R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

May 17, 2015

ewsletter Content FFIEC IT Security Web Site Audits
Web Site Compliance
 
NIST Handbook
 
Penetration Testing
 
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


FYI
- Our cybersecurity testing meets the independent pen-test requirements outlined in the FFIEC Information Security booklet.  Independent pen-testing is part of any financial institution's cybersecurity defense.  To receive due diligence information, agreement and, cost saving fees, please complete the information form at https://yennik.com/forms-vista-info/external_vista_info_form.htm.  All communication is kept strictly confidential.

FYI - US court says NSA phone data program is illegal - The US government has long argued that the program is legal under the controversial Patriot Act, but a federal appeals court sees things differently. A US Appeals court has sent shockwaves through the government and security industry after ruling that the National Security Agency's wholesale collection of phone call data is illegal. http://www.cnet.com/news/us-court-says-nsa-phone-data-program-is-illegal/

FYI - India and Japan form cyber alliance - Indian officials from the Ministry of Telecom and the Department of Electronics and Information Technology (DeitY) met with a visiting Japanese trade delegation led by Minister of Economy and Trade Yoichi Miyazawa according to the Economic Times. http://www.scmagazine.com/japan-looks-to-invest-in-indias-it-sectors/article/412811/

FYI - House approves controversial cybersecurity bill - The House of Representatives passed bipartisan legislation on Wednesday designed to help companies and the federal government better defend against the growing threat of cyberattacks, despite opposition from privacy advocates. http://www.cnet.com/news/house-approves-controversial-cybersecurity-bill/

FYI - Romanian rozzers round up alleged $15 MILLION ATM cybercrim gang - 25 people arrested over international cash-slurp operation - Romanian police have arrested 25 people who are suspected of being part of a cyber-crime gang that organised $15m in fraudulent bank withdrawals. http://www.theregister.co.uk/2015/04/28/romanian_police_arrest_25_15m_swindle_allegations/

FYI - Twin brothers indicted on computer hacking charges - Twin brothers in Virginia were indicted Thursday on computer hacking and other charges. http://www.scmagazine.com/twin-brothers-indicted-on-computer-hacking-charges/article/412825/

FYI - A former Goldman Sachs programmer has been convicted for the second time in four years on charges that he misused his former employer’s code, adding a new chapter to an already bizarre and controversial case that has drawn much unwanted attention to the world of high-speed trading and elicited criticism of prosecutorial overzealousness. http://www.wired.com/2015/05/programmer-convicted-bizarre-goldman-sachs-caseagain/

FYI - Lower house of French Parliament approves surveillance bill - The lower house of the French Parliament has approved a controversial intelligence bill that could broaden the government's surveillance powers. http://www.scmagazine.com/french-surveillance-bill-progresses-through-parliament/article/413032/

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Ryanair stung after $5m Shanghai'd from online fuel account - Crooks siphoned off money from an account earmarked for the payment of fuel bills via an electronic transfer to a bank in China last week. http://www.theregister.co.uk/2015/04/30/ryanair_online_heist/

FYI - FBI investigating Rutgers University in DDoS attack - The FBI is working with Rutgers University to identify the source of a series of distributed denial-of-service (DDoS) attacks that have plagued the school this week. http://www.scmagazine.com/the-fbi-is-helpign-rutger-inveigate-a-series-of-ddos-attack/article/412149/

FYI - Partners HealthCare says workers responded to phishing emails, patient data at risk - Partners HealthCare Systems has published an announcement on its website that personal and health-related data belonging to its patients was potentially exposed to unauthorized access. http://www.scmagazine.com/partners-healthcare-group-patient-information-may-be-at-risk/article/412552/

FYI - Oregon's Health CO-OP laptop stolen, about 15K members notified - Oregon's Health CO-OP has notified approximately 15,000 current and former members that a laptop containing personal information was stolen. http://www.scmagazine.com/oregons-health-co-op-laptop-stolen-about-15k-members-notified/article/412536/

FYI - EllisLab server hacked, passwords possibly compromised - Hackers last month gained unauthorized access to a server of software development company EllisLab may have gotten their hands on personal information belonging to EllisLab.com members, the company CEO Derek Jones said in a Friday blog post. http://www.scmagazine.com/attackers-use-stolen-login-info-to-hack-into-ellislabs-servers/article/412796/

FYI - Possible payment card breach at Hard Rock Hotel & Casino Las Vegas - Hard Rock Hotel & Casino Las Vegas is warning customers of a potential security incident involving payment cards.
http://www.scmagazine.com/possible-payment-card-breach-at-hard-rock-hotel-casino-las-vegas/article/412819/
http://www.theregister.co.uk/2015/05/04/hard_rock_breach/

FYI - Retail Capital notifies hundreds following security incident - Michigan-based Retail Capital is notifying more than 700 individuals that unauthorized access was gained to the electronic mailbox of a sales manager, and personal information may have been compromised. http://www.scmagazine.com/retail-capital-notifies-hundreds-following-security-incident/article/413042/

Return to the top of the newsletter

WEB SITE COMPLIANCE -
OCC - Threats from Fraudulent Bank Web Sites - Risk Mitigation and Response Guidance for Web Site Spoofing Incidents (Part 3 of 5)
 
 
PROCEDURES TO ADDRESS SPOOFING - Information Gathering
 
 After a bank has determined that it is the target of a spoofing incident, it should collect available information about the attack to enable an appropriate response.  The information that is collected will help the bank identify and shut down the fraudulent Web site, determine whether customer information has been obtained, and assist law enforcement authorities with any investigation.  Below is a list of useful information that a bank can collect.  In some cases, banks will require the assistance of information technology specialists or their service providers to obtain this information.
 
