You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Scenario Library**: 6 scenarios including 3 NCSC NZ official scenarios + 3 2025 real-world incident scenarios
19
+
-**Multi-Language Support**: Full English and French translations
19
20
-**D20 Dice System**: Advantage/Disadvantage mechanics for action resolution
20
21
-**Dynamic Injects**: Facilitator can trigger unexpected events during gameplay
21
22
-**Cross-Tab Sync**: Open in multiple windows for simultaneous facilitator/player views
@@ -70,18 +71,34 @@ Facilitators can trigger unexpected events during gameplay.
70
71
71
72
## Scenarios
72
73
73
-
### 1. DDoS Attack (Easy)
74
+
### NCSC NZ Official Scenarios
75
+
76
+
#### 1. DDoS Attack (Easy)
74
77
**Code**: 4452
75
78
Paid stressor service hired by criminals for Bitcoin extortion. Tests availability response and stakeholder communication.
76
79
77
-
### 2. Ransomware (Medium)
80
+
####2. Ransomware (Medium)
78
81
**Code**: 1456
79
82
Security tester USB attack on admin laptop. Tests backup recovery and incident disclosure.
80
83
81
-
### 3. Cloud Infrastructure Compromise (Hard)
84
+
####3. Cloud Infrastructure Compromise (Hard)
82
85
**Code**: 6244
83
86
Misconfigured access keys lead to PII exfiltration. Tests data breach response and media handling.
84
87
88
+
### 2025 Real-World Incident Scenarios
89
+
90
+
#### 4. The "Deepfake" CFO (Easy)
91
+
**Code**: 1461
92
+
AI-driven Business Email Compromise using deepfake video technology. Based on the 2024 Arup Hong Kong incident where $25M was fraudulently transferred via deepfake video conference call. Tests detection of AI-generated media and social engineering response.
93
+
94
+
#### 5. The Poisoned Package (Medium)
95
+
**Code**: 3164
96
+
Software supply chain attack via NPM/PyPI typosquatting. Based on XZ Utils backdoor (CVE-2024-3094) and Polyfill.io compromise. Tests secure development practices and supply chain security.
97
+
98
+
#### 6. Hypervisor Ransomware (Hard)
99
+
**Code**: 5126
100
+
VMware ESXi/Hyper-V hypervisor-level ransomware with double extortion tactics. Based on ESXiArgs and Akira ransomware campaigns (2024). Tests critical infrastructure response and backup strategy at the virtualization layer.
0 commit comments