The morning started like any other at Nimbus Technologies, a growing startup with a substantial AWS footprint. Their monitoring dashboard suddenly lit up with alerts—unusual login patterns, unexpected API calls, and resource changes nobody authorized.
0% Complete
As Nimbus' newly hired security analyst, you've been tasked with investigating this potential breach. The CTO is breathing down your neck while the company's critical cloud infrastructure and sensitive customer data hang in the balance.
Using your SPL skills and cloud security knowledge, you'll need to trace the attacker's path through CloudTrail logs, determine what systems were compromised, assess potential data exfiltration, and identify unauthorized infrastructure changes.
Time is of the essence—every minute the attacker remains in the environment, they could be accessing more sensitive data or setting up persistent backdoors. Your mission: follow the digital breadcrumbs, understand the scope of the breach, and provide the intelligence needed to stop the attack and begin recovery.
Are your cloud forensics skills up to the challenge? Dive into the logs and find out!
Discover the initial signs of the breach by investigating unusual login patterns and access key exposures.
Track the attacker's reconnaissance activities and attempts to escalate privileges within the AWS environment.
Identify data exfiltration attempts and infrastructure changes made to increase the monetary value of the breach for the attackers.
Techniques that adversaries use to gain their initial foothold within a network or system.
Techniques that adversaries use to gain higher-level permissions on a system or network.
Techniques that adversaries use to gain knowledge about the system and internal network.
Techniques adversaries use to gather information and the data they're after as part of their mission.
Techniques that adversaries use to move data from a system to an external system.
Techniques that adversaries use to cause damage to a system or network.
Discover the initial signs of the breach by investigating unusual login patterns and access key exposures.
Track the attacker's reconnaissance activities and attempts to escalate privileges within the AWS environment.