3.7 From which REAL domain was this last attack launched?
(Level 3: We're not happy)
|
#21,
2 years, 9 months after release (2024-09-05 18:25:34)
|
75 |
3.6 Before this successful attack, they tried another one, more sneaky but unsucessful. Could you tell the "code" they used?
(Level 3: We're not happy)
|
#16,
2 years, 9 months after release (2024-09-05 18:24:14)
|
100 |
3.5 The attackers are nice tricksters because they also fooled this user. Which URL did they make him/her click?
(Level 3: We're not happy)
|
#16,
2 years, 9 months after release (2024-09-05 18:22:35)
|
100 |
3.4 The compromised user have connecting from another countries ... Which one is the most frequent?
(Level 3: We're not happy)
|
#23,
2 years, 9 months after release (2024-09-05 18:15:33)
|
50 |
3.3 This kind of attack is EXACTLY called ...
(Level 3: We're not happy)
|
#19,
2 years, 9 months after release (2024-09-05 18:10:21)
|
100 |
3.2 Who fooled this user to install the "thingy" ?
(Level 3: We're not happy)
|
#22,
2 years, 9 months after release (2024-09-05 18:02:45)
|
75 |
3.1 Attackers have tricked someone to consent the installation of something. What is its name?
(Level 3: We're not happy)
|
#21,
2 years, 9 months after release (2024-09-05 17:57:05)
|
125 |
2.8 When the attackers did first successfully use the stolen account ?
(Level 2: Alert! Emergency!)
|
#22,
2 years, 9 months after release (2024-09-05 17:43:44)
|
75 |
2.7 Attackers have left a privileged backdoor to MINAF's O365. Which form does it take?
(Level 2: Alert! Emergency!)
|
#18,
2 years, 9 months after release (2024-09-05 17:36:36)
|
125 |
2.6 To expand their activities, the attackers have obtained full access to some mailboxes. Which ones?
(Level 2: Alert! Emergency!)
|
#17,
2 years, 9 months after release (2024-09-05 17:29:19)
|
75 |
2.5 Attackers also created an email rule that filtered out some keywords. Which ones?
(Level 2: Alert! Emergency!)
|
#14,
2 years, 9 months after release (2024-09-05 17:18:38)
|
75 |
2.4 The attackes have given themselves permissions over two Sharepoint sites. Who are their owners?
(Level 2: Alert! Emergency!)
|
#16,
2 years, 9 months after release (2024-09-05 16:59:43)
|
75 |
1.8 How many times have been the compressed payload successfully executed?
(Level 1: MINAF-PC7)
|
#13,
2 years, 9 months after release (2024-09-05 14:18:49)
|
100 |
1.7 Which user advises Maria Jose Files to "install" everything?
(Level 1: MINAF-PC7)
|
#28,
2 years, 9 months after release (2024-09-05 14:14:30)
|
125 |
1.6 Where did all these malware was downloaded from?
(Level 1: MINAF-PC7)
|
#32,
2 years, 9 months after release (2024-09-05 13:56:42)
|
75 |
1.5 In that folder there is DEFINITELY another file that Windows Defender strongly dislikes. Which one?
(Level 1: MINAF-PC7)
|
#35,
2 years, 9 months after release (2024-09-05 13:39:05)
|
50 |
1.4 Which payload do these files have?
(Level 1: MINAF-PC7)
|
#23,
2 years, 9 months after release (2024-09-05 13:28:37)
|
75 |
1.3 If you look carefully in the user folder, you'll see some suspicious compressed files. What final extension is the most used?
(Level 1: MINAF-PC7)
|
#30,
2 years, 9 months after release (2024-09-05 13:01:48)
|
50 |
1.2 Which file generated the most recent AV alert?
(Level 1: MINAF-PC7)
|
#29,
2 years, 9 months after release (2024-09-05 12:57:03)
|
50 |
1.1 At which time did María José Feliz create the document "World_Happiness_Plan.docx" on her computer?
(Level 1: MINAF-PC7)
|
#28,
2 years, 9 months after release (2024-09-05 12:53:07)
|
50 |