3.8 In what time the attackers first set foot on MINAF's O365 infrastructure?
(Level 3: We're not happy)
|
#15,
2 years, 9 months after release (2024-09-05 18:31:23)
|
100 |
3.7 From which REAL domain was this last attack launched?
(Level 3: We're not happy)
|
#18,
2 years, 9 months after release (2024-09-05 18:24:29)
|
75 |
3.6 Before this successful attack, they tried another one, more sneaky but unsucessful. Could you tell the "code" they used?
(Level 3: We're not happy)
|
#10,
2 years, 9 months after release (2024-09-05 18:22:17)
|
100 |
3.5 The attackers are nice tricksters because they also fooled this user. Which URL did they make him/her click?
(Level 3: We're not happy)
|
#13,
2 years, 9 months after release (2024-09-05 18:19:47)
|
100 |
3.4 The compromised user have connecting from another countries ... Which one is the most frequent?
(Level 3: We're not happy)
|
#16,
2 years, 9 months after release (2024-09-05 18:11:05)
|
50 |
3.3 This kind of attack is EXACTLY called ...
(Level 3: We're not happy)
|
#17,
2 years, 9 months after release (2024-09-05 18:06:42)
|
100 |
3.2 Who fooled this user to install the "thingy" ?
(Level 3: We're not happy)
|
#25,
2 years, 9 months after release (2024-09-05 18:04:25)
|
75 |
3.1 Attackers have tricked someone to consent the installation of something. What is its name?
(Level 3: We're not happy)
|
#23,
2 years, 9 months after release (2024-09-05 17:57:23)
|
125 |
2.9 Which in the "innocent" password of the compromised account ?
(Level 2: Alert! Emergency!)
|
#20,
2 years, 9 months after release (2024-09-05 17:46:22)
|
100 |
2.8 When the attackers did first successfully use the stolen account ?
(Level 2: Alert! Emergency!)
|
#15,
2 years, 9 months after release (2024-09-05 17:41:20)
|
75 |
2.7 Attackers have left a privileged backdoor to MINAF's O365. Which form does it take?
(Level 2: Alert! Emergency!)
|
#16,
2 years, 9 months after release (2024-09-05 17:35:29)
|
125 |
2.6 To expand their activities, the attackers have obtained full access to some mailboxes. Which ones?
(Level 2: Alert! Emergency!)
|
#20,
2 years, 9 months after release (2024-09-05 17:29:57)
|
75 |
2.4 The attackes have given themselves permissions over two Sharepoint sites. Who are their owners?
(Level 2: Alert! Emergency!)
|
#22,
2 years, 9 months after release (2024-09-05 17:05:42)
|
75 |
2.1 María José Feliz shared this file with an user ... who reshared it with a third user. Who?
(Level 2: Alert! Emergency!)
|
#28,
2 years, 9 months after release (2024-09-05 16:39:59)
|
75 |
1.8 How many times have been the compressed payload successfully executed?
(Level 1: MINAF-PC7)
|
#20,
2 years, 9 months after release (2024-09-05 14:20:16)
|
100 |
1.7 Which user advises Maria Jose Files to "install" everything?
(Level 1: MINAF-PC7)
|
#34,
2 years, 9 months after release (2024-09-05 14:18:24)
|
125 |
1.5 In that folder there is DEFINITELY another file that Windows Defender strongly dislikes. Which one?
(Level 1: MINAF-PC7)
|
#33,
2 years, 9 months after release (2024-09-05 13:38:12)
|
50 |
1.3 If you look carefully in the user folder, you'll see some suspicious compressed files. What final extension is the most used?
(Level 1: MINAF-PC7)
|
#40,
2 years, 9 months after release (2024-09-05 13:30:42)
|
50 |
1.4 Which payload do these files have?
(Level 1: MINAF-PC7)
|
#28,
2 years, 9 months after release (2024-09-05 13:29:06)
|
75 |
1.2 Which file generated the most recent AV alert?
(Level 1: MINAF-PC7)
|
#35,
2 years, 9 months after release (2024-09-05 13:04:02)
|
50 |