Cyber Security for Financial Institutions
Best Practices and Recommendations
By : Khawar Nehal
Applied Technology Research Center
http://atrc.net.pk
17 August 2016
For FPCCI seminar on cyber security
Agenda
What needs to be done
Why it needs to be done
How to do it
Trends and solutions
Other suggestions
What needs to be done
Recognition that the financial industry did not
prepare well for the cyber security threats.
Recognition that the financial industry shall be
offering online services in the future.
Accepting that depending on others to solve the
problem shall not work.
Why it needs to be done
The only constant in the universe is change.
Cyber security threats are likely to rise rather than
fall.
Security is possible if people decide to take full
responsibility of it.
How it needs to be done
Development of a security policy
Implementation of security policies which are
effective in maintaining security
Monitoring and control of weak elements in the
system.
Elimination of weak elements with more audited
new elements to allow for incremental
development.
Trends
Trends
Insider Misuse
Miscellaneous errors
Denial of Service
Crimeware
For : Insider misuse
Steps :
Make sure you have a security policy
Train everyone on the security policy
Get everyone to sign on the policy
Implement the policy
What you need to do is learn how to monitor for
illegal behavior or actions which violate the policy.
For : Miscellaneous errors
Generally these can be distilled down to two types.
Software errors which cause the software to not follow
the configuration.
Misconfiguration by the administrator or responsible
person.
For : Miscellaneous errors
If you train the administrators and
eliminate ALL bugs in your softwares, then
you shall eliminate a LOT of the issues
related to cyber security.
For : Miscellaneous errors
It is very important to eliminate ALL
vendors which provide a false
presentation of security when their
supplied systems are not able to
provide REAL security due to bugs
and low quality of development.
For : Miscellaneous errors
Think like the airforce.
Check everything.
If everything is not bug free, then do
not FLY.
In the financial industry, that means
stop rolling out services or systems
with bugs which are the cause of past,
present and future problems.
For : Miscellaneous errors
It shall not be long before the products
with errors and mistakes are not
blamed on the vendors anymore but
on the procurement.
So change before the change is
forced on to you.
Denial of service
Even if it is a DDOS, then all you need to do is
outsource your incoming connection to a DDOS
vendor. They shall handle it completely for you.
If the DOS threat is internal then you just combine
the first two items mentioned :
Insider misuse and Misc Errors
The solution to this combination shall solve the
DOS issue.
Crimeware
This requires training and awareness of the user.
For example everyone knows that if they lose
their credit card, they are to report it within 24
hours or risk losing money.
So they take it seriously.
Similarly, all communications related to
configurations (passwords, accounts, pin codes,
card numbers or whatever) needs to be confirmed
on the original phone numbers and emails of the
bank before any requests are entertained.
Crimeware
The main reason is that insecure computers are
allowed to access the bank systems via users.
Basic settings like checking for insecure or lax
systems before allowing your software to be used
shall help solve a lot of issues.
Examples include : looking for the existence of
uncommon applications in devices.
Devices include laptops, desktops, and mobiles.
Crimeware
As security awareness is increased, then the
financial institutions can steadily increase their
requirements for secure computing systems for
users.
The other approach is to offer better risk managed
services for those with more secure platforms.
An example is vendors with chip and swipe vs the
old magnetic strip only vendor risk management
difference in POS.
4 major threats covered
So we have covered the trending 4 major threats
and some ways which can reduce them
significantly.
Question to ask
How can I reduce my security issues without
having to spend a lot of resources.
By asking this question, you shall be able to get a
lot of security results.
Without it, you shall have a lot of vendors pushing
a lot of noise and less security.
Why this question
This is the main question which system operators
and admins ask when they are faced with real
threats and it has worked over the last 60 years of
computing.
That is why industries like Internet services have
less security issues and other industries have
many loopholes.
Other techniques
Here is a list of methods which from our
experience help a lot towards increasing cyber
security.
Redundant systems from different suppliers.
Example : Learn how the root DNS servers are
implemented.
Know about communications
Private links are sold and marketed as private.
Examples include : Satellite links and Point to
Point radio links.
Spy satellites target point to point links and
satellites broadcast to 1/3 of the planet.
Addons for browsers like firefox
There are many useful security related addons to
firefox.
And firefox is designed in a safer manner than
most other browsers.
Train people and make them use the security
addons.
Active companies need to have these addons
report their findings instead of just protecting the
users.
Software updates
Protection of mission critical systems which
cannot be updated too frequently.
They need to be protected with application level
gateways implemented on continuously updated
systems.
Detecting weak systems
Any system parts which are weak in security need
to be identified and isolated. Then replaced with
other similar parts in functionality so that the
overall security can be improved.
If the introduction of a part causes more
successful and frequent attacks, then that part is
to considered weak and should be replaced.
Bounties for weaknesses
Offer bounties to find weaknesses in your system.
Get over your fear and do it.
Most people and companies do not do it
because of the fear that they have to change
their systems and modify their processes.
This is why we have cyber security issues.
Separate checking system
The system software and applications which are
to check the laptop, desktop or server shall reside
on a separate bootable SD card.
Shutdown compromised systems
If the checking system detects anomalies, then
the system needs to be quarantined and another
system shall be used in its place.
The data can be migrated from the old system to
the redundant or replacement system.
Clean image booting
Clean booting via virtual machine images,
snapshots, software like deep freeze and to be
checked Windows 10 methods need to be used
for making accessing computers have a low
chance of being compromised by other software
or configurations.
Application level gateways
Servers need protection via application level
gateways.
Especially weak softwares which may be
proprietary and all their bugs cannot be fixed.
Some device drivers could be available only on
insecure type softwares so they also need to be
protected via such gateways.
Application level gateways do not allow any type
of network traffic so they act like firewalls as far as
stopping unnecessary packets goes.
Authentic and Non auth backups
Similar to authentic primary data servers and their
replicated backup servers in the DNS root server
design.
Application servers can be designed in a similar
manner.
This way reliability of the services is increased.
Offline backups
Offline and offsite backups are mandatory.
Online backups can and will be compromised in
cases of cyber crimes.
Since the online backups are connected to the
original, it can be assumed that the attacker has
access to the online backups and can effectively
destroy them in case they are in position to
destroy the original servers.
Encrypted backups
All backups need to be encrypted. Especially
those which are stored physically offline and
offsite.
They shall be transported out physically.
Use Tough encryption
Do more efforts to implement the strongest
encryption techniques.
If possible to even go for theoretically
unbreakable encryption.
Automate the process so it becomes easier to
use.
Multifactor Authentication
Use more than just pass sentences.
Use SMS, smart cards and more.
Secure programming
Train people in secure and reliable programming.
Hire people who know secure and reliable
programming.
Continuously updated systems
There are many systems available which are
continuously updated.
Learn to use them and actually use them.
Summary
So now we have covered some other methods of
increasing cyber security.
To understand them in detail and to discuss your
specific business and its need please contact for
more details.
Contact information
Applied Technology Research Center
92-331-2036-422
khawar@atrc.net.pk
http://atrc.net.pk
Samples of attacks follows
And other suggestions
An example of a real attack
I had been getting sms messages and emails but
I did not know that the ordinary folk were being
successfully being looted by the billions.
Had we know earlier, we would have making
presentations earlier.
It was recently that the financial industry started
taking a stance and started asking the companies
to do something.
Carbanak
 Most cybercrime targets consumers and businesses, stealing
account information like passwords and other data that then
lets thieves cash out hijacked bank accounts or create fake
credit/debit cards
 Group now specializes in breaking into banks directly and
then use ways to funnel cash from the financial institution
itself
 Carbanak deployed malware via phishing scams to get inside
of computers at 100+ banks and steal between $300 million
to $1 billion
Not surprising
The attack method is related to social engineering and phishing so it
is not surprising.
What I am afraid is that we know of way more serious attack
methods which have been used.
Lack of updates
Common Vulnerabilities and Exposure (CVE)
Verizon Data Breach Investigation Report (DBIR)
Lack of updates
One half of the CVEs exploited in 2014 went from
publish to compromise in less than a month.
In addition, 99.9% of the exploited vulnerabilities
were compromised more than a year after the
CVE was published.
Lack of updates
A key point in the DBIR is that a CVE being added
to Metasploit is probably the single most reliable
predictor of exploitation in the wild. This reinforces
that patching is a significant concern and applying
patches quickly and efficiently reduces the threat
landscape by a significant amount.
Dependence causes weakness
Increased reliance upon technology service providers weakens the
financial institutions with regards to cyber security.
Institutions need to take responsibility for all outsourced technology
services.
Institutions must eliminate single points of failure. Dependence on
one vendor for mission critical systems is not acceptable anymore.
Service providers need to prove resilience (especially in the face of
cyber events) and security. One way is to demand SLAs as a
minimum.
Plans for redundancy and backups need to be made to survive
critical vendor and infrastructure failure.
A recent example of phishing
A ninth grade example from 2014
A pair of ninth-graders used a manual for a cash machine that
showed them how to get into its ”operator mode” using a guessable
password. They didn’t steal any cash, however, but assisted the
Bank of Montreal in closing off the vulnerability.
Suggestions
A defacement is a corruption of your website.
Use static HTML for the most critical pages.
This makes your website less likely to be defaced.
Use content management pages in the
background pages or for pages which change a
lot.
Suggestions
A defacement is a corruption of your website.
Have regular downloads of the website via
crawling.
In case your website is defaced and the content
management pages are taking too long to restore,
at least you shall have static pages available.
Also have regular backups via ftp so it costs less
to restore the original CMS website too.
Lack of training
If you want to learn about security then go to a
security website.
Do not go to a company site selling security
products.
Examples to get you started :
Sectools.org, seclists.org, nmap.org
Cybercrime bill
Make people aware of the existence of the cyber
crime bill. It allows technically international
cooperation.
It might not deter the hardest criminals, but at
least you can inform that you have legal rights to
prosecute for unauthorized access.
SMiShing
 Phishing lures sent via SMS text message and voice phishing
(vishing)
 “Thank you for calling Askari Bank. A text message has been
sent to inform you that your debit card has been limited due
to a security issue. To reactivate, please press 1 now.”
 Caller then prompted to enter last four digits of CNIC, and
then full card number and expiration date
Cybercrime bill
Make people aware of the existence of the cyber
crime bill. It allows technically international
cooperation.
It might not deter the hardest criminals, but at
least you can inform that you have legal rights to
prosecute for unauthorized access.
Contact information
Applied Technology Research Center
92-331-2036-422
khawar@atrc.net.pk
http://atrc.net.pk

Cyber Security for Financial Institutions

  • 1.
    Cyber Security forFinancial Institutions Best Practices and Recommendations By : Khawar Nehal Applied Technology Research Center http://atrc.net.pk 17 August 2016 For FPCCI seminar on cyber security
  • 2.
    Agenda What needs tobe done Why it needs to be done How to do it Trends and solutions Other suggestions
  • 3.
    What needs tobe done Recognition that the financial industry did not prepare well for the cyber security threats. Recognition that the financial industry shall be offering online services in the future. Accepting that depending on others to solve the problem shall not work.
  • 4.
    Why it needsto be done The only constant in the universe is change. Cyber security threats are likely to rise rather than fall. Security is possible if people decide to take full responsibility of it.
  • 5.
    How it needsto be done Development of a security policy Implementation of security policies which are effective in maintaining security Monitoring and control of weak elements in the system. Elimination of weak elements with more audited new elements to allow for incremental development.
  • 6.
  • 7.
  • 8.
    For : Insidermisuse Steps : Make sure you have a security policy Train everyone on the security policy Get everyone to sign on the policy Implement the policy What you need to do is learn how to monitor for illegal behavior or actions which violate the policy.
  • 9.
    For : Miscellaneouserrors Generally these can be distilled down to two types. Software errors which cause the software to not follow the configuration. Misconfiguration by the administrator or responsible person.
  • 10.
    For : Miscellaneouserrors If you train the administrators and eliminate ALL bugs in your softwares, then you shall eliminate a LOT of the issues related to cyber security.
  • 11.
    For : Miscellaneouserrors It is very important to eliminate ALL vendors which provide a false presentation of security when their supplied systems are not able to provide REAL security due to bugs and low quality of development.
  • 12.
    For : Miscellaneouserrors Think like the airforce. Check everything. If everything is not bug free, then do not FLY. In the financial industry, that means stop rolling out services or systems with bugs which are the cause of past, present and future problems.
  • 13.
    For : Miscellaneouserrors It shall not be long before the products with errors and mistakes are not blamed on the vendors anymore but on the procurement. So change before the change is forced on to you.
  • 14.
    Denial of service Evenif it is a DDOS, then all you need to do is outsource your incoming connection to a DDOS vendor. They shall handle it completely for you. If the DOS threat is internal then you just combine the first two items mentioned : Insider misuse and Misc Errors The solution to this combination shall solve the DOS issue.
  • 15.
    Crimeware This requires trainingand awareness of the user. For example everyone knows that if they lose their credit card, they are to report it within 24 hours or risk losing money. So they take it seriously. Similarly, all communications related to configurations (passwords, accounts, pin codes, card numbers or whatever) needs to be confirmed on the original phone numbers and emails of the bank before any requests are entertained.
  • 16.
    Crimeware The main reasonis that insecure computers are allowed to access the bank systems via users. Basic settings like checking for insecure or lax systems before allowing your software to be used shall help solve a lot of issues. Examples include : looking for the existence of uncommon applications in devices. Devices include laptops, desktops, and mobiles.
  • 17.
