R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

May 10, 2020

Please stay safe - We will recover.

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.


Virtual IT audits - In response to the national emergency, I am now performing virtual FFIEC IT audits for insured financial institutions.  I am a former bank examiner with over 50 years IT audit experience.  Please email R. Kinney Williams at examiner@yennik.com from your bank's domain and I will email you information and fees.

FYI - Two Charged with Stimulus Fraud - First in the nation to be charged with fraudulently seeking CARES Act SBA Paycheck Protection Loans - Two businessmen have been charged in the District of Rhode Island with allegedly filing bank loan applications fraudulently seeking more than a half-million dollars in forgivable loans guaranteed by the Small Business Administration (SBA) under the Coronavirus Aid, Relief, and Economic Security (CARES) Act. https://www.fdicoig.gov/press-release/two-charged-stimulus-fraud?

Exposure of 7.4B records at Le Figaro highlights ongoing problems with misconfigured databases - The exposure of 7.4 billion personal information-laden records, including some login credentials, at France’s Le Figaro underscores how unsecured databases persist even in a world hyperaware of privacy and data security. https://www.scmagazine.com/home/security-news/database-security/exposure-of-7-4b-records-at-le-figaro-highlights-ongoing-problems-with-misconfigured-databases/

Build a data-driven defense strategy to fight cybercrime - The coronavirus pandemic is being compared to war-like conditions by the World Health Organization. We know that bad decisions and poor data (or intelligence) during a war can have serious human and economic consequences. https://www.scmagazine.com/home/opinion/executive-insight/build-a-data-driven-defense-strategy-to-fight-cybercrime/

This new cybersecurity school will teach kids to crack codes from home - Online initiative looks to inspire a new generation of cybersecurity talent to bring out their 'digital Sherlock Holmes' while schools remain closed. https://www.zdnet.com/article/this-new-cybersecurity-school-will-teach-kids-to-crack-codes-from-home/

Banking trojan attack exposes dangers of not securing MDM solutions - A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. https://www.scmagazine.com/home/security-news/mobile-security/banking-trojan-attack-exposes-dangers-of-not-securing-mdm-solutions/

Average ransom payment up 33 percent in Q1, Sodinokibi and Ryuk top variants - The ever industrious and forward-looking groups behind the majority of ransomware attacks essentially reinvented the business during the first quarter of 2020 developing new tools and methods that helped boost their success rate. https://www.scmagazine.com/home/security-news/ransomware/average-ransom-payment-up-33-percent-in-q1-sodinokibi-and-ryuk-top-variants/

Trump cites cybersecurity concerns issuing order to protect power grid - President Trump declared a national emergency to protect the nation’s the bulk-power infrastructure that stops the purchase or use of any equipment that involves a foreign adversary in any way. https://www.scmagazine.com/home/security-news/government-and-defense/trump-cites-cyber-concerns-issuing-order-to-protect-power-grid/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - GoDaddy takes seven months to discover data breach - Cybersecurity pros are coming down hard on GoDaddy after the domain registry company reported that an outsider had accessed customer login credentials possibly affecting all 19 million company accounts. https://www.scmagazine.com/home/security-news/data-breach/godaddy-takes-seven-months-to-discover-data-breach/

Phishing attacks spoof Microsoft Teams to steal user credentials - Attackers are exploiting the surge in the use of Microsoft Teams in an attempt to trap unsuspecting users, says Abnormal Security. https://www.techrepublic.com/article/phishing-attacks-spoof-microsoft-teams-to-steal-user-credentials/

Notification emails impersonate Microsoft Teams to steal credentials - As the use of collaborative platforms continues to tick up as people work from home during the Covid-19 pandemic, hackers are sending fake email notifications that appear to come from Microsoft Teams in an effort to steal employee credentials. https://www.scmagazine.com/home/security-news/phishing/notification-emails-impersonate-microsoft-teams-to-steal-credentials/

North Dakota government fiber provider hit by ransomware - The company that operates a fiber optic network that supports statewide and local government entities across North Dakota was a victim of a recent ransomware attack that included some of the firm’s files being published on a website that attempts to shame victims into paying. https://statescoop.com/north-dakota-government-fiber-provider-hit-maze-ransomware/

900,000 WordPress sites attacked via XSS vulnerabilities - Nearly 1 million WordPress sites are being hit by what is likely a single threat actor attempting to inject a redirect into the sites by exploiting a cross site scripting vulnerability. https://www.scmagazine.com/home/security-news/vulnerabilities/900000-wordpress-sites-attacked-via-xss-vulnerabilities/

No reprieve for health care orgs as ransomware hits hospital operator, plastic surgeons - If there was any lingering hope that cybercriminals would show mercy on health care providers during the COVID-19 crisis - as some claimed they would do - that pipe dream evaporated with the news that various ransomware groups attacked Fresenius, Europe’s largest private hospital operator, as well as a pair of U.S.-based plastic surgery clinics. https://www.scmagazine.com/home/security-news/ransomware/no-reprieve-for-health-care-orgs-as-ransomware-hits-hospital-operator-plastic-surgeons/

44M leaked Pakistani mobile user records apparently belong to Jazz - A month after hacker peddled 115 million records of Pakistani mobile users, information on 44 million of them have been leaked online. https://www.scmagazine.com/home/security-news/44m-leaked-pakistani-mobile-user-records-apparently-belong-to-jazz/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
Risk Management of Outsourced Technology Services
   
   Due Diligence in Selecting a Service Provider - Contract Issues
   
   Dispute Resolution
   

   The institution should consider including in the contract a provision for a dispute resolution process that attempts to resolve problems in an expeditious manner as well as provide for continuation of services during the dispute resolution period.
   
   Indemnification
   

   Indemnification provisions generally require the financial institution to hold the service provider harmless from liability for the negligence of the institution, and vice versa. These provisions should be reviewed to reduce the likelihood of potential situations in which the institution may be liable for claims arising as a result of the negligence of the service provider.
   
   Limitation of Liability
   
   Some service provider standard contracts may contain clauses limiting the amount of liability that can be incurred by the service provider. If the institution is considering such a contract, consideration should be given to whether the damage limitation bears an adequate relationship to the amount of loss the financial institution might reasonably experience as a result of the service provider’s failure to perform its obligations.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.
  

  SECURITY TESTING - KEY FACTORS
  

  Management is responsible for considering the following key factors in developing and implementing independent diagnostic tests:
  
  Personnel. Technical testing is frequently only as good as the personnel performing and supervising the test. Management is responsible for reviewing the qualifications of the testing personnel to satisfy themselves that the capabilities of the testing personnel are adequate to support the test objectives.
  
  Scope. The tests and methods utilized should be sufficient to validate the effectiveness of the security process in identifying and appropriately controlling security risks.
  
  Notifications. Management is responsible for considering whom to inform within the institution about the timing and nature of the tests. The need for protection of institution systems and the potential for disruptive false alarms must be balanced against the need to test personnel reactions to unexpected activities.
  
  Controls Over Testing. Certain testing can adversely affect data integrity, confidentiality, and availability. Management is expected to limit those risks by appropriately crafting test protocols. Examples of issues to address include the specific systems to be tested, threats to be simulated, testing times, the extent of security compromise allowed, situations in which testing will be suspended, and the logging of test activity. Management is responsible for exercising oversight commensurate with the risk posed by the testing.
  
  Frequency. The frequency of testing should be determined by the institution's risk assessment. High - risk systems should be subject to an independent diagnostic test at least once a year. Additionally, firewall policies and other policies addressing access control between the financial institution's network and other networks should be audited and verified at least quarterly.  Factors that may increase the frequency of testing include the extent of changes to network configuration, significant changes in potential attacker profiles and techniques, and the results of other testing.
  (FYI - This is exactly the type of independent diagnostic testing that we perform.  Please refer to http://www.internetbankingaudits.com/ for information.)
  
  Proxy Testing. Independent diagnostic testing of a proxy system is generally not effective in validating the effectiveness of a security process. Proxy testing, by its nature, does not test the operational system's policies and procedures, or its integration with other systems. It also does not test the reaction of personnel to unusual events. Proxy testing may be the best choice, however, when management is unable to test the operational system without creating excessive risk.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Section II. Management Controls Chapter 5 - COMPUTER SECURITY POLICY
  
  5.5 Cost Considerations
  

  A number of potential costs are associated with developing and implementing computer security policies. Overall, the major cost of policy is the cost of implementing the policy and its impacts upon the organization. For example, establishing a computer security program, accomplished through policy, does not come at negligible cost.
  
  Other costs may be those incurred through the policy development process. Numerous administrative and management activities may be required for drafting, reviewing, coordinating, clearing, disseminating, and publicizing policies. In many organizations, successful policy implementation may require additional staffing and training - and can take time. In general, the costs to an organization for computer security policy development and implementation will depend upon how extensive the change needed to achieve a level of risk acceptable to management.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.