Stop Malicious Process-Operation Artic Cobra-Mission 4
Rated 3.5/5 based on 11 customer reviews

Stop Malicious Process-Operation Artic Cobra-Mission 4

Available: In Stock
$0.00

Image

Scenario Overview: 

A family of Trojans (L e ZeuS byre. Duplex SpyEye) causing a surge of identity thefts has attacked institutions on a global scale. Due to the potentially destabilizing economic impact, the International Cyber Defense Organization has been called upon for assistance. You are being deployed to find and remove any trace of this infection that has exfiltrated identity information from the headquarters of Rahatalo Regional Bank in southern Finland.

How to be Successful:

The learner will analyze network traffic to find and stop all malicious processes attacking this financial institution. They must stop exfiltration and analyze the extent of the data loss while ensuring that no further infections can occur by eradicating all aspects of the Trojan.

What should you know prior:

Learners should be familiar with basic understanding of application layer networking, Linux CLI, packet capture & analysis and best practices of how to contain and eradicate malware.


DEFENSIVE
Click For Video
Load Time

Easy: 5 min

Medium:14 min

Time Limit 8 hrs
# of Tasks 4
Hints Yes
Save Session Yes
Team Based Yes

Scenario Overview: 

A family of Trojans (L e ZeuS byre. Duplex SpyEye) causing a surge of identity thefts has attacked institutions on a global scale. Due to the potentially destabilizing economic impact, the International Cyber Defense Organization has been called upon for assistance. You are being deployed to find and remove any trace of this infection that has exfiltrated identity information from the headquarters of Rahatalo Regional Bank in southern Finland.

How to be Successful:

The learner will analyze network traffic to find and stop all malicious processes attacking this financial institution. They must stop exfiltration and analyze the extent of the data loss while ensuring that no further infections can occur by eradicating all aspects of the Trojan.

What should you know prior:

Learners should be familiar with basic understanding of application layer networking, Linux CLI, packet capture & analysis and best practices of how to contain and eradicate malware.


DEFENSIVE
Click For Video
Load Time

Easy: 5 min

Medium:14 min

Time Limit 8 hrs
# of Tasks 4
Hints Yes
Save Session Yes
Team Based Yes