Home > List all groups > Carbanak, Anunak

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Carbanak, Anunak

NamesCarbanak (Kaspersky)
Anunak (Group-IB)
Carbon Spider (CrowdStrike)
CountryUkraine Ukraine
MotivationFinancial crime, Financial gain
First seen2013
DescriptionCarbanak is a threat group that mainly targets banks. It also refers to malware of the same name (Carbanak). It is sometimes referred to as FIN7, but these appear to be two groups using the same Carbanak malware and are therefore tracked separately.

(Kaspersky) From late 2013 onwards, several banks and financial institutions have been attacked by an unknown group of cybercriminals. In all these attacks, a similar modus operandi was used. According to victims and the law enforcement agencies (LEAs) involved in the investigation, this could result in cumulative losses of up to 1 billion USD. The attacks are still active. This report provides a technical analysis of these attacks. The motivation for the attackers, who are making use of techniques commonly seen in Advanced Persistent Threats (APTs), appears to be financial gain as opposed to espionage. An analysis of the campaign has revealed that the initial infections were achieved using spear phishing emails that appeared to be legitimate banking communications, with Microsoft Word 97 – 2003 (.doc) and Control Panel Applet (.CPL) files attached. We believe that the attackers also redirected to exploit kits website traffic that related to financial activity.
ObservedSectors: Financial, Hospitality.
Countries: Australia, Austria, Brazil, Bulgaria, Canada, China, Czech, France, Germany, Hong Kong, Iceland, India, Luxembourg, Morocco, Nepal, Norway, Pakistan, Poland, Russia, Spain, Sweden, Switzerland, Taiwan, UK, Ukraine, USA, Uzbekistan.
Tools usedAntak, Ave Maria, BABYMETAL, Backdoor Batel, Bateleur, BELLHOP, Boostwrite, Cain & Abel, Carbanak, Cobalt Strike, DarkSide, DNSMessenger, DNSRat, DRIFTPIN, FlawedAmmyy, Griffon, HALFBAKED, Harpy, JS Flash, KLRD, Mimikatz, MBR Eraser, Odinaff, POWERPIPE, POWERSOURCE, PsExec, SocksBot, SoftPerfect Network Scanner, SQLRAT, TeamViewer, TinyMet.
Operations performedAug 2020DarkSide: New targeted ransomware demands million dollar ransoms
Aug 2020DarkSide Ransomware hits North American real estate developer
Oct 2020Ransomware gang donates part of ransom demands to charity organizations
Nov 2020Darkside Ransomware Gang Launches Affiliate Program
Nov 2020DarkSide Ransomware Group Makes New Storage System
Feb 2021Leading Canadian rental car company hit by DarkSide ransomware
Feb 2021Eletrobras, Copel energy companies hit by ransomware attacks
Feb 2021Hypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact
Mar 2021Darkside 2.0 Ransomware Promises Fastest Ever Encryption Speeds
Mar 2021CompuCom MSP hit by DarkSide ransomware cyberattack
Apr 2021Canadian retailer Home Hardware hit by ransomware
Apr 2021Ransomware gang wants to short the stock price of their victims
Counter operationsMar 2018Mastermind behind EUR 1 billion cyber bank robbery arrested in Spain
Aug 2018Three Carbanak cyber heist gang members arrested
Jan 2021Darkside Ransomware Decryption Tool

Last change to this card: 23 April 2021

Download this actor card in PDF or JSON format

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
PGP Download PGP key