GaboonGrabber Scenario: Financial Compliance Crisis

GaboonGrabber Scenario: Continental Securities Group Compliance Crisis

Continental Securities Group: Broker-dealer, 300 employees, SEC/FINRA regulated
Social Engineering + Compliance Pressure • GaboonGrabber
STAKES
Customer financial data + SEC, FINRA, SOX regulations + 24/7 transaction processing
HOOK
Continental Securities Group is facing their annual federal banking examination next month, creating intense pressure to demonstrate robust security controls. The attacker is exploiting this compliance focus by sending fake ‘regulatory security audit’ emails that bypass normal skepticism because they appear to support compliance efforts.
PRESSURE
  • Federal banking examination in 4 weeks – regulatory deficiencies could trigger enforcement action
FRONT • 3-4 hours • Intermediate
Continental Securities Group: Broker-dealer, 300 employees, SEC/FINRA regulated
Social Engineering + Compliance Pressure • GaboonGrabber
NPCs
  • Maria Santos (Compliance Director): Extremely anxious about upcoming examination, demanding evidence of security improvements, doesn't understand that urgent compliance can create vulnerabilities
  • David Kim (CTO): Overwhelmed by compliance requests, approved several 'audit tools' quickly to demonstrate security responsiveness, now questioning those decisions
  • Rachel Green (CISO): Frustrated with new security 'requirements' affecting customer service, clicked on audit emails to show compliance cooperation
  • Richard Hartwell (CEO): Expects comprehensive security documentation, will arrive in 3 weeks for intensive examination, represents regulatory authority
SECRETS
  • IT bypassed normal vendor verification for 'regulatory audit tools' to demonstrate quick compliance response
  • Management created culture where compliance questions are answered immediately without security review
  • Attacker researched banking examination cycles and targets institutions during pre-examination stress periods

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

GaboonGrabber Financial Compliance Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

GaboonGrabber Financial Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support

Scenario Details for IMs

Hook

“It’s Tuesday morning at Continental Securities Group, and the quarterly board meeting just ended with one clear message: the upcoming federal examination must go perfectly. With just four weeks to prepare, every department is scrambling to demonstrate compliance improvements. But yesterday, several staff members reported computer slowdowns, and the IT help desk has been fielding calls about new ‘audit software’ that appeared after staff responded to what seemed like legitimate regulatory security requirements.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Computers experiencing 25% performance degradation across multiple departments”
  • “Help desk reports 6 calls about unfamiliar ‘compliance monitoring’ software”
  • “Staff mention receiving ‘federal banking security audit’ emails Monday evening”
  • “Customer service terminals occasionally freezing during peak hours”

Key Discovery Paths:

Detective Investigation Leads:

  • Email analysis reveals sophisticated spoofing of federal banking regulator communications
  • File system examination shows ComplianceMonitor.exe and AuditTool.exe in system directories
  • Registry forensics reveals persistence mechanisms disguised as regulatory compliance tools

Protector System Analysis:

  • Network monitoring detects encrypted communication to command servers registered recently
  • Process analysis shows memory injection into banking software and customer service applications
  • Security log review reveals unauthorized access attempts to customer database systems

Tracker Network Investigation:

  • DNS query analysis shows lookups to domains mimicking federal banking regulator websites
  • Traffic analysis reveals data exfiltration patterns targeting customer account information
  • Email flow investigation shows targeted phishing campaign during examination preparation

Communicator Stakeholder Interviews:

  • Compliance staff admit clicking on “urgent audit requirements” to demonstrate cooperation
  • Branch managers reveal pressure to respond immediately to any regulatory communications
  • IT staff explain expedited approval of “compliance tools” to meet examination deadlines

Mid-Scenario Pressure Points:

  • Hour 1: Compliance officer demands confirmation that all “audit tools” are properly installed
  • Hour 2: Federal examiner calls to confirm examination schedule and document preparation
  • Hour 3: Board chair inquires about compliance readiness and any potential issues
  • Hour 4: Customer service reports intermittent access issues affecting transaction processing

Evolution Triggers:

  • If containment exceeds 6 hours, GaboonGrabber deploys secondary payload targeting customer data
  • If network isolation affects compliance systems, regulatory documentation becomes inaccessible
  • If customer-facing systems show instability, transaction processing integrity becomes questionable

Resolution Pathways:

Technical Success Indicators:

  • Team identifies social engineering exploitation of compliance pressure and culture
  • Network segmentation protects customer data while maintaining transaction processing
  • Behavioral analysis and memory forensics confirm complete malware removal

Business Success Indicators:

  • Incident response demonstrates robust security controls to federal examiner
  • Compliance documentation includes security incident as evidence of effective monitoring
  • Customer transaction processing maintains integrity throughout response process

Learning Success Indicators:

  • Team understands how compliance pressure creates exploitable organizational vulnerabilities
  • Participants recognize balance needed between compliance responsiveness and security verification
  • Group demonstrates effective coordination between compliance, security, and operational teams

Common IM Facilitation Challenges:

If Team Ignores Compliance Context:

“Your technical analysis is solid, but Maria Santos just received a call from the federal examiner asking about your bank’s security posture. How do you explain this incident as evidence of strong security controls?”

If Business Impact Is Underestimated:

“While you’re investigating, the customer service system just froze during peak banking hours. Customers are waiting in line and Rachel Green needs to know if the systems are safe to use.”

If Regulatory Complexity Overwhelms:

“The regulatory details are complex, but the core question is simple: how do you maintain security when everyone feels pressure to demonstrate immediate compliance?”

Success Metrics for Session:

Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish banking compliance crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing compliance pressure vulnerabilities and customer data protection.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of financial institution security challenges. Use the full set of NPCs to create realistic regulatory examination pressures. The two rounds allow GaboonGrabber to progress toward customer data theft, raising stakes. Debrief can explore balance between compliance responsiveness and security verification.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing federal examination preparation, customer data protection, transaction processing, and regulatory compliance. The three rounds allow for full narrative arc including villain’s banking-specific multi-stage attack plan.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate banking audit software causing unrelated performance issues). Make containment ambiguous, requiring players to justify regulatory-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of banking compliance and security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “You discover that 8 workstations across compliance and branch management departments received emails Monday evening from FFIEC-Security-Audit@federalbanking-examiners.org with urgent instructions to install ‘pre-examination compliance monitoring tools’. Email forensics reveal sophisticated spoofing of federal banking regulator communications.”

Clue 2 (Minute 10):

“File system examination shows ComplianceMonitor.exe and AuditTool.exe running on affected workstations. These executables lack valid digital signatures and are establishing encrypted connections to command servers registered during the institution’s examination preparation period.”

Clue 3 (Minute 15): “Process analysis reveals GaboonGrabber trojan with memory injection into banking software and customer service applications. The malware is conducting reconnaissance of customer financial data and attempting to establish persistent access to transaction processing systems.”

Pre-Defined Response Options

Option A: Complete System Isolation & Regulatory Notification

  • Action: Immediately isolate affected workstations, remove GaboonGrabber from all systems, implement regulatory incident notification to federal banking examiners, establish secure compliance documentation access.
  • Pros: Completely removes threat and fulfills banking regulatory requirements; demonstrates robust security controls for upcoming examination.
  • Cons: Requires immediate regulatory disclosure; may complicate examination preparation and affect compliance timeline.
  • Type Effectiveness: Super effective against Trojan type malmons like GaboonGrabber in regulated banking environments.

Option B: Selective Quarantine & Accelerated Forensics

  • Action: Quarantine confirmed compromised workstations, implement enhanced monitoring on banking network, accelerate forensics to determine customer data exposure before regulatory notification decisions.
  • Pros: Allows continued compliance preparation on clean systems; provides detailed incident documentation for examination.
  • Cons: Delays regulatory notification until investigation complete; may affect customer transaction processing during forensics.
  • Type Effectiveness: Moderately effective against Trojan threats; balances investigation depth with business continuity.

