R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

April 26, 2020

Please stay safe - We will recover.

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.


FFIEC IT audits - To meet the national emergency, I am now performing remote/offsite FFIEC IT audits for insured financial institutions.  I am a former bank examiner with over 50 years IT audit experience.  Please email R. Kinney Williams at examiner@yennik.com from your bank's domain and I will email you information and fees.

FYI - The Pentagon Hasn't Fixed Basic Cybersecurity Blind Spots - Five years ago, the Department of Defense set dozens of security hygiene goals. A new report finds that it has abandoned or lost track of most of them. https://www.wired.com/story/pentagon-cybersecurity-blind-spots/

U.S. offers up to $5M for info on North Korean cyber activity - Four U.S. federal agencies on Wednesday jointly issued an advisory that warns of ongoing North Korea-sponsored cyberthreat operations, and offers a reward of up to $5 million for information on such operations. https://www.scmagazine.com/home/security-news/cybercrime/u-s-offers-up-to-5m-for-info-on-north-korean-cyber-activity/

Texas judge OKs expanded mail-in voting during COVID-19 pandemic - A week after troubling images emerged of voters sporting face masks and trying to maintain social distancing as they stood in long lines during the Wisconsin primary, a Texas court ruled that the state’s registered voters would qualify to vote via mail during the pandemic. https://www.scmagazine.com/home/security-news/texas-judge-oks-expanded-mail-in-voting-during-covid-19-pandemic/

OVER 460 VULNERABILITIES RESOLVED IN TENTH BUG BOUNTY CHALLENGE WITH U.S. DEPARTMENT OF DEFENSE THANKS TO HACKERS ON HACKERONE - U.S. Air Force awards hackers over $290,000 in fourth ‘Hack the Air Force’ Challenge with HackerOne https://www.hackerone.com/press-release/over-460-vulnerabilities-resolved-tenth-bug-bounty-challenge-us-department-defense

Amid Security Concerns: to Zoom or not to Zoom? - Zoom has rolled out new security features and promised a cyber security and privacy makeover after withering reports of the platform’s failings. In the meantime, enterprises are left to wonder ‘to Zoom or not Zoom?’ https://securityledger.com/2020/04/amid-security-concerns-to-zoom-or-not-to-zoom/

Microsoft throws extended support lifeline for folk stuck on car-crash Windows 10 1809 - Also: 2010 server products to survive into 2021 as overstretched admins given more breathing space. https://www.theregister.co.uk/2020/04/15/windows_10_1809_support_extended/

More CFOs feeling the heat with ransomware - Too often we’re hearing about ​cities​ and ​organizations​ falling prey to ransomware attacks with the average cost of ransomware related downtime ​hovering around $55K​ – note that’s just the cost of ​downtime, which excludes any ransom that might be paid. https://www.scmagazine.com/home/opinion/executive-insight/more-cfos-feeling-the-heat-with-ransomware/

That critical VMware vuln allowed anyone on your network to create new admin users, no creds needed - A critical vulnerability in VMware's vCenter management product allowed any old bod on the same network to remotely create an admin-level user, research by Guardicore Labs has revealed. https://www.theregister.co.uk/2020/04/17/vmware_vcenter_critical_vuln_anyone_create_admin_users/

DHS Urges Pulse Secure VPN Users To Update Passwords - The DHS urged organizations to update their passwords and make sure that a critical Pulse Secure VPN flaw has been patched, as attackers continue to exploit the flaw. https://threatpost.com/dhs-urges-pulse-secure-vpn-users-to-update-passwords/154925/

Ministry of Defence lowers supplier infosec standards thanks to COVID-19 outbreak - Updated Security standards for defence contractors have been lowered thanks to the coronavirus outbreak, Britain's Ministry of Defence has told its suppliers. https://www.theregister.co.uk/2020/04/20/mod_relaxes_cyber_essentials_plus_suppliers/

REVIEW CFAA FOR FIRST TIME - For the first time, the United States Supreme Court has agreed to review a case involving the Computer Fraud and Abuse Act (CFAA), the highly controversial anti-hacking law that many in the civil liberties and digital rights communities have argued is overly broad and punitive. The case could be a landmark in the decades-old effort to narrow the scope of the CFAA. https://duo.com/decipher/supreme-court-to-review-cfaa-for-first-time

