LogoEagle
Fields


Login
User ID
Password
Forgot Password?
AntiPhishing
 
click this box to close

Please be aware that by accessing any of the sites listed below you will be leaving our website.

Heartbleed Bug
On Monday April 7th, a critical vulnerability pertaining to OpenSSL software (nicknamed the "Heartbleed Bug") was publicly disclosed.
OpenSSL is used by millions of websites, so the flaw impacts almost everyone. This vulnerability exists in certain versions of OpenSSL, a widely used cryptographic library that enables SSL (Secure Sockets Layer) and TLS (Transport Security Layer) encryption. IF exploited an attacker may be able to trick the system into revealing chunks of data residing in its memory. User names and passwords are the likely target.
First Farmers National Bank's website was NOT vulnerable to the Heartbleed bug.  Protections were in place to mitigate the vulnerability. If you are an account holder that uses our online banking website, it is NOT necessary for you to change your account passwords as a result of the Heartbleed bug. However, because other websites may be vulnerable, you should regenerate new passwords for other important websites that you visit or inquire about any other websites vulnerability to the threat.  Most websites should have posted something about their individual vulnerabilities by this time.
Please be aware and on the lookout for phising emails masquerading as "Heartbleed" password change notices.  WE DO NOT SEND OUT EMAILS TO REQUEST ANY INFORMATION ABOUT YOUR ONLINE BANKING OR REQUEST FOR YOU TO CHANGE 
YOUR USER NAME OR PASSWORDS.
Best practice NEVER click on a link in ANY EMAIL UNLESS you are sure of who the sender is and you fully trust them.
For additional information about the Heartbleed vulnerability you may want to goto 
www.heartbleed.com. This is a public site with general information on this issue. 



Visit the FDIC Website for information about deposit insurance coverage
www.fdic.gov

Select this link for information about our Electronic Funds Transfer Rules
3083-01-Waurika/UserFiles/file/EFT%20Disclosure.pdf

Select this link for information about Your Security Using our Online Banking Services
3083-01-Waurika/UserFiles/file/Customer%20Security%20Message%20for%20new%20FFIEC%20Guidance.pdf

Protect Yourself Online - select the following link to the FCC website information
www.fcc.gov/guides/how-protect-yourself-online

Waurika Alumin contacts

Waurikaalumni@yahoo.com

www.facebook.com/waurikaalumni


Learn more about "PHISHING"
http://www.occ.gov/consumer/phishing.htm
 

Be alert to IDENTITY THEFT
http://www.ftc.gov/bcp/edu/microsites/idtheft/


Customer Alert..  Please see the following document concerning attempts to use social media like Facebook to gain access to your
financial systems like your online banking.  We currently are using multifactor security as the document suggests, however, no systems are secure unless both the provider and user exercise caution.  WE STRONGLY recommend that you do not use the same user id and passwords for your online banking as you use for any other online activity.

Ramnit Worm Threatens Online Accounts
Facebook Targeted by Fraudsters Seeking Log-in Credentials
·        Researchers at Seculert say the Ramnit worm, which last year defeated two-factor authentication measures used to protect online banking accounts and corporate networks, is now targeting Facebook - a development that should especially concern financial service businesses.
·Lab researchers working for the Israel-based provider of cyberthreat management services say Ramnit has been linked to the compromise of more than 45,000 Facebook log-in credentials, primarily hitting users in the United Kingdom and France.
"We suspect that the attackers behind Ramnit are using the stolen credentials to log in to victims' Facebook accounts and to transmit malicious links to their friends, thereby magnifying the malware's spread even further," says a blog posted on Seculert's website Jan. 5. "In addition, cybercriminals are taking advantage of the fact that users tend to use the same password in various web-based services (Facebook, Gmail, Corporate SSL VPN, Outlook Web Access, etc.) to gain remote access to corporate networks."
Because users often use the same log-in and password credentials for multiple accounts, the threat of Ramnit attacks should be concerning to every industry, not just financial services, though financial institutions often have the most to lose when consumers online banking accounts are breached.
"As demonstrated by the 45,000 compromised Facebook subscribers, the viral power of social networks can be manipulated to cause considerable damage to individuals and institutions when it is in the wrong hands," Securlet says.
Ramnit: Evolving
Ramnit is a worm, which means, unlike malware, it can spread to other computers without being sent through e-mail or a malicious website. Ramnit, which surfaced in April 2010, continues to evolve.
In August 2011, security vendor Trusteer was the first to discover Ramnit's merger with the Zeus variant designed to target online banking accounts. The Ramnit-Zeus hybrid was superior because of its advanced man-in-the-browser capabilities, which enabled it to steal online banking and corporate log-in credentials. The Ramnit hybrid bypassed two-factor authentication, and between September 2011 and December 2011, Trusteer estimated that some 800,000 machines had been infected.
Amit Klein, chief technology officer of Trusteer, says Seculert's new findings show how quickly Ramnit is evolving to use multiple distribution vectors. "The combination of file infection, social network propagation and man-in-the-browser capabilities creates an aggressive threat," he says. "Ramnit can reach a corporate employee machine through propagation via stolen social network accounts."
Once launched on a corporate PC, Ramnit's browser penetration module steals internal and software-as-a-service credentials. Incoming web pages can then be modified using an HTML injection to request and steal more sensitive information.
Ramnit's man-in-the-middle looks like an actual social-media or bank-account sign-in page that captures a user's ID and password, and sometimes other personal information en route to the actual log-in page. The difference, however, is that the page in the middle captures authentication data and allows the attacker to gain access to the victim's accounts at will.
Dave Jevans of the Anti-Phishing Working Group says stealing credentials from social-networking sites is big business. "We have seen up to a million people per day being directed to malicious websites through FB worms," he says.
A Call for Multifactor Authentication
An analyst at Booz Allen Hamilton, says every organization should take Ramnit's rapid evolution as a sign that outdated authentication measures are no longer effective.
"Passwords are not very useful for anything anymore," Wansley says. "They are just too easy to forget, copy or break. Everyone needs to go to multifactor authentication - like Google has recently - for social-media sign-in, and certainly for anything that is for financial or medical-related accounts."
Passphrases are better than passwords, but multifactor authentication is the new standard."Nobody should be using their social-media passwords or phrases for their financial accounts," Wansley says.
In the financial space, cybercriminals increasingly use older malware to capture individual passwords and personal information that is later exploited to gain access to financial accounts. "The Ramnit example is typical of these type attacks," Wansley says. "Ramnit is actually an older malicious code that has been updated with new features to achieve other purposes."