APT28: Initial Access
15 minsBeginnerPrepare for an expected APT28 intrusion and identify the first foothold activity against TryGovMe.
Video coming soon
We'll add the PII protected run recording shortly.
Loading SOC Compass...
Walk through real incident response drills side-by-side. Compare workflows with automated PII protection enabled against baseline methods, and share recordings with stakeholders safely.
Filter exercises by difficulty or search for a specific threat actor, technique, or learning goal.
Prepare for an expected APT28 intrusion and identify the first foothold activity against TryGovMe.
Video coming soon
We'll add the PII protected run recording shortly.
Hunt for malicious executable launch and any C2 callbacks on a compromised host in TryGovMe.
Video coming soon
We'll add the PII protected run recording shortly.
Track reconnaissance and pre‑lateral movement once APT28 secures a foothold on Dev‑QA‑Server.
Video coming soon
We'll add the PII protected run recording shortly.
Confirm host reconnaissance and establish how the actor attempts persistence before eviction efforts.
Video coming soon
We'll add the PII protected run recording shortly.
Investigate moves to elevate privileges and widen access within TryGovMe as the campaign deepens.
Video coming soon
We'll add the PII protected run recording shortly.
Determine what kept the attackers on Dev‑QA‑Server: evidence of credential access and its impact.
Video coming soon
We'll add the PII protected run recording shortly.
A full campaign scenario where APT28 targets partners for sensitive data; prepare, detect, and respond.
Video coming soon
We'll add the PII protected run recording shortly.
Investigate an alleged breach posted to a leak site and determine scope and impact before time runs out.
Video coming soon
We'll add the PII protected run recording shortly.
Separate noisy autoscaling from real abuse as an actor turns cloud resources into a cryptojacking rig.
Video coming soon
We'll add the PII protected run recording shortly.
Onboard to the simulator by closing true‑positive alerts and learning the flow of a phishing scenario.
Video coming soon
We'll add the PII protected run recording shortly.
Dark‑web leaked RDP credentials tie back to two users; investigate exposure and potential misuse.
Video coming soon
We'll add the PII protected run recording shortly.
An exposed upload page enables web‑shell access; follow privilege escalation and data exfiltration chain.
Video coming soon
We'll add the PII protected run recording shortly.
Malvertising masquerades as a printer driver; map the compromise through privilege escalation and lateral movement.
Video coming soon
We'll add the PII protected run recording shortly.
Analyze each phase of an active phishing incident and assemble a clear, defensible incident narrative.
Video coming soon
We'll add the PII protected run recording shortly.