GaboonGrabber Scenario: RegionalBank Compliance Crisis

RegionalBank: Community banking, 350 employees across 12 locations
Social Engineering + Compliance Pressure • GaboonGrabber
STAKES
Customer financial data + Banking regulations + 24/7 transaction processing
HOOK
RegionalBank faces their annual federal banking examination next month, creating intense pressure to demonstrate robust security controls. The attacker is exploiting this compliance focus by sending fake 'regulatory security audit' emails that bypass normal skepticism because they appear to support compliance efforts.
PRESSURE
Federal banking examination in 4 weeks - regulatory deficiencies could trigger enforcement action
FRONT • 3-4 hours • Intermediate
RegionalBank: Community banking, 350 employees across 12 locations
Social Engineering + Compliance Pressure • GaboonGrabber
NPCs
  • Amanda Torres (Chief Compliance Officer): Extremely anxious about upcoming examination, demanding evidence of security improvements, doesn't understand that urgent compliance can create vulnerabilities
  • Robert Chen (IT Director): Overwhelmed by compliance requests, approved several 'audit tools' quickly to demonstrate security responsiveness, now questioning those decisions
  • Maria Rodriguez (Branch Manager): Frustrated with new security 'requirements' affecting customer service, clicked on audit emails to show compliance cooperation
  • James Park (Federal Banking Examiner): Expects comprehensive security documentation, will arrive in 3 weeks for intensive examination, represents regulatory authority
SECRETS
  • IT bypassed normal vendor verification for 'regulatory audit tools' to demonstrate quick compliance response
  • Management created culture where compliance questions are answered immediately without security review
  • Attacker researched banking examination cycles and targets institutions during pre-examination stress periods

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

GaboonGrabber Financial Compliance Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

GaboonGrabber Financial Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

RegionalBank: Community Banking Under Federal Oversight During Compliance Crisis

Quick Reference

  • Organization: Community bank serving three-county region, 350 employees across 12 branch locations providing personal banking, small business lending, and mortgage services
  • Key Assets at Risk: Customer financial data (2,100 customers affected), Federal regulatory standing (OCC examination in 27 days), 24/7 transaction processing capability, Community banking reputation
  • Business Pressure: Federal banking examination in 27 days—Board expects perfect outcome to maintain CAMELS rating enabling growth initiatives, but security incident threatens examination timeline and regulatory compliance
  • Core Dilemma: Transparent incident reporting demonstrates security program maturity to federal regulators BUT requires operational disruptions during critical examination preparation period, OR Suppress…

Hook

“It’s Tuesday morning at RegionalBank, and the quarterly board meeting just ended with one clear message: the upcoming federal examination must go perfectly. With just four weeks to prepare, every department is scrambling to demonstrate compliance improvements. But yesterday, several staff members reported computer slowdowns, and the IT help desk has been fielding calls about new ‘audit software’ that appeared after staff responded to what seemed like legitimate regulatory security requirements.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Computers experiencing 25% performance degradation across multiple departments”
  • “Help desk reports 6 calls about unfamiliar ‘compliance monitoring’ software”
  • “Staff mention receiving ‘federal banking security audit’ emails Monday evening”
  • “Customer service terminals occasionally freezing during peak hours”

Key Discovery Paths:

Detective Investigation Leads:

  • Email analysis reveals sophisticated spoofing of federal banking regulator communications
  • File system examination shows “ComplianceMonitor.exe” and “AuditTool.exe” in system directories
  • Registry forensics reveals persistence mechanisms disguised as regulatory compliance tools

Protector System Analysis:

  • Network monitoring detects encrypted communication to command servers registered recently
  • Process analysis shows memory injection into banking software and customer service applications
  • Security log review reveals unauthorized access attempts to customer database systems

Tracker Network Investigation:

  • DNS query analysis shows lookups to domains mimicking federal banking regulator websites
  • Traffic analysis reveals data exfiltration patterns targeting customer account information
  • Email flow investigation shows targeted phishing campaign during examination preparation

Communicator Stakeholder Interviews:

  • Compliance staff admit clicking on “urgent audit requirements” to demonstrate cooperation
  • Branch managers reveal pressure to respond immediately to any regulatory communications
  • IT staff explain expedited approval of “compliance tools” to meet examination deadlines

Mid-Scenario Pressure Points:

  • Hour 1: Compliance officer demands confirmation that all “audit tools” are properly installed
  • Hour 2: Federal examiner calls to confirm examination schedule and document preparation
  • Hour 3: Board chair inquires about compliance readiness and any potential issues
  • Hour 4: Customer service reports intermittent access issues affecting transaction processing

Evolution Triggers:

