R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

October 31, 2021

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.


Virtual/remote IT audits - I am performing virtual/remote FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.

FYI - How this work-from-home era transformed security awareness, tech development forever - As companies adapt to the work-from-home era, the technologies and the way they purchase products will also adapt. https://www.scmagazine.com/feature/devops/how-this-work-from-home-era-transformed-security-awareness-tech-development-forever

Security, compliance challenge financial firms’ efforts to use collaborative tools - Financial services institutions (FSIs) are trying their best to to implement collaborative tools in their applications and on their websites to better communicate and work with their retail and business customers online and on their mobile devices. https://www.scmagazine.com/analysis/application-security/security-compliance-challenge-financial-firms-efforts-to-use-collaborative-tools?

US rolls out new rules governing export of hacking and cyberdefense tools - According to the Washington Post, the new rules are meant to target companies selling to Russia and China. The US Commerce Department has released new rules designed to stop companies from selling hacking tools to China, Russia and other countries that may use them for nefarious purposes. https://www.zdnet.com/article/us-rolls-out-new-rules-governing-export-of-hacking-cyberdefense-tools/

CISA Leader Backs 24-Hour Timeline for Incident Reporting - A top leader of the U.S. Cybersecurity and Infrastructure Security Agency has voiced support for a 24-hour timeline for cyber incident reporting involving critical infrastructure, signaling a push by the Biden administration to implement a rapid mechanism for federal response. https://www.govinfosecurity.com/cisa-leader-backs-24-hour-timeline-for-incident-reporting-a-17767

Can healthcare improve third-party vendor security, business continuity? - As a whole, the healthcare sector relies on a significant number of third-party vendors and other business associates to maintain daily operations and provide relatively seamless transactions. https://www.scmagazine.com/feature/third-party-risk/can-healthcare-improve-third-party-vendor-security-business-continuity

Study: 40% of organizations globally in the past year hit by a cloud data breach - Thales on Wednesday reported that 40% of organizations globally have experienced a cloud-based data breach in the past 12 months. https://www.scmagazine.com/news/cloud-security/study-40-of-organizations-globally-in-the-past-year-hit-by-a-cloud-data-breach


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Ransomware Sinks Teeth into Candy-Corn Maker Ahead of Halloween - Chicago-based Ferrara acknowledged an Oct. 9 attack that encrypted some systems and disrupted production. https://threatpost.com/ransomware-candy-corn-halloween/175630/

Cookie-swiping phishing scam steals YouTube channels from their creators - Freelance phishers-for-hire are targeting YouTube content providers, hoping to trick victims into downloading cookie-stealing malware so they can to hijack their channels for the purpose of publishing scam content. https://www.scmagazine.com/analysis/phishing/cookie-swiping-phishing-scam-steals-youtube-channels-from-their-creators

Judge Sentences Michigan Man to 7 Years in Prison for Hacking UPMC HR Databases and Stealing Employees’ Personal Information. https://www.justice.gov/usao-wdpa/pr/judge-sentences-michigan-man-7-years-prison-hacking-upmc-hr-databases-and-stealing

Ransomware attack drives Indiana provider offline; vendor breach impacts 173K dental patients - Vendor incidents and cyberattacks leading to network outages remain the leading threats against the healthcare sector, as two more providers report falling victim to these types of incidents. https://www.scmagazine.com/analysis/breach/ransomware-attack-drives-indiana-provider-offline-vendor-breach-impacts-173k-dental-patients

BillQuick says patch coming after Huntress report identifies vulnerabilities used in ransomware attack - BillQuick has said a short-term patch will be released to address some of the vulnerabilities identified this weekend by Huntress. https://www.zdnet.com/article/billquick-says-patch-coming-after-huntress-report-identifies-vulnerabilities-used-for-ransomware/

Popular NPM library hijacked to install password-stealers, miners - Hackers hijacked the popular UA-Parser-JS NPM library, with millions of downloads a week, to infect Linux and Windows devices with cryptominers and password-stealing trojans in a supply-chain attack. https://www.bleepingcomputer.com/news/security/popular-npm-library-hijacked-to-install-password-stealers-miners/

Ransomware attack drives Indiana provider offline; vendor breach impacts 173K dental patients - Vendor incidents and cyberattacks leading to network outages remain the leading threats against the healthcare sector, as two more providers report falling victim to these types of incidents. https://www.scmagazine.com/analysis/breach/ransomware-attack-drives-indiana-provider-offline-vendor-breach-impacts-173k-dental-patients

Kansas Man Admits Hacking Public Water Facility - Roughly seven months after being indicted for his actions, a Kansas man admitted in court to tampering with the systems at the Post Rock Rural Water District. https://www.securityweek.com/kansas-man-admits-hacking-public-water-facility


Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
    
    While the Board of Directors has the responsibility for ensuring that appropriate security control processes are in place for e-banking, the substance of these processes needs special management attention because of the enhanced security challenges posed by e-banking.
  Over the next number of weeks we will cover the principles of Security Controls.
    
