R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc., the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and onsite FFIEC IT Security Audits

June 9, 2024

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Gold Standard Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Bank regulatory FFIEC IT audits - I perform annual IT audits required by the regulatory agencies for banks and credit unions. I am a former bank examiner over 30 years of IT auditing experience. Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees. All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:


Why email attacks still loom as a major threat to critical infrastructure sectors - While every organization across every vertical faces the risk of experiencing a cyberattack, certain industries are particularly susceptible to being targeted by threat actors—especially those in critical infrastructure sectors. https://www.scmagazine.com/perspective/why-email-attacks-still-loom-as-a-major-threat-to-critical-infrastructure-sectors

U.S. Dismantles World's Largest 911 S5 Botnet with 19 Million Infected Devices - The U.S. Department of Justice (DoJ) on Wednesday said it dismantled what it described as "likely the world's largest botnet ever," which consisted of an army of 19 million infected devices that was leased to other threat actors to commit a wide array of offenses. https://thehackernews.com/2024/05/us-dismantles-worlds-largest-911-s5.html

Seven best practices for managing non-human identities - The concept of identity and access management (IAM) has undergone a remarkable transformation in recent years. Traditionally focused on managing human identities, IAM now extends to a wide range of non-human identities (NHI) – from applications and service accounts to virtual machines, cloud resources, and even IoT devices. https://www.scmagazine.com/perspective/seven-best-practices-for-managing-non-human-identities

Cyber risk is rising for poorly configured OT devices - Since late last year, researchers have identified more politically motivated groups targeting water and other key critical infrastructure systems. https://www.cybersecuritydive.com/news/cyber-risk-ot-devices/717873/

Securing your call centers: Best practices for cybersecurity protection - All call centers face cybersecurity threats because they handle information like credit card numbers, health records, and personal purchase history. https://www.cybersecuritydive.com/spons/securing-your-call-centers-best-practices-for-cybersecurity-protection/717175/

Cox fixed an API auth bypass exposing millions of modems to attacks - ​Cox Communications has fixed an authorization bypass vulnerability that enabled remote attackers to abuse exposed backend APIs to reset millions of Cox-supplied modems' settings and steal customers' sensitive personal information. https://www.bleepingcomputer.com/news/security/cox-fixed-an-api-auth-bypass-exposing-millions-of-modems-to-attacks/

HHS reverses course, allows Change Healthcare to file breach notifications for others - Change Healthcare to file breach notifications on behalf of the thousands of organizations impacted by February’s ransomware attack. https://therecord.media/hhs-changes-course-change-healthcare-breach-notifications-customers

Top 2024 SaaS Concerns: Data breaches, AI and insider risks - Heading into the rest of 2024 it’s clear that protecting SaaS data from data breaches, corruption by new AI tools, and insider risk, remain important challenges for security pros. https://www.scmagazine.com/feature/data-breaches-impact-of-ai-and-insider-risk-top-the-list-of-saas-security-concerns

Ransomware report finds 43% of data unrecoverable after attack - Ransomware victims permanently lose 43% of the data affected by an attack on average, according to a report. https://www.scmagazine.com/news/ransomware-report-finds-43-of-data-unrecoverable-after-attack

State of CISO Leadership: 2024 - A CISO’s job in 2024 is in flux. It has evolved from technical, to strategic, to business leadership and sometimes being the legal fall guy. Those takeaways are from keynotes, roundtables and conversations with chief information security officers at the recent RSA Conference. https://www.scmagazine.com/feature/state-of-ciso-leadership-2024

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

First American says personal data of 44K breached in December cyberattack - The company previously said the attack had a material impact on Q4 operations, but would not have a significant long-term impact on results. https://www.cybersecuritydive.com/news/first-american-44k-breached-cyberattack/717377/

Multi-day DDoS storm batters Internet Archive - The Internet Archive has been under a distributed-denial-of-service (DDoS) attack since Sunday, and is trying to keep services going. https://www.theregister.com/2024/05/29/ddos_internet_archive/

Ransomware attack forces Seattle Public Library systems offline - A ransomware attack over the weekend forced administrators of the Seattle Public Library system to take their systems offline. https://statescoop.com/ransomware-seattle-public-library/

Christie's ransomware data breach - Christie’s website went offline earlier this month due to what the company described at the time as a “technology security incident”. The cyberattack was launched just as th
e auction house was attempting to sell high-value items worth an estimated $840 million. https://www.securityweek.com/christies-confirms-data-breach-after-ransomware-group-claims-attack/

2.8M US folks learn their personal info was swiped months ago in Sav-Rx IT heist - Sav-Rx has started notifying about 2.8 million people that their personal information was likely stolen during an IT intrusion that happened more than seven months ago. https://www.theregister.com/2024/05/28/savrx_data_theft/

BBC suffers data breach impacting current, former employees - The BBC has disclosed a data security incident that occurred on May 21, involving unauthorized access to files hosted on a cloud-based service, compromising the personal information of BBC Pension Scheme members. https://www.bleepingcomputer.com/news/security/bbc-suffers-data-breach-impacting-current-former-employees/

