Bitsight Technologies Company Overview Cooperativa Central de Credito Ailos Group 2022 06 20
Bitsight Technologies Company Overview Cooperativa Central de Credito Ailos Group 2022 06 20
Ailos Group
Company
Overview Report
780
SECURITY RATING
2022-06-20 https://www.bitsight.com/
Company Overview 1 of 36
TABLE OF CONTENTS
Compromised Systems
A Botnet Infections
A Spam Propagation
A Malware Servers
A Unsolicited Communications
A Potentially Exploited
Diligence
A SPF
A DKIM
A SSL Certificates
A SSL Configurations
A Open Ports
A Server Software
N/A Desktop Software
of 18 June 2022.
Public Disclosures
A Security Incidents
780 ADVANCED
Subscription Insureds
Monitored by 1 company
Homepage ailos.coop.br
Industry Finance
IP addresses 165
Searched by 30 users
Company ID Unassigned
Security Ratings
780 740
Highest on 18 Jun 2022 Lowest on 18 Oct 2021
850
800
700
600
500
400
300
JUL 2021 SEP 2021 NOV 2021 JAN 2022 MAR 2022 MAY 2022
Compromised Systems
Compromised Systems are devices or Compromised Systems are evaluated For example, an organization could have
machines in an organization’s network based on the number and type of malware, an "F" for botnet infections, if they either
that show symptoms of malicious or the severity, and the duration. For each risk had many botnets in a short period, or a
unwanted software. These compromises vector, an overall letter grade is calculated few persistent botnets over months.
can disrupt daily business operations and from evaluations of each instance of
can increase an organization’s risk of compromise.
breach.
Botnet Infections Spam Propagation Malware Servers Unsolicited Communications Potentially Exploited
Number of Events
0
Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun
Top 10%
Remediation Suggestions
Conduct a thorough security review of Average Days to resolve events over past year
the machine (malware & antivirus
No data to compare with the Finance industry to resolve events.
sweep).
Review services used on the machine,
harden firewall rules. Cooperativa Central de
0.0
0.0
Improve employee computer safety C rédito Ailos Group
training (phishing, installing unapproved
software).
Finance Industry 3.3
3.3
0 1 2 3 4
Top Findings
Top 10%
Top Findings
Top 10%
Top Findings
Top 10%
Remediation Suggestions 0 1 2 3 4
0 1 2 3 4 5
Top Findings
Top 10%
0 1 2 3 4 5
Top Findings
Diligence
Diligence risk vectors show steps a Neutral. Records are assessed using grade would be an “A”. Likewise, if none of
company has taken to prevent attacks. industry-standard criteria. For each the three domains have SPF records, their
BitSight currently evaluates SPF, DKIM, diligence risk vector, an overall letter grade overall SPF grade would be an “F”.
TLS/SSL, Open Port and DNSSEC is calculated using the evaluations of each
Records older than 60 days will not affect
information in assessing a company’s individual record.
a company’s Security Rating.
security diligence.
For example, if a company has three
All diligence records are evaluated as one domains, and each of them has an
of the following: Good, Fair, Warn, Bad or effective SPF record, their overall SPF
250
200
Number of records
150
100
50
0
Dec 2021 Jan 2022 Feb 2022 Mar 2022 Apr 2022 May 2022 Current
Top 10%
Record count
50
information they need to reject mail sent
by unauthorized hosts. BitSight verifies
that a company has SPF records on all
domains that are sending or have 25
attempted to send email, and that they
are configured in a way that helps
prevent email spoofing.
0
Good Fair Warn Bad Neutral
Remediation Suggestions
Create an SPF record. and conduct a Check for common mistakes in your configured to send mail. If a company
thorough security review of the machine SPF record. does not intend to send mail from a
(malware & antivirus sweep). All domains should have SPF records, domain, an attacker can still use that
even SMTP servers and those that aren’t domain to spoof email.
Top 10%
Record count
4
company uses DKIM and has configured
it in a way that prevents email spoofing.
0
Good Fair Warn Bad Neutral
Remediation Suggestions
Search for Diligence records and then Generate a new RSA keypair, specifying Refer to the recommended key rotation
implement an effective DKIM record if one a bit strength of 2048 or larger. For elliptic for how often to generate a new RSA
does not already exist. Please see our curve keys, a length of 224 bits is keypair.
comprehensive article on How to create a recommended. Refer to the recommended Check that your keys are properly
DKIM record. key length. We follow NIST stored and the DKIM record has the correct
recommendations regarding key length. key.
selector1._domainke
2022-06-17 2022-06-17 GOOD Minor
y.unilos.coop.br
selector1._domainke
2022-06-17 2022-06-17 GOOD Minor
y.transpocred.coop.br
selector1._domainke
2022-02-11 2022-06-08 GOOD Minor
y.ailos.coop.br
11dkim1._domainke
y.sistemaailos.coop. 2022-05-18 2022-05-18 GOOD Minor
br
Top 10%
Record count
20
Certificates are responsible for verifying
the authenticity of your company servers
to your associates, clients, and guests,
and serve as the basis for establishing 10
cryptographic trust.
Remediation Suggestions
0
Review the Certificate Authority Best Good Fair Warn Bad Neutral
Practices and implement effective
TLS/SSL certificates.
Obtain valid and up-to-date TLS
certificates from an industry certificate
authority.
Select a stronger signature algorithm
(like SHA-256).
www.dev.integra.ailo
2022-02-02 2022-06-18 GOOD Minor
s.coop.br
acessoaconta.viacre
2021-08-26 2022-06-18 GOOD Minor Large number of DNS Names: 37
dialtovale.coop.br
apimobile.ailos.coop.
2021-09-08 2022-06-18 GOOD Minor
br
www.ailosconfigmgr
2022-04-07 2022-06-18 GOOD Minor
cmg.ailos.coop.br
autodiscover.ailos.co
2021-09-01 2022-06-18 GOOD Minor
op.br
view.sistemaailos.co
2022-04-29 2022-06-17 GOOD Minor
op.br
Top 10%
Record count
50
encryption standards when making
encrypted connections to other
machines. Incorrect or weak
28.1%
28.1%
configurations may make servers 25
vulnerable to certain attacks (POODLE,
Heartbleed). 7.9%
7.9%
0
Good Fair Warn Bad Neutral
Remediation Suggestions
Update and keep server Refer to the TLS 1.0 and 1.1 deprecation Regenerate Diffie-Hellman primes to be
implementations of TLS/SSL (OpenSSL, schedule to see how this risk vector will be 2048 bits.
LibreSSL, etc); latest versions are patched affected. Disable SSL v2, SSL v3, TLS 1.0, Refer to the Guide to Deploying Diffie-
against known vulnerabilities and they and TLS 1.1. Migrate to a minimum of TLS Hellman for TLS to configure TLS securely.
have countermeasures for other attacks. 1.2. Migrating to a later version (TLS 1.2 or
TLS 1.3) is strongly encouraged.
Top 10%
Record count
50
unnecessary open ports provide ways for
attackers to access a company’s network.
25
0
Good Fair Warn Bad Neutral
Remediation Suggestions
Embedded in every packet of network Audit the services running on a network infrastructure. The port number is
communication is the port number for that particular machine and ensure only vital embedded in every packet of network
communication, which can be used to services are running. communication, which can be used for
identify and block unwanted attempts to Set up access to required services over port identification. View the full list of
communicate over certain ports or ranges a Virtual Private Network (VPN). network ports in the IANA Service Name
of ports not used by the company. Close Block specific or ranges of ports not and Transport Protocol Port Number
unnecessary open ports. used by the company in the company edge Registry.
Bottom 30%
Record count
10
provide protection against malicious
behavior, such as man-in-the-middle and 33.3%
33.3%
cross-site scripting attacks. Different
types of headers are required for 5
HTTP/1.0, HTTP/1.1, and HTTPS.
Remediation Suggestions
Records that affect a company’s Refer to the Help and Remediation configuration requirements.
Diligence grades have messages that messages for additional details. Ensure application headers are created
provides an explanation and remediation. Implement the required headers from correctly and don’t contain misspellings
the list of required headers and refer to the (typos).
Top 40%
75
Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun
Remediation Suggestions
Conduct general housekeeping on latest patches. Implement automatic acquire when bringing any new devices
company infrastructure. Keep software, updates for critical systems. onto your network.
hardware, operating systems, and Ensure new systems introduced into Find out how quickly your critical
supporting libraries up-to-date. Doing so your corporate network are free of known vendors are patching vulnerabilities. Your
can make it easier to patch systems in vulnerabilities. Staying informed on the organization’s security posture may be
case vulnerabilities appear in the future. latest threats is a simple way to be aware strong, but even one weak link in your
Ensure your operating systems and of any possible risks your company could supply chain can pose significant risk.
supporting libraries are up-to-date with the
Top 10%
Record count
these endpoints may be outdated,
tampered with, or misconfigured.
“Endpoints” refer to any desktop
computer, server, mobile device, media
system, or appliance that has internet
access. A system is classified as
“insecure system” when these endpoints
try to communicate with a web domain
Good Fair Warn Bad Neutral
that doesn’t yet exist or isn’t registered to
anyone.
Remediation Suggestions
Top 10%
Server Software
Remediation Suggestions
Identify out-of-date server software organization’s production applications Consult your operating system vendors’
installations and update them. depend on certain unsupported versions, software repositories and release notes for
Ensure the organization has critical their software development teams will more information on supported server
server software set to auto-update, if need to integrate the newer versions into software for your organization.
applicable, and if some of the their code base.
Record count
communications from desktop software
include metadata about the device's 40.0%
40.0%
2
operating system and browser version;
we compare the devices' version of OS
and browser with currently released 1
versions and software updates available
for those systems, and determine
0
whether those systems are supported or
Good Fair Warn Bad Neutral
out of date.
software. Supported
Set up auto-update methods for
critical desktop software. 60.0%
60.0%
Insufficient information prevents
BitSight from identifying unsupported Unsupported
100.0%
100.0% 50%
software. The use of software device
management systems is recommended,
along with integrating human processes
40.0%
40.0% Unknown
that ensures systems in the organization
are patched and the software is up-to-
0.0%
0.0% 0.0%
0.0% 0%
date. Operating Systems Browsers
Windows 10 60.0%
60.0%
0 20 40 60 80 0 10 20 30 40 50
Visible Web Activity Distribution (%) Visible Web Activity Distribution (%)
Windows 10 / Chrom
2022-06-03 2022-06-17 GOOD Minor Supported Operating System and Browser
e 102.0.5005
Windows 10 / Chrom
2022-04-15 2022-04-22 GOOD Minor Supported Operating System and Browser
e 100.0.4896
Record count
communications from mobile devices
include metadata about the device's
2
operating system, browser version, and
applications. The version information is
compared with the latest and currently 1
available versions in order to determine if
the mobile device is running supported or
0
out-of-date software.
Good Fair Warn Bad Neutral
Remediation Suggestions
Search for Diligence records and then Software Currency by Number of Users
identify and update unsupported mobile
software. 100%
Chrome Mobile
33.3%
33.3%
100.0.4896
Android 11 66.7%
66.7%
Chrome Mobile
33.3%
33.3%
101.0.4951
Android 9 33.3%
33.3%
Chrome Mobile
33.3%
33.3%
102.0.5005
0 20 40 60 80 0 10 20 30 40
Visible Web Activity Distribution (%) Visible Web Activity Distribution (%)
Android 9 / Chrome
2022-06-03 2022-06-03 GOOD Minor Supported Operating System and Browser
Mobile 102.0.5005
Android 11 / Chrome
2022-05-20 2022-05-20 GOOD Minor Supported Operating System and Browser
Mobile 101.0.4951
Android 11 / Chrome
2022-05-06 2022-05-06 GOOD Minor Supported Operating System and Browser
Mobile 100.0.4896
Top 50%
Record count
50
configured effectively.
Remediation Suggestions
ailoscartoes.com.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
cecred.com.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
credcrea.com.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
credelesc.com.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
credicomin.com.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
acredi.coop.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
civia.coop.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
evolua.coop.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
rodocredito.coop.br 2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
seminarioailos.coop.
2021-05-12 2022-06-18 NEUTRAL Minor DNSSEC is not configured on this domain
br
App Grade
Remediation Suggestions
Identify mobile applications that are Understand which, if any, applications adhered to a policy of keeping end-user
not adhering to application security best at an insured present a risk for known operating systems up-to-date.
practices. vulnerabilities and other threats. If your company is developing and
Verify questionnaire data from vendors. Verify quality and other contractual supporting apps for third party customers,
For example, to verify claims that their agreements with clients or vendors; for please ensure your support emails and
organization is free of a particular example, verify that a client created secure support URLs reflect the appropriate
operating system. software from a security standpoint and ownership information.
Domain Squatting**
Domain squatting reports on the presence of registered domains named similarly to those owned by an organization. Attackers set
up malicious software served by similar domain names to take advantage of organization visitors' mistyped URLs, and can trick users
to opening malicious email attachment if recipients do not carefully check messages' domain names of origin.
Remediation Suggestions
Assess potential weaknesses in Implement a policy for domain Be wary of suspicious domains that
domain coverage. Work to register any squatting threats, including process for are similar to official domains for a
potentially at-risk domains and to issuing takedown requests, taking legal vendor, but not registered to their
trademark your brand assets. Increase action based on trademark infringement, company.
domain squatting coverage by and implementing firewalls/blocking Understand if end users at an insured
requesting the addition of a secondary mechanisms to protect against squatted company are at risk for data loss, email
domain that legitimately belongs in your domains. phishing attacks, and other threats.
domain map. Verify completed questionnaires from
critical vendors.
Overview
15k
23159 RESULTS 12
12 828
TYPOGRAPHICAL ERRORS
10k
57.5% 13327 results
6 152
SPEAR PHISHING
5k
27.3% 6326 results 3 484
BIT-FLIP
0
0 297
297 174
174 22
22 202
202
0
15.1% 3506 results Unregistered Another Company Third Party
Addition 1456 0 0
Homoglyph 4079 3 0
Hyphenation 617 3 0
Bit-flip 3484 22 0
Bitsquatting 3484 22 0
Insertion 6476 6 1
Omission 662 17 76
Repetition 419 0 0
Replacement 3382 12 0
Transposition 671 1 25
Vowel-swap 647 32 0
Various 255 25 0
User Behavior
User Behavior looks at user file sharing
activity that may introduce malicious
software into a company, for example,
by downloading a compromised file.
Top 10%
Record count
cloud storage services, or direct peer-to-
peer channels such as BitTorrent,
Gnutella.
ic
ks
es
Tv
r
he
ie
at
us
o
ov
Ot
ic
Ga
M
pl
M
Ap
Remediation Suggestions
IP Address First Seen Last Seen Duration Severity File Sharing Category
Exposed Credentials**
The Exposed Credentials risk vector indicates if employees of a company had their information disclosed as a result of a publicly
disclosed data breach. Exposed Credentials is an informational risk vector and does not affect a company's Security Rating. Many
websites do not validate email addresses, which makes it difficult to assert that certain exposed records are associated with a
company's employees. Likewise, BitSight does not test that exposed credentials are valid, for example by trying a username and
password exposed from a breached site, in order to preserve business confidence and trust.
Remediation Suggestions
Use Exposed Credentials as an password complexity, to address the Consider using 2-factor
opportunity to create or re-evaluate potential risks associated with Exposed authentication as part of your
policies on information reuse, especially Credentials. organization’s user account security
requirements concerning password reuse, strategy.
Observed Events
Observation Date Exposure Date Breached Site Domains Records
Public Disclosures
Public Disclosure events provide
information on breaches, general
security incidents, and other disclosures
related to possible incidents of
undesirable access to a company's
data.
Top 10%
Security Incidents
Breaches are publicly disclosed events of unauthorized access, often involving data loss or theft. These events are graded based on
several factors, including the number of lost or exposed data records.
Note: Breaches have a negative impact on Security Ratings only if they occur and have a 120-day half-life. For instance, the remaining
impact of a breach will be fewer than 20 points after 18 months for severe breaches and under 10 points for moderate breaches.
General Security Incidents are a diverse range of events related to the undesirable access of a company’s data and are considered
more severe than Other Disclosures. Some categories of General Security Incidents are Ratings-impacting, while others are
informational only and do not impact the rating. These events are graded based on several factors, including the number of lost or
exposed data records.
Note: Ratings-impacting General Security Incidents have a negative impact on Security Ratings only if they occur and have a 120-day
half-life. For instance, the remaining impact of a General Security Incident will be fewer than 20 points after 18 months for the most
severe incidents and under 10 points for moderate ones.
Other Disclosures*
Other Disclosures are considered the least severe group of events within Public Disclosures. This category is used for incidents we
learn about via public information, and through other means, that are judged to be minimal in their reflection on security posture. All
categories of Other Disclosures are informational only and do not impact the rating.
FAQ
What is a BitSight Company Overview cyber insurance premiums. It’s used by the How can I discuss information in this
Report? world’s largest investment banks, retailers, report?
private equity companies, and insurers to
This report was created for Cooperativa This report summarizes the security
evaluate the security risk of their own
Central de Crédito Ailos Group, by BitSight performance of the company, depicted
organization and their third parties with
Technologies. It is a snapshot of the across the risk categories and the risk
objective, evidence-based security ratings.
company’s BitSight Security Rating vectors within them.
performance during the past year, as of 18 Based in Boston, MA, BitSight is backed by The Compromised Systems risk
June 2022. It includes: the Globespan Capital Partners, Menlo category indicates the presence of
A historical overview of the company’s Ventures, Comcast Ventures, malware or unwanted software, which is
BitSight Security Rating and their overall Commonwealth Capital Ventures, evidence of insufficient security controls.
security performance. Flybridge Capital Partners, and the The Diligence risk category assesses the
A summary analysis of the company’s National Science Foundation. steps a company has taken to prevent
observed events by risk vector. attacks, their best practice
For more information about BitSight, visit implementation, and risk mitigation
Learn more about this report here: www.bitsight.com or follow @BitSight on (e.g., server configurations) to determine
https://bitsighttech.com/understand-your-rating
Twitter. if the security practices of an
organization are on par with best
Why am I receiving this report? Please email BitSight Support at practices.
[email protected] regarding
The User Behavior risk category
A BitSight Company Overview Report is additional questions or for more assesses employee activity, such as file
typically shared by BitSight customers with information about this report. sharing and password re-use. These
companies in their networks (their third types of activities can introduce
parties). The report is typically sent for malware to an organization or result in
What is a BitSight Security Rating?
various reasons, such as informing their a data breach.
third parties of risks affecting their internet A BitSight Security Rating describes a The Public Disclosures risk category
security posture that may need company’s cybersecurity posture, serves as provides information related to possible
remediation, as a part of the evaluation a measure of their risk, and transforms incidents of undesirable access to a
process for cyber insurance applicants, or how companies manage security risk by company’s data, including breaches,
to meet regulatory requirements. using a data-driven, outside-in approach to general security incidents, and other
rate a company’s security effectiveness. disclosures.
If this report is sent by another party,
BitSight encourages discussing this report A company’s rating is presented as a
with that party. Access to the BitSight number between 250 and 900. It’s an
platform can also be granted to the third aggregation of the letter grades of all risk
parties of BitSight customers, where they vectors (with different weights), that are
may view additional details. then normalized for that company. It’s
based on a 10-point rating system, and
then rounded down in 10 point increments.
Who is BitSight?
Therefore, if the current rating is 740, this is
BitSight is a company that provides daily a representation of the combined
security ratings through an automated assessments of all risk vectors. The rating
service via the BitSight Security Ratings may be somewhere between 740 and 749
Platform. in actuality.
The BitSight platform continuously Learn more about the BitSight Security
analyzes terabytes of external data on the Rating here:
security behaviors of a company in order https://www.bitsight.com/security-ratings
to help organizations manage third party
risk, first party risk, benchmark
performance, and assess and negotiate
Disclaimer
This report and all data contained
herein are the proprietary information of
BitSight Technologies, Inc. and are
governed by and may be used only in
accordance with the terms and
conditions of the applicable underlying
agreement. For the avoidance of doubt,
this report and all data contained herein
are provided on an “as is” basis and for
internal us only, and BitSight
Technologies, Inc. hereby disclaims any
and all express or implied warranties
whatsoever, including, but not limited to,
any warranties of merchantability or
fitness for a particular purpose. Except
as otherwise permitted in the applicable
underlying agreement, this report may
not be reproduced in whole or in part by
any means of reproduction.