Details on 267M Facebook users sold for cheap on dark web - A cybercriminal actor on the dark web has made available a dataset of Facebook accounts belonging to 267 million users, recently selling the collective lot to researchers for 500 Euros. https://www.scmagazine.com/home/security-news/details-on-267m-facebook-users-sold-for-cheap-on-dark-web/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - California software developer hit with W-2 scam - COVID-19 may have made April 15 just another day on the calendar this year, but cybercriminals are still running W-2 tax form scams this time hitting Applications Software Technologies. https://www.scmagazine.com/home/security-news/data-breach/california-software-developer-hit-with-w-2-scam/

GitHub users being hit with credential stealing phishing messages - GitHub users are being targeted by a Sawfish phishing campaign designed to steal their GitHub login credentials and time-based one-time password (TOTP) codes. https://www.scmagazine.com/home/security-news/phishing/github-users-being-hit-with-credential-stealing-phishing-messages/

23 million Webkinz login credentials found on the dark web - The popular children’s website Webkinz suffered a massive data breach earlier this month that saw about 23 million user login credentials exposed on a dark web forum. https://www.scmagazine.com/home/security-news/data-breach/23-million-webkinz-login-credentials-found-on-the-dark-web/

Maze ransomware attack catches IT services firm Cognizant unawares - Digital solutions provider and IT consultant giant Cognizant has been struck by a Maze ransomware attack that infected its systems and caused service disruptions to its clients. https://www.scmagazine.com/home/security-news/cybercrime/maze-ransomware-attack-catches-it-services-firm-cognizant-unawares/

Clearview AI source code, facial recognition apps, data exposed - In a familiar refrain, a cloud data bucket was left open, but this time the stakes were high – a misconfigured server exposed the source code, copies of its facial recognition apps as well as private data at controversial startup Clearview AI, which gained unwanted notoriety earlier this year for obtaining billions of photos by scraping the internet for use by law enforcement agencies. https://www.scmagazine.com/home/security-news/database-security/clearview-ai-source-code-facial-recognition-apps-data-exposed/

20M Aptoide accounts exposed by leak on hacker forum - More than 20 million accounts registered with the software marketplace application Aptoide have been reportedly exposed after a unknown actor posted stolen user data on a hacking forum. https://www.scmagazine.com/home/security-news/cybercrime/20m-aptoide-accounts-exposed-by-leak-on-hacker-forum/

German government might have lost tens of millions of euros in COVID-19 phishing attack - German state of North Rhine-Westphalia failed to put in place a citizen verification procedure and allowed fraudsters to steal millions of euros. https://www.zdnet.com/article/german-government-might-have-lost-tens-of-millions-of-euros-in-covid-19-phishing-attack/

IT services firm Cognizant hit with Maze ransomware - Cognizant, a multibillion-dollar IT services company with clients in the banking and oil and gas industries, said Saturday its computer systems had been disrupted by Maze ransomware, a strain of malicious code that has been used in cyberattacks in the U.S. and Europe in recent months. https://www.cyberscoop.com/cognizant-maze-ransomware-fortune-500/

SBA emergency loan applicants’ data likely exposed - A breach at the Small Business Administration may have exposed personal information on almost 8,000 small businesses that applied to the agency’s Economic Injury Disaster Loan program (EIDL), recently expanded to include organizations affected by the COVID-19 pandemic. https://www.scmagazine.com/home/security-news/network-security/sba-emergency-loan-applicants-data-likely-exposed/

Fitness software maker Kinomap leaves database open exposing 42 million users - A database from the fitness software company Kinomap was found exposed on the internet leaving the records of 42 million users open and viewable for at least one month. https://www.scmagazine.com/home/security-news/data-breach/fitness-software-maker-kinomap-leaves-database-open-exposing-42-million-users/

Online leak undermines Torrance’s claim that no personal data was affected by cyberattack - A new online post by the DoppelPaymer gang further suggests that a cyberattack experienced by Torrance, California in late February-early March was a case of ransomware — one that appears to have affected personal data, despite the Los Angeles-area city’s claims otherwise. https://www.scmagazine.com/home/security-news/cybercrime/online-leak-undermines-citys-claim-that-no-personal-data-was-affected-by-cyberattack/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
Risk Management of Outsourced Technology Services
   
