R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

July 3, 2022

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

How to achieve (real) passwordless authentication - Let's face it - everyone hates passwords. The good ones are hard to remember, and we've each got so many of them that some are bound to be bad. In enterprises and on websites, help desks and tech-support staffers spend far too much time resetting user passwords. https://www.scmagazine.com/resource/identity-and-access/achieving-real-passwordless-authentication

Are passwords finally being pushed out by frictionless authentication alternatives? - The cybersecurity industry may finally be on the cusp of meaningfully moving beyond passwords, as up-and-coming technologies promise a more secure authentication experience without causing user friction, according to a cybersecurity veteran. https://www.scmagazine.com/analysis/identity-and-access/are-passwords-finally-being-pushed-out-by-frictionless-authentication-alternatives

The future of personal identity - Imagine a day in the near future when you go to a bank to apply for a loan. Instead of providing a driver's license, passport or birth certificate to verify your identity, and then filling out forms providing your date of birth, street address, email address, Social Security number and employment status, you simply tap your phone and display a QR code that the bank's loan office scans to get all that information. https://www.scmagazine.com/resource/identity-and-access/the-future-of-personal-identity

Cloud Security Technical Reference Architecture - Executive Order 14028, “Improving the Nation’s Cybersecurity” marks a renewed commitment to and prioritization of federal cybersecurity modernization and strategy.
https://www.meritalk.com/articles/cisa-issues-revised-cloud-security-tra/
https://www.cisa.gov/sites/default/files/publications/Cloud%20Security%20Technical%20Reference%20Architecture.pdf

Pair of Brand-New Cybersecurity Bills Become Law - Bipartisan legislation allows cybersecurity experts to work across multiple agencies and provides federal support for local governments. https://www.darkreading.com/careers-and-people/cybersecurity-bills-become-law

GAO - Electronic Health Information - HHS Needs to Improve Communications for Breach Reporting - Health IT systems can enhance health care delivery and empower providers to make informed decisions about patient health. But these systems may be vulnerable to breaches. https://www.gao.gov/products/gao-22-105425

Job opening: Department of Energy is on the hunt for information security chief - Greg Sisson, the Department of Energy’s chief information security officer, will be leaving his post on July 11 for a job in the private sector. https://www.scmagazine.com/analysis/careers/job-opening-department-of-energy-is-on-the-hunt-for-information-security-chief

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Info on 1.5m people stolen from US bank in cyberattack - Time to rethink that cybersecurity strategy? A US bank has said at least the names and social security numbers of more than 1.5 million of its customers were stolen from its computers in December. https://www.msn.com/en-us/money/news/info-on-1-5m-people-stolen-from-us-bank-in-cyberattack/ar-AAYHUsa

5 more organizations added to Eye Care Leaders attack total, now biggest PHI breach of 2022 - The impact from the Eye Care Leaders ransomware attack continues to expand, with five more covered entities reporting impacts to patient data in the last week. https://www.scmagazine.com/analysis/breach/5-more-organizations-added-to-eye-care-leaders-attack-total-now-biggest-phi-breach-of-2022

2 Texas Hospitals Infected With Malicious Code May Face PHI Exposure - Baptist Medical Center and Resolute Health Hospital informed patients that their network was infected with malicious code in April, potentially resulting in PHI exposure. https://healthitsecurity.com/news/2-texas-hospitals-infected-with-malicious-code-face-potential-phi-exposure

Cloudflare Outage Whacks 19 Data Centers for Global Traffic - A network configuration change that went awry resulted in a massive Cloudflare outage that left many of the world's most popular websites inaccessible for 75 minutes. https://www.govinfosecurity.com/cloudflare-outage-whacks-19-data-centers-for-global-traffic-a-19429

TC Takes Action Against CafePress Over Massive Data Breach, Cover-Up - The Federal Trade Commission (FTC) on Friday announced that it has finalized an order against CafePress, requiring it to improve its security posture following a cybersecurity incident that the company attempted to cover up. https://www.securityweek.com/ftc-takes-action-against-cafepress-over-massive-data-breach-cover

More than $100m in cryptocurrency stolen from blockchain biz - 'A humbling and unfortunate reminder' that monsters lurk under bridges - Blockchain venture Harmony offers bridge services for transferring crypto coins across different blockchains, but something has gone badly wrong. https://www.theregister.com/2022/06/24/harmony_100m_cryptocurrency_theft/

Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft - A China-based advanced persistent threat (APT) actor, active since early 2021, appears to be using ransomware and double-extortion attacks as camouflage for systematic, government-sponsored cyberespionage and intellectual property theft. https://www.darkreading.com/attacks-breaches/chinese-apt-ransomware-attacks-cover-ip-theft

‘Money mule’ accounts have transferred $3 billion in the first half of 2022 - hybrid bot technology to open the accounts on a wider basis, according to BioCatch, a behavioral biometrics company. https://www.scmagazine.com/analysis/identity-and-access/money-mule-accounts-have-transferred-3-billion-in-the-first-half-of-2022

Return to the top of the newsletter

WEB SITE COMPLIANCE -  OCC - Threats from Fraudulent Bank Web Sites - Risk Mitigation and Response Guidance for Web Site Spoofing Incidents (Part 4 of 5)
    
    
PROCEDURES TO ADDRESS SPOOFING - Spoofing Incident Response
    
    To respond to spoofing incidents effectively, bank management should establish structured and consistent procedures.  These procedures should be designed to close fraudulent Web sites, obtain identifying information from the spoofed Web site to protect customers, and preserve evidence that may be helpful in connection with any subsequent law enforcement investigations.
    
    Banks can take the following steps to disable a spoofed Web site and recover customer information.  Some of these steps will require the assistance of legal counsel.
    
    *  Communicate promptly, including through written communications, with the Internet service provider (ISP) responsible for hosting the fraudulent Web site and demand that the suspect Web site be shutdown;
    *  Contact the domain name registrars promptly, for any domain name involved in the scheme, and demand the disablement of the domain names;
    *  Obtain a subpoena from the clerk of a U.S. District Court directing the ISP to identify the owners of the spoofed Web site and to recover customer information in accordance with the Digital Millennium Copyright Act;
    *  Work with law enforcement; and
    *  Use other existing mechanisms to report suspected spoofing activity.
    
    The following are other actions and types of legal documents that banks can use to respond to a spoofing incident:
    
    *  Banks can write letters to domain name registrars demanding that the incorrect use of their names or trademarks cease immediately;
    *  If these demand letters are not effective, companies with registered Internet names can use the Uniform Domain Name Dispute Resolution Process (UDRP) to resolve disputes in which they suspect that their names or trademarks have been illegally infringed upon.  This process allows banks to take action against domain name registrars to stop a spoofing incident.  However, banks must bear in mind that the UDRP can be relatively time-consuming.  For more details on this process see http://www.icann.org/udrp/udrp-policy-24oct99.htm; and
    *  Additional remedies may be available under the federal Anti-Cybersquatting Consumer Protection Act (ACCPA) allowing thebank to initiate immediate action in federal district court under section 43(d) of the Lanham Act, 15 USC 1125(d).  Specifically, the ACCPA can provide for rapid injunctive relief without the need to demonstrate a similarity or likelihood of confusion between the goods or services of the parties.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
  
  
SYSTEMS DEVELOPMENT, ACQUISITION, AND MAINTENANCE - SOFTWARE DEVELOPMENT AND ACQUISITION
  
  Security Controls in Application Software

  
  Application development should incorporate appropriate security controls, audit trails, and activity logs. Typical application access controls are addressed in earlier sections. Application security controls should also include validation controls for data entry and data processing. Data entry validation controls include access controls over entry and changes to data, error checks, review of suspicious or unusual data, and dual entry or additional review and authorization for highly sensitive transactions or data. Data processing controls include: batch control totals; hash totals of data for comparison after processing; identification of any changes made to data outside the application (e.g., data-altering utilities); and job control checks to ensure programs run in correct sequence (see the booklet "Computer Operations" for additional considerations).
  
  Some applications will require the integration of additional authentication and encryption controls to ensure integrity and confidentiality of the data. As customers and merchants originate an increasing number of transactions, authentication and encryption become increasingly important to ensure non-repudiation of transactions.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 19 - CRYPTOGRAPHY

19.2.4 User Authentication

Cryptography can increase security in user authentication techniques. As discussed in Chapter 16, cryptography is the basis for several advanced authentication methods. Instead of communicating passwords over an open network, authentication can be performed by demonstrating knowledge of a cryptographic key. Using these methods, a one-time password, which is not susceptible to eavesdropping, can be used. User authentication can use either secret or public key cryptography.

19.3 Implementation Issues

This section explores several important issues that should be considered when using (e.g., designing, implementing, integrating) cryptography in a computer system.

19.3.1 Selecting Design and Implementation Standards

Applicable security standards provide a common level of security and interoperability among users..

NIST and other organizations have developed numerous standards for designing, implementing, and using cryptography and for integrating it into automated systems. By using these standards, organizations can reduce costs and protect their investments in technology. Standards provide solutions that have been accepted by a wide community and that have been reviewed by experts in relevant areas. Standards help ensure interopability among different vendors' equipment, thus allowing an organization to select from among various products in order to find cost-effective equipment.

Managers and users of computer systems will have to select among various standards when deciding to use cryptography. Their selection should be based on cost-effectiveness analysis, trends in the standard's acceptance, and interoperability requirements. In addition, each standard should be carefully analyzed to determine if it is applicable to the organization and the desired application. For example, the Data Encryption Standard and the Escrowed Encryption Standard are both applicable to certain applications involving communications of data over commercial modems. Some federal standards are mandatory for federal computer systems, including DES (FIPS 46-2) and the DSS (FIPS 181).


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.