Snowflake customers caught in identity-based attack spree - Cyber authorities and researchers warn many major companies could be compromised by the targeted attacks against Snowflake customer environments. https://www.cybersecuritydive.com/news/snowflake-customer-databases-breached/717801/

Live Nation confirms jumbo breach, Ticketmaster customer data exposed - The live concert and entertainment giant disclosed the compromise days after reports began surfacing of a data breach. The company said it detected the intrusion on May 20. https://www.cybersecuritydive.com/news/live-nation-ticketmaster-cyberattack/717787/

AI firm Hugging Face discloses leak of secrets on its Spaces platform - Artificial intelligence company Hugging Face disclosed that secrets from its Spaces platform may have been accessed without proper authorization last week. https://www.scmagazine.com/news/ai-firm-hugging-face-discloses-leak-of-secrets-on-its-spaces-platform

Snowflake Data Breach Impacts Ticketmaster, Other Organizations - Ticketmaster and multiple other organizations have had significant amounts of information stolen in a data breach at cloud storage company Snowflake, security researchers report. https://www.securityweek.com/snowflake-hack-impacts-ticketmaster-other-organizations/

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
   
   
Sound Practices for Managing Outsourced E-Banking Systems and Services (Part 3 of 3)
   

   4. Banks should ensure that periodic independent internal and/or external audits are conducted of outsourced operations to at least the same scope required if such operations were conducted in-house.
   
   a)   For outsourced relationships involving critical or technologically complex e-banking services/applications, banks may need to arrange for other periodic reviews to be performed by independent third parties with sufficient technical expertise.
   
   5. Banks should develop appropriate contingency plans for outsourced e-banking activities.
   
   a)  Banks need to develop and periodically test their contingency plans for all critical e-banking systems and services that have been outsourced to third parties.
   
   b)  Contingency plans should address credible worst-case scenarios for providing continuity of e-banking services in the event of a disruption affecting outsourced operations.
   
   c)   Banks should have an identified team that is responsible for managing recovery and assessing the financial impact of a disruption in outsourced e-banking services.
   
   6. Banks that provide e-banking services to third parties should ensure that their operations, responsibilities, and liabilities are sufficiently clear so that serviced institutions can adequately carry out their own effective due diligence reviews and ongoing oversight of the relationship.
   
   a)   Banks have a responsibility to provide serviced institutions with information necessary to identify, control and monitor any risks associated with the e-banking service arrangement.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
  
  
SECURITY CONTROLS - IMPLEMENTATION - NETWORK ACCESS

  
  Network security requires effective implementation of several control mechanisms to adequately secure access to systems and data. Financial institutions must evaluate and appropriately implement those controls relative to the complexity of their network.  Many institutions have increasingly complex and dynamic networks stemming from the growth of distributed computing.
  
  Security personnel and network administrators have related but distinct responsibilities for ensuring secure network access across a diverse deployment of interconnecting network servers, file servers, routers, gateways, and local and remote client workstations.  Security personnel typically lead or assist in the development of policies, standards, and procedures, and monitor compliance. They also lead or assist in incident-response efforts.  Network administrators implement the policies, standards, and procedures in their day-to-day operational role.
  
  Internally, networks can host or provide centralized access to mission-critical applications and information, making secure access an organizational priority. Externally, networks integrate institution and third-party applications that grant customers and insiders access to their financial information and Web-based services. Financial institutions that fail to restrict access properly expose themselves to increased transaction, reputation, and compliance risk from threats including the theft of customer information, data alteration, system misuse, or denial-of-service attacks.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Chapter 9 - Assurance

 

 9.4 Operational Assurance
 

 Design and implementation assurance addresses the quality of security features built into systems. Operational assurance addresses whether the system's technical features are being bypassed or have vulnerabilities and whether required procedures are being followed. It does not address changes in the system's security requirements, which could be caused by changes to the system and its operating or threat environment.
 
 Security tends to degrade during the operational phase of the system life cycle. System users and operators discover new ways to intentionally or unintentionally bypass or subvert security (especially if there is a perception that bypassing security improves functionality). Users and administrators often think that nothing will happen to them or their system, so they shortcut security. Strict adherence to procedures is rare, and they become outdated, and errors in the system's administration commonly occur.
 
 Organizations use two basic methods to maintain operational assurance:
 
 !  A system audit -- a one-time or periodic event to evaluate security. An audit can vary widely in scope: it may examine an entire system for the purpose of reaccreditation or it may investigate a single anomalous event.
 
 !  Monitoring -- an ongoing activity that checks on the system, its users, or the environment.
 
 In general, the more "real-time" an activity is, the more it falls into the category of monitoring. This distinction can create some unnecessary linguistic hairsplitting, especially concerning system-generated audit trails. Daily or weekly reviewing of the audit trail (for unauthorized access attempts) is generally monitoring, while an historical review of several months' worth of the trail (tracing the actions of a specific user) is probably an audit.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.