   Due Diligence in Selecting a Service Provider - Contract Issues
   
  Business Resumption and Contingency Plans
   
  The contract should address the service provider’s responsibility for backup and record protection, including equipment, program and data files, and maintenance of disaster recovery and contingency plans. Responsibilities should include testing of the plans and providing results to the institution. The institution should consider interdependencies among service providers when determining business resumption testing requirements. The service provider should provide the institution with operating procedures the service provider and institution are to implement in the event business resumption contingency plans are implemented. Contracts should include specific provisions for business recovery timeframes that meet the institution’s business requirements. The institution should ensure that the contract does not contain any provisions that would excuse the service provider from implementing its contingency plans.
   
  Sub-contracting and Multiple Service Provider Relationships
   
  Some service providers may contract with third-parties in providing services to the financial institution. To provide accountability, it may be beneficial for the financial institution to seek an agreement with and designate a primary contracting service provider. The institution may want to consider including a provision specifying that the contracting service provider is responsible for the service provided to the institution regardless of which entity is actually conducting the operations. The institution may also want to consider including notification and approval requirements regarding changes to the service provider’s significant subcontractors.
   
  Cost
   

  The contract should fully describe fees and calculations for base services, including any development, conversion, and recurring services, as well as any charges based upon volume of activity and for special requests. Cost and responsibility for purchase and maintenance of hardware and software may also need to be addressed. Any conditions under which the cost structure may be changed should be addressed in detail including limits on any cost increases.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.
  
  
SECURITY TESTING - TESTING CONCEPTS AND APPLICATION
  
  
Measurement and Interpretation of Test Results. Institutions should design tests to produce results that are logical and objective. Results that are reduced to metrics are potentially more precise and less subject to confusion, as well as being more readily tracked over time. The interpretation and significance of test results are most useful when tied to threat scenarios. Traceability. Test results that indicate an unacceptable risk in an institution's security should be traceable to actions subsequently taken to reduce the risk to an acceptable level.
  
  Thoroughness. Institutions should perform tests sufficient to provide a high degree of assurance that their security plan, strategy and implementation is effective in meeting the security objectives. Institutions should design their test program to draw conclusions about the operation of all critical controls. The scope of testing should encompass all systems in the institution's production environment and contingency plans and those systems within the institution that provide access to the production environment.
  
  Frequency. Test frequency should be based on the risk that critical controls are no longer functioning. Factors to consider include the nature, extent, and results of prior tests, the value and sensitivity of data and systems, and changes to systems, policies and procedures, personnel, and contractors. For example, network vulnerability scanning on highrisk systems can occur at least as frequently as significant changes are made to the network.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Section II. Management Controls Chapter 5 - COMPUTER SECURITY POLICY
 
 5.3.3 System-Specific Policy Implementation
 
 Technology plays an important - but not sole - role in enforcing system-specific policies. When technology is used to enforce policy, it is important not to neglect nontechnology-based methods. For example, technical system-based controls could be used to limit the printing of confidential reports to a particular printer. However, corresponding physical security measures would also have to be in place to limit access to the printer output or the desired security objective would not be achieved.
  
 Technical methods frequently used to implement system-security policy are likely to include the use of logical access controls. However, there are other automated means of enforcing or supporting security policy that typically supplement logical access controls. For example, technology can be used to block telephone users from calling certain numbers. Intrusion-detection software can alert system administrators to suspicious activity or can take action to stop the activity. Personal computers can be configured to prevent booting from a floppy disk.
 
 Technology-based enforcement of system-security policy has both advantages and disadvantages. A computer system, properly designed, programmed, installed, configured, and maintained, consistently enforces policy within the computer system, although no computer can force users to follow all procedures. Management controls also play an important role - and should not be neglected. In addition, deviations from the policy may sometimes be necessary and appropriate; such deviations may be difficult to implement easily with some technical controls. This situation occurs frequently if implementation of the security policy is too rigid (which can occur when the system analysts fail to anticipate contingencies and prepare for them).


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.