  • If containment exceeds 6 hours, GaboonGrabber deploys secondary payload targeting customer data
  • If network isolation affects compliance systems, regulatory documentation becomes inaccessible
  • If customer-facing systems show instability, transaction processing integrity becomes questionable

Resolution Pathways:

Technical Success Indicators:

  • Team identifies social engineering exploitation of compliance pressure and culture
  • Network segmentation protects customer data while maintaining transaction processing
  • Behavioral analysis and memory forensics confirm complete malware removal

Business Success Indicators:

  • Incident response demonstrates robust security controls to federal examiner
  • Compliance documentation includes security incident as evidence of effective monitoring
  • Customer transaction processing maintains integrity throughout response process

Learning Success Indicators:

  • Team understands how compliance pressure creates exploitable organizational vulnerabilities
  • Participants recognize balance needed between compliance responsiveness and security verification
  • Group demonstrates effective coordination between compliance, security, and operational teams

Common IM Facilitation Challenges:

If Team Ignores Compliance Context:

“Your technical analysis is solid, but Amanda just received a call from the federal examiner asking about your bank’s security posture. How do you explain this incident as evidence of strong security controls?”

If Business Impact Is Underestimated:

“While you’re investigating, the customer service system just froze during peak banking hours. Customers are waiting in line and Maria needs to know if the systems are safe to use.”

If Regulatory Complexity Overwhelms:

“The regulatory details are complex, but the core question is simple: how do you maintain security when everyone feels pressure to demonstrate immediate compliance?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish banking compliance crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing compliance pressure vulnerabilities and customer data protection.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of financial institution security challenges. Use the full set of NPCs to create realistic regulatory examination pressures. The two rounds allow GaboonGrabber to progress toward customer data theft, raising stakes. Debrief can explore balance between compliance responsiveness and security verification.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing federal examination preparation, customer data protection, transaction processing, and regulatory compliance. The three rounds allow for full narrative arc including villain’s banking-specific multi-stage attack plan.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate banking audit software causing unrelated performance issues). Make containment ambiguous, requiring players to justify regulatory-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of banking compliance and security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “You discover that 8 workstations across compliance and branch management departments received emails Monday evening from ‘FFIEC-Security-Audit@federalbanking-examiners.org’ with urgent instructions to install ‘pre-examination compliance monitoring tools’. Email forensics reveal sophisticated spoofing of federal banking regulator communications.”

Clue 2 (Minute 10): “File system examination shows ‘ComplianceMonitor.exe’ and ‘AuditTool.exe’ running on affected workstations. These executables lack valid digital signatures and are establishing encrypted connections to command servers registered during RegionalBank’s examination preparation period.”

Clue 3 (Minute 15): “Process analysis reveals GaboonGrabber trojan with memory injection into banking software and customer service applications. The malware is conducting reconnaissance of customer financial data and attempting to establish persistent access to transaction processing systems.”


Pre-Defined Response Options

Option A: Complete System Isolation & Regulatory Notification

  • Action: Immediately isolate affected workstations, remove GaboonGrabber from all systems, implement regulatory incident notification to federal banking examiners, establish secure compliance documentation access.
  • Pros: Completely removes threat and fulfills banking regulatory requirements; demonstrates robust security controls for upcoming examination.
  • Cons: Requires immediate regulatory disclosure; may complicate examination preparation and affect compliance timeline.
  • Type Effectiveness: Super effective against Trojan type malmons like GaboonGrabber in regulated banking environments.

Option B: Selective Quarantine & Accelerated Forensics

  • Action: Quarantine confirmed compromised workstations, implement enhanced monitoring on banking network, accelerate forensics to determine customer data exposure before regulatory notification decisions.
  • Pros: Allows continued compliance preparation on clean systems; provides detailed incident documentation for examination.
  • Cons: Delays regulatory notification until investigation complete; may affect customer transaction processing during forensics.
  • Type Effectiveness: Moderately effective against Trojan threats; balances investigation depth with business continuity.

Option C: Network Segmentation & Transaction Protection

  • Action: Implement emergency network segmentation between compliance systems and customer transaction processing, deploy behavioral monitoring on all banking workstations, continue examination preparation with enhanced oversight.
  • Pros: Maintains critical banking operations and compliance preparation; prevents lateral movement to customer financial systems.
  • Cons: Doesn’t remove existing malware; allows GaboonGrabber to potentially collect additional customer information during continued operations.
  • Type Effectiveness: Partially effective against Trojan type malmons; contains but doesn’t eliminate threat.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Amanda Torres (Chief Compliance Officer) reports that 8 staff members across compliance and branch management received “URGENT: Pre-Examination Security Audit Required” emails Monday evening from “FFIEC-Security-Audit@federalbanking-examiners.org” (legitimate regulator is FFIEC.gov). During examination preparation stress, staff clicked through thinking it was mandatory compliance requirement.

