R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

April 17, 2022

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

Crisis communications: What organizations should do before a breach - Understanding the technical environment and relationships with stakeholders are the two most important things organizations should have in place during a breach incident, said the CEO of a communications firm specializing in security, privacy and risk organizations. https://www.scmagazine.com/podcast/breach/crisis-communications-what-organizations-should-do-before-a-breach

HHS wants healthcare industry feedback on security practices, penalties - The Department of Health and Human Services is seeking industry feedback on the security practices currently being employed by healthcare-covered entities and business associates, as detailed in the Health Information Technology for Economic and Clinical Health (HITECH) Act. https://www.scmagazine.com/analysis/compliance/hhs-wants-healthcare-industry-feedback-on-security-practices-penalties

Financial fraud shot up 233% last year, account takeover on the rise - It’s no secret that financial fraud has sharply risen during the pandemic over the past couple of years, but a recent report paints an even more disturbing picture. https://www.scmagazine.com/analysis/cybercrime/financial-fraud-shot-up-233-last-year-account-takeover-on-the-rise

U.S. government and energy firms close ranks, fearing Russian cyberattacks - In February, as Russian troops massed on Ukraine’s border, executives with a major energy firm here worked with U.S. energy and homeland security officials to draw up a playbook and help prepare the electricity sector to deal with potential cyberattacks by Russia. https://www.washingtonpost.com/national-security/2022/04/06/russia-cyber-attack-threat-energy/

With consumer data privacy in focus, making the case for NIST in healthcare - As states continue to enact their own privacy laws and Congress forges ahead with discussions of a federal privacy law, healthcare entities must prioritize coordination between privacy and security offices and look to NIST rather than The Health Insurance Portability and Accountability Act (HIPAA) requirements to strengthen their cyber posture and ensure compliance. https://www.scmagazine.com/feature/privacy/with-consumer-data-privacy-in-focus-making-the-case-for-nist-in-healthcare

Account takeover poised to surpass malware as the No. 1 security concern - As most researchers and financial executives can attest, virtually all types of fraud have dramatically risen over the past two years. However, attackers taking over legitimate financial accounts have become even more of a favorite with cybercriminals than most fraud schemes. https://www.scmagazine.com/analysis/cybercrime/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern

How bank customers can reduce the risk from account takeover fraud - Account takeover has become an increasingly popular and accessible way for fraudsters to steal money from real bank customers, and also to commit other forms of cyber-malfeasance. However, experts have pointed out steps that financial institutions and their customers can take to reduce that risk. https://www.scmagazine.com/analysis/cybercrime/how-bank-customers-can-reduce-the-risk-from-account-takeover-fraud

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

First malware targeting AWS Lambda serverless cloud environment discovered - Researchers on Wednesday reported on the first publicly known case of malware specifically designed to execute in an AWS Lambda environment. https://www.scmagazine.com/news/cloud-security/first-malware-targeting-aws-lambda-serverless-cloud-environment-discovered%EF%BF%BC

California health plan facing network disruptions after alleged Hive ransomware attack - Partnership HealthPlan of California (PHC) is currently experiencing computer system disruptions and working to recover its network with support from third-party forensic specialists. Multiple reports allege the Hive ransomware group is behind the attack. https://www.scmagazine.com/analysis/breach/california-health-plan-facing-network-disruptions-after-alleged-hive-ransomware-attack

WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers - Security vendor WatchGuard quietly fixed a critical vulnerability in a line of its firewall devices and didn’t explicitly disclose the flaw for at least seven months, following revelations hackers from Russia’s military apparatus exploited the flaw en masse to assemble a giant botnet. https://arstechnica.com/information-technology/2022/04/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers/

Palo Alto Networks firewalls, VPNs vulnerable to OpenSSL bug - American cybersecurity company Palo Alto Networks warned customers on Wednesday that some of its firewall, VPN, and XDR products are vulnerable to a high severity OpenSSL infinite loop bug disclosed three weeks ago. https://www.bleepingcomputer.com/news/security/palo-alto-networks-firewalls-vpns-vulnerable-to-openssl-bug/

Lapsus$ breach of Okta prompts HHS alert for healthcare organizations - The Department of Health and Human Services to warn the sector of the ongoing, potential threat the extortion group poses to the sector. https://www.scmagazine.com/analysis/risk-management/lapsus-breach-of-okta-prompts-hhs-alert-for-healthcare-organizations

Patient data stolen ahead of East Tennessee Children’s Hospital attack, outage - Several weeks after a cyberattack spurred network disruptions at East Tennessee Children's Hospital, ETCH is notifying an undisclosed number of patients and parents that the threat actors stole sensitive health information during the incident. https://www.scmagazine.com/analysis/breach/patient-data-stolen-ahead-of-east-tennessee-childrens-hospital-attack-outage

Health insurance exchange didn’t report 44 data breaches, but were hit with no security mandates - The health insurance exchange for Connecticut, Access Health, faced a whopping 44 data breaches over the course of three and a half years. https://www.scmagazine.com/analysis/breach/health-insurance-exchange-didnt-report-44-data-breaches-but-were-hit-with-no-mandate-to-improve-security

Denial-of-service disrupts Finnish government sites during Zelenskyy speech - A denial-of-service attack knocked the websites for Finland’s defense and foreign ministries offline Friday, the government there said, just as Ukrainian President Volodymyr Zelenskyy spoke to the Finnish parliament. https://www.cyberscoop.com/finland-denial-of-service-zelenskyy/

Atlassian blames script maintenance for week-long cloud outage - Atlassian is blaming a recent maintenance script for accidentally disabling several of its cloud services, which have been down now for nearly a week. https://www.zdnet.com/article/atlassian-blames-script-maintenance-for-week-long-cloud-outage/

Patient data stolen ahead of East Tennessee Children’s Hospital attack, outage - Several weeks after a cyberattack spurred network disruptions at East Tennessee Children's Hospital, ETCH is notifying an undisclosed number of patients and parents that the threat actors stole sensitive health information during the incident. https://www.scmagazine.com/analysis/breach/patient-data-stolen-ahead-of-east-tennessee-childrens-hospital-attack-outage

Return to the top of the newsletter

WEB SITE COMPLIANCE - We continue the series regarding FDIC Supervisory Insights regarding
Incident Response Programs.  (5 of 12)
  
  
Notification Procedures
  
  An institution should notify its primary Federal regulator as soon as it becomes aware of the unauthorized access to or misuse of sensitive customer information or customer information systems. Notifying the regulatory agency will help it determine the potential for broader ramifications of the incident, especially if the incident involves a service provider, as well as assess the effectiveness of the institution's IRP.
  
  Institutions should develop procedures for notifying law enforcement agencies and filing SARs in accordance with their primary Federal regulator's requirements.  Law enforcement agencies may serve as an additional resource in handling and documenting the incident. Institutions should also establish procedures for filing SARs in a timely manner because regulations impose relatively quick filing deadlines. The SAR form itself may serve as a resource in the reporting process, as it contains specific instructions and thresholds for when to file a report. The SAR form instructions also clarify what constitutes a "computer intrusion" for filing purposes. Defining procedures for notifying law enforcement agencies and filing SARs can streamline these notification and reporting requirements.
  
  Institutions should also address customer notification procedures in their IRP. When an institution becomes aware of an incident involving unauthorized access to sensitive customer information, the institution should conduct a reasonable investigation to determine the likelihood that such information has been or will be misused. If the institution determines that sensitive customer information has been misused or that misuse of such information is reasonably possible, it should notify the affected customer(s) as soon as possible. Developing standardized procedures for notifying customers will assist in making timely and thorough notification. As a resource in developing these procedures, institutions should reference the April 2005 interpretive guidance, which specifically addresses when customer notification is necessary, the recommended content of the notification, and the acceptable forms of notification.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
  
  SECURITY CONTROLS - IMPLEMENTATION - DATA CENTER SECURITY

  
  When selecting a site for the most important information systems components, one major objective is to limit the risk of exposure from internal and external sources. The selection process should include a review of the surrounding area to determine if it is relatively safe from exposure to fire, flood, explosion, or similar environmental hazards. Outside intruders can be deterred through the use of guards, fences, barriers, surveillance equipment, or other similar devices. Since access to key information system hardware and software should be limited, doors and windows must be secure. Additionally, the location should not be identified or advertised by signage or other indicators.
  
  Detection devices, where applicable, should be utilized to prevent theft and safeguard the equipment. They should provide continuous coverage. Detection devices have two purposes - to alarm when a response is necessary and to support subsequent forensics. The alarm capability is only useful when a response will occur. Some intruder detection devices available include:
  
  ! Switches that activate an alarm when an electrical circuit is broken;
  ! Light and laser beams, ultraviolet beams and sound or vibration detectors that are invisible to the intruder, and ultrasonic and radar devices that detect movement in a room; and
  ! Closed-circuit television that allows visual observation and recording of actions.
  
  Risks from environmental threats can be addressed somewhat through devices such as halon gas, smoke alarms, raised flooring, heat sensors, and the like.
  
  Physical security devices frequently need preventive maintenance to function properly. Maintenance logs are one control the institution can use to determine whether the devices are appropriately maintained. Periodic testing of the devices provides assurance that they are operating correctly.
  
  Security guards should be properly instructed about their duties. The employees who access secured areas should have proper identification and authorization to enter the area. All visitors should sign in and wear proper IDs so that they can be identified easily. Security guards should be trained to restrict the removal of assets from the premises and to record the identity of anyone removing assets. Consideration should be given to implementing a specific and formal authorization process for the removal of hardware and software from premises.
  
  The following security zones should have access restricted to a need basis:
  
  ! Operations center
  ! Uninterrupted power supply
  ! Telecommunications equipment
  ! Media library

Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Chapter 18 - AUDIT TRAILS
 
 
18.3.2 Review of Audit Trails
 

 Audit trails can be used to review what occurred after an event, for periodic reviews, and for real-time analysis. Reviewers should know what to look for to be effective in spotting unusual activity. They need to understand what normal activity looks like. Audit trail review can be easier if the audit trail function can be queried by user ID, terminal ID, application name, date and time, or some other set of parameters to run reports of selected information.
 
 Audit Trail Review After an Event. Following a known system or application software problem, a known violation of existing requirements by a user, or some unexplained system or user problem, the appropriate system-level or application-level administrator should review the audit trails. Review by the application/data owner would normally involve a separate report, based upon audit trail data, to determine if their resources are being misused.
 
 Periodic Review of Audit Trail Data. Application owners, data owners, system administrators, data processing function managers, and computer security managers should determine how much review of audit trail records is necessary, based on the importance of identifying unauthorized activities. This determination should have a direct correlation to the frequency of periodic reviews of audit trail data.
 
 Real-Time Audit Analysis. Traditionally, audit trails are analyzed in a batch mode at regular intervals (e.g., daily). Audit records are archived during that interval for later analysis. Audit analysis tools can also be used in a real-time, or near real-time fashion. Such intrusion detection tools are based on audit reduction, attack signature, and variance techniques. Manual review of audit records in real time is almost never feasible on large multiuser systems due to the volume of records generated. However, it might be possible to view all records associated with a particular user or application, and view them in real time.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.