R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

May 3, 2015

ewsletter Content FFIEC IT Security Web Site Audits
Web Site Compliance
NIST Handbook
Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.

- Feds Warn Airlines to Look Out for Passengers Hacking Jets - In response to reports last week that passenger Wi-Fi networks make some planes vulnerable to hacking, the FBI and TSA have issued an alert to airlines advising them to be on the lookout for evidence of tampering or network intrusions.

FYI - Fukushima nuke plant owner told to upgrade from Windows XP - The Tokyo Electric Power Company (TEPCO), operator of the stricken Fukushima Daiichi nuclear energy complex, has been told to migrate 48,000 internet-connected PCs off Windows XP sooner rather than later. http://www.theregister.co.uk/2015/04/23/fukushima_nuke_plant_owner_told_to_upgrade_from_windows_xp/

FYI - U.S. plans a cybersecurity center in Silicon Valley - Facility would promote greater collaboration between the government and private sector - The U.S. government plans to open a cybersecurity office in Silicon Valley as part of its push to encourage closer cooperation between federal law enforcement agencies and the private sector. http://www.computerworld.com/article/2912468/cybercrime-hacking/us-plans-a-cybersecurity-center-in-silicon-valley.html

FYI - Agencies Often Lack Strong Authentication and it’s a Big Problem - The cyberbullies of the world like to beat up on the U.S. government. The Office of Management and Budget’s annual Federal Information Security Management Act report to Congress revealed that agencies reported nearly 70,000 cyberincidents in fiscal 2014, a 15 percent bump up from the previous year. http://www.nextgov.com/emerging-tech/emerging-tech-blog/2015/04/agencies-often-lack-strong-authentication-and-its-big-problem/111076/

NCUA Hosting Cybersecurity Webinar - Learn More about Cyber-Threats and Taking Precautions at Credit Unions - Credit unions can get up-to-date information on cybersecurity and deterring cybercrime on a webinar hosted by the National Credit Union Administration on Wednesday, May 20. The webinar, “Cybersecurity Basics,” will begin at 2 p.m.   www.ncua.gov/News/Pages/NW20150429CybersecurityWebinar.aspx


FYI - Potential breach brews at Costa Coffee Club - It's not just caffeine that may make Costa Coffee Club customers eschew coffee for another beverage - the coffee company has warned its customers that a possible data breach may have put their information at risk and has reset passwords for all the club accounts. http://www.scmagazine.com/costa-coffee-takes-steps-to-thwart-breach/article/411394/

FYI - About 25K people impacted in Saint Agnes Health Care breach - Maryland-based Saint Agnes Health Care is notifying approximately 25,000 individuals that their personal information was compromised by attackers who used a phishing email to gain access to an employee's email account, which contained the data. http://www.scmagazine.com/about-25k-people-impacted-in-saint-agnes-health-care-breach/article/411636/

FYI - Hackers steal nearly $5M from Ryanair's accounts - Amid all the warnings that cyber attackers will eventually hack commercial airlines, hijacking and compromising planes and causing other dire results, hackers staged a more traditional assault on Ryanair, stealing nearly $5 million from the budget airline's business bank account. http://www.scmagazine.com/hackers-steal-nearly-5m-from-ryanairs-accounts/article/412150/

FYI - FBI investigating Rutgers University in DDoS attack - The FBI is working with Rutgers University to identify the source of a series of distributed denial-of-service (DDoS) attacks that have plagued the school this week. http://www.scmagazine.com/the-fbi-is-helpign-rutger-inveigate-a-series-of-ddos-attack/article/

FYI - iPad app glitch delays 74 flights for American Airlines - A glitch in an iPad navigation application used by pilots caused 74 flight delays at American Airlines. The issue, which occurred on Tuesday and Wednesday, was resolved by Wednesday afternoon. http://www.scmagazine.com/glitch-in-ipad-application-causes-74-flights-delays/article/412040/

FYI - Texas-based Seton Family of Hospitals notifies 39K patients of breach - Texas-based Seton Family of Hospitals is notifying approximately 39,000 patients that an employee's email address – which contained personal information – was compromised in a phishing attack. http://www.scmagazine.com/texas-based-seton-family-of-hospitals-notifies-39k-patients-of-breach/article/412138/

Return to the top of the newsletter

OCC - Threats from Fraudulent Bank Web Sites - Risk Mitigation and Response Guidance for Web Site Spoofing Incidents (Part 2 of 5)
Banks can improve their ability to detect spoofing by monitoring appropriate information available inside the bank and by searching the Internet for illegal or unauthorized use of bank names and trademarks.  The following is a list of possible indicators of Web-site spoofing:
 *  E-mail messages returned to bank mail servers that were not originally sent by the bank.  In some cases, these e-mails may contain links to spoofed Web sites;
 *  Reviews of Web-server logs can reveal links to suspect Web addresses indicating that the bank's Web site is being copied or that other malicious activity is taking place;
 *  An increase in customer calls to call centers or other bank personnel, or direct communications from consumer reporting spoofing activity.
Banks can also detect spoofing by searching the Internet for identifiers associated with the bank such as the name of a company or bank.  Banks can use available search engines and other tools to monitor Web sites, bulletin boards, news reports, chat rooms, newsgroups, and other forums to identify usage of a specific company or bank name.  The searches may uncover recent registrations of domain names similar to the bank's domain name before they are used to spoof the bank's Web site.  Banks can conduct this monitoring in-house or can contract with third parties who provide monitoring services.
Banks can encourage customers and consumers to assist in the identification process by providing prominent links on their Web pages or telephone contact numbers through which customers and consumers can report phishing or other fraudulent activities.
 Banks can also train customer-service personnel to identify and report customer calls that may stem from potential Web-site attacks.

Return to the top of the newsletter

We continue our coverage of the FDIC's "Guidance on Managing Risks Associated With Wireless Networks and Wireless Customer Access."
Risk Mitigation
Security should not be compromised when offering wireless financial services to customers or deploying wireless internal networks. Financial institutions should carefully consider the risks of wireless technology and take appropriate steps to mitigate those risks before deploying either wireless networks or applications. As wireless technologies evolve, the security and control features available to financial institutions will make the process of risk mitigation easier. Steps that can be taken immediately in wireless implementation include:
 1)  Establishing a minimum set of security requirements for wireless networks and applications;
 2)  Adopting proven security policies and procedures to address the security weaknesses of the wireless environment;
 3)  Adopting strong encryption methods that encompass end-to-end encryption of information as it passes throughout the wireless network;
 4)  Adopting authentication protocols for customers using wireless applications that are separate and distinct from those provided by the wireless network operator;
 5)  Ensuring that the wireless software includes appropriate audit capabilities (for such things as recording dropped transactions);
 6)  Providing appropriate training to IT personnel on network, application and security controls so that they understand and can respond to potential risks; and
 9)  Performing independent security testing of wireless network and application implementations.

Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 20 -

20.3.5 Network-Related Threats

Most of the human threats of concern to HGA originate from insiders. Nevertheless, HGA also recognizes the need to protect its assets from outsiders. Such attacks may serve many different purposes and pose a broad spectrum of risks, including unauthorized disclosure or modification of information, unauthorized use of services and assets, or unauthorized denial of services.

As shown in the figure below, HGA's systems are connected to the three external networks: (1) the Internet, (2) the Interagency WAN, and (3) the public-switched (telephone) network. Although these networks are a source of security risks, connectivity with them is essential to HGA's mission and to the productivity of its employees; connectivity cannot be terminated simply because of security risks.

In each of the past few years before establishing its current set of network safeguards, HGA had detected several attempts by outsiders to penetrate its systems. Most, but not all of these, have come from the Internet, and those that succeeded did so by learning or guessing user account passwords. In two cases, the attacker deleted or corrupted significant amounts of data, most of which were later restored from backup files. In most cases, HGA could detect no ill effects of the attack, but concluded that the attacker may have browsed through some files. HGA also conceded that its systems did not have audit logging capabilities sufficient to track an attacker's activities. Hence, for most of these attacks, HGA could not accurately gauge the extent of penetration.

In one case, an attacker made use of a bug in an e-mail utility and succeeded in acquiring System Administrator privileges on the server--a significant breach. HGA found no evidence that the attacker attempted to exploit these privileges before being discovered two days later. When the attack was detected, COG immediately contacted the HGA's Incident Handling Team, and was told that a bug fix had been distributed by the server vendor several months earlier. To its embarrassment, COG discovered that it had already received the fix, which it then promptly installed. It now believes that no subsequent attacks of the same nature have succeeded.

Although HGA has no evidence that it has been significantly harmed to date by attacks via external networks, it believes that these attacks have great potential to inflict damage. HGA's management considers itself lucky that such attacks have not harmed HGA's reputation and the confidence of the citizens its serves. It also believes the likelihood of such attacks via external networks will increase in the future.

Figure 20.1


PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119


Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated