3.8 In what time the attackers first set foot on MINAF's O365 infrastructure?
(Level 3: We're not happy)
|
#17,
2 years, 9 months after release (2024-09-05 18:32:25)
|
100 |
3.6 Before this successful attack, they tried another one, more sneaky but unsucessful. Could you tell the "code" they used?
(Level 3: We're not happy)
|
#14,
2 years, 9 months after release (2024-09-05 18:22:36)
|
100 |
3.5 The attackers are nice tricksters because they also fooled this user. Which URL did they make him/her click?
(Level 3: We're not happy)
|
#14,
2 years, 9 months after release (2024-09-05 18:20:10)
|
100 |
3.4 The compromised user have connecting from another countries ... Which one is the most frequent?
(Level 3: We're not happy)
|
#19,
2 years, 9 months after release (2024-09-05 18:13:16)
|
50 |
3.3 This kind of attack is EXACTLY called ...
(Level 3: We're not happy)
|
#18,
2 years, 9 months after release (2024-09-05 18:08:04)
|
100 |
3.2 Who fooled this user to install the "thingy" ?
(Level 3: We're not happy)
|
#21,
2 years, 9 months after release (2024-09-05 18:02:39)
|
75 |
3.1 Attackers have tricked someone to consent the installation of something. What is its name?
(Level 3: We're not happy)
|
#25,
2 years, 9 months after release (2024-09-05 17:57:37)
|
125 |
2.9 Which in the "innocent" password of the compromised account ?
(Level 2: Alert! Emergency!)
|
#21,
2 years, 9 months after release (2024-09-05 17:46:50)
|
100 |
2.8 When the attackers did first successfully use the stolen account ?
(Level 2: Alert! Emergency!)
|
#23,
2 years, 9 months after release (2024-09-05 17:44:33)
|
75 |
2.6 To expand their activities, the attackers have obtained full access to some mailboxes. Which ones?
(Level 2: Alert! Emergency!)
|
#21,
2 years, 9 months after release (2024-09-05 17:32:09)
|
75 |
2.5 Attackers also created an email rule that filtered out some keywords. Which ones?
(Level 2: Alert! Emergency!)
|
#19,
2 years, 9 months after release (2024-09-05 17:21:02)
|
75 |
2.4 The attackes have given themselves permissions over two Sharepoint sites. Who are their owners?
(Level 2: Alert! Emergency!)
|
#24,
2 years, 9 months after release (2024-09-05 17:06:23)
|
75 |
2.3 ... and from which IP address?
(Level 2: Alert! Emergency!)
|
#24,
2 years, 9 months after release (2024-09-05 16:53:25)
|
50 |
2.1 María José Feliz shared this file with an user ... who reshared it with a third user. Who?
(Level 2: Alert! Emergency!)
|
#24,
2 years, 9 months after release (2024-09-05 16:29:11)
|
75 |
1.9 María José Feliz shared this document with other user. Which one?
(Level 1: MINAF-PC7)
|
#28,
2 years, 9 months after release (2024-09-05 14:27:41)
|
75 |
1.8 How many times have been the compressed payload successfully executed?
(Level 1: MINAF-PC7)
|
#19,
2 years, 9 months after release (2024-09-05 14:19:55)
|
100 |
1.7 Which user advises Maria Jose Files to "install" everything?
(Level 1: MINAF-PC7)
|
#32,
2 years, 9 months after release (2024-09-05 14:16:31)
|
125 |
1.6 Where did all these malware was downloaded from?
(Level 1: MINAF-PC7)
|
#30,
2 years, 9 months after release (2024-09-05 13:56:28)
|
75 |
1.5 In that folder there is DEFINITELY another file that Windows Defender strongly dislikes. Which one?
(Level 1: MINAF-PC7)
|
#36,
2 years, 9 months after release (2024-09-05 13:40:35)
|
50 |
1.3 If you look carefully in the user folder, you'll see some suspicious compressed files. What final extension is the most used?
(Level 1: MINAF-PC7)
|
#39,
2 years, 9 months after release (2024-09-05 13:28:52)
|
50 |
1.2 Which file generated the most recent AV alert?
(Level 1: MINAF-PC7)
|
#37,
2 years, 9 months after release (2024-09-05 13:15:51)
|
50 |