3.8 In what time the attackers first set foot on MINAF's O365 infrastructure?
(Level 3: We're not happy)
|
#15,
2 years, 9 months after release (2024-09-05 16:31:23)
|
100 |
3.7 From which REAL domain was this last attack launched?
(Level 3: We're not happy)
|
#18,
2 years, 9 months after release (2024-09-05 16:24:29)
|
75 |
3.6 Before this successful attack, they tried another one, more sneaky but unsucessful. Could you tell the "code" they used?
(Level 3: We're not happy)
|
#10,
2 years, 9 months after release (2024-09-05 16:22:17)
|
100 |
3.5 The attackers are nice tricksters because they also fooled this user. Which URL did they make him/her click?
(Level 3: We're not happy)
|
#13,
2 years, 9 months after release (2024-09-05 16:19:47)
|
100 |
3.4 The compromised user have connecting from another countries ... Which one is the most frequent?
(Level 3: We're not happy)
|
#16,
2 years, 9 months after release (2024-09-05 16:11:05)
|
50 |
3.3 This kind of attack is EXACTLY called ...
(Level 3: We're not happy)
|
#17,
2 years, 9 months after release (2024-09-05 16:06:42)
|
100 |
3.2 Who fooled this user to install the "thingy" ?
(Level 3: We're not happy)
|
#25,
2 years, 9 months after release (2024-09-05 16:04:25)
|
75 |
3.1 Attackers have tricked someone to consent the installation of something. What is its name?
(Level 3: We're not happy)
|
#23,
2 years, 9 months after release (2024-09-05 15:57:23)
|
125 |
2.9 Which in the "innocent" password of the compromised account ?
(Level 2: Alert! Emergency!)
|
#20,
2 years, 9 months after release (2024-09-05 15:46:22)
|
100 |
2.8 When the attackers did first successfully use the stolen account ?
(Level 2: Alert! Emergency!)
|
#15,
2 years, 9 months after release (2024-09-05 15:41:20)
|
75 |
2.7 Attackers have left a privileged backdoor to MINAF's O365. Which form does it take?
(Level 2: Alert! Emergency!)
|
#16,
2 years, 9 months after release (2024-09-05 15:35:29)
|
125 |
2.6 To expand their activities, the attackers have obtained full access to some mailboxes. Which ones?
(Level 2: Alert! Emergency!)
|
#20,
2 years, 9 months after release (2024-09-05 15:29:57)
|
75 |
2.4 The attackes have given themselves permissions over two Sharepoint sites. Who are their owners?
(Level 2: Alert! Emergency!)
|
#22,
2 years, 9 months after release (2024-09-05 15:05:42)
|
75 |
2.1 María José Feliz shared this file with an user ... who reshared it with a third user. Who?
(Level 2: Alert! Emergency!)
|
#28,
2 years, 9 months after release (2024-09-05 14:39:59)
|
75 |
1.8 How many times have been the compressed payload successfully executed?
(Level 1: MINAF-PC7)
|
#20,
2 years, 9 months after release (2024-09-05 12:20:16)
|
100 |
1.7 Which user advises Maria Jose Files to "install" everything?
(Level 1: MINAF-PC7)
|
#34,
2 years, 9 months after release (2024-09-05 12:18:24)
|
125 |
1.5 In that folder there is DEFINITELY another file that Windows Defender strongly dislikes. Which one?
(Level 1: MINAF-PC7)
|
#33,
2 years, 9 months after release (2024-09-05 11:38:12)
|
50 |
1.3 If you look carefully in the user folder, you'll see some suspicious compressed files. What final (real) extension is the most used?
(Level 1: MINAF-PC7)
|
#40,
2 years, 9 months after release (2024-09-05 11:30:42)
|
50 |
1.4 Which payload do these files have?
(Level 1: MINAF-PC7)
|
#28,
2 years, 9 months after release (2024-09-05 11:29:06)
|
75 |
1.2 Which file generated the most recent AV alert?
(Level 1: MINAF-PC7)
|
#35,
2 years, 9 months after release (2024-09-05 11:04:02)
|
50 |