  • Clue 2 (Minute 10): File analysis discovers “ComplianceMonitor.exe” and “AuditTool.exe” running from system directories on affected workstations. Memory forensics shows process injection into banking software (core banking system, customer service platform) - this is GaboonGrabber trojan specifically targeting financial institution data.

  • Clue 3 (Minute 15): Network monitoring reveals encrypted connections to command-and-control servers. GaboonGrabber is accessing customer financial data - examining access patterns shows it’s targeting account numbers, balances, transaction histories, and personally identifiable information (PII) for 23,000+ customer accounts.

  • Clue 4 (Minute 20): James Park (Federal Banking Examiner) emails confirming examination schedule in 3 weeks and requesting advance security documentation. Meanwhile, Robert Chen (IT Director) admits expediting approval of “compliance tools” to demonstrate security responsiveness to Amanda. Customer service terminals are experiencing freezes during peak hours - potentially affecting transaction integrity.

Response Options (Choose One):

  • Option A: Emergency Isolation + Regulatory Self-Disclosure
    • Action: Immediately isolate all 8 infected workstations, shut down customer data system access, wipe infected systems, begin regulatory self-disclosure to FFIEC/OCC (incident notification within 36 hours per banking regulations)
    • Pros: Guarantees malware removal; meets federal banking notification requirements; demonstrates robust security controls to examiner; protects remaining customer data
    • Cons: Halts compliance preparation for 48-72 hours; complicates examination timeline; regulatory disclosure may trigger preliminary examination inquiry; customer service capacity reduced during remediation
    • Business Impact: Amanda fears incident will be used as examination finding; branch operations degraded; but proactive disclosure demonstrates security maturity
    • Type Effectiveness: Super effective against Trojan type malmons - complete removal
  • Option B: Controlled Quarantine + Forensic Assessment
    • Action: Quarantine infected systems to isolated VLAN, deploy clean backup workstations for customer service, conduct rapid forensics to determine breach scope for regulatory notification timing
    • Pros: Maintains customer service operations; contains threat while preserving evidence; allows accurate breach scope assessment before regulatory disclosure; preserves examination preparation timeline
    • Cons: Reduced workstation capacity creates service bottlenecks; GaboonGrabber remains active on quarantined systems during investigation; forensics may reveal worse breach requiring immediate disclosure anyway
    • Business Impact: Customer service somewhat degraded but operational; compliance preparation continues; managed regulatory notification possible
    • Type Effectiveness: Moderately effective against Trojan type malmons - contains but doesn’t immediately remove
  • Option C: Network Segmentation + Business Continuity
    • Action: Block C2 domains at firewall, segment banking network (customer data separated from general network), deploy aggressive endpoint security tools, continue operations with “heightened monitoring”
    • Pros: Fastest response; maintains examination preparation schedule; keeps customer service fully operational; Amanda’s compliance timeline preserved
    • Cons: GaboonGrabber’s fileless techniques may evade endpoint tools; doesn’t address root compromise; may violate banking regulations requiring prompt breach notification; continuing to operate on infected systems risks additional customer data exposure
    • Business Impact: Examination preparation unaffected; customer service normal; regulatory disclosure avoided (short-term)
    • Type Effectiveness: Partially effective against Trojan type malmons - containment without remediation

Round Transition Guidance:

After Round 1 response, GaboonGrabber’s next stage activates based on team’s choice:

  • If Option A (Emergency Isolation): Round 2 focuses on examination complication (James Park asks pointed questions about incident timeline and root cause), preparing regulatory self-disclosure documentation, and managing branch operations with reduced IT capacity while Amanda worries about examination outcome.

  • If Option B (Controlled Quarantine): Round 2 reveals forensics found GaboonGrabber accessed customer wire transfer credentials in addition to account data - breach now includes active transaction system compromise. Race to complete investigation and regulatory notification before 36-hour window closes while maintaining customer service.

  • If Option C (Network Segmentation): Round 2 discovers GaboonGrabber deployed Redline credential stealer during “safe” operating window - now has banking system login credentials for 12 employees. Must address expanded breach scope, potential unauthorized transaction risk, and delayed regulatory notification implications.

Round 2: Regulatory Disclosure & Customer Impact (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 35): Forensic timeline reconstruction shows GaboonGrabber was active for 32 hours before detection. During that window, it accessed customer account data for 23,427 accounts including: account numbers, balances, transaction histories, SSNs, addresses, and phone numbers. This meets federal banking breach notification thresholds (Gramm-Leach-Bliley Act).

  • Clue 6 (Minute 40): Banking regulatory counsel explains: unauthorized access to customer financial information requires notification to: (1) primary federal regulator (FFIEC/OCC) within 36 hours, (2) affected customers “as soon as possible”, (3) major credit bureaus if >1,000 customers affected. Failure to notify can result in enforcement actions including civil money penalties and exam downgrade.

  • Clue 7 (Minute 50): Robert Chen reveals the compliance pressure culture - Amanda’s directive to “demonstrate security improvements immediately” led IT to bypass normal vendor verification for anything labeled “compliance” or “audit.” Monthly compliance meetings track “security initiative responsiveness” as key performance indicator, creating organizational pressure to approve security requests instantly.

  • Clue 8 (Minute 55): Maria Rodriguez (Branch Manager) reports customers are calling about slow transaction processing and asking if “the bank’s systems are secure.” One customer’s spouse works in IT and heard about “malware at a bank” - unclear if referring to RegionalBank or unrelated incident, but social media rumors starting. Amanda receives email from James Park requesting “preliminary security posture briefing” before formal examination.

Response Options (Choose One):

  • Option A: Full Regulatory Disclosure + Comprehensive Customer Notification
    • Action: Immediately file regulatory incident report with FFIEC/OCC, notify all 23,427 affected customers with breach details and credit monitoring offer, brief federal examiner on incident and response, establish customer hotline for questions
    • Pros: Legally compliant; demonstrates transparency to regulator; protects customers from identity theft; shows security program effectiveness through detection and response
    • Cons: Large-scale notification creates customer alarm; potential deposit withdrawals; media coverage likely; credit monitoring costs $700K annually; examination will scrutinize incident root cause; regulatory enforcement action possible
    • Business Impact: Customer trust test through transparency; regulatory relationship preserved through honesty; but reputation and cost impacts significant
    • Type Effectiveness: Super effective against Trojan type malmons - comprehensive breach response demonstrates banking security controls
  • Option B: Staged Disclosure + Controlled Notification
    • Action: File regulatory incident report immediately (36-hour requirement), brief examiner with preliminary findings, begin customer notification in phases (highest-risk accounts first), enhanced monitoring for all customers while notifications proceed
    • Pros: Meets regulatory timeline; provides examiner with transparent incident narrative; prioritizes most vulnerable customers; allows refinement of customer communication based on initial responses
    • Cons: Phased customer notification may extend beyond “as soon as possible” standard; customers may hear about breach through informal channels before official notification; regulatory examiner may question notification staging
    • Business Impact: Controlled customer communication; managed regulatory relationship; but timing questions create compliance uncertainty
    • Type Effectiveness: Moderately effective against Trojan type malmons - balanced approach with some regulatory risk
  • Option C: Minimal Disclosure + Narrow Notification
    • Action: File regulatory report with narrow interpretation (describe as “attempted intrusion” rather than successful breach), notify only customers whose accounts show suspicious activity (versus all accessed accounts), describe incident to other customers as “security update” if asked
    • Pros: Minimizes customer alarm; avoids mass notification costs; reduces media attention; examination narrative focuses on “successful defense” rather than breach; Amanda’s compliance timeline minimally affected
    • Cons: Likely regulatory violation (accessed data requires notification regardless of exfiltration proof); legal liability if breach scope discovered later during examination; ethically problematic; enforcement action risk if regulators determine notification was inadequate
    • Business Impact: Short-term reputation/cost preservation; catastrophic risk if violation exposed during examination or through customer identity theft
    • Type Effectiveness: Ineffective against Trojan type malmons - doesn’t address breach scope; regulatory and customer protection failure

IM Facilitation Notes:

This round introduces banking regulatory compliance and fiduciary responsibility. Players must balance:

  • Regulatory compliance (prompt notification) vs. examination outcome concerns
  • Customer protection (comprehensive notification) vs. business viability (potential deposit withdrawals)
  • Transparency to regulator (demonstrates security maturity) vs. enforcement action fears
  • Short-term reputation management vs. long-term regulatory relationship

Key Discussion Points:

  • What are the consequences of inadequate notification vs. comprehensive disclosure?
  • How does “compliance responsiveness” culture create security vulnerabilities?
  • When do examination concerns override customer protection obligations?
  • How do you turn security incident into demonstration of effective security program to examiner?

Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs & Forensics:

  • Email server logs: Phishing campaign targeting compliance and branch staff (sender spoofing, examination timing correlation)
  • EDR telemetry: Process injection into core banking system and customer service platform, memory-resident malware behavior
  • Database access logs: Customer account data accessed, query patterns, exfiltration indicators
  • Network flow logs: C2 domain connections, data transfer volumes, timing correlations with business operations
  • Banking application logs: Transaction processing impacts, system freezes, potential transaction integrity issues

Communications & Culture:

  • Phishing email analysis: “Pre-examination security audit” social engineering - why compliance staff trusted it
  • Compliance meeting minutes: “Security initiative responsiveness” KPI documentation, organizational pressure evidence
  • Management directives: Amanda’s “demonstrate security improvements immediately” communications creating bypass culture
  • Customer communications: Maria’s customer inquiries about system security, social media rumor monitoring
  • Examiner communications: James Park’s preliminary briefing request, examination documentation expectations

Stakeholder Interviews:

  • Amanda Torres (Chief Compliance Officer): Reveals examination anxiety, admits creating “compliance urgency” culture, fears incident will be used as examination finding
  • Robert Chen (IT Director): Explains vendor verification bypass for “compliance tools,” reveals tension between security thoroughness and compliance responsiveness
  • Maria Rodriguez (Branch Manager): Describes customer service impacts, reports customer security concerns, represents frontline employee compliance pressure
  • James Park (Federal Banking Examiner): Regulatory perspective - incident could demonstrate robust detection OR be used as control deficiency finding, depending on response quality
  • Customers (23,427 affected): Account data exposure, potential identity theft risk, trust in community bank relationship

Technical Analysis:

  • Infected workstation forensics: GaboonGrabber capabilities specific to banking systems (core banking integration, transaction monitoring)
  • Customer data exposure assessment: What account data accessed (account numbers, balances, PII), exfiltration confirmation, breach scope for regulatory notification
  • Transaction integrity verification: Were any transactions modified or initiated by malware? Banking system audit trail review
  • Core banking system security: Can primary banking systems be trusted? Has data been modified? Backup verification timeline

Network & Banking System Analysis:

  • C2 infrastructure: Domain analysis, communication protocols, attacker infrastructure patterns indicating financial sector specialization
  • Data exfiltration patterns: Volume analysis, file type identification, customer account targeting
  • Lateral movement investigation: Did GaboonGrabber spread beyond initial workstations to core banking servers, wire transfer systems?
  • Banking network segmentation: Are customer-facing systems properly isolated from back-office? Did segmentation contain breach?

Regulatory Context & Compliance:

  • GaboonGrabber threat intelligence: Known financial institution targeting, typical banking sector attack patterns
  • Banking breach notification requirements: FFIEC guidance, Gramm-Leach-Bliley Act notification rules, 36-hour regulator notification timeline
  • FFIEC examination process: How security incidents are evaluated, what demonstrates effective security program vs. control deficiencies
  • Regulatory enforcement: What triggers enforcement actions? How do regulators distinguish between unavoidable breach and negligent security?
  • Industry breach precedents: Similar bank data breaches, regulatory outcomes, customer impact studies

Response Evaluation Criteria

Type-Effective Approaches (Trojan/Stealth Malmons):

  • Complete system remediation: Re-imaging infected workstations ensures fileless malware removal in banking environment
  • Banking system integrity verification: Confirming transaction logs and customer data haven’t been modified
  • Comprehensive forensics: Understanding full breach scope before regulatory notifications
  • Credential rotation: Resetting banking system passwords for accounts accessed from infected workstations
  • Network segmentation validation: Ensuring customer transaction systems properly isolated from compromised administrative systems

Common Effective Strategies:

  • Immediate C2 blocking: Disrupts attacker control even if malware temporarily remains
  • Regulatory counsel involvement: Banking compliance expertise guides notification decisions
  • Transparent examiner communication: Turning incident into demonstration of security program effectiveness
  • Customer-centered notification: Clear, supportive messaging maintains community bank relationship
  • Cultural assessment: Addressing “compliance urgency” mindset prevents recurrence

Common Pitfalls:

  • Signature-based detection reliance: GaboonGrabber’s memory-resident techniques evade traditional antivirus in banking systems
  • Examination anxiety capitulation: Minimizing breach to avoid examination scrutiny violates regulatory notification requirements
  • Notification scope minimization: Narrow interpretation of “accessed” data to reduce customer notification costs
  • Customer impact dismissal: Treating 23,427 affected accounts as “just data” rather than community relationships and fiduciary responsibility
  • Incident framing: Describing breach as “attempted intrusion” rather than successful compromise misleads regulator

Adjudicating Novel Approaches

Hybrid Solutions (Encourage with Guidance):

  • “We’ll brief the examiner early with comprehensive incident narrative to demonstrate security program maturity” → “Yes, and… that transforms incident from control deficiency to evidence of effective detection and response. What specific documentation does James Park need? How do you frame incident response as strength rather than weakness?”

  • “We’ll partner with credit union association to provide coordinated customer education about phishing” → “Creative approach to turning bank-specific incident into industry service. How does community-focused response strengthen customer relationships? Does it change regulatory perception of incident?”

  • “We’ll offer enhanced fraud monitoring for affected customers beyond standard credit monitoring” → “Yes, that addresses banking-specific identity theft risks. What fraud monitoring is relevant for account compromise (vs. credit breach)? How does this demonstrate fiduciary responsibility to examiner?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll frame the incident as ‘successful defense’ to examiner since we detected and contained it” → “That emphasizes positive aspects, but forensics shows 32 hours of customer data access before detection. How does James Park evaluate ‘successful defense’ claim against evidence? What if examiner perceives this as minimization rather than transparent self-assessment?”

  • “We’ll delay regulatory notification until after customer notification complete to provide ‘comprehensive report’” → “That creates polished documentation, but FFIEC guidance requires notification within 36 hours of discovery. What are consequences of delayed notification? How does examiner perceive delay - thoroughness or avoidance?”

  • “We’ll notify only customers showing suspicious account activity rather than all accessed accounts” → “That focuses on confirmed harm, but regulatory counsel notes Gramm-Leach-Bliley requires notification for unauthorized access, not just confirmed fraud. What’s the legal risk? How do customers react if they later discover they were part of breach but not notified?”

Risk Assessment Framework:

When players propose novel approaches, evaluate:

  1. Regulatory Compliance: Does this meet FFIEC/Gramm-Leach-Bliley notification requirements?
  2. Fiduciary Responsibility: Does this protect customers’ financial information and banking relationship?
  3. Examination Impact: Does this demonstrate effective security program or reveal control deficiencies?
  4. Technical Effectiveness: Does this actually remove GaboonGrabber and secure banking systems?
  5. Community Trust: Can the bank defend this decision to 23,427 customers whose financial data was compromised?

Example Adjudication:

Player Proposal: “We’ll file regulatory report immediately, but stage customer notifications over 2 weeks based on account risk level, with highest-balance and elderly customers notified first.”

IM Response: “Interesting prioritization approach. Regulatory counsel notes Gramm-Leach-Bliley requires notification ‘as soon as possible’ - typically interpreted as days, not weeks. Can you justify 2-week staging legally? Additionally, Amanda asks: ‘What if a 22-year-old customer’s identity is stolen during our staging period because we prioritized elderly customers? How do we defend that?’ What’s your risk assessment?”

Guidance for Players: Encourage them to meet “as soon as possible” standard (3-5 days for mass notification logistics) while prioritizing highest-risk outreach: Personal phone calls to elderly/vulnerable customers, priority fraud monitoring for high-balance accounts, but all written notifications within one week. Staging support services, not notifications.


Advanced Challenge Materials (150-170 min, 3 rounds)

Complexity Layer: Ambiguous Evidence

Subtle Indicators:

  • Partial Database Logs: Core banking system logging was not comprehensive - can confirm GaboonGrabber queried customer account tables, but can’t determine exact records exfiltrated vs. accessed
  • Encrypted C2 Traffic: Network logs show 4.7GB transferred to C2 servers, but can’t decrypt to confirm contents - could be customer data, could be system reconnaissance, could be encrypted database exports
  • Timeline Uncertainties: Phishing emails sent Monday evening, but some file timestamps show malware activity Sunday night - suggests possible earlier compromise or log tampering
  • Legitimate Banking Access: GaboonGrabber accessed customer accounts using legitimate compliance officer credentials - distinguishing malicious queries from normal audit activities extremely difficult
  • Regulatory Notification Ambiguity: Legal counsel debates whether “unauthorized access” includes malware viewing records vs. confirmed exfiltration - notification scope interpretation affects 23,427 customers and examination narrative

Incomplete Information:

  • Unknown Customer Impact: Can’t determine which of 23,427 customers’ data was actually exfiltrated vs. just viewed in database - notification decision based on incomplete evidence
  • Transaction Integrity Questions: Core banking system backups exist, but transaction integrity verification requires multi-day audit - can’t confirm no transactions were modified without extensive analysis
  • Examination Timing Impact: Unknown how James Park will interpret incident - could demonstrate security maturity OR be used as control deficiency finding, depending on factors team can’t fully control
  • Customer Reaction Uncertainty: Don’t know if comprehensive notification will trigger deposit withdrawals threatening bank viability

Technical Ambiguity:

  • Persistent Backdoor Confirmation: Found registry persistence on compliance workstations, but can’t verify if GaboonGrabber established backdoors in core banking servers without weeks of forensics
  • Redline Deployment Status: Threat intelligence indicates GaboonGrabber typically deploys Redline credential stealer as Stage 3 - was it deployed? If so, what banking credentials were stolen?
  • Wire Transfer System Exposure: GaboonGrabber found on same network segment as wire transfer system - can’t confirm compromise without shutting down wire transfers for forensic examination (affects daily operations)

Complexity Layer: Red Herrings

Legitimate Anomalies:

  • Unrelated Compliance Software: Bank recently deployed legitimate FFIEC CAT (Cybersecurity Assessment Tool) software - team may waste time investigating whether vendor tool was attack vector
  • Performance Issues from Peak Load: Monday was loan application deadline, creating legitimate system slowdowns team may attribute to GaboonGrabber
  • Examiner Communications: James Park’s “preliminary briefing” request is standard examination procedure, not indicator that he suspects security incident

Coincidental Timing:

  • Industry Security Alert: Federal banking agencies issued general phishing warning to all banks last week - Amanda’s heightened compliance anxiety partially driven by this unrelated alert, not specific threat intelligence
  • Competitor Branch Closure: Competing bank closed nearby branch due to “operational issues” - customers asking if RegionalBank has same problems, but competitor incident unrelated to GaboonGrabber

Previous Incidents:

  • Six-Month-Old Phishing Test: Bank’s security awareness vendor conducted phishing simulation in March - some log artifacts remain, potentially confusing timeline and making current breach appear older
  • Former IT Contractor: IT contractor was terminated 3 months ago for performance issues - some staff suspect insider threat, wasting investigation resources on unrelated personnel issue
  • Compliance Finding from Last Exam: Previous examination cited “inadequate vendor risk management” - Amanda’s current vendor verification anxiety stems from trying to remediate old finding, creating cultural vulnerability attacker exploited

Expert-Level Insights

Advanced Trojan TTPs in Banking Context:

  • Core Banking System Integration: GaboonGrabber specifically targets banking platforms (Jack Henry, FIS, Fiserv) - uses API hooking to intercept database queries without network-level detection
  • Examination Cycle Exploitation: Attacker understands federal banking examination timing - targets institutions 3-4 weeks before examination when compliance anxiety highest and security scrutiny paradoxically lowest
  • Compliance Authority Exploitation: Social engineering leverages regulatory authority - staff less likely to question communications appearing to come from FFIEC/OCC due to examination power dynamics

Operational Security Patterns:

  • Banking Sector Intelligence: Attack precisely timed for pre-examination period suggests reconnaissance of public examination schedules or monitoring of banking job postings (banks often hire compliance consultants before exams)
  • Compliance Culture Weaponization: “Security initiative responsiveness” KPI created measurable incentive to bypass security controls - organizational metric became attack vector
  • Federal Domain Spoofing: Using “federalbanking-examiners.org” (vs. legitimate ffiec.gov/occ.gov) exploits institutional fear of regulatory authority

Strategic Implications:

  • Community Bank Vulnerability: Unlike large banks with dedicated security teams, community banks rely on compliance officers who may lack technical security expertise - creates exploitable knowledge gap
  • Examination Paradox: Regulatory oversight intended to improve security inadvertently creates vulnerability window when banks feel pressure to demonstrate instant compliance
  • Customer Base Characteristics: 23,427 customers in community bank represents significant portion of local population - breach affects town’s economic fabric, not just abstract “data”

Innovation Requirements

Why Standard Approaches Are Insufficient:

  1. Examination Timing Paradox: Standard incident response timeline (weeks for thorough investigation) conflicts with examination schedule (3 weeks away) - can’t delay examination indefinitely
  2. Notification Precision Challenge: Standard breach notification assumes you can definitively confirm what data was stolen - banking system access makes this nearly impossible without perfect logging
  3. Community Bank Viability: Standard “maximum transparency” approach may trigger deposit withdrawals threatening bank survival - can’t sacrifice institution to perfectly handle breach
  4. Regulatory Relationship: Standard “lawyer up and minimize” approach damages examiner relationship - need to demonstrate security program maturity through transparent incident handling

Creative Solutions Needed:

“Incident-as-Examination-Evidence” Documentation Strategy:

  • Challenge: Transform security incident from examination vulnerability to demonstration of effective security program - comprehensive detection, response, and disclosure showing maturity
  • Innovation Required: Detailed incident documentation formatted for examiner review, narrative framing breach as security program validation, proactive briefing demonstrating transparency
  • Evaluation Criteria: Does documentation demonstrate adequate controls and effective response? Can team articulate root cause and remediation clearly to non-technical examiner? Does transparency build or damage regulatory confidence?

