Skip to content

Commit 2bee2f6

Browse files
Merge pull request #4 from joris-decombe/docs/update-scenario-list
Update documentation with new 2025 threat scenarios
2 parents 80fe529 + f01ae10 commit 2bee2f6

File tree

2 files changed

+46
-8
lines changed

2 files changed

+46
-8
lines changed

CLAUDE.md

Lines changed: 25 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,9 @@ Scenarios are defined as objects with:
8383
- `injects[]`: Optional events the facilitator can trigger (from Extra Injects table in manual)
8484
- Each turn has `publicText` (shown to players) and `facilitatorInfo` (hidden, facilitator-only)
8585

86-
**Current Scenarios** (from NCSC NZ Rolls & Responders Facilitator Manual V1.1):
86+
**Current Scenarios**:
87+
88+
**NCSC NZ Official Scenarios** (from Rolls & Responders Facilitator Manual V1.1):
8789

8890
1. **DDoS Attack** (Code 4452) - Easy
8991
- Paid stressor service hired by criminals for Bitcoin extortion
@@ -100,10 +102,29 @@ Scenarios are defined as objects with:
100102
- 3 turns: Pre-Incident → Response Phase → Recovery
101103
- Injects: Historical researcher warning, media article
102104

105+
**2025 Real-World Incident Scenarios**:
106+
107+
4. **The "Deepfake" CFO** (Code 1461) - Easy
108+
- AI-driven BEC via deepfake video (based on 2024 Arup Hong Kong $25M case)
109+
- 3 turns: Pre-Incident → Response → Recovery
110+
- Inject: Media coverage of similar attacks
111+
112+
5. **The Poisoned Package** (Code 3164) - Medium
113+
- Supply chain attack via NPM/PyPI typosquatting (based on XZ Utils CVE-2024-3094 & Polyfill.io)
114+
- 3 turns: Pre-Incident → Response → Recovery
115+
- Injects: Developer reports anomaly, additional compromised systems discovered
116+
117+
6. **Hypervisor Ransomware** (Code 5126) - Hard
118+
- ESXi/Hyper-V ransomware with double extortion (based on ESXiArgs & Akira campaigns)
119+
- 3 turns: Pre-Incident → Response → Recovery
120+
- Injects: Ransom demand with threat publication, backup corruption discovered
121+
103122
**Adding custom scenarios**:
104-
1. Add to `SCENARIOS` object in `scenarios.js`
105-
2. Follow the structure of existing R&R scenarios
106-
3. Include difficulty rating and scenario code
123+
1. Add translations to `src/locales/en.json` and `src/locales/fr.json`
124+
2. Add to `getScenarioData(t)` function in `scenarios.js`
125+
3. Add scenario ID to `getScenarioIds()` array
126+
4. Follow the structure of existing R&R scenarios
127+
5. Include difficulty rating and scenario code
107128

108129
## Key Files
109130

README.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ Based on the [NCSC New Zealand "Rolls & Responders"](https://www.ncsc.govt.nz/pr
1515
## Features
1616

1717
- **Dual-View Architecture**: Separate facilitator console and player display that sync via localStorage
18-
- **Scenario Library**: 3 official NCSC NZ scenarios (DDoS, Ransomware, Cloud Compromise)
18+
- **Scenario Library**: 6 scenarios including 3 NCSC NZ official scenarios + 3 2025 real-world incident scenarios
19+
- **Multi-Language Support**: Full English and French translations
1920
- **D20 Dice System**: Advantage/Disadvantage mechanics for action resolution
2021
- **Dynamic Injects**: Facilitator can trigger unexpected events during gameplay
2122
- **Cross-Tab Sync**: Open in multiple windows for simultaneous facilitator/player views
@@ -70,18 +71,34 @@ Facilitators can trigger unexpected events during gameplay.
7071

7172
## Scenarios
7273

73-
### 1. DDoS Attack (Easy)
74+
### NCSC NZ Official Scenarios
75+
76+
#### 1. DDoS Attack (Easy)
7477
**Code**: 4452
7578
Paid stressor service hired by criminals for Bitcoin extortion. Tests availability response and stakeholder communication.
7679

77-
### 2. Ransomware (Medium)
80+
#### 2. Ransomware (Medium)
7881
**Code**: 1456
7982
Security tester USB attack on admin laptop. Tests backup recovery and incident disclosure.
8083

81-
### 3. Cloud Infrastructure Compromise (Hard)
84+
#### 3. Cloud Infrastructure Compromise (Hard)
8285
**Code**: 6244
8386
Misconfigured access keys lead to PII exfiltration. Tests data breach response and media handling.
8487

88+
### 2025 Real-World Incident Scenarios
89+
90+
#### 4. The "Deepfake" CFO (Easy)
91+
**Code**: 1461
92+
AI-driven Business Email Compromise using deepfake video technology. Based on the 2024 Arup Hong Kong incident where $25M was fraudulently transferred via deepfake video conference call. Tests detection of AI-generated media and social engineering response.
93+
94+
#### 5. The Poisoned Package (Medium)
95+
**Code**: 3164
96+
Software supply chain attack via NPM/PyPI typosquatting. Based on XZ Utils backdoor (CVE-2024-3094) and Polyfill.io compromise. Tests secure development practices and supply chain security.
97+
98+
#### 6. Hypervisor Ransomware (Hard)
99+
**Code**: 5126
100+
VMware ESXi/Hyper-V hypervisor-level ransomware with double extortion tactics. Based on ESXiArgs and Akira ransomware campaigns (2024). Tests critical infrastructure response and backup strategy at the virtualization layer.
101+
85102
## How to Play
86103

87104
1. **Choose a scenario** on the landing page

0 commit comments

Comments
 (0)