Option C: Network Segmentation & Transaction Protection

  • Action: Implement emergency network segmentation between compliance systems and customer transaction processing, deploy behavioral monitoring on all banking workstations, continue examination preparation with enhanced oversight.
  • Pros: Maintains critical banking operations and compliance preparation; prevents lateral movement to customer financial systems.
  • Cons: Doesn’t remove existing malware; allows GaboonGrabber to potentially collect additional customer information during continued operations.
  • Type Effectiveness: Partially effective against Trojan type malmons; contains but doesn’t eliminate threat.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Maria Santos (Compliance Director) reports that 8 staff members across compliance and branch management received “URGENT: Pre-Examination Security Audit Required” emails Monday evening from FFIEC-Security-Audit@federalbanking-examiners.org (legitimate regulator is FFIEC.gov). During examination preparation stress, staff clicked through thinking it was mandatory compliance requirement.

** Richard Hartwell (CEO) emails confirming examination schedule in 3 weeks and requesting advance security documentation. Meanwhile, David Kim (CTO) admits expediting approval of “compliance tools” to demonstrate security responsiveness to Maria Santos. Customer service terminals are experiencing freezes during peak hours – potentially affecting transaction integrity.

  • Clue 2 (Minute 10): File analysis discovers ComplianceMonitor.exe and AuditTool.exe running from system directories on affected workstations. Memory forensics shows process injection into banking software (core banking system, customer service platform) - this is GaboonGrabber trojan specifically targeting financial institution data.

  • Clue 3 (Minute 15): Network monitoring reveals encrypted connections to command-and-control servers. GaboonGrabber is accessing customer financial data – examining access patterns shows it’s targeting account numbers, balances, transaction histories, and personally identifiable information (PII) for 23,000+ customer accounts.

  • Clue 4 (Minute 20):

  • Clue 1 (Minute 5): Maria Santos (Compliance Director) reports that 8 staff members across compliance and branch management received “URGENT: Pre-Examination Security Audit Required” emails Monday evening from FFIEC-Security-Audit@federalbanking-examiners.org (legitimate regulator is FFIEC.gov). During examination preparation stress, staff clicked through thinking it was mandatory compliance requirement.

  • Clue 2 (Minute 10): File analysis discovers ComplianceMonitor.exe and AuditTool.exe running from system directories on affected workstations. Memory forensics shows process injection into banking software (core banking system, customer service platform) - this is GaboonGrabber trojan specifically targeting financial institution data.

  • Clue 3 (Minute 15): Network monitoring reveals encrypted connections to command-and-control servers. GaboonGrabber is accessing customer financial data – examining access patterns shows it’s targeting account numbers, balances, transaction histories, and personally identifiable information (PII) for 23,000+ customer accounts.

  • **Clue 4 (Minute 20): Richard Hartwell (CEO) emails confirming examination schedule in 3 weeks and requesting advance security documentation. Meanwhile, David Kim (CTO) admits expediting approval of “compliance tools” to demonstrate security responsiveness to Maria Santos. Customer service terminals are experiencing freezes during peak hours – potentially affecting transaction integrity.

Response Options (Choose One):

  • Option A: Emergency Isolation + Regulatory Self-Disclosure
    • Action: Immediately isolate all 8 infected workstations, shut down customer data system access, wipe infected systems, begin regulatory self-disclosure to FFIEC/OCC (incident notification within 36 hours per banking regulations)
    • Pros: Guarantees malware removal; meets federal banking notification requirements; demonstrates robust security controls to examiner; protects remaining customer data
    • Cons: Halts compliance preparation for 48-72 hours; complicates examination timeline; regulatory disclosure may trigger preliminary examination inquiry; customer service capacity reduced during remediation
    • Business Impact: Maria Santos fears incident will be used as examination finding; branch operations degraded; but proactive disclosure demonstrates security maturity
    • Type Effectiveness: Super effective against Trojan type malmons – complete removal
  • Option B: Controlled Quarantine + Forensic Assessment
    • Action: Quarantine infected systems to isolated VLAN, deploy clean backup workstations for customer service, conduct rapid forensics to determine breach scope for regulatory notification timing
    • Pros: Maintains customer service operations; contains threat while preserving evidence; allows accurate breach scope assessment before regulatory disclosure; preserves examination preparation timeline
    • Cons: Reduced workstation capacity creates service bottlenecks; GaboonGrabber remains active on quarantined systems during investigation; forensics may reveal worse breach requiring immediate disclosure anyway
    • Business Impact: Customer service somewhat degraded but operational; compliance preparation continues; managed regulatory notification possible
    • Type Effectiveness: Moderately effective against Trojan type malmons – contains but doesn’t immediately remove
  • Option C: Network Segmentation + Business Continuity
    • Action: Block C2 domains at firewall, segment banking network (customer data separated from general network), deploy aggressive endpoint security tools, continue operations with “heightened monitoring”
    • Pros: Fastest response; maintains examination preparation schedule; keeps customer service fully operational; Maria Santos’s compliance timeline preserved
    • Cons: GaboonGrabber’s fileless techniques may evade endpoint tools; doesn’t address root compromise; may violate banking regulations requiring prompt breach notification; continuing to operate on infected systems risks additional customer data exposure
    • Business Impact: Examination preparation unaffected; customer service normal; regulatory disclosure avoided (short-term)
    • Type Effectiveness: Partially effective against Trojan type malmons – containment without remediation

Round Transition Guidance:

After Round 1 response, GaboonGrabber’s next stage activates based on team’s choice:

  • If Option A (Emergency Isolation): Round 2 focuses on examination complication (Richard Hartwell asks pointed questions about incident timeline and root cause), preparing regulatory self-disclosure documentation, and managing branch operations with reduced IT capacity while Maria Santos worries about examination outcome.

  • If Option B (Controlled Quarantine): Round 2 reveals forensics found GaboonGrabber accessed customer wire transfer credentials in addition to account data – breach now includes active transaction system compromise. Race to complete investigation and regulatory notification before 36-hour window closes while maintaining customer service.

  • If Option C (Network Segmentation): Round 2 discovers GaboonGrabber deployed Redline credential stealer during “safe” operating window – now has banking system login credentials for 12 employees. Must address expanded breach scope, potential unauthorized transaction risk, and delayed regulatory notification implications.

Round 2: Regulatory Disclosure & Customer Impact (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 35): Forensic timeline reconstruction shows GaboonGrabber was active for 32 hours before detection. During that window, it accessed customer account data for 23,427 customers including: account numbers, balances, transaction histories, SSNs, addresses, and phone numbers. This meets federal banking breach notification thresholds (Gramm-Leach-Bliley Act).

  • Clue 6 (Minute 40): Banking regulatory counsel explains: unauthorized access to customer financial information requires notification to: (1) primary federal regulator (FFIEC/OCC) within 36 hours, (2) affected customers “as soon as possible”, (3) major credit bureaus if >1,000 customers affected. Failure to notify can result in enforcement actions including civil money penalties and exam downgrade.

  • Clue 7 (Minute 50): David Kim reveals the compliance pressure culture – Maria Santos’s directive to “demonstrate security improvements immediately” led IT to bypass normal vendor verification for anything labeled “compliance” or “audit.” Monthly compliance meetings track “security initiative responsiveness” as key performance indicator, creating organizational pressure to approve security requests instantly.

  • Clue 8 (Minute 55):

Rachel Green (CISO) reports customers are calling about slow transaction processing and asking if “the bank’s systems are secure.” One customer’s spouse works in IT and heard about “malware at a bank” – unclear if referring to Continental Securities Group or unrelated incident, but social media rumors starting. Maria Santos receives email from Richard Hartwell requesting “preliminary security posture briefing” before formal examination.

Response Options (Choose One):

  • Option A: Full Regulatory Disclosure + Comprehensive Customer Notification
    • Action: Immediately file regulatory incident report with FFIEC/OCC, notify all 23,427 affected customers with breach details and credit monitoring offer, brief federal examiner on incident and response, establish customer hotline for questions
    • Pros: Legally compliant; demonstrates transparency to regulator; protects customers from identity theft; shows security program effectiveness through detection and response
    • Cons: Large-scale notification creates customer alarm; potential deposit withdrawals; media coverage likely; credit monitoring costs $700K annually; examination will scrutinize incident root cause; regulatory enforcement action possible
    • Business Impact: Customer trust test through transparency; regulatory relationship preserved through honesty; but reputation and cost impacts significant
    • Type Effectiveness: Super effective against Trojan type malmons – comprehensive breach response demonstrates banking security controls
  • Option B: Staged Disclosure + Controlled Notification
    • Action: File regulatory incident report immediately (36-hour requirement), brief examiner with preliminary findings, begin customer notification in phases (highest-risk accounts first), enhanced monitoring for all customers while notifications proceed
    • Pros: Meets regulatory timeline; provides examiner with transparent incident narrative; prioritizes most vulnerable customers; allows refinement of customer communication based on initial responses
    • Cons: Phased customer notification may extend beyond “as soon as possible” standard; customers may hear about breach through informal channels before official notification; regulatory examiner may question notification staging
    • Business Impact: Controlled customer communication; managed regulatory relationship; but timing questions create compliance uncertainty
    • Type Effectiveness: Moderately effective against Trojan type malmons – balanced approach with some regulatory risk
  • Option C: Minimal Disclosure + Narrow Notification
    • Action: File regulatory report with narrow interpretation (describe as “attempted intrusion” rather than successful breach), notify only customers whose accounts show suspicious activity (versus all accessed accounts), describe incident to other customers as “security update” if asked
    • Pros: Minimizes customer alarm; avoids mass notification costs; reduces media attention; examination narrative focuses on “successful defense” rather than breach; Maria Santos’s compliance timeline minimally affected
    • Cons: Likely regulatory violation (accessed data requires notification regardless of exfiltration proof); legal liability if breach scope discovered later during examination; ethically problematic; enforcement action risk if regulators determine notification was inadequate
    • Business Impact: Short-term reputation/cost preservation; catastrophic risk if violation exposed during examination or through customer identity theft
    • Type Effectiveness: Ineffective against Trojan type malmons – doesn’t address breach scope; regulatory and customer protection failure

IM Facilitation Notes:

This round introduces banking regulatory compliance and fiduciary responsibility. Players must balance:

  • Regulatory compliance (prompt notification) vs. examination outcome concerns
  • Customer protection (comprehensive notification) vs. business viability (potential deposit withdrawals)
  • Transparency to regulator (demonstrates security maturity) vs. enforcement action fears
  • Short-term reputation management vs. long-term regulatory relationship

Key Discussion Points:

  • What are the consequences of inadequate notification vs. comprehensive disclosure?
  • How does “compliance responsiveness” culture create security vulnerabilities?
  • When do examination concerns override customer protection obligations?
  • How do you turn security incident into demonstration of effective security program to examiner?

Full Game Materials (120-140 min, 3 rounds)

NoteHow Full Game Differs from Lunch & Learn

The Full Game expands the scenario from 2 guided rounds to 3 open-ended rounds. Players drive their own investigation using the Key Discovery Paths above rather than receiving timed clues. Round 3 shifts from immediate crisis response to long-term regulatory recovery. Rounds run 30-35 minutes each with more open-ended decision-making. Use the Resolution Pathways section to guide your assessment of team progress.

Round 1: Banking System Compromise & Pre-Examination Crisis (30 min)

Monday morning at Continental Securities Group – four weeks before the annual federal banking examination, Compliance Director Maria Santos discovers that 8 workstations across branch and compliance offices are infected with GaboonGrabber malware. CTO David Kim traces the infection to fake “regulatory security audit” emails that compliance staff installed without standard vendor verification. The malware has accessed customer account data for 23,427 accounts and is conducting reconnaissance of core banking transaction systems. CEO Richard Hartwell is expected in 3 weeks for an intensive examination that will evaluate the bank’s security controls.

Open investigation guidance: All four Key Discovery Paths are available. Teams typically uncover the social engineering vector (fake regulatory security audit emails exploiting pre-examination anxiety), the scope of customer data exposure (account numbers, balances, PII for 23,427 customers), the compliance culture that enabled it (examination pressure overriding vendor verification), and GaboonGrabber’s banking-specific capabilities (core banking integration, transaction monitoring, credential harvesting targeting Redline stealer deployment).

If the team stalls:

“David Kim‘s forensic analysis reveals the scope: ’GaboonGrabber has accessed customer records for 23,427 accounts – names, account numbers, balances, and PII. It’s also querying our core banking transaction system, which means it may be monitoring or even modifying transactions. We need to verify transaction integrity across every affected account. And in 3 weeks, the federal examiner arrives – this incident will either demonstrate our detection capability or become the finding that triggers enforcement action.’”

Facilitation questions:

  • “The malware was installed because compliance staff bypassed vendor verification to demonstrate ‘security responsiveness’ before the examination – how do you address the irony that examination preparation created the vulnerability the examination will evaluate?”
  • “23,427 customer accounts were accessed – Gramm-Leach-Bliley Act requires regulator notification within 36 hours. How do you notify the same examiner who’s about to evaluate your security?”
  • “GaboonGrabber is querying transaction systems – if even one transaction was modified, the integrity of your entire banking ledger is in question. How do you verify 23,427 accounts?”

Round 1→2 Transition

The investigation confirms GaboonGrabber targeting customer financial data with potential transaction system access. Maria Santos must decide: notify the federal examiner immediately (demonstrating detection capability but exposing the breach before the examination), or remediate first and disclose during the examination (risking the appearance of concealment). David Kim warns that transaction integrity verification will take days – during which the bank’s core systems may not be trustworthy.

Round 2: Regulatory Examination & Customer Trust Crisis (35 min)

If teams chose immediate regulatory notification: Federal examiner acknowledges prompt notification but accelerates examination timeline. Regulatory team on-site evaluating both the breach and the compliance culture that caused it. Customer notification requirements triggered, creating public awareness of the breach.

If teams chose remediation before disclosure: Remediation progressing but evidence of the breach timeline is preserved in logs. If examiner discovers the delay between detection and notification, it transforms from “security incident” into “potential compliance violation.” Maria Santos is increasingly anxious about the disclosure gap.

New developments beyond Round 1: Transaction integrity audit reveals three customer accounts with unauthorized micro-transfers ($0.50-$2.00 each) – testing whether the banking system accepts attacker-initiated transactions. CISO Rachel Green reports customers calling about unfamiliar small charges, creating public awareness before the bank’s prepared communication. GaboonGrabber’s Stage 3 payload (Redline stealer) is detected attempting to harvest banking system administrator credentials. Competitor bank begins marketing campaign to Continental Securities Group customers highlighting their “superior security.”

Facilitation questions:

  • “Micro-transfers confirm the attacker was testing transaction capabilities – three accounts today could be thousands tomorrow. How does confirmed transaction manipulation change your remediation urgency?”
  • “Customers are calling about suspicious charges before you’ve issued notification – how do you manage a breach that’s discovering itself through customer complaints?”
  • “The examination is now evaluating your breach response in real-time – every decision becomes part of the regulatory record. How does that change how you document and justify your response?”

Round 2→3 Transition

The immediate banking crisis is contained – malware removed, transaction integrity verified, regulatory notification filed. But Continental Securities Group faces the federal examination with the breach as the centerpiece finding. The examiner will evaluate not just what happened, but whether the organizational culture that enabled it represents a systemic control deficiency. Focus shifts to: how does a community bank demonstrate effective security governance when the compliance culture designed to pass examinations is the same culture the attacker exploited?

Round 3: Regulatory Recovery & Community Trust Restoration (35 min)

Four weeks post-incident. The federal banking examination has concluded its initial assessment and Continental Securities Group faces a formal findings report. The examination identified the breach as a “significant control deficiency” – not for the attack itself, but for the compliance culture that bypassed vendor verification to appear responsive. Customer attrition has begun: 340 accounts closed in the first two weeks. The fundamental question: can a community bank that depends on customer trust survive when that trust has been demonstrably violated – and the regulatory framework designed to protect customers was part of the problem?

Investigation focus areas:

  • Transaction integrity – David Kim coordinates: comprehensive audit of all 23,427 affected accounts for unauthorized activity, customer reimbursement for confirmed fraudulent transactions, core banking system hardening and enhanced transaction monitoring, third-party verification of banking system integrity
  • Regulatory remediation – Maria Santos leads: formal response to examination findings with corrective action plan, vendor verification process reform that maintains compliance responsiveness, compliance culture assessment distinguishing genuine security from performative compliance, FFIEC examination preparation framework that strengthens rather than undermines security
  • Customer trust restoration – Rachel Green coordinates: transparent customer communication with specific protective actions, enhanced fraud monitoring for affected accounts, community engagement demonstrating commitment to customer data protection, competitive response to rival bank’s marketing campaign
  • Organizational culture reform – Bank leadership addresses: “compliance urgency” metrics that incentivized bypassing security controls, staff training distinguishing regulatory tools from social engineering, examination preparation culture that treats security as genuine rather than performative

Pressure events:

  • Federal examination findings classify the breach as “systemic control deficiency” rather than “isolated incident,” requiring comprehensive remediation plan within 60 days
  • Customer attrition accelerates to 500+ accounts as local media reports on the breach and competitor bank intensifies marketing
  • State banking commission opens parallel investigation, creating dual regulatory compliance burden
  • Two senior compliance officers resign, citing impossible expectations to demonstrate compliance urgency while maintaining genuine security

Facilitation questions:

  • “The examination found a ‘systemic control deficiency’ – the culture, not just the malware. How do you reform compliance culture when the pressure comes from the same regulatory framework that identified the deficiency?”
  • “340 customers closed accounts in two weeks – community banks depend on relationship trust. How do you rebuild that when competitors are actively recruiting your customers?”
  • “Maria Santos‘s ’compliance urgency’ created the vulnerability, but she was responding to genuine examination pressure. Where does regulatory culture end and organizational responsibility begin?”

Victory Conditions

  • GaboonGrabber eliminated with transaction integrity verified across all 23,427 affected accounts
  • Federal examination findings addressed with credible corrective action plan
  • Customer notification and protection measures maintaining community trust
  • Compliance culture reformed to treat security as genuine protection rather than performative examination preparation

Debrief Focus (Full Game)

  • How regulatory examination pressure creates a predictable attack surface – the anxiety to demonstrate compliance makes institutions vulnerable to social engineering disguised as compliance tools
  • The unique challenge of banking breach response when the same regulator evaluating your security is the audience for your breach notification
  • Why community banks face existential trust threats from data breaches that larger institutions absorb – customer relationships are personal and irreplaceable
  • How compliance culture can become performative (appearing secure for examiners) rather than substantive (actually being secure) – and why social engineers exploit the gap
  • Long-term implications when regulatory frameworks designed to protect consumers inadvertently create the organizational pressure that compromises consumer protection

Advanced Challenge Materials (150-170 min, 3+ rounds)

Red Herrings & Misdirection

  • Legitimate compliance tool deployment – Maria Santos’s team actually installed a genuine regulatory reporting tool last week, creating forensic artifacts initially confused with GaboonGrabber’s installation timeline
  • Core system maintenance – scheduled database optimization causing system delays initially attributed to malware activity rather than planned maintenance
  • Competitor marketing coincidence – rival firm’s security marketing campaign was planned before the breach; timing appears coordinated but is coincidental, wasting investigation resources on competitor intelligence theory
  • Former employee access – recently departed compliance analyst’s credentials still active in system; initial investigation suspects insider threat before confirming external social engineering

Removed Resources & Constraints

  • Examination timeline pressure – federal banking examination cannot be rescheduled; the examiner will evaluate whatever state the bank is in when they arrive, forcing remediation within a regulatory clock
  • Transaction verification complexity – verifying 23,427 accounts for unauthorized activity requires manual review of transaction logs that aren’t designed for forensic analysis, taking weeks with current staff
  • Customer notification constraints – Gramm-Leach-Bliley Act requires regulator notification within 36 hours but customer notification guidance is ambiguous, creating legal uncertainty about timing and scope
  • Single IT director – David Kim manages all technology for 12 branches; no dedicated information security staff exist, and incident response competes with daily banking operations

Enhanced Pressure

  • Transaction manipulation escalation – additional unauthorized micro-transfers discovered across 50+ accounts, suggesting attacker tested and confirmed transaction capability before detection interrupted larger operation
  • Regulatory enforcement threat – examination team indicates findings may warrant formal enforcement action (consent order) rather than informal corrective plan, potentially requiring public disclosure of regulatory action
  • Customer class-action – attorney files class-action on behalf of affected customers before Continental Securities Group completes its customer notification plan, forcing public disclosure on opposing counsel’s timeline
  • Staff morale crisis – branch staff report customers confronting them about the breach during routine transactions, creating hostile work environment that threatens service quality

Ethical Dilemmas

  • Disclosure timing – notifying the federal examiner immediately demonstrates detection capability but triggers accelerated examination during active remediation. Remediating first provides better examination position but creates a disclosure gap that could be interpreted as concealment. What’s the right timing when both options carry regulatory risk?
  • Customer notification scope – 23,427 accounts were accessed but only 3 show unauthorized transactions. Full notification may cause panic and mass account closures that threaten the bank’s viability. Targeted notification protects the bank but may not meet GLB Act requirements. What scope is legally and ethically appropriate?
  • Compliance culture accountability – Maria Santos created the “compliance urgency” culture that enabled the bypass, but she was responding to genuine examination pressure. Removing her (accountability) loses institutional compliance knowledge. Retaining her (pragmatism) signals tolerance for the culture that caused the breach. What serves the bank and its customers?
  • Competitive vulnerability – sharing detailed breach information with banking industry ISACs helps other community banks defend against similar attacks but also reveals Continental Securities Group’s security weaknesses to competitors. How much do you share when transparency helps the sector but hurts your institution?

Advanced Debrief Topics

  • How regulatory examination cycles create predictable windows of organizational vulnerability that sophisticated attackers specifically target for social engineering campaigns
  • The ethics of breach response in banking when every disclosure decision affects customer trust, regulatory standing, and institutional survival simultaneously
  • Why community banking faces unique cybersecurity challenges – limited IT resources, personal customer relationships, examination pressure, and competitive vulnerability create a different risk profile than large banks
  • How compliance culture becomes a security liability when examination preparation incentivizes appearing secure over being secure – and why regulatory frameworks must account for this dynamic
  • Balancing regulatory transparency (demonstrating detection and response) with institutional preservation (maintaining customer confidence and competitive position) when both serve the public interest differently