    Crimeware As security awarenessis increased, then the financial institutions can steadily increase their requirements for secure computing systems for users. The other approach is to offer better risk managed services for those with more secure platforms. An example is vendors with chip and swipe vs the old magnetic strip only vendor risk management difference in POS.
  • 18.
    4 major threatscovered So we have covered the trending 4 major threats and some ways which can reduce them significantly.
  • 19.
    Question to ask Howcan I reduce my security issues without having to spend a lot of resources. By asking this question, you shall be able to get a lot of security results. Without it, you shall have a lot of vendors pushing a lot of noise and less security.
  • 20.
    Why this question Thisis the main question which system operators and admins ask when they are faced with real threats and it has worked over the last 60 years of computing. That is why industries like Internet services have less security issues and other industries have many loopholes.
  • 21.
    Other techniques Here isa list of methods which from our experience help a lot towards increasing cyber security. Redundant systems from different suppliers. Example : Learn how the root DNS servers are implemented.
  • 22.
    Know about communications Privatelinks are sold and marketed as private. Examples include : Satellite links and Point to Point radio links. Spy satellites target point to point links and satellites broadcast to 1/3 of the planet.
  • 23.
    Addons for browserslike firefox There are many useful security related addons to firefox. And firefox is designed in a safer manner than most other browsers. Train people and make them use the security addons. Active companies need to have these addons report their findings instead of just protecting the users.
  • 24.
    Software updates Protection ofmission critical systems which cannot be updated too frequently. They need to be protected with application level gateways implemented on continuously updated systems.
  • 25.
    Detecting weak systems Anysystem parts which are weak in security need to be identified and isolated. Then replaced with other similar parts in functionality so that the overall security can be improved. If the introduction of a part causes more successful and frequent attacks, then that part is to considered weak and should be replaced.
  • 26.
    Bounties for weaknesses Offerbounties to find weaknesses in your system. Get over your fear and do it. Most people and companies do not do it because of the fear that they have to change their systems and modify their processes. This is why we have cyber security issues.
  • 27.
    Separate checking system Thesystem software and applications which are to check the laptop, desktop or server shall reside on a separate bootable SD card.
  • 28.
    Shutdown compromised systems Ifthe checking system detects anomalies, then the system needs to be quarantined and another system shall be used in its place. The data can be migrated from the old system to the redundant or replacement system.
  • 29.
    Clean image booting Cleanbooting via virtual machine images, snapshots, software like deep freeze and to be checked Windows 10 methods need to be used for making accessing computers have a low chance of being compromised by other software or configurations.
  • 30.
    Application level gateways Serversneed protection via application level gateways. Especially weak softwares which may be proprietary and all their bugs cannot be fixed. Some device drivers could be available only on insecure type softwares so they also need to be protected via such gateways. Application level gateways do not allow any type of network traffic so they act like firewalls as far as stopping unnecessary packets goes.
  • 31.
    Authentic and Nonauth backups Similar to authentic primary data servers and their replicated backup servers in the DNS root server design. Application servers can be designed in a similar manner. This way reliability of the services is increased.
  • 32.
    Offline backups Offline andoffsite backups are mandatory. Online backups can and will be compromised in cases of cyber crimes. Since the online backups are connected to the original, it can be assumed that the attacker has access to the online backups and can effectively destroy them in case they are in position to destroy the original servers.
  • 33.
    Encrypted backups All backupsneed to be encrypted. Especially those which are stored physically offline and offsite. They shall be transported out physically.
  • 34.
    Use Tough encryption Domore efforts to implement the strongest encryption techniques. If possible to even go for theoretically unbreakable encryption. Automate the process so it becomes easier to use.
  • 35.
    Multifactor Authentication Use morethan just pass sentences. Use SMS, smart cards and more.
  • 36.
    Secure programming Train peoplein secure and reliable programming. Hire people who know secure and reliable programming.
  • 37.
    Continuously updated systems Thereare many systems available which are continuously updated. Learn to use them and actually use them.
  • 38.
    Summary So now wehave covered some other methods of increasing cyber security. To understand them in detail and to discuss your specific business and its need please contact for more details.
  • 39.
    Contact information Applied TechnologyResearch Center 92-331-2036-422 khawar@atrc.net.pk http://atrc.net.pk
  • 40.
    Samples of attacksfollows And other suggestions
  • 41.
    An example ofa real attack I had been getting sms messages and emails but I did not know that the ordinary folk were being successfully being looted by the billions. Had we know earlier, we would have making presentations earlier. It was recently that the financial industry started taking a stance and started asking the companies to do something.
  • 42.
    Carbanak  Most cybercrimetargets consumers and businesses, stealing account information like passwords and other data that then lets thieves cash out hijacked bank accounts or create fake credit/debit cards  Group now specializes in breaking into banks directly and then use ways to funnel cash from the financial institution itself  Carbanak deployed malware via phishing scams to get inside of computers at 100+ banks and steal between $300 million to $1 billion
  • 44.
    Not surprising The attackmethod is related to social engineering and phishing so it is not surprising. What I am afraid is that we know of way more serious attack methods which have been used.
  • 45.
    Lack of updates CommonVulnerabilities and Exposure (CVE) Verizon Data Breach Investigation Report (DBIR)
  • 46.
    Lack of updates Onehalf of the CVEs exploited in 2014 went from publish to compromise in less than a month. In addition, 99.9% of the exploited vulnerabilities were compromised more than a year after the CVE was published.
  • 47.
    Lack of updates Akey point in the DBIR is that a CVE being added to Metasploit is probably the single most reliable predictor of exploitation in the wild. This reinforces that patching is a significant concern and applying patches quickly and efficiently reduces the threat landscape by a significant amount.
  • 48.
    Dependence causes weakness Increasedreliance upon technology service providers weakens the financial institutions with regards to cyber security. Institutions need to take responsibility for all outsourced technology services. Institutions must eliminate single points of failure. Dependence on one vendor for mission critical systems is not acceptable anymore. Service providers need to prove resilience (especially in the face of cyber events) and security. One way is to demand SLAs as a minimum. Plans for redundancy and backups need to be made to survive critical vendor and infrastructure failure.
  • 49.
    A recent exampleof phishing
  • 51.
    A ninth gradeexample from 2014 A pair of ninth-graders used a manual for a cash machine that showed them how to get into its ”operator mode” using a guessable password. They didn’t steal any cash, however, but assisted the Bank of Montreal in closing off the vulnerability.
  • 52.
    Suggestions A defacement isa corruption of your website. Use static HTML for the most critical pages. This makes your website less likely to be defaced. Use content management pages in the background pages or for pages which change a lot.
  • 53.
    Suggestions A defacement isa corruption of your website. Have regular downloads of the website via crawling. In case your website is defaced and the content management pages are taking too long to restore, at least you shall have static pages available. Also have regular backups via ftp so it costs less to restore the original CMS website too.
  • 54.
    Lack of training Ifyou want to learn about security then go to a security website. Do not go to a company site selling security products. Examples to get you started : Sectools.org, seclists.org, nmap.org
  • 55.
    Cybercrime bill Make peopleaware of the existence of the cyber crime bill. It allows technically international cooperation. It might not deter the hardest criminals, but at least you can inform that you have legal rights to prosecute for unauthorized access.
  • 56.
    SMiShing  Phishing luressent via SMS text message and voice phishing (vishing)  “Thank you for calling Askari Bank. A text message has been sent to inform you that your debit card has been limited due to a security issue. To reactivate, please press 1 now.”  Caller then prompted to enter last four digits of CNIC, and then full card number and expiration date
  • 57.
    Cybercrime bill Make peopleaware of the existence of the cyber crime bill. It allows technically international cooperation. It might not deter the hardest criminals, but at least you can inform that you have legal rights to prosecute for unauthorized access.
  • 58.
    Contact information Applied TechnologyResearch Center 92-331-2036-422 khawar@atrc.net.pk http://atrc.net.pk

Editor's Notes

  • #4 Accept that we need to prepare better Services need to be offered due to market demands Self reliance and taking ownership shall work.
  • #5 Changes shall keep happening Attacks are very likely to rise in complexity and severity. Security is possible taken responsibility of.
  • #6 Develop a security policy Implement it Monitor it Control it Eliminate all weak elements in the system.
  • #7 Here are the trends in attacks over the past few years.
  • #8 The top 4 from the trends Insider misuse Errors Denial of service Crime ware
  • #9 Insider misuse is when a person inside the organization does something bad. To solve this you need A security policy Make sure everyone knows the policy exists and is active Implement the policy Have a system to monitor actions so the policy can be implemented
  • #10 Errors Errors in configuration by the administrator managing the system. Errors in the software development of the system which prevents administrators from implementing their configuration correctly.
  • #11 Errors A LOT of issues can be solved by fixing the software bugs and having the correct configurations by the administrator. This requires bug free software and well trained and experienced administrators.
  • #12 Depending on vendors to supply bug free systems has not worked so far very well. So monitor for product quality and replace all components of the system which cause more attacks to become successful.
  • #13 Learn from the airforce. They check everything before takeoff. For the financial industry it means stop offering services if you do not have the systems ready for it.