Carbanak is a threat group that mainly targets banks. It also refers to malware of the same name (Carbanak). It is sometimes referred to as FIN7, but these appear to be two groups using the same Carbanak malware and are therefore tracked separately.
Disclaimer: We present this mapping to stimulate thinking about active defense options to combat this adversary, not to present all possibilities. We invite you to use this as a guide and add your own use cases for applying Shield techniques to counter each adversary action.
Note: All ATT&CK Group sub-technique mappings have been remapped to their parent technique and were derived from Group Technique mappings in ATT&CK v8.
|ATT&CK Technique||Opportunity Space||AD Technique||Use Case|
|T1036 - Masquerading||There is an opportunity to detect the presence of an adversary by identifying and alerting on anomalous behaviors.||DTE0007 - Behavioral Analytics||A defender can look for known files in non-standard locations or files that are creating anomalous processes or connections.|
|T1078 - Valid Accounts||There is an opportunity to introduce user accounts that are used to make a system look more realistic.||DTE0010 - Decoy Account||A defender can create decoy user accounts which are used to make a decoy system or network look more realistic.|
|T1078 - Valid Accounts||There is an opportunity to deploy a tripwire that triggers an alert when an adversary touches a network resource or uses a specific technique.||DTE0012 - Decoy Credentials||A defender can seed systems with decoy credentials in a variety of locations and establish alerting that will trigger if an adversary harvests the credentials and attempts to use them.|
|T1078 - Valid Accounts||There is an opportunity to prepare user accounts so they look used and authentic.||DTE0008 - Burn-In||A defender can prepare a Decoy System by logging in to the Decoy Account and using it in ways consistent with the deception story, creating artifacts in the system that make it look legitimate.|
|T1102 - Web Service||There is an opportunity to detect the presence of an adversary by identifying and alerting on anomalous behaviors.||DTE0007 - Behavioral Analytics||A defender can detect the use of external web services for communication relay. By implementing behavior analytics anomalies in what domains a system is communicating with, how frequently, and at what times, a defender can potentially identify malicious traffic.|
|T1218 - Signed Binary Proxy Execution||There is an opportunity to block an adversary's intended action and force them to reveal additional TTPs.||DTE0036 - Software Manipulation||A defender can monitor operating system functions calls to look for adversary use and/or abuse.|
|T1218 - Signed Binary Proxy Execution||There is an opportunity to study the adversary and collect first-hand observations about them and their tools.||DTE0018 - Detonate Malware||A defender can detonate malicious code leveraging a signed binary on a decoy system or within a decoy network to see how it behaves or for adversary engagement purposes.|
|T1218 - Signed Binary Proxy Execution||There is an opportunity to create a detection with a moderately high probability of success.||DTE0003 - API Monitoring||A defender can monitor and analyze operating system functions calls for detection and alerting.|
|T1219 - Remote Access Software||There is an opportunity to study the adversary and collect first-hand observations about them and their tools.||DTE0017 - Decoy System||A defender can install remote access tools on decoy systems across the network to see if the adversary uses these tools for command and control.|
|T1543 - Create or Modify System Process||There is an opportunity to use security controls to stop or allow an adversary's activity.||DTE0032 - Security Controls||A defender can choose to harden or weaken security controls on a system to affect an adversaries ability to modify or create system processes.|
|T1562 - Impair Defenses||There is an opportunity to study the adversary and collect first-hand observations about them and their tools.||DTE0004 - Application Diversity||A defender can plant AV or monitoring tools which are easy for an adversary to remove. If an adversary removes these, they may be enticed to act more openly believing they have removed monitoring from the system.|
|T1562 - Impair Defenses||There is an opportunity to create a detection with a moderately high probability of success.||DTE0034 - System Activity Monitoring||A defender can monitor for signs that security tools and other controls are being tampered with by an adversary.|
|T1562 - Impair Defenses||There is an opportunity to create a detection with a moderately high probability of success.||DTE0033 - Standard Operating Procedure||A defender can define operating procedures for modifying GPOs and alert when they are not followed.|