R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

September 12, 2021

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
FYI - CISA urges hospitals to remediate flaws in Philips patient monitoring devices - A number of vulnerabilities found in certain Philips patient monitoring devices could enable an attacker with either access to the medical device network or physical access to perform a number of malicious activities, including accessing patient data, according to a Department of Homeland Security Cybersecurity and Infrastructure Security Agency alert. https://www.scmagazine.com/analysis/asset-management/cisa-urges-hospitals-to-remediate-flaws-in-philips-patient-monitoring-devices

ISAC group unveils pragmatic, attainable cyber standards for school districts - With the understanding that many school districts lack the resources to realistically meet every single cybersecurity best practice, the ISAC group K12 SIX has released its own set of pragmatic infosec standards for the education sector - with each security measure divided into four distinct levels of implementation. https://www.scmagazine.com/analysis/leadership/isac-group-unveils-pragmatic-attainable-cyber-standards-for-school-districts

Rethinking the approach to health care’s reliance on IT as security leaders - A chief information security officer bears the responsibility of driving a culture of security across the enterprise from gaining board and financial support for key initiatives, to implementing tech and processes that will keep the network safe or online after a cyberattack. https://www.scmagazine.com/feature/strategy/rethinking-the-approach-to-health-cares-reliance-on-it-as-security-leaders

House bill would create new cyber training and apprentice programs at DHS - A bill introduced in the House this week would create a program within the Cybersecurity and Infrastructure Security Agency to retrain military veterans and members of the armed forces. https://www.scmagazine.com/analysis/careers/house-bill-would-create-new-cyber-training-and-apprentice-programs-at-dhs

Why companies need to practice due diligence for cybersecurity - For years, cybersecurity was considered the business of the IT department. In the corporate structure, it made sense. IT was in charge of the computers and the network, cybersecurity was a computer issue, thus cybersecurity was an IT issue. https://www.scmagazine.com/perspective/strategy/why-companies-need-to-practice-due-diligence-for-cybersecurity

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - UK VoIP telco receives 'colossal ransom demand', reveals REvil cybercrooks suspected of 'organised' DDoS attacks on UK VoIP companies - Two UK VoIP operators have had their services disrupted over the last couple of days by ongoing, aggressive DDoS attacks. https://www.theregister.com/2021/09/02/uk_voip_telcos_revil_ransom/

Fired NY credit union employee nukes 21GB of data in revenge - A former employee of a New York credit union, pleaded guilty to accessing the financial institution's computer systems without authorization and destroying over 21 gigabytes of data in revenge after being fired. https://www.bleepingcomputer.com/news/security/fired-ny-credit-union-employee-nukes-21gb-of-data-in-revenge/

Dallas Terminates Worker Who Deleted 22.5 TB of Police Data - The Dallas Police Department employee responsible for deleting 22.5 terabytes of police data was fired by city officials Friday. The worker had been employed for nine years and showed a history of errors. https://www.govtech.com/security/dallas-terminates-worker-who-deleted-22-5-tb-of-police-data 

Dallas school district admits SSNs and more of all employees and students since 2010 accessed during security incident - The Dallas Independent School District said if you were a student, employee or contractor between 2010 and the present, your personal data was likely downloaded by an "unauthorized third party." https://www.zdnet.com/article/dallas-school-district-admits-ssns-and-more-of-all-employees-and-students-since-2010-accessed-during-security-incident/

New Zealand internet outage blamed on DDoS attack on nation's third largest internet provider - Here in the UK, Sky broadband users back online - Parts of New Zealand were cut off from the digital world today after a major local ISP was hit by an aggressive DDoS attack. https://www.theregister.com/2021/09/03/nz_outage/

French government visa website hit by cyber-attack that exposed applicants' personal data - The personal data of visa applicants hoping to visit or emigrate to France has been exposed in a cyber-attack targeting the French government’s ‘France-Visas’ website. https://portswigger.net/daily-swig/french-government-visa-website-hit-by-cyber-attack-that-exposed-applicants-personal-data

Howard University takes a ‘cyber day’ after ransomware attack - Prominent Washington, D.C.- area higher education institution Howard University was forced to cancel classes on Tuesday, after a Sept. 3 ransomware attack forced the HBCU’s Enterprise Technology Services team to shut down its network. https://www.scmagazine.com/analysis/ransomware/howard-university-takes-a-cyber-day-after-ransomware-attack

Dupage Medical, Sturdy Memorial patients file lawsuits after PHI, data breaches - In the last week, the patients impacted by the data breaches reported by Dupage Medical Group and Massachusetts-based Sturdy Memorial Hospital have filed two separate lawsuits, alleging a range of complaints and insecure data practices. https://www.scmagazine.com/analysis/breach/dupage-medical-sturdy-memorial-patients-file-lawsuits-after-phi-data-breaches

Hackers install crypto miner on Jenkins project server via Confluence exploit - The Jenkins project reported Friday that one of its servers was successfully attacked by hackers using a recently warned about Confluence vulnerability to install a cryptocurrency miner. https://www.scmagazine.com/news/breach/hackers-install-crypto-miner-on-jenkins-project-server-via-confluence-exploit

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
   
   
Risk management principles (Part 2 of 2)
   
   The Committee recognizes that banks will need to develop risk management processes appropriate for their individual risk profile, operational structure and corporate governance culture, as well as in conformance with the specific risk management requirements and policies set forth by the bank supervisors in their particular jurisdiction(s). Further, the numerous e-banking risk management practices identified in this Report, while representative of current industry sound practice, should not be considered to be all-inclusive or definitive, since many security controls and other risk management techniques continue to evolve rapidly to keep pace with new technologies and business applications.
   
   This Report does not attempt to dictate specific technical solutions to address particular risks or set technical standards relating to e-banking. Technical issues will need to be addressed on an on-going basis by both banking institutions and various standards-setting bodies as technology evolves. Further, as the industry continues to address e-banking technical issues, including security challenges, a variety of innovative and cost efficient risk management solutions are likely to emerge. These solutions are also likely to address issues related to the fact that banks differ in size, complexity and risk management culture and that jurisdictions differ in their legal and regulatory frameworks.
   
   For these reasons, the Committee does not believe that a "one size fits all" approach to e-banking risk management is appropriate, and it encourages the exchange of good practices and standards to address the additional risk dimensions posed by the e-banking delivery channel. In keeping with this supervisory philosophy, the risk management principles and sound practices identified in this Report are expected to be used as tools by national supervisors and implemented with adaptations to reflect specific national requirements where necessary, to help promote safe and secure e-banking activities and operations.
   
   The Committee recognizes that each bank's risk profile is different and requires a risk mitigation approach appropriate for the scale of the e-banking operations, the materiality of the risks present, and the willingness and ability of the institution to manage these risks. These differences imply that the risk management principles presented in this Report are intended to be flexible enough to be implemented by all relevant institutions across jurisdictions. National supervisors will assess the materiality of the risks related to e-banking activities present at a given bank and whether, and to what extent, the risk management principles for e-banking have been adequately met by the bank's risk management framework.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
   
   SECURITY CONTROLS - IMPLEMENTATION
   

   LOGICAL AND ADMINISTRATIVE ACCESS CONTROL 
   
   AUTHENTICATION -
Token Systems (2 of 2)
   
   Weaknesses in token systems relate to theft of the token, ease in guessing any password generating algorithm within the token, ease of successfully forging any authentication credential that unlocks the token, and reverse engineering, or cloning, of the token. Each of these weaknesses can be addressed through additional control mechanisms. Token theft generally is protected against by policies that require prompt reporting and cancellation of the token's ability to allow access to the system. Additionally, the impact of token theft is reduced when the token is used in multi - factor authentication; for instance, the password from the token is paired with a password known only by the user and the system. This pairing reduces the risk posed by token loss, while increasing the strength of the authentication mechanism. Forged credentials are protected against by the same methods that protect credentials in non - token systems. Protection against reverse engineering requires physical and logical security in token design. For instance, token designers can increase the difficulty of opening a token without causing irreparable damage, or obtaining information from the token either by passive scanning or active input/output.
   
   Token systems can also incorporate public key infrastructure, and biometrics.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 16 - TECHNICAL CONTROLS - IDENTIFICATION AND AUTHENTICATION
  
  16.2.2 Smart Tokens (1 of 2)
   
  A smart token expands the functionality of a memory token by incorporating one or more integrated circuits into the token itself. When used for authentication, a smart token is another example of authentication based on something a user possesses (i.e., the token itself). A smart token typically requires a user also to provide something the user knows (i.e., a PIN or password) in order to "unlock" the smart token for use.
  
  There are many different types of smart tokens. In general, smart tokens can be divided three different ways based on physical characteristics, interface, and protocols used. These three divisions are not mutually exclusive.
  
  Physical Characteristics. Smart tokens can be divided into two groups: smart cards and other types of tokens. A smart card looks like a credit card, but incorporates an embedded microprocessor. Smart cards are defined by an International Standards Organization (ISO) standard. Smart tokens that are not smart cards can look like calculators, keys, or other small portable objects.
  
  Interface. Smart tokens have either a manual or an electronic interface. Manual or human interface tokens have displays and/or keypads to allow humans to communicate with the card. Smart tokens with electronic interfaces must be read by special reader/writers. Smart cards, described above, have an electronic interface. Smart tokens that look like calculators usually have a manual interface.
  
  Protocol. There are many possible protocols a smart token can use for authentication. In general, they can be divided into three categories: static password exchange, dynamic password generators, and challenge-response.
  
  1)  Static tokens work similarly to memory tokens, except that the users authenticate themselves to the token and then the token authenticates the user to the computer.
  
  2)  A token that uses a dynamic password generator protocol creates a unique value, for example, an eight-digit number, that changes periodically (e.g., every minute). If the token has a manual interface, the user simply reads the current value and then types it into the computer system for authentication. If the token has an electronic interface, the transfer is done automatically. If the correct value is provided, the log-in is permitted, and the user is granted access to the system.
  
  3)  Tokens that use a challenge-response protocol work by having the computer generate a challenge, such as a random string of numbers. The smart token then generates a response based on the challenge. This is sent back to the computer, which authenticates the user based on the response. The challenge-response protocol is based on cryptography. Challenge-response tokens can use either electronic or manual interfaces.

PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.