Respond to Phishing and Exfil-Operation Angry Tiger-Mission 6
Scenario Overview:
The intelligence sharing sites have reported that energy companies are detecting an increasing number of phishing emails that pose cyber-security risks to their Information Technology (IT) and Operational Technology (OT) infrastructure. It is unclear what the intent is of the attack but it is feared that it could be the start of exfiltration theft of intellectual property or even destructive threats to energy services_ These companies fear that multiple cyber-attacks could cause significant financial damage and Public Relations concerns.
How to be Successful:
The learner will conduct a risk assessment of a company's existing network structure and its cyber risk posture for possible phishing attacks. They will need to understand the threat vectors used in the cyber attacks and review any detectable weaknesses to ensure no malicious activity is occurring on the network currently.
What should you know prior:
Learners should be familiar with incident response processes, windows & *nix system administration and network monitoring tools.
Load Time |
Easy: 15 min Medium: 15 min |
Time Limit | 40 hrs |
# of Tasks | 5 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |
Scenario Overview:
The intelligence sharing sites have reported that energy companies are detecting an increasing number of phishing emails that pose cyber-security risks to their Information Technology (IT) and Operational Technology (OT) infrastructure. It is unclear what the intent is of the attack but it is feared that it could be the start of exfiltration theft of intellectual property or even destructive threats to energy services_ These companies fear that multiple cyber-attacks could cause significant financial damage and Public Relations concerns.
How to be Successful:
The learner will conduct a risk assessment of a company's existing network structure and its cyber risk posture for possible phishing attacks. They will need to understand the threat vectors used in the cyber attacks and review any detectable weaknesses to ensure no malicious activity is occurring on the network currently.
What should you know prior:
Learners should be familiar with incident response processes, windows & *nix system administration and network monitoring tools.
Load Time |
Easy: 15 min Medium: 15 min |
Time Limit | 40 hrs |
# of Tasks | 5 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |