FYI
- Please make sure you have changed our phone number to
806-535-8300. At the end of the year I will be disconnecting
all the landlines.
FYI
- Remember that security probe that ended with a sheriff cuffing the
pen testers? The contract is now public so you can decide who
screwed up - The infosec duo cuffed during an IT penetration test
that went south last week are out of jail, though not necessarily
out of the woods.
https://www.theregister.co.uk/2019/09/19/iowa_pentester_update/
Can automation solve your patching problems? - With complex systems
and the pressure of keeping everything up to date, patch management
consistently presents a challenge for IT-Ops and infrastructure
teams, even those that have a traditional patching solution in
place.
https://www.scmagazine.com/home/opinion/executive-insight/can-automation-solve-your-patching-problems/
CFPB probes fake credit card accounts at Bank of America - The
Consumer Financial Protection Bureau (CFPB) has been probing of Bank
of America (BoA) for allegedly opening customer credit card accounts
with authorization a la Wells Fargo.
https://www.scmagazine.com/home/security-news/cfpb-probes-fake-credit-card-accounts-at-bank-of-america/
Cyber insurance premium costs rise 5 percent for 2019, despite
increased attacks - The average cost for cyber insurance rose about
five percent in 2019 despite the large increase in the number of
attacks and claims files, a new report has found.
https://www.scmagazine.com/home/security-news/data-breach/cyber-insurance-premium-costs-rise-5-percent-for-2019-despite-increased-attacks/
Arrest made in Ecuador's massive data breach - Ecuador police arrest
director of data analytics firm that leaked the personal records of
most of Ecuador's population. Ecuadorian authorities have arrested
the executive of a data analytics firm after his company left the
personal records of most of Ecuador's population exposed online on
an internet server.
https://www.zdnet.com/article/arrest-made-in-ecuadors-massive-data-breach/
Wakulla County school board elects to negotiate with ransomware
hackers - Wakulla County Schools board members on Wednesday
reportedly voted unanimously to negotiate with hackers who infected
the Florida-based district’s systems with ransomware.
https://www.scmagazine.com/home/security-news/ransomware/wakulla-county-school-board-elects-to-negotiate-with-ransomware-hackers/
Consumer ransomware insurance? You could be painting a target on us
all for avaricious crims - Fire, theft, flood – and now cyber
attack. Customers of a Californian biz offering payouts of up to
$50,000 in case your cat videos get Wannacry’d but experts worry it
could make the problem worse.
https://www.theregister.co.uk/2019/09/13/california_ransomware_insurance_50k_payout/
ATTACKS, INTRUSIONS, DATA THEFT & LOSS
FYI
- WeWork unsecured WiFi exposes documents - Security scans of a
WeWork building in New York’s Financial District uncovered security
vulnerabilities in the company’s WiFi network that exposed financial
records and devices of companies in the building.
https://www.scmagazine.com/home/security-news/wework-unsecured-wifi-exposes-documents/
Report: Scotiabank exposed source code and credentials on GitHub
repositories - For months in some instances, Canadian banking giant
Scotiabank reportedly stored highly sensitive digital property on a
series of publicly open and accessible GitHub repositories,
potentially exposing its internal source code, login credentials and
access keys.
https://www.scmagazine.com/home/security-news/data-breach/report-scotiabank-exposed-source-code-and-credentials-on-github-repositories/
Thinkful confirms breach - On the heels of its acquisition by Chegg,
developer education site Thinkful said an unauthorized third party
had breached its systems.
https://www.scmagazine.com/home/security-news/data-breach/thinkful-confirms-breach/
Malinda Air locks down publicly exposed servers - Indonesian budget
airline Malindo Air reported on September 19 it had locked down the
formerly publicly exposed servers that had compromised passenger
data.
https://www.scmagazine.com/home/security-news/data-breach/malinda-air-locks-down-publicly-exposed-servers/
Millions of YouTube accounts hijacked through phishing and
compromised 2FA - Cybersecurity executives blamed YouTube’s
continued use of multifactor authentication and relying on user
credentials instead of more advanced forms authentication as the
reasons behind why millions of accounts were hijacked over the last
few days.
https://www.scmagazine.com/home/security-news/millions-of-youtube-accounts-hijacked-through-phishing-and-compromised-2fa/
Eight cities’ payment records impacted in Click2Gov portal breach -
For the second time since 2017, the third-party government
bill-payment portal Click2Gov has experienced a significant data
breach affecting thousands of individuals in multiple cities across
the U.S.
https://www.scmagazine.com/web-services-security-e-commerce-security/eight-cities-payment-records-impacted-in-click2gov-portal-breach/
Ransomware attack disrupts Campbell County Health - Campbell County
Health (CCH) in Wyoming on Sept. 20 was hit with a ransomware attack
that has severely disrupted the facility’s computer network,
requiring a return to paper record keeping and the transfer of some
patients to non-affected hospitals.
https://www.scmagazine.com/home/security-news/ransomware/ransomware-attack-disrupts-campbell-county-health/
Return to the top
of the newsletter
WEB SITE COMPLIANCE -
We continue the series regarding
FDIC Supervisory Insights regarding
Incident Response
Programs. (2 of 12)
The
Importance of an Incident Response Program
A bank's ability to respond to security incidents in a planned and
coordinated fashion is important to the success of its information
security program. While IRPs are important for many reasons, three
are highlighted in this article.
First, though incident prevention is important, focusing solely on
prevention may not be enough to insulate a bank from the effects of
a security breach. Despite the industry's efforts at identifying and
correcting security vulnerabilities, every bank is susceptible to
weaknesses such as improperly configured systems, software
vulnerabilities, and zero-day exploits. Compounding the problem is
the difficulty an organization experiences in sustaining a "fully
secured" posture. Over the long term, a large amount of resources
(time, money, personnel, and expertise) is needed to maintain
security commensurate with all potential vulnerabilities.
Inevitably, an organization faces a point of diminishing returns
whereby the extra resources applied to incident prevention bring a
lesser amount of security value. Even the best information security
program may not identify every vulnerability and prevent every
incident, so banks are best served by incorporating formal incident
response planning to complement strong prevention measures. In the
event management's efforts do not prevent all security incidents
(for whatever reason), IRPs are necessary to reduce the sustained
damage to the bank.
Second, regulatory agencies have recognized the value of IRPs and
have mandated that certain incident response requirements be
included in a bank's information security program. In March 2001,
the FDIC, the Office of the Comptroller of the Currency (OCC), the
Office of Thrift Supervision (OTS), and the Board of Governors of
the Federal Reserve System (FRB) (collectively, the Federal bank
regulatory agencies) jointly issued guidelines establishing
standards for safeguarding customer information, as required by the
Gramm-Leach-Bliley Act of 1999. These standards require banks to
adopt response programs as a security measure. In April 2005, the
Federal bank regulatory agencies issued interpretive guidance
regarding response programs. This additional guidance describes
IRPs and prescribes standard procedures that should be included in
IRPs. In addition to Federal regulation in this area, at least 32
states have passed laws requiring that individuals be notified of a
breach in the security of computerized personal information.
Therefore, the increased regulatory attention devoted to incident
response has made the development of IRPs a legal necessity.
Finally, IRPs are in the best interests of the bank. A
well-developed IRP that is integrated into an overall information
security program strengthens the institution in a variety of ways.
Perhaps most important, IRPs help the bank contain the damage
resulting from a security breach and lessen its downstream effect.
Timely and decisive action can also limit the harm to the bank's
reputation, reduce negative publicity, and help the bank identify
and remedy the underlying causes of the security incident so that
mistakes are not destined to be repeated.
Return to
the top of the newsletter
FFIEC IT SECURITY -
We continue our series on the FFIEC
interagency Information Security Booklet.
CONTROLS TO PROTECT AGAINST MALICIOUS CODE
Typical controls to protect against malicious code use technology,
policies and procedures, and training. Prevention and detection of
malicious code typically involves anti-virus and other detection
products at gateways, mail servers, and workstations. Those products
generally scan messages for known signatures of a variety of
malicious code, or potentially dangerous behavioral characteristics.
Differences between products exist in detection capabilities and the
range of malicious code included in their signatures. Detection
products should not be relied upon to detect all malicious code.
Additionally, anti-virus and other products that rely on signatures
generally are ineffective when the malicious code is encrypted. For
example, VPNs, IPSec, and encrypted e-mail will all shield malicious
code from detection.
Signature-based anti-virus products scan for unique components of
certain known malicious code. Since new malicious code is created
daily, the signatures need to be updated continually. Different
vendors of anti-virus products update their signatures on different
frequencies. When an update appears, installing the update on all of
an institution's computers may involve automatically pushing the
update to the computers, or requesting users to manually obtain the
update.
Heuristic anti - virus products generally execute code in a
protected area of the host to analyze and detect any hostile intent.
Heuristic products are meant to defend against previously unknown or
disguised malicious code.
Malicious code may be blocked at the firewall or gateway. For
example, a general strategy might be to block all executable e-mail
attachments, as well as any Active-X or Java applets. A more refined
strategy might block based on certain characteristics of known code.
Protection of servers involves examining input from users and only
accepting that input which is expected. This activity is called
filtering. If filtering is not employed, a Web site visitor, for
instance, could employ an attack that inserts code into a response
form, causing the server to perform certain actions. Those actions
could include changing or deleting data and initiating fund
transfers.
Protection from malicious code also involves limiting the
capabilities of the servers and Web applications to only include
functions necessary to support operations. See "Systems Development,
Acquisition, and Maintenance."
Anti-virus tools and code blocking are not comprehensive
solutions. New malicious code could have different signatures, and
bypass other controls. Protection against newly developed malicious
code typically comes in the form of policies, procedures, and user
awareness and training. For example, policies could prohibit the
installation of software by unauthorized employees, and regular
reviews for unauthorized software could take place. System users
could be trained not to open unexpected messages, not to open any
executables, and not to allow or accept file transfers in P2P
communications. Additional protection may come from disconnecting
and isolating networks from each other or from the Internet in the
face of a fast-moving malicious code attack.
An additional detection control involves network and host
intrusion detection devices. Network intrusion detection devices can
be tuned to alert when known malicious code attacks occur. Host
intrusion detection can be tuned to alert when they recognize
abnormal system behavior, the presence of unexpected files, and
changes to other files.
Return to the top of
the newsletter
NATIONAL INSTITUTE OF STANDARDS
AND TECHNOLOGY -
We continue
the series on the National Institute of Standards and Technology
(NIST) Handbook.
Chapter 20 -
ASSESSING AND MITIGATING THE RISKS TO A HYPOTHETICAL COMPUTER SYSTEM
(HGA)20.6.3
Mitigating Vulnerabilities Related to the Continuity of Operations
The assessment
recommended that COG institute a program of periodic internal
training and awareness sessions for COG personnel having contingency
plan responsibilities. The assessment urged that COG undertake a
rehearsal during the next three months in which selected parts of
the plan would be exercised. The rehearsal should include attempting
to initiate some aspect of processing activities at one of the
designated alternative sites. HGA's management agreed that
additional contingency plan training was needed for COG personnel
and committed itself to its first plan rehearsal within three
months.
After a short
investigation, HGA divisions owning applications that depend on the
WAN concluded that WAN outages, although inconvenient, would not
have a major impact on HGA. This is because the few time-sensitive
applications that required WAN-based communication with the
mainframe were originally designed to work with magnetic tape
instead of the WAN, and could still operate in that mode; hence
courier-delivered magnetic tapes could be used as an alternative
input medium in case of a WAN outage. The divisions responsible for
contingency planning for these applications agreed to incorporate
into their contingency plans both descriptions of these procedures
and other improvements.
With respect to
mainframe outages, HGA determined that it could not easily make
arrangements for a suitable alternative site. HGA also obtained and
examined a copy of the mainframe facility's own contingency plan.
After detailed study, including review by an outside consultant, HGA
concluded that the plan had major deficiencies and posed significant
risks because of HGA's reliance on it for payroll and other
services. This was brought to the attention of the Director of HGA,
who, in a formal memorandum to the head of the mainframe's owning
agency, called for (1) a high-level interagency review of the plan
by all agencies that rely on the mainframe, and (2) corrective
action to remedy any deficiencies found.
HGA's management agreed
to improve adherence to its virus-prevention procedures. It agreed
(from the point of view of the entire agency) that information
stored on PC hard disks is frequently lost. It estimated, however,
that the labor hours lost as a result would amount to less than a
person year--which HGA management does not consider to be
unacceptable. After reviewing options for reducing this risk, HGA
concluded that it would be cheaper to accept the associated loss
than to commit significant resources in an attempt to avoid it. COG
volunteered, however, to set up an automated program on the LAN
server that e-mails backup reminders to all PC users once each
quarter. In addition, COG agreed to provide regular backup services
for about 5 percent of HGA's PCs; these will be chosen by HGA's
management based on the information stored on their hard disks.
|