R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

May 17, 2020

Please stay safe - We will recover.

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.


Virtual IT audits - In response to the national emergency, I am now performing virtual FFIEC IT audits for insured financial institutions.  I am a former bank examiner with over 50 years IT audit experience.  Please email R. Kinney Williams at examiner@yennik.com from your bank's domain and I will email you information and fees.

FYI - What one cybersecurity company has learned from responding to Maze ransomware - When hackers lock the computer systems of a big company with ransomware, the gears of corporate damage control kick into action. https://www.cyberscoop.com/maze-ransomware-mandiant-lessons-learned/

GitHub Takes Aim at Open Source Software Vulnerabilities - GitHub Advanced Security will help automatically spot potential security problems in the world's biggest open source platform. https://www.wired.com/story/github-advanced-security-open-source/

New York City schools OK tailored Zoom platform for remote learning - After privacy issues prompted the New York City Department of Education to transition away from Zoom as a telelearning option, the department has reversed that decision, noting that the teleconferencing company has created a safer platform for the city’s students. https://www.scmagazine.com/home/security-news/new-york-city-schools-ok-tailored-zoom-platform-for-remote-learning/

SAP says 7 cloud products not currently up to security standards - SAP SE this week publicly disclosed that seven of its cloud products “do not meet one or several contractually agreed or statutory IT security standards at present,” adding that the ERP software giant is actively taking steps to remediate these issues. https://www.scmagazine.com/home/security-news/network-security/sap-says-7-cloud-products-not-currently-up-to-security-standards/

MobiFriends data on 3.6 million users available for download online - The leaked personal data of more than 3.6 million users registered on dating site MobiFriends was made all the more vulnerable because the site used the notoriously weak MD5 hashing. https://www.scmagazine.com/home/security-news/mobifriends-data-on-3-6-million-users-available-for-download-online/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Phishing emails caught exploiting DocuSign and COVID-19 - A new attack discovered by Abnormal Security aims to steal account credentials from people who use the online document signing platform. https://www.techrepublic.com/article/phishing-emails-caught-exploiting-docusign-and-covid-19/

Credit card skimmer caught hiding behind website favicon - A website seemingly offering images and icons for download is actually a cover-up for a credit card skimming operation, says Malwarebytes. https://www.techrepublic.com/article/credit-card-skimmer-caught-hiding-behind-website-favicon/

2FA app weaponized to infect Mac users with Dacls RAT - MacOS users who think they have protected themselves by downloading a particular two-factor authentication application may have actually infected their machines with a new variant of the Dacls remote access trojan. https://www.scmagazine.com/home/security-news/cybercrime/2fa-app-weaponized-to-infect-mac-users-with-dacls-rat/

Europe’s Largest Private Hospital Operator Fresenius Hit by Ransomware - Fresenius, Europe’s largest private hospital operator and a major provider of dialysis products and services that are in such high demand thanks to the COVID-19 pandemic, has been hit in a ransomware cyber attack on its technology systems. https://krebsonsecurity.com/2020/05/europes-largest-private-hospital-operator-fresenius-hit-by-ransomware/

Transport biz Toll Group suffers second ransomware infection in just three months - Which is just dandy seeing as deliveries are just a wee bit important right now - Transport company Toll Group has been slugged by ransomware for the second time in three months. https://www.theregister.co.uk/2020/05/06/toll_group_second_ransomware_attack/

A hacker group tried to hijack 900,000 WordPress sites over the last week - Massive hacking operations causes a 30 times spike in bad traffic. A hacker group has attempted to hijack nearly one million WordPress sites in the last seven days, according to a security alert issued today by cyber-security firm Wordfence. https://www.zdnet.com/article/a-hacker-group-tried-to-hijack-900000-wordpress-sites-over-the-last-week/

Hacker hijacks Milwaukee Bucks star’s Twitter account, posts offensive trash talk - A malicious hacker reportedly hijacked the Twitter account of NBA star forward Giannis Antetokounmpo and riddled it with disparaging and offensive fake tweets about current and former players. https://www.scmagazine.com/home/security-news/cybercrime/hacker-hijacks-milwaukee-bucks-stars-twitter-account-posts-offensive-trash-talk/

REvil hackers extort law firm with Lady Gaga, Nicki Minaj, Elton John as clients - Cyberattackers have breached a high-profile entertainment and media law firm, infecting the practice with ransomware and stealing files that apparently pertain to its star clients, including Lady Gaga, Madonna, Elton John, Barbara Streisand, Bruce Springsteen, Mariah Carey and Mary J. Blige. https://www.scmagazine.com/home/security-news/ransomware/revil-hackers-extort-law-firm-with-lady-gaga-nicki-minaj-elton-john-as-clients/

MobiFriends data on 3.6 million users available for download online - The leaked personal data of more than 3.6 million users registered on dating site MobiFriends was made all the more vulnerable because the site used the notoriously weak MD5 hashing. https://www.scmagazine.com/home/security-news/mobifriends-data-on-3-6-million-users-available-for-download-online/

Iran-linked hackers recently targeted coronavirus drugmaker Gilead - sources - Hackers linked to Iran have targeted staff at U.S. drugmaker Gilead Sciences Inc in recent weeks, according to publicly-available web archives reviewed by Reuters and three cybersecurity researchers, as the company races to deploy a treatment for the COVID-19 virus.  https://www.reuters.com/article/us-healthcare-coronavirus-gilead-iran-ex/exclusive-iran-linked-hackers-recently-targeted-coronavirus-drugmaker-gilead-sources-idUSKBN22K2EV

Ransomware Hit ATM Giant Diebold Nixdorf - Diebold Nixdorf, a major provider of automatic teller machines (ATMs) and payment technology to banks and retailers, recently suffered a ransomware attack that disrupted some operations. https://krebsonsecurity.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/

Package delivery giant Pitney Bowes confirms second ransomware attack in 7 months - Pitney Bowes network infected with Maze ransomware, after the company got hit by the Ryuk gang in October last year. https://www.zdnet.com/article/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months/

Texas Courts hit by ransomware, network disabled to limit spread - The Texas court system was hit by ransomware on Friday night, May 8th, which led to the branch network including websites and servers being disabled to block the malware from spreading to other systems. https://www.bleepingcomputer.com/news/security/texas-courts-hit-by-ransomware-network-disabled-to-limit-spread/

Ruhr University Bochum shuts down servers after ransomware attack - The Ruhr University Bochum (RUB), Ruhr-Universität Bochum in German, announced today that it was forced to shut down large parts of its central IT infrastructure, also including the backup systems, after a ransomware attack that took place overnight, between May 6 and May 7. https://www.bleepingcomputer.com/news/security/ruhr-university-bochum-shuts-down-servers-after-ransomware-attack/

Hackers Turned Virginia Government Websites Into Elaborate eBooks Scam Pages - Hackers hijacked and took over control of two subdomains on the official website of the Virginia state government. For some reason, they then turned the two sites into some sort of eBook scam. https://www.vice.com/en_us/article/88947x/hackers-virginia-government-websites-ebooks-scam

Magellan Health warns ransomware attack exposed PII - Magellan Health is warning customers that an April 11 ransomware attack may have affected their personal information. https://www.scmagazine.com/home/security-news/magellan-health-warns-ransomware-attack-exposed-pii/

Pitney Bowes hit with second ransomware attack - For the second time in a seven-month span, Pitney Bowes has been hit by a ransomware attack, but cyber experts and financial analysts cautioned against rashly judging the company’s security practices – or assuming fiscal doom – with some suggesting that lessons learned from the first attack may have limited the damage of the most recent one. https://www.scmagazine.com/home/security-news/ransomware/pitney-bowes-hit-with-second-ransomware-attack/

Ransomware attack prompts Texas courts to disable websites, servers - A ransomware attack on Texas courts discovered “during the overnight hours” last Thursday night forced the Office of Court Administration (OCA) to disable websites and servers. https://www.scmagazine.com/home/security-news/ransomware-attack-prompts-texas-courts-to-disable-websites-servers/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
Risk Management of Outsourced Technology Services
   
   Due Diligence in Selecting a Service Provider - Contract Issues
   
   Termination
   
   The extent and flexibility of termination rights sought can vary depending upon the service. Contracts for technologies subject to rapid change, for example, may benefit from greater flexibility in termination rights. Termination rights may be sought for a variety of conditions including change in control (e.g., acquisitions and mergers), convenience, substantial increase in cost, repeated failure to meet service levels, failure to provide critical services, bankruptcy,
   company closure, and insolvency.
   
   Institution management should consider whether or not the contract permits the institution to terminate the contract in a timely manner and without prohibitive expense (e.g., reasonableness of cost or penalty provisions). The contract should state termination and notification requirements with time frames to allow the orderly conversion to another provider. The contract must provide for return of the institution’s data, as well as other institution resources, in a timely manner and in machine readable format. Any costs associated with transition assistance should be clearly stated.
   
   Assignment
   
   The institution should consider contract provisions that prohibit assignment of the contract to a third party without the institution’s consent, including changes to subcontractors.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.
  
  
SECURITY TESTING - OUTSOURCED SYSTEMS
  

  Management is responsible for ensuring institution and customer data is protected, even when that data is transmitted, processed, or stored by a service provider. Service providers should have appropriate security testing based on the risk to their organization, their customer institutions, and the institution's customers. Accordingly, management and auditors evaluating TSPs providers should use the above testing guidance in performing initial due diligence, constructing contracts, and exercising ongoing oversight or audit responsibilities. Where indicated by the institution's risk assessment, management is responsible for monitoring the testing performed at the service provider through review of timely audits and test results or other equivalent evaluations.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 6 - COMPUTER SECURITY PROGRAM MANAGEMENT
  
  
Computers and the information they process are critical to many organizations' ability to perform their mission and business functions. It therefore makes sense that executives view computer security as a management issue and seek to protect their organization's computer resources as they would any other valuable asset. To do this effectively requires developing of a comprehensive management approach.
  
  This chapter presents an organization wide approach to computer security and discusses its important management function. Because organizations differ vastly in size, complexity, management styles, and culture, it is not possible to describe one ideal computer security program. However, this chapter does describe some of the features and issues common to many federal organizations.
  
  6.1 Structure of a Computer Security Program
  
  Many computer security programs that are distributed throughout the organization have different elements performing various functions. While this approach has benefits, the distribution of the computer security function in many organizations is haphazard, usually based upon history (i.e., who was available in the organization to do what when the need arose). Ideally, the distribution of computer security functions should result from a planned and integrated management philosophy.
  
  Managing computer security at multiple levels brings many benefits. Each level contributes to the overall computer security program with different types of expertise, authority, and resources. In general, higher-level officials (such as those at the headquarters or unit levels in the agency described above) better understand the organization as a whole and have more authority. On the other hand, lower-level officials (at the computer facility and applications levels) are more familiar with the specific requirements, both technical and procedural, and problems of the systems and the users. The levels of computer security program management should be complementary; each can help the other be more effective.
  
  Since many organizations have at least two levels of computer security management, this chapter divides computer security program management into two levels: the central level and the system level. (Each organization, though, may have its own unique structure.) The central computer security program can be used to address the overall management of computer security within an organization or a major component of an organization. The system-level computer security program addresses the management of computer security for a particular system.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.