“Community-Focused Breach Response” Customer Engagement:

  • Challenge: Maintain community bank customer relationships through breach notification - leverage local presence and personal banking relationships rather than corporate crisis management
  • Innovation Required: Branch-level customer outreach (face-to-face conversations with long-term customers), community education events about financial fraud prevention, personalized support for elderly/vulnerable customers
  • Evaluation Criteria: Does community-focused response strengthen or damage customer trust? Can personal relationships offset breach impact? Does localized response differentiate community bank from large institutional banks?

“Compliance-Security Integration” Cultural Reform:

  • Challenge: Address root cause (compliance urgency bypassing security) through organizational change - integrate security verification into compliance processes
  • Innovation Required: Redesign compliance KPIs to measure security effectiveness (not responsiveness), create joint compliance-security review process, demonstrate cultural change to examiner as incident remediation
  • Evaluation Criteria: Does cultural reform address root cause or just create new bureaucracy? Can team demonstrate sustainable change to examiner? Does integration prevent recurrence without slowing legitimate compliance work?

Banking Security Status Tracking

Initial State (100%):

  • 23,427 customer accounts compromised (account numbers, balances, transaction histories, PII)
  • 8 workstations infected across compliance and branch management departments
  • Federal banking examination in 3 weeks - incident could demonstrate security maturity OR control deficiency
  • 36-hour regulatory notification deadline (FFIEC guidance)

Degradation Triggers:

  • Hour 0-6 (Immediate Response Window): Each hour of delayed containment = 15% increased likelihood GaboonGrabber deploys Redline credential stealer (expanding from data theft to credential compromise)
  • Hour 6-24 (Investigation Phase): Customer service system freezes increase - 10% probability per hour of transaction processing integrity questions arising
  • Hour 24-36 (Regulatory Notification Window): Delayed FFIEC notification triggers compliance violation (+enforcement action risk, examination downgrade probability)
  • Hour 36-72 (Customer Notification Phase): Delayed customer notification increases identity theft risk + regulatory criticism of inadequate “as soon as possible” interpretation

Recovery Mechanisms:

  • Immediate System Isolation + C2 Blocking: Prevents further data exfiltration, stops credential theft deployment (+50% customer data protection, -40% compliance preparation capacity during remediation)
  • Comprehensive Regulatory Disclosure + Examiner Briefing: Maintains regulatory relationship through transparency (+60% examination outcome, requires detailed incident documentation)
  • Prompt Customer Notification + Fraud Monitoring: Protects customers from identity theft, demonstrates fiduciary responsibility (+50% customer protection, requires $700K fraud monitoring budget)
  • Transparent Community Communication: Leverages local bank relationships to maintain customer trust (+40% deposit retention, requires face-to-face outreach)
  • Third-Party Banking Forensics + Transaction Audit: Confirms system integrity and breach scope (+50% technical confidence, requires 5-7 days and $100K specialized banking forensics)

Critical Thresholds:

  • Below 60% Banking System Security: GaboonGrabber has established persistent access to core banking systems surviving standard remediation - 23,427 customers face ongoing account compromise risk
  • Below 50% Customer Trust: Deposit withdrawals exceed $15M (5% of deposits), threatening community bank capital ratios and viability
  • Below 40% Regulatory Compliance: FFIEC/OCC determines notification was inadequate - enforcement action triggered (civil money penalties, consent order, examination downgrade to “needs improvement”)

Time Pressure Dynamics:

  • Tuesday Morning (Hour 0): Detection and initial response - critical decision point for containment vs. examination preparation continuity
  • Wednesday Morning (Hour 24): Forensic findings reveal 23,427 customer accounts accessed - regulatory notification decision point with 12-hour window remaining
  • Wednesday Afternoon (Hour 36): FFIEC notification deadline - compliance/enforcement crossroads
  • Thursday-Friday (Hour 48-72): Customer notification window - “as soon as possible” regulatory standard interpretation
  • Week 3: Federal examination begins - incident will be evaluated as control finding, how it’s handled determines security program rating

Success Metrics:

  • Optimal Outcome (>85% across all dimensions): Immediate isolation and regulatory notification within 36 hours, comprehensive customer notification within 5 days with fraud monitoring, transparent examiner briefing transforming incident into security program strength demonstration, community-focused response maintaining deposit base, cultural reforms addressing compliance-security integration
  • Acceptable Outcome (65-85%): Regulatory notification within deadline, customer notification complete, examination finding documented as “isolated incident with effective response”, some deposit impact but manageable, basic remediation complete
  • Poor Outcome (<65%): Delayed/inadequate notifications triggering enforcement action, customer deposit withdrawals threatening viability, examination downgrade, media crisis, community trust severely damaged, cultural root cause unaddressed