R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc., the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and onsite FFIEC IT Security Audits

June 30, 2024

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Gold Standard Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Bank regulatory FFIEC IT audits - I perform annual IT audits required by the regulatory agencies for banks and credit unions. I am a former bank examiner over 30 years of IT auditing experience. Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees. All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:


Broadband Buildout Initiative - Apply by August 5 new Dallas Fed program will provide technical assistance to selected communities that are working on broadband infrastructure projects.
https://www.dallasfed.org/cd/digital?utm_source=MarketingCloud&utm_medium=email&utm_campaign=24.06.27+CD+-+DI+Round+2&utm_content=Read+more

Deadline looms for alleged LockBit extortion of Feds over 33TB of data - UPDATE: The deadline passed this afternoon at 2:27 Eastern on a threat ransomware group LockBit allegedly made to the Federal Reserve Board that they would release 33 terabytes of government data if a ransom was not paid. As of 5:18 Eastern, a Google search found no recent updates on the story and of three government agencies contacted, only the FBI responded, saying: "Thank you for reaching out. The FBI declines to comment."
https://www.scmagazine.com/news/lockbit-claims-ransom-negotiations-with-the-fed-over-33tb-of-stolen-data

US to ban Kaspersky software sales over ties with Russia - A report from Reuters cites sources familiar in reporting that the Biden administration is set to introduce new measures that would bar the import and sales of both Kaspersky-branded software and white label products that use Kaspersky software under a different brand name. The company confirmed the report and said it plans to fight the decision.
https://www.scmagazine.com/news/us-to-ban-kaspersky-software-sales-over-ties-with-russia-reports-say

After 2 hacks, CDK Global warns customers of social-engineering attacks - After experiencing two cyberattacks this week in which it had to take down its customer support lines and shut down most of its systems, CDK Global posted a voicemail advising that threat actors are contacting CDK customers and business partners posing as members or affiliates of CDK.
https://www.scmagazine.com/news/after-2-hacks-cdk-global-warns-customers-of-social-engineering-attacks

The common denominator behind CDK and other recent breaches - CDK Global was the latest company to fall victim to a massive cyberattack and as a result, was forced to shut down many of its systems.
https://www.scmagazine.com/perspective/identity-the-common-denominator-behind-cdk-and-other-recent-breaches

Cyber insurance terms drive companies to invest more in security, report finds - Though recovery costs continue to outpace coverage, companies are investing in network security to lower premiums and yield better policy terms.
https://www.cybersecuritydive.com/news/cyber-insurance-companies-invest-security/719930/

Foster a collaborative security culture to avoid becoming the chief incident scapegoat officer - Even just 10 years ago, the chief information security officer (CISO) role was more straightforward. Much has changed over that time, and radical changes to the threat landscape have forced the CISO to evolve.
https://www.scmagazine.com/perspective/foster-a-cybersecurity-culture-to-avoid-becoming-the-chief-incident-scapegoat-officer

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

After 2 hacks, CDK Global warns customers of social-engineering attacks - After experiencing two cyberattacks this week in which it had to take down its customer support lines and shut down most of its systems, CDK Global posted a voicemail advising that threat actors are contacting CDK customers and business partners posing as members or affiliates of CDK.
https://www.scmagazine.com/news/after-2-hacks-cdk-global-warns-customers-of-social-engineering-attacks

Identity: the common denominator behind CDK and other recent breaches - CDK Global was the latest company to fall victim to a massive cyberattack and as a result, was forced to shut down many of its systems.
https://www.scmagazine.com/perspective/identity-the-common-denominator-behind-cdk-and-other-recent-breaches

Santander warns US employees bank account info stolen in third-party database hack - Santander Bank warned thousands of U.S. employees that their direct deposit bank account information and social security numbers may have been obtained in a third-party database hack, according to filings with the Attorneys General of Maine and Vermont.
https://www.cybersecuritydive.com/news/santander-employees-database-hack/719394/

Scathing report on Medibank cyberattack highlights unenforced MFA - A scathing report by Australia's Information Commissioner details how misconfigurations and missed alerts allowed a hacker to breach Medibank and steal data from over 9 million people.
https://www.bleepingcomputer.com/news/security/scathing-report-on-medibank-cyberattack-highlights-unenforced-mfa/

Single point of software failure could hamstring 15K car dealerships for days - CDK Global touts itself as an all-in-one software-as-a-service solution that is "trusted by nearly 15,000 dealer locations." One connection, over an always-on VPN to CDK's data centers, gives a dealership customer relationship management (CRM) software, financing, inventory, and more back-office tools.
https://arstechnica.com/information-technology/2024/06/cyberattacks-have-forced-thousands-of-car-dealerships-to-paper-for-a-second-day/

Massachusetts 911 Outage Caused by Errant Firewall - A statewide outage of the 911 emergency response system in Massachusetts this week was caused by an errant firewall that prevented calls from getting to the 911 dispatch centers.
https://www.securityweek.com/massachusetts-911-outage-caused-by-errant-firewall/

Crown Equipment confirms a cyberattack disrupted manufacturing - Forklift manufacturer Crown Equipment confirmed today that it suffered a cyberattack earlier this month that disrupted manufacturing at its plants.
https://www.bleepingcomputer.com/news/security/crown-equipment-confirms-a-cyberattack-disrupted-manufacturing/

Levis caught with pants down: Hackers expose 72,000 customer account details - Denim clothing king Levi Strauss said some 72,000 customer accounts could be under attack from threat actors.
https://www.scmagazine.com/news/levis-gets-stripped-of-72000-customer-account-details

Coding error in forgotten API blamed for massive data breach - The data breach at Australian telco Optus, which saw over nine million customers' personal information exposed, has been blamed on a coding error that broke API access controls, and was left in place for years. 
https://www.theregister.com/2024/06/21/optus_data_breach_faulty_api/

Crooks get their hands on 500K+ radiology patients' records in cyber-attack - The 90-year-old Minnesota-based healthcare biz provides on-site radiology services for 22 hospitals and clinics, plus remote teleradiology for more than 100 facilities in upper Midwest America.
https://www.theregister.com/2024/06/20/radiology_information_loss/

Change Healthcare lists the medical data stolen in ransomware attack - UnitedHealth has confirmed for the first time what types of medical and patient data were stolen in the massive Change Healthcare ransomware attack, stating that data breach notifications will be mailed in July.
https://www.bleepingcomputer.com/news/security/change-healthcare-lists-the-medical-data-stolen-in-ransomware-attack/

LivaNova USA Discloses Data Breach Impacting 130,000 Individuals - The incident, according to a notification letter to the impacted individuals, was identified on November 19, roughly one month after hackers breached its network.
https://www.securityweek.com/livanova-usa-discloses-data-breach-impacting-130000-individuals/

Indonesia's national data center encrypted with LockBit ransomware variant - Hackers have encrypted systems at Indonesia's national data center with ransomware, disrupting immigration checks at airports and a variety of other public services, according to the country's communications ministry.
https://therecord.media/indonesia-national-data-centre-hacked

Return to the top of the newsletter

WEB SITE COMPLIANCE - We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
  
  Sound Practices to Help Maintain the Privacy of Customer E-Banking Information
  
  1. Banks should employ appropriate cryptographic techniques, specific protocols or other security controls to ensure the confidentiality of customer e-banking data.
  
  2. Banks should develop appropriate procedures and controls to periodically assess its customer security infrastructure and protocols for e-banking.
  
  3. Banks should ensure that its third-party service providers have confidentiality and privacy policies that are consistent with their own.
  
  4. Banks should take appropriate steps to inform e-banking customers about the confidentiality and privacy of their information. These steps may include:
  
  a)   Informing customers of the bank's privacy policy, possibly on the bank's website. Clear, concise language in such statements is essential to assure that the customer fully understands the privacy policy. Lengthy legal descriptions, while accurate, are likely to go unread by the majority of customers.
  
  b)   Instructing customers on the need to protect their passwords, personal identification numbers (PINs) and other banking and/or personal data. 
  
  c)   Providing customers with information regarding the general security of their personal computer, including the benefits of using virus protection software, physical access controls and personal firewalls for static Internet connections.

Return to the top of the newsletter

FFIEC IT SECURITY
- We continue our series on the FFIEC interagencyInformation Security Booklet.  
   
   SECURITY CONTROLS - IMPLEMENTATION - NETWORK ACCESS
   
   Protocols and Ports (Part 2 of 3)
   
   Other common protocols in a TCP/IP network include the following types.
   
   ! Address resolution protocol (ARP) - Obtains the hardware address of connected devices and matches that address with the IP address for that device. The hardware address is the Ethernet card's address, technically referred to as the "media access control" (MAC) address. Ethernet systems route messages by the MAC address, requiring a router to obtain both the IP address and the MAC address of connected devices. Reverse ARP (RARP) also exists as a protocol.
   
   ! Internet control message protocol (ICMP) - Used to send messages about network health between devices, provides alternate routing information if trouble is detected, and helps to identify problems with a routing.
   
   ! File transfer protocol (FTP) - Used to browse directories and transfer files. Although access can be authenticated or anonymous, FTP does not support encrypted authentication. Conducting FTP within encrypted channels, such as a Virtual Private Network (VPN), secure shell (SSH) or secure sockets layer (SSL) sessions can improve security.
   
   ! Trivial file transfer protocol (TFTP) - A file transfer protocol with no file - browsing ability, and no support for authentication.
   
   ! Simple mail - transfer protocol (SMTP) - Commonly used in e-mail systems to send mail.
   
   ! Post office protocol (POP) - Commonly used to receive e-mail.
   
   ! Hypertext transport protocol (HTTP) - Used for Web browsing.
   
   ! Secure shell (SSH)  - Encrypts communications sessions, typically used for remote administration of servers.
   
   ! Secure sockets layer (SSL)  - Typically used to encrypt Webbrowsing sessions, sometimes used to secure e-mail transfers and FTP sessions.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

 Chapter 9 - Assurance
 

 .4.1.4 Penetration Testing
 
 Penetration testing can use many methods to attempt a system break-in. In addition to using active automated tools as described above, penetration testing can be done "manually." The most useful type of penetration testing is to use methods that might really be used against the system. For hosts on the Internet, this would certainly include automated tools. For many systems, lax procedures or a lack of internal controls on applications are common vulnerabilities that penetration testing can target. Another method is "social engineering," which involves getting users or administrators to divulge information about systems, including their passwords.
 
 9.4.2 Monitoring Methods and Tools
 
 Security monitoring is an ongoing activity that looks for vulnerabilities and security problems. Many of the methods are similar to those used for audits, but are done more regularly or, for some automated tools, in real time.
 
 9.4.2.1 Review of Systems Logs
 
 A periodic review of system-generated logs can detect security problems, including attempts to exceed access authority or gain system access during unusual hours.

PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.