R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

December 19, 2021

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.


Virtual/remote IT audits - I am performing virtual/remote FFIEC IT/AIO audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.

FYI - As New York bank begins minting stablecoins, security concerns ensue - A regional bank based in New York announced earlier this month that it would begin issuing stablecoins, raising the issue of how the traditional banking industry might deal with the security and regulatory concerns of dealing in cryptocurrencies. https://www.scmagazine.com/analysis/cryptocurrency/as-new-york-bank-begins-minting-stablecoins-security-concerns-ensue

Bad actors are following bank customers to mobile - Well before the pandemic, mobile financial services were on their way up. But, in the wake of the digital banking boom, cyber-criminals are upping their own game to take advantage of all the financial customers who are new to the mobile platform or accessing it more frequently. https://www.scmagazine.com/analysis/application-security/bad-actors-are-following-bank-customers-to-mobile

The government is close to picking quantum-resistant encryption standards. Now it must plan for what to do if they fail. - Over the next few months, the National Institute for Standards and Technology will finalize a short list of new encryption algorithms and standards that are designed to withstand the threat of quantum computers, which are expected to one day mature to the point where they are capable of breaking many classical forms of encryption. https://www.scmagazine.com/analysis/encryption/the-government-is-close-to-picking-quantum-resistant-encryption-standards-now-it-must-plan-for-what-to-do-if-they-fail

Medical device security can’t be solved in healthcare: What’s ‘acceptable risk?’ - Healthcare provider organizations face a highly unique challenge: operating patient-connected devices with known vulnerabilities and outdated technology. https://www.scmagazine.com/feature/asset-management/medical-device-security-cant-be-solved-in-healthcare-whats-acceptable-risk

Ransomware groups don’t abide by promises not to target healthcare - That is one implication of a new CyberPeace Institute blog researching ransomware groups whose wares have been used in attacks on healthcare facilities since May 2020. https://www.scmagazine.com/analysis/cybercrime/ransomware-groups-dont-abide-by-promises-not-to-target-healthcare

HHS: Majority of health systems faced cyberattack in last 18 months - Software supply chain attacks increased by 650% in the last year, with 82% of healthcare systems reporting a cyberattack in the last 18 months, according to a recent Department of Health and Human Services Cybersecurity Coordination Center and Healthcare & Public Health Sector Coordinating Council webinar. https://www.scmagazine.com/analysis/incident-response/hhs-majority-of-health-systems-faced-cyberattack-in-last-18-months


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Log4j vulnerability cleanup expected to take months or years - As the reality sets in over implications of the Log4j vulnerability, security staff have hunkered down to quickly remediate the problem. The question now is whether that sprint will be followed by a marathon.
https://www.scmagazine.com/analysis/application-security/log4j-vulnerability-cleanup-expected-to-take-months-or-years
https://www.scmagazine.com/analysis/policy/cisa-adds-log4j-to-critical-vulnerabilities-list-warns-industry-to-follow-similar-guidelines
https://www.cisa.gov/news/2021/12/11/statement-cisa-director-easterly-log4j-vulnerability

Planned Parenthood LA sued over data theft, ransomware attack affecting 409K - A patient has filed a lawsuit against Planned Parenthood Los Angeles, one week after the disclosure of a ransomware attack that led to the theft of health data tied to 409,759 patients. https://www.scmagazine.com/analysis/breach/planned-parenthood-la-sued-over-data-theft-ransomware-attack-affecting-409k

Ransomware attack takes down Kronos Private Cloud for several weeks - The Kronos Private Cloud (KPC), a popular HR platform used by Tesla and many other companies, was hit with a ransomware attack over the weekend, prompting parent company UKG to tell its customers that the service may take several weeks to restore - a grim prospect with so many companies short-staffed because of the holidays. https://www.scmagazine.com/news/cybercrime/ransomware-attack-takes-down-kronos-private-cloud-for-several-weeks

Log4j flaw: Attackers are making thousands of attempts to exploit this severe vulnerability - Cyber attackers are making over a hundred attempts to exploit a critical security vulnerability in Java logging library Apache Log4j every minute, security researchers have warned. https://www.zdnet.com/article/log4j-flaw-attackers-are-making-thousands-of-attempts-to-exploit-this-severe-vulnerability/

Timekeeping biz Kronos hit by ransomware and warns customers to engage biz continuity plans - Kronos Private Cloud has been hit by a ransomware attack. The company, also known as Ultimate Kronos Group (UKG), provides timekeeping services to companies employing millions of people across the world. https://www.theregister.com/2021/12/13/ultimate_kronos_group_ransomware_attack/

Irish Health Service ransomware attack happened after one staffer opened malware-ridden email - Ireland's Health Service Executive (HSE) was almost paralysed by ransomware after a single user opened a malicious file attached to a phishing email, a consultancy's damning report has revealed. https://www.theregister.com/2021/12/10/ireland_health_conti_ransomware_attack_report/

German logistics giant Hellmann reports cyberattack - Billion-dollar logistics firm Hellmann Worldwide Logistics reported a cyberattack this week that forced them to temporarily remove all connections to their central data center. The company said the shut down was having a "material impact" on their business operations. https://www.zdnet.com/article/german-logistics-giant-hellmann-reports-cyberattack/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
    

  
Board and Management Oversight
- Principle 10: Banks should take appropriate measures to preserve the confidentiality of key e-banking information. Measures taken to preserve confidentiality should be commensurate with the sensitivity of the information being transmitted and/or stored in databases.
    
