3.8 In what time the attackers first set foot on MINAF's O365 infrastructure?
(Level 3: We're not happy)
|
3 months, 4 days after release (2022-02-24 08:03:26)
|
100 |
1.8 How many times have been the compressed payload successfully executed?
(Level 1: MINAF-PC7)
|
3 months, 4 days after release (2022-02-24 08:03:01)
|
100 |
3.7 From which REAL domain was this last attack launched?
(Level 3: We're not happy)
|
3 months, 2 days after release (2022-02-22 14:22:44)
|
75 |
3.3 This kind of attack is EXACTLY called ...
(Level 3: We're not happy)
|
3 months, 2 days after release (2022-02-22 14:12:16)
|
100 |
3.5 The attackers are nice tricksters because they also fooled this user. Which URL did they make him/her click?
(Level 3: We're not happy)
|
3 months, 2 days after release (2022-02-22 14:08:19)
|
100 |
3.4 The compromised user have connecting from another countries ... Which one is the most frequent?
(Level 3: We're not happy)
|
3 months, 2 days after release (2022-02-22 13:51:03)
|
50 |
3.2 Who fooled this user to install the "thingy" ?
(Level 3: We're not happy)
|
3 months, 2 days after release (2022-02-22 13:37:32)
|
75 |
3.1 Attackers have tricked someone to consent the installation of something. What is its name?
(Level 3: We're not happy)
|
3 months, 2 days after release (2022-02-22 13:32:47)
|
125 |
2.7 Attackers have left a privileged backdoor to MINAF's O365. Which form does it take?
(Level 2: Alert! Emergency!)
|
3 months, 2 days after release (2022-02-22 13:13:41)
|
125 |
2.9 Which in the "innocent" password of the compromised account ?
(Level 2: Alert! Emergency!)
|
3 months, 2 days after release (2022-02-22 13:11:56)
|
100 |
2.8 When the attackers did first successfully use the stolen account ?
(Level 2: Alert! Emergency!)
|
3 months, 2 days after release (2022-02-22 12:56:28)
|
75 |
2.6 To expand their activities, the attackers have obtained full access to some mailboxes. Which ones?
(Level 2: Alert! Emergency!)
|
2 months, 15 days after release (2022-02-04 14:18:50)
|
75 |
2.5 Attackers also created an email rule that filtered out some keywords. Which ones?
(Level 2: Alert! Emergency!)
|
2 months, 15 days after release (2022-02-04 14:13:00)
|
75 |
2.4 The attackes have given themselves permissions over two Sharepoint sites. Who are their owners?
(Level 2: Alert! Emergency!)
|
2 months, 15 days after release (2022-02-04 14:00:22)
|
75 |
2.2. When did the attackers got the World_Happiness_Plan.docx?
(Level 2: Alert! Emergency!)
|
2 months, 15 days after release (2022-02-04 13:03:32)
|
100 |
2.3 ... and from which IP address?
(Level 2: Alert! Emergency!)
|
2 months, 14 days after release (2022-02-03 14:22:44)
|
50 |
2.1 María José Feliz shared this file with an user ... who reshared it with a third user. Who?
(Level 2: Alert! Emergency!)
|
2 months, 14 days after release (2022-02-03 14:14:07)
|
75 |
1.9 María José Feliz shared this document with other user. Which one?
(Level 1: MINAF-PC7)
|
1 month, 27 days after release (2022-01-19 12:11:42)
|
75 |
1.7 Which user advises Maria Jose Files to "install" everything?
(Level 1: MINAF-PC7)
|
1 month, 26 days after release (2022-01-18 16:51:01)
|
125 |
1.6 Where did all these malware was downloaded from?
(Level 1: MINAF-PC7)
|
1 month, 26 days after release (2022-01-18 13:52:41)
|
75 |
1.4 Which payload do these files have?
(Level 1: MINAF-PC7)
|
1 month, 26 days after release (2022-01-18 12:57:49)
|
75 |
1.3 If you look carefully in the user folder, you'll see some suspicious compressed files. What final extension is the most used?
(Level 1: MINAF-PC7)
|
1 month, 26 days after release (2022-01-18 12:50:17)
|
50 |
1.2 Which file generated the most recent AV alert?
(Level 1: MINAF-PC7)
|
1 month, 26 days after release (2022-01-18 12:35:00)
|
50 |
1.1 At which time did María José Feliz create the document "World_Happiness_Plan.docx" on her computer?
(Level 1: MINAF-PC7)
|
1 month, 25 days after release (2022-01-17 14:05:05)
|
50 |