Pub. 5 2015-2016 Issue 1

O V E R A C E N T U R Y : B U I L D I N G B E T T E R B A N K S - H E L P I N G C O L O R A D A N S R E A L I Z E D R E A M S July • August 2015 9 Carl Cope is the COO for CoNetrix. CoNetrix is a provider of information technology consulting, IT/GLBA audits and cybersecurity testing, Aspire IT hosting, and the developer of tandem, a security and compliance software suite designed to help financial institutions create and maintain their Information Security Programs. Visit CoNetrix at www.conetrix.com . Are you also ready to clear “cyber smoke?” Often Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks create smokescreens as distractions to conceal the real exploits of malware insertion, unauthorized data access, or fraud. If successful, both attacks create the same problem, a disruption of service. DDoS is more powerful and is harder to control as it enlists hundreds or thousands of captured computers in its attacking army. In a way, denial of service is like a phone busy signal, but on the Internet. It is when an IP address (which could be the website of a bank or a bank service-provider) is flooded with In- ternet traffic which overwhelms the connection and disrupts all Internet service. During a denial of service attack, all customer, vendor, and Internet connections get a “busy signal” and cannot connect to the attacked IP address. At first glance, denial of service may not seem to be a sig- nificant risk. Perhaps just a nuisance, or a little inconvenience. But what if, during an attack, miscreants successfully executed fraudulent ACH and wire transactions stealing thousands or millions of dollars from your bank? The denial of service was a smokescreen to hide the theft. Over 10 years ago, denial of service was one of the tactics used in an exploit which resulted in a bank losing more than $10 million. Denial of service capabilities have grown since then. A report fromVerisign 1 indicates the size of traffic used in attacks grew 245% from2013 to 2014. Most Internet service is measured in megabits-per-second and one of the largest attacks, a 2013 protest against SpamHaus.com, was enacted using as much as 400 gigabits-per-second of malicious traffic. Along with bigger attacks, the number of attacks has also increased. This is because it is easier than ever to use denial of service. You don’t have to be a computer wizard anymore. DoS software can be purchased or, even easier, it is available for-hire. For as little as $2 an hour (the cheapest price listed in Verisign’s report) you can hire a denial of service attacker. The FFIEC recognizes the increasing risk of DDoS attacks and released a joint statement. 2 The statement explains the risk of DDoS and outlines six steps needed to mitigate the risk. One of the steps requires incident response plans and notifi- cation of service-providers. To prevent loss, you should contact service-providers (wire/ACH/card processors) as soon as a DDoS attack is suspected. The immediacy is vital because while your bank’s Internet connection is jammed, attackers posing as the bank can be issuing fraudulent transaction instructions to your service-providers. The DDoS smokescreen can hide the fraud from the bank. The best plan is to notify all service-providers of your outage and require they request out-of-band authoriza- tion from the bank for any transaction orders they receive via the Internet. And keep all controls in place until the smoke clears.  1 Verisign DDoS Trend Report, Issue 4 - 4th Quarter 2014 2 Distributed Denial of Service(DDoS) Cyber-Attacks, Risk Mitigation, and Additional Resources, April 2, 2014

RkJQdWJsaXNoZXIy OTM0Njg2