Skip to main content
MFA Fatigue: The Notification Flood operation cover
BeginnerSIEMXDR

MFA Fatigue: The Notification Flood

In this guided walkthrough, you will investigate a sophisticated identity-led intrusion. An attacker leveraged social engineering via Microsoft Teams and MFA push-bombing to 'log in' rather than 'break in'. You will analyze SIEM authentication patterns and XDR behavioral data to trace the attacker's path from a simple voice call to full environment compromise.

30m
6 tasks
90 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Identifying the Cloud Resource Transfer Technique

15

An alert was triggered at 2026-03-14T11:00:00Z involving the unauthorized movement of resources within our cloud environment. You need to examine the security alerts for the Azure-AD-Tenant to identify how the attacker attempted to exfiltrate or transfer these resources to an external account.

SOC{...}Hint available
2

Identifying the Initial Access Vector

15

An alert was triggered for user l.smith involving a suspicious attachment. Investigate the XDR panel to determine how the attacker initially gained access to the workstation and find the mapped technique ID.

SOC{...}Hint available
3

Identifying Suspicious Post-Exploitation Execution

15

An automated alert triggered on corp-wks-102 indicating an unusual process execution following a login by l.smith. Investigate the message field in the SIEM panel to determine which command-line interpreter was used to initiate the script.

SOC{...}Hint available
4

Investigating Suspicious Network Outbound

15

At 2026-03-14T11:00:03.729Z, an alert was triggered for an unusual connection originating from l.smith's workstation. You need to review the raw log data to determine which external infrastructure was being communicated with during this event.

SOC{...}Hint available
5

Identifying the Ransomware Technique

15

An automated alert triggered at 2026-03-15T01:12:00Z indicating suspicious file modifications on corp-wks-550. You need to examine the XDR panel to determine which high-impact attack technique was automatically mapped by the detection engine.

SOC{...}Hint available
6

Identify External Command and Control Connection

15

An alert was triggered indicating potential unauthorized outbound traffic from l.smith's workstation. Investigate the XDR Timeline to identify the remote destination address involved in this network event.

SOC{...}Hint available

6 tasks · 90 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Beginner

Ideal for newcomers to SOC operations. Guided investigation with clear indicators.

Prerequisites

  • No prior experience required
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more