 *  The means by which the bank became aware that it was the target of a spoofing incident (e.g., report received through Website, fax, telephone, etc.);
 *  Copies of any e-mails or documentation regarding other forms of communication (e.g., telephone calls, faxes, etc.) that were used to direct customers to the spoofed Web sites;
 *  Internet Protocol (IP) addresses for the spoofed Web sites along with identification of the companies associated with the IP addresses;
 *  Web-site addresses (universal resource locator) and the registration of the associated domain names for the spoofed site; and
 *  The geographic locations of the IP address (city, state, and country).


Return to the top of the newsletter

FFIEC IT SECURITY
-
We continue our coverage of the FDIC's "Guidance on Managing Risks Associated With Wireless Networks and Wireless Customer Access."
 
 PART I. Risks Associated with Wireless Internal Networks
 
 
Financial institutions are evaluating wireless networks as an alternative to the traditional cable to the desktop network. Currently, wireless networks can provide speeds of up to 11 Mbps between the workstation and the wireless access device without the need for cabling individual workstations. Wireless networks also offer added mobility allowing users to travel through the facility without losing their network connection. Wireless networks are also being used to provide connectivity between geographically close locations as an alternative to installing dedicated telecommunication lines.
 
 Wireless differs from traditional hard-wired networking in that it provides connectivity to the network by broadcasting radio signals through the airways. Wireless networks operate using a set of FCC licensed frequencies to communicate between workstations and wireless access points. By installing wireless access points, an institution can expand its network to include workstations within broadcast range of the network access point.
 
 The most prevalent class of wireless networks currently available is based on the IEEE 802.11b wireless standard. The standard is supported by a variety of vendors for both network cards and wireless network access points. The wireless transmissions can be encrypted using "Wired Equivalent Privacy" (WEP) encryption. WEP is intended to provide confidentiality and integrity of data and a degree of access control over the network. By design, WEP encrypts traffic between an access point and the client. However, this encryption method has fundamental weaknesses that make it vulnerable. WEP is vulnerable to the following types of decryption attacks:
 
 1)  Decrypting information based on statistical analysis;
 
 2)  Injecting new traffic from unauthorized mobile stations based on known plain text;
 
 3)  Decrypting traffic based on tricking the access point;
 
 4)  Dictionary-building attacks that, after analyzing about a day's worth of traffic, allow real-time automated decryption of all traffic (a dictionary-building attack creates a translation table that can be used to convert encrypted information into plain text without executing the decryption routine); and
 
 5)  Attacks based on documented weaknesses in the RC4 encryption algorithm that allow an attacker to rapidly determine the encryption key used to encrypt the user's session).

Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 20 -
ASSESSING AND MITIGATING THE RISKS TO A HYPOTHETICAL COMPUTER SYSTEM (HGA)

20.3.5 Network-Related Threats

Most of the human threats of concern to HGA originate from insiders. Nevertheless, HGA also recognizes the need to protect its assets from outsiders. Such attacks may serve many different purposes and pose a broad spectrum of risks, including unauthorized disclosure or modification of information, unauthorized use of services and assets, or unauthorized denial of services.

As shown in the figure below, HGA's systems are connected to the three external networks: (1) the Internet, (2) the Interagency WAN, and (3) the public-switched (telephone) network. Although these networks are a source of security risks, connectivity with them is essential to HGA's mission and to the productivity of its employees; connectivity cannot be terminated simply because of security risks.

In each of the past few years before establishing its current set of network safeguards, HGA had detected several attempts by outsiders to penetrate its systems. Most, but not all of these, have come from the Internet, and those that succeeded did so by learning or guessing user account passwords. In two cases, the attacker deleted or corrupted significant amounts of data, most of which were later restored from backup files. In most cases, HGA could detect no ill effects of the attack, but concluded that the attacker may have browsed through some files. HGA also conceded that its systems did not have audit logging capabilities sufficient to track an attacker's activities. Hence, for most of these attacks, HGA could not accurately gauge the extent of penetration.

In one case, an attacker made use of a bug in an e-mail utility and succeeded in acquiring System Administrator privileges on the server--a significant breach. HGA found no evidence that the attacker attempted to exploit these privileges before being discovered two days later. When the attack was detected, COG immediately contacted the HGA's Incident Handling Team, and was told that a bug fix had been distributed by the server vendor several months earlier. To its embarrassment, COG discovered that it had already received the fix, which it then promptly installed. It now believes that no subsequent attacks of the same nature have succeeded.

Although HGA has no evidence that it has been significantly harmed to date by attacks via external networks, it believes that these attacks have great potential to inflict damage. HGA's management considers itself lucky that such attacks have not harmed HGA's reputation and the confidence of the citizens its serves. It also believes the likelihood of such attacks via external networks will increase in the future.

Figure 20.1

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated