R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
for the week of January 19, 2025

Published by Yennik, Inc. the acknowledged leader in independent IT security audits for financial institutions.
 


Newsletter Content FFIEC IT Security Virtual IT Audits - Gold Standard Pen-Testing Auditing
Web Site Compliance NIST Handbook Internet Banking News archives


MISCELLANEOUS CYBERSECURITY NEWS:

US govt launches cybersecurity safety label for smart devices - ​Today, the White House announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for internet-connected consumer devices. https://www.bleepingcomputer.com/news/security/us-govt-launches-cybersecurity-safety-label-for-smart-devices/

Misconfigured license plate readers are leaking data and video in real time - In just 20 minutes this morning, an automated license-plate-recognition (ALPR) system in Nashville, Tennessee, captured photographs and detailed information from nearly 1,000 vehicles as they passed by. https://arstechnica.com/security/2025/01/misconfigured-license-plate-readers-are-leaking-data-and-video-in-real-time/

Consumers are becoming apathetic to cyber incidents, research finds - Despite an increase in cyber incidents, breaches had less impact on consumer trust in 2024. https://www.cybersecuritydive.com/news/consumer-trust-cyber-incident-data-breach/737145/

Pastor indicted for Christian-themed cryptocurrency pyramid scam - A church pastor is facing more than two dozen criminal charges in connection with a cryptocurrency pyramid scheme. https://www.scworld.com/news/pastor-indicted-for-christian-themed-cryptocurrency-pyramid-scam

HIPPA Updates Loom as Healthcare Breaches Boom: Prevent and Protect with Microsegmentation - In a landmark move, the U.S. Department of Health and Human Services (HHS) has issued a new proposal to strengthen the HIPAA Security Rule, calling for stringent cybersecurity measures to protect electronic protected health information (ePHI). https://www.scworld.com/perspective/hippa-updates-loom-as-healthcare-breaches-boom-prevent-and-protect-with-microsegmentation

Cyber disruptions remain top business risk concern in US, globally - A report shows the global disruption caused by CrowdStrike’s IT mishap added to longtime concerns about data breaches and ransomware. https://www.cybersecuritydive.com/news/cyber-business-risk-us-globally/737447/

The double-edged sword of AI in cybersecurity: driving efficiency gains, meeting compliance requirements and navigating greater risk - The cyber threat landscape is constantly evolving, but one thing remains consistent - cyber threats are rising, and so is their price tag. Industry analysts predicted cybercrime damage to cost $9.5 trillion in 2024, more than triple what it was less than a decade ago. https://www.cybersecuritydive.com/spons/the-double-edged-sword-of-ai-in-cybersecurity-driving-efficiency-gains-me/736239/ 

Four take guilty pleas in US government IT bribery scam - Four people pled guilty to offering and accepting bribes to government officials in exchange for IT service contracts. https://www.scworld.com/news/four-take-guilty-pleas-in-us-government-it-bribery-scam

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

PowerSchool data breach possibly exposed student, staff data - The cloud-based K-12 software provider confirmed a compromised credential was used to access its PowerSource customer support portal. https://www.cybersecuritydive.com/news/powerschool-data-breach/737024/

Chinese hackers breach office that reviews foreign investments in US - U.S. officials on Jan. 10 said that as part of the recent cyberattack on the Treasury Department, Chinese hackers breached an interagency government office that reviews foreign investments for national security risks, according to CNN. https://www.scworld.com/news/chinese-hackers-breach-office-that-reviews-foreign-investments-in-us

Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People - Florida-based medical and dental billing and revenue cycle management company Medusind has revealed that a data breach discovered in December 2023 impacts over 360,000 individuals. https://www.securityweek.com/medical-billing-firm-medusind-says-data-breach-impacts-360000-people/

Casio says data of 8,500 people exposed in October ransomware attack - Japanese electronics manufacturer Casio says that the October 2024 ransomware incident exposed the personal data of approximately 8,500 people. https://www.bleepingcomputer.com/news/security/casio-says-data-of-8-500-people-exposed-in-october-ransomware-attack/

Hack of Rhode Island social services platform impacted at least 709K, officials say - State officials received reports from Deloitte and a third-party forensic firm showing the threat to the database has been mitigated and restoration efforts are underway. https://www.cybersecuritydive.com/news/rhode-island-social-services-breach-709k/737111/

Infostealer Infections Lead to Telefonica Ticketing System Breach - Information stealer malware allowed threat actors to compromise the credentials of multiple Telefonica employees and access the telecommunication giant’s internal ticketing system. https://www.securityweek.com/infostealer-infections-lead-to-telefonica-internal-ticketing-system-breach/

UN aviation agency ICAO confirms its recruitment database was hacked - The International Civil Aviation Organization (ICAO), a part of the United Nations, confirmed on Wednesday a hack of its recruitment systems involving the compromise of more than 40,000 records containing personal information. https://therecord.media/icao-un-confirms-recruitment-systems-data-breach

Slovakia’s land registry hit by biggest cyberattack in country’s history, minister says - A cyberattack that hit Slovakia’s land registry earlier this week was the biggest in the country’s history, the minister of agriculture said on Friday. https://therecord.media/slovakia-registry-cyberattack-land-agriculture

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases - Chinese cyber-spies who broke into the US Treasury Department also stole documents from officials investigating real-estate sales near American military bases, it's reported. https://www.theregister.com/2025/01/10/china_treasury_foreign_investment/

Return to the top of the newsletter

WEB SITE COMPLIANCE - Risk Management of Outsourced Technology Services

Due Diligence in Selecting a Service Provider - Contract Issues

Some considerations for contracting with service providers are discussed below. This listing is not all-inclusive and the institution may need to evaluate other considerations based on its unique circumstances. The level of detail and relative importance of contract provisions varies with the scope and risks of the services outsourced.

Scope of Service

The contract should clearly describe the rights and responsibilities of parties to the contract.
Considerations include:

• Timeframes and activities for implementation and assignment of responsibility.  Implementation provisions should take into consideration other existing systems or interrelated systems to be developed by different service providers (e.g., an Internet banking system being integrated with existing core applications or systems customization).
• Services to be performed by the service provider including duties such as software support and maintenance, training of employees or customer service.
• Obligations of the financial institution.
• The contracting parties’ rights in modifying existing services performed under the contract.
• Guidelines for adding new or different services and for contract re-negotiation.

Performance Standards

Institutions should generally include performance standards defining minimum service level requirements and remedies for failure to meet standards in the contract. For example, common service level metrics include percent system uptime, deadlines for completing batch processing, or number of processing errors. Industry standards for service levels may provide a reference point. The institution should periodically review overall performance standards to ensure consistency with its goals and objectives.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
  
  
SYSTEMS DEVELOPMENT, ACQUISITION, AND MAINTENANCE
  
  Financial institution system development, acquisition, and maintenance functions should incorporate agreed upon security controls into software prior to development and implementation. Management should integrate consideration of security controls into each phase of the system development process. For the purposes of this section, system development could include the internal development of customized systems, the creation of database systems, or the acquisition of third-party developed software. System development could include long-term projects related to large mainframe-based software projects with legacy source code or rapid Web-based software projects using fourth-generation programming. In all cases, institutions need to prioritize security controls appropriately.
  
  SOFTWARE DEVELOPMENT AND ACQUISITION
  
  Security Requirements
  
  Financial institutions should develop security control requirements for new systems, system revisions, or new system acquisitions. Management will define the security control requirements based on their risk assessment process evaluating the value of the information at risk and the potential impact of unauthorized access or damage. Based on the risks posed by the system, management may use a defined methodology for determining security requirements, such as ISO 15408, the Common Criteria.23 Management may also refer to published, widely recognized industry standards as a baseline for establishing their security requirements. A member of senior management should document acceptance of the security requirements for each new system or system acquisition, acceptance of tests against the requirements, and approval for implementing in a production environment.
  
  Development projects should consider automated controls for incorporation into the application and the need to determine supporting manual controls. Financial institutions can implement appropriate security controls with greater cost effectiveness by designing them into the original software rather than making subsequent changes after implementation. When evaluating purchased software, financial institutions should consider the availability of products that have either been independently evaluated or received security accreditation through financial institution or information technology-related industry groups.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 
Chapter 12 - COMPUTER SECURITY INCIDENT HANDLING
 
 12.2.1 Defining the Constituency to Be Served
 
 The constituency includes computer users and program managers. Like any other customer-vendor relationship, the constituency will tend to take advantage of the capability if the services rendered are valuable.
 
 The constituency is not always the entire organization. For example, an organization may use several types of computers and networks but may decide that its incident handling capability is cost-justified only for its personal computer users. In doing so, the organization may have determined that computer viruses pose a much larger risk than other malicious technical threats on other platforms. Or, a large organization composed of several sites may decide that current computer security efforts at some sites do not require an incident handling capability, whereas other sites do (perhaps because of the criticality of processing).
 
 The focus of a computer security incident handling capability may be external as well as internal. An incident that affects an organization may also affect its trading partners, contractors, or clients. In addition, an organization's computer security incident handling capability may be able to help other organizations and, therefore, help protect the community as a whole.
 
 12.2.2 Educated Constituency
 
 Users need to know about, accept, and trust the incident handling capability or it will not be used. Through training and awareness programs, users can become knowledgeable about the existence of the capability and how to recognize and report incidents. Users trust in the value of the service will build with reliable performance.
 
 12.2.3 Centralized Reporting and Communications
 
 Successful incident handling requires that users be able to report incidents to the incident handling team in a convenient, straightforward fashion; this is referred to as centralized reporting. A successful incident handling capability depends on timely reporting. If it is difficult or time consuming to report incidents, the incident handling capability may not be fully used. Usually, some form of a hotline, backed up by pagers, works well.
 
 Centralized communications is very useful for accessing or distributing information relevant to the incident handling effort. For example, if users are linked together via a network, the incident handling capability can then use the network to send out timely announcements and other information. Users can take advantage of the network to retrieve security information stored on servers and communicate with the incident response team via e-mail.
 
 Managers need to know details about incidents, including who discovered them and how, so that they can prevent similar incidents in the future. However users will not be forthcoming if they fear reprisal or that they will become scapegoats. Organizations may need to offer incentives to employees for reporting incidents and offer guarantees against reprisal or other adverse actions. It may also be useful to consider anonymous reporting.


You may also receive this newsletter by email.  Go to https://yennik.com/newletter.htm for more information.  The various category comments may be excerpts from regulatory press releases, which can be found at the respective regulatory web site.  Our privacy statement can be found at http://www.yennik.com/privacy_statement.htm.

Copyright 2024 Yennik, Inc.
R. Kinney Williams 806-535-8300 or email examiner@yennik.com

Our logo above is registered with the United States Patent and Trademark Office.