
Akira Ransomware: Full Kill Chain IR
Step into the shoes of a Tier 3 SOC Analyst to investigate a high-impact ransomware intrusion by the Howling Scorpius group (Akira). This scenario covers the full lifecycle of a modern double-extortion attack, from initial VPN credential abuse and SEO poisoning to lateral movement, credential dumping, and final data exfiltration. You will need to correlate evidence across SIEM logs, XDR process trees, and Firewall traffic to reconstruct the timeline and identify the root cause of the breach.
Start this operation
Requires a Pro subscription.
View Pro PlansFree forever — no credit card required
Investigation Tasks
Complete each task by investigating alerts and submitting your findings.
Tracing the External Infiltration Point
50At 2025-08-01T09:14:56.565Z, a high-priority alert indicated a potential unauthorized access attempt targeting our internal file server. Analyze the network traffic logs to determine which external entity initiated the connection that bypassed the standard perimeter filters.
Uncovering the Persistent Shadow: Malicious Artifact Identification
100An unauthorized process execution was detected on corp-wks-42 at 2025-08-01T11:44:54.495Z, originating from a temporary directory. You must investigate the telemetry to find the unique cryptographic identifier of the file that was used to establish an initial foothold.
Identifying C2 Communications from compromised workstation
50Following a suspicious process execution on corp-wks-101, network logs indicate a potential data exfiltration attempt or beaconing behavior. Review the network telemetry to determine which external infrastructure the host was communicating with at the time of the alert.
Tracing the Origin of Evidence
100During the timeline reconstruction of the incident on dc-prod-01, an unusual execution was detected. To verify the integrity of our telemetry, we need to confirm which specialized logging agent reported this specific activity at 2025-08-01T09:20:06.485Z.
Identifying the Ransomware Impact on File Servers
100Around 2025-08-14T03:00:00Z, several automated alerts triggered indicating unauthorized data encryption on file-srv-01. You must investigate the XDR panel to determine which specific sub-technique or technique was mapped to this disruptive activity.
Unusual Persistence Investigation on dc-prod-01
100After gaining initial access, the adversary attempted to stabilize their connection to the domain controller. Using the firewall logs, determine which destination port was targeted during the suspicious inbound traffic spike from the unknown external source.
Identifying Remote Network Beaconing Target
50After the initial compromise on corp-wks-42, the attacker attempted to pivot deeper into the internal network. Analyze the endpoint logs from the morning of August 4th to determine which production asset was targeted during the lateral movement phase.
Identifying Anomalous Network Persistence
100An alert triggered for a suspicious outbound connection from a high-value domain controller. You must analyze the network telemetry to determine which local process initiated this traffic to ensure it is not a masquerading attempt or a malicious beacon.
Mapping the Adversary Tactic
100An alert was triggered on corp-wks-42 involving the itadm account. You need to determine the specific phase of the attack lifecycle that the adversary was attempting to execute when they interacted with the local security authority process.
Tracing Persistence Mechanisms on corp-wks-101
100A high-severity alert triggered on corp-wks-101 involving the user asmith. Investigation into the behavioral logs suggests a shell was used to modify registry keys for persistence; you must determine the exact initiating process name that spawned this activity.
10 tasks · 850 points total
Start investigationTraining Tools
Skills You'll Build
Complex multi-stage investigations. Realistic noise, ambiguous indicators, lateral movement.
Prerequisites
- Basic understanding of security alerts
- Experience with log analysis tools
- Familiarity with SIEM concepts
- Familiarity with XDR concepts
- Familiarity with Firewall concepts
Ready to investigate?
This operation requires a Pro subscription.
View Pro PlansFree forever — no credit card required
More Operations
View allClickFix: The Fake CAPTCHA Trap
Investigate a modern 'ClickFix' social engineering attack where a user was tricked into executing a malicious PowerShell command via a fake CAPTCHA interface. You will analyze SIEM and XDR telemetry to trace the infection from the initial web lure to the deployment of an infostealer.
Phishing Investigation: ZipLine Supply Chain Campaign
Investigate a sophisticated social engineering campaign targeting manufacturing supply chains. You will analyze a 'reversed' phishing flow where attackers use 'Contact Us' forms to trick employees into initiating email conversations, leading to the deployment of the custom MixShell in-memory implant via DNS tunneling.
Credential Harvesting: The Lookalike Login
An investigation into a modern phishing campaign targeting critical infrastructure. You will analyze email headers for domain spoofing, identify 'Paste and Run' execution chains, and track the delivery of the LummaC2 information stealer through SIEM logs.