   
Board and Management Oversight - Principle 4: Banks should take appropriate measures to authenticate the identity and authorization of customers with whom it conducts business over the Internet.  (Part 1 of 2)
    
    It is essential in banking to confirm that a particular communication, transaction, or access request is legitimate. Accordingly, banks should use reliable methods for verifying the identity and authorization of new customers as well as authenticating the identity and authorization of established customers seeking to initiate electronic transactions.
    
    Customer verification during account origination is important in reducing the risk of identity theft, fraudulent account applications and money laundering. Failure on the part of the bank to adequately authenticate customers could result in unauthorized individuals gaining access to e-banking accounts and ultimately financial loss and reputational damage to the bank through fraud, disclosure of confidential information or inadvertent involvement in criminal activity.
    
    Establishing and authenticating an individual's identity and authorization to access banking systems in a purely electronic open network environment can be a difficult task. Legitimate user authorization can be misrepresented through a variety of techniques generally known as "spoofing." Online hackers can also take over the session of a legitimate authorized individual through use of a "sniffer" and carry out activities of a mischievous or criminal nature. Authentication control processes can in addition be circumvented through the alteration of authentication databases.
    
    Accordingly, it is critical that banks have formal policy and procedures identifying appropriate methodology(ies) to ensure that the bank properly authenticates the identity and authorization of an individual, agent or system by means that are unique and, as far as practical, exclude unauthorized individuals or systems. Banks can us a variety of methods to establish authentication, including PINs, passwords, smart cards, biometrics, and digital certificates. These methods can be either single factor or multi-factor (e.g. using both a password and biometric technology to authenticate). Multi-factor authentication generally provides stronger assurance.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
   
   SECURITY CONTROLS - IMPLEMENTATION
   

   LOGICAL AND ADMINISTRATIVE ACCESS CONTROL 

   
   Examples of Common Authentication Weaknesses, Attacks, and Offsetting Controls (Part 1 of 2)
   
   
All authentication methodologies display weaknesses. Those weaknesses are of both a technical and a nontechnical nature. Many of the weaknesses are common to all mechanisms. Examples of common weaknesses include warehouse attacks, social engineering, client attacks, replay attacks, and hijacking.
   
   Warehouse attacks result in the compromise of the authentication storage system, and the theft of the authentication data. Frequently, the authentication data is encrypted; however, dictionary attacks make decryption of even a few passwords in a large group a trivial task. A dictionary attack uses a list of likely authenticators, such as passwords, runs the likely authenticators through the encryption algorithm, and compares the result to the stolen, encrypted authenticators. Any matches are easily traceable to the pre-encrypted authenticator.
   
   Dictionary and brute force attacks are viable due to the speeds with which comparisons are made. As microprocessors increase in speed, and technology advances to ease the linking of processors across networks, those attacks will be even more effective. Because those attacks are effective, institutions should take great care in securing their authentication databases. Institutions that use one - way hashes should consider the insertion of secret bits (also known as "salt") to increase the difficulty of decrypting the hash. The salt has the effect of increasing the number of potential authenticators that attackers must check for validity, thereby making the attacks more time consuming and creating more opportunity for the institution to identify and react to the attack.
   
   Warehouse attacks typically compromise an entire authentication mechanism. Should such an attack occur, the financial institution might have to deny access to all or nearly all users until new authentication devices can be issued (e.g. new passwords). Institutions should consider the effects of such a denial of access, and appropriately plan for large-scale re-issuances of authentication devices


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

 Chapter 17 - LOGICAL ACCESS CONTROL
 
 This chapter first discusses basic criteria that can be used to decide whether a particular user should be granted access to a particular system resource. It then reviews the use of these criteria by those who set policy (usually system-specific policy), commonly used technical mechanisms for implementing logical access control, and issues related to administration of access controls.
 
 Controlling access is normally thought of as applying to human users (e.g., will technical access be provided for user JSMITH to the file "payroll.dat") but access can be provided to other computer systems. Also, access controls are often incorrectly thought of as only applying to files. However, they also protect other system resources such as the ability to place an outgoing long-distance phone call through a system modem (as well as, perhaps, the information that can be sent over such a call). Access controls can also apply to specific functions within an application and to specific fields of a file.
 
 17.1 Access Criteria
 
 In deciding whether to permit someone to use a system resource logical access controls examine whether the user is authorized for the type of access requested. (Note that this inquiry is usually distinct from the question of whether the user is authorized to use the system at all, which is usually addressed in an identification and authentication process.)
 
 The system uses various criteria to determine if a request for access will be granted. They are typically used in some combination. Many of the advantages and complexities involved in implementing and managing access control are related to the different kinds of user accesses supported.
 
 When determining what kind of technical access to allow to specific data, programs, devices, and resources, it is important to consider who will have access and what kind of access they will be allowed. It may be desirable for everyone in the organization to have access to some information on the system, such as the data displayed on an organization's daily calendar of nonconfidential meetings. The program that formats and displays the calendar, however, might be modifiable by only a very few system administrators, while the operating system controlling that program might be directly accessible by still fewer.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.