapter 18 - AUDIT TRAILS
 
 Audit trails maintain a record of system activity both by system and application processes and by user activity of systems and applications. In conjunction with appropriate tools and procedures, audit trails can assist in detecting security violations, performance problems, and flaws in applications.
 
 Audit trails may be used as either a support for regular system operations or a kind of insurance policy or as both of these. As insurance, audit trails are maintained but are not used unless needed, such as after a system outage. As a support for operations, audit trails are used to help system administrators ensure that the system or resources have not been harmed by hackers, insiders, or technical problems.
 
 This chapter focuses on audit trails as a technical control, rather than the process of security auditing, which is a review and analysis of the security of a system. This chapter discusses the benefits and objectives of audit trails, the types of audit trails, and some common implementation issues.
 
 The Difference Between Audit Trails and Auditing
 
 An audit trail is a series of records of computer events, about an operating system, an application, or user activities. A computer system may have several audit trails, each devoted to a particular type of activity.
 
 Auditing is the review and analysis of management, operational, and technical controls. The auditor can obtain valuable information about activity on a computer system from the audit trail. Audit trails improve the auditability of the computer system. Auditing is discussed in the assurance chapter.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.