SafeBreach Labs has an extensive Hacker's Playbook™ that protects organizations from known threat groups tactics, techniques, and procedures (TTPs). The US-CERT Dridex Malware Alert (AA19-339A) which supplied updated indicators of compromise (IOCs) for Dridex was just released but SafeBreach customers can rest assured they are already protected.
Dridex is one of the most prevalent banking trojan associated with threat groups, TA505, Indrik Spider, Mummy Spider and TA542 that has caused major havoc to US financial institutions since 2011. Fraud and hacking charges were also announced today alleging over $100 million was stolen from hundreds of US banks.
To assess security control effectiveness against Dridex, the SafeBreach Breach and Attack Simulation Platform specifically tests the following security controls :
Playbook #310 - Dridex Malware passed via HTTP/S |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Infiltration |
Malware Transfer |
Command & Control |
(T1024) Custom Cryptographic Protocol (T1094) Custom Command and Control Protocol |
Network Controls Are security controls in place to prevent the download and transfer of the targeted malware used in this attack? |
Playbook #2530 - Transfer of Dridex malware over HTTP/S |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Infiltration |
Malware Transfer |
Command & Control |
(T1094) Custom Command and Control Protocol |
Network Controls Are security controls in place to prevent the download and transfer of the targeted malware used in this attack? |
Playbook #1590 - Email Dridex v4 inside a ZIP attachment |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Infiltration |
Email Attachments |
Initial Access |
(T1193) Spearphishing Attachment |
Email Controls Are security controls in place to scan and identify email for the malicious payloads used in this attack? |
Playbook #2532 - Email Dridex malware as a ZIP attachment |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Infiltration |
Email Attachments |
Initial Acces |
(T1193) Spearphishing Attachment |
Email Controls Are security controls in place to scan and identify email for the malicious payloads used in this attack? |
Playbook #275 - Dridex Malware passed via HTTP/S |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Lateral Movement |
Malware Transfer |
Command & Control |
(T1024) Custom Cryptographic Protocol (T1094) Custom Command and Control Protocol |
Network Controls Are security controls in place to prevent the download and transfer of the targeted malware used in this attack? |
Playbook #2529 - Transfer of Dridex v4 malware over HTTP/S |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Lateral Movement |
Malware Transfer |
Command & Control |
(T1094) Custom Command and Control Protocol |
Network Controls Are security controls in place to prevent the download and transfer of the targeted malware used in this attack? |
Playbook #1599 - Email Dridex v4 inside a ZIP attachment |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Lateral Movement |
Email Attachments |
Initial Acces |
(T1193) Spearphishing Attachment |
Email Controls Are security controls in place to scan and identify email for the malicious payloads used in this attack? |
Playbook #2531 - Email Dridex malware as a ZIP attachment |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Lateral Movement |
Email Attachments |
Initial Acces |
(T1193) Spearphishing Attachment |
Email Controls Are security controls in place to scan and identify email for the malicious payloads used in this attack? |
Playbook #2528 - Write Dridex malware to disk |
|||
Attack Phase |
Attack Type |
MITRE Tactic |
MITRE Technique |
Host Level |
Malware Drop |
Defense Evasion |
(T1107) File Deletion |
Endpoint Controls Are security controls or hardening in place to prevent saving the malicious files to local disk? |
SafeBreach customer can quickly and easily run all simulations associated with Dridex from the SafeBreach Playbook by searching Dridex:
Select all the Attack ID’s and once all the simulations run you can easily assess which simulations were stopped and which were missed with remediation efforts to harden your security posture:
SafeBreach validates your existing security controls are working as intended on an automated and continuous basis with the leading Breach and Attack Simulation platform. The Safebreach Hacker's Playbook™ of breach methods simulates these breach scenarios, and thousands more, without impacting users or infrastructure. Breach methods are constantly updated by SafeBreach Labs, our team of offensive security researchers, to help keep customers ahead of attacks.
For any questions, please visit the SafeBreach Support Portal and submit a support request.