    Confidentiality is the assurance that key information remains private to the bank and is not viewed or used by those unauthorized to do so. Misuse or unauthorized disclosure of data exposes a bank to both reputation and legal risk. The advent of e-banking presents additional security challenges for banks because it increases the exposure that information transmitted over the public network or stored in databases may be accessible by unauthorized or inappropriate parties or used in ways the customer providing the information did not intend. Additionally, increased use of service providers may expose key bank data to other parties.
    
    To meet these challenges concerning the preservation of confidentiality of key e-banking information, banks need to ensure that:
    
    1)  All confidential bank data and records are only accessible by duly authorized and authenticated individuals, agents or systems.
    
    2)  All confidential bank data are maintained in a secure manner and protected from unauthorized viewing or modification during transmission over public, private or internal networks.
    
    3)  The bank's standards and controls for data use and protection must be met when third parties have access to the data through outsourcing relationships.
    
    4)  All access to restricted data is logged and appropriate efforts are made to ensure that access logs are resistant to tampering.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our review of the FDIC paper "Risk Assessment Tools and Practices or Information System Security." 
   
   PENETRATION ANALYSIS (Part 1 of 2)
   
   After the initial risk assessment is completed, management may determine that a penetration analysis (test) should be conducted. For the purpose of this paper, "penetration analysis" is broadly defined. Bank management should determine the scope and objectives of the analysis. The scope can range from a specific test of a particular information systems security or a review of multiple information security processes in an institution.
   
   A penetration analysis usually involves a team of experts who identify an information systems vulnerability to a series of attacks. The evaluators may attempt to circumvent the security features of a system by exploiting the identified vulnerabilities. Similar to running vulnerability scanning tools, the objective of a penetration analysis is to locate system vulnerabilities so that appropriate corrective steps can be taken.
   
   The analysis can apply to any institution with a network, but becomes more important if system access is allowed via an external connection such as the Internet. The analysis should be independent and may be conducted by a trusted third party, qualified internal audit team, or a combination of both. The information security policy should address the frequency and scope of the analysis. In determining the scope of the analysis, items to consider include internal vs. external threats, systems to include in the test, testing methods, and system architectures.
   
   A penetration analysis is a snapshot of the security at a point in time and does not provide a complete guaranty that the system(s) being tested is secure. It can test the effectiveness of security controls and preparedness measures. Depending on the scope of the analysis, the evaluators may work under the same constraints applied to ordinary internal or external users. Conversely, the evaluators may use all system design and implementation documentation. It is common for the evaluators to be given just the IP address of the institution and any other public information, such as a listing of officers that is normally available to outside hackers. The evaluators may use vulnerability assessment tools, and employ some of the attack methods discussed in this paper such as social engineering and war dialing. After completing the agreed-upon analysis, the evaluators should provide the institution a detailed written report. The report should identify vulnerabilities, prioritize weaknesses, and provide recommendations for corrective action.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 17 - LOGICAL ACCESS CONTROL
  
  
17.3.1.4 Constrained User Interfaces
  
  Often used in conjunction with ACLs are constrained user interfaces, which restrict users' access to specific functions by never allowing them to request the use of information, functions, or other specific system resources for which they do not have access. Three major types exist: (1) menus, (2) database views, and (3) physically constrained user interfaces.
  
  Constrained user interfaces can provide a form of access control that closely models how an organization operates. Many systems allow administrators to restrict users' ability to use the operating system or application system directly. Users can only execute commands that are provided by the administrator, typically in the form of a menu. Another means of restricting users is through restricted shells, which limit the system commands the user can invoke. The use of menus and shells can often make the system easier to use and can help reduce errors.
  
  Menu-driven systems are a common constrained user interface, where different users are provided different menus on the same system. 
  
  Database views is a mechanism for restricting user access to data contained in a database. It may be necessary to allow a user to access a database, but that user may not need access to all the data in the database (e.g., not all fields of a record nor all records in the database). Views can be used to enforce complex access requirements that are often needed in database situations, such as those based on the content of a field. For example, consider the situation where clerks maintain personnel records in a database. Clerks are assigned a range of clients based upon last name (e.g., A-C, D-G). Instead of granting a user access to all records, the view can grant the user access to the record based upon the first letter of the last name field.
  
  Physically constrained user interfaces can also limit a user's abilities. A common example is an ATM machine, which provides only a limited number of physical buttons to select options; no alphabetic keyboard is usually present.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.