Full screen

Share

 Sh0bh!t Purv@             Pr@jWal S!ng#                J0rdan R0ch@          @rch!tha Ram3sh               Gay@tr! Mugl!kar

Want to create interactive content? It’s easy in Genially!

Get started free

Digital Disarray: The Breach of Data Corp.

Jordan Rocha

Created on May 9, 2024

In this thrilling cybersecurity escape room, participants handle a data breach at DataCorp. They must solve puzzles to find the breach's source, secure data, and prevent future attacks. This experience teaches phishing awareness, password security, data protection, and incident response.

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

Sh0bh!t Purv@ Pr@jWal S!ng# J0rdan R0ch@ @rch!tha Ram3sh Gay@tr! Mugl!kar

Later That Night

*Sigh* It's been a long day, with all that happened at DataCorp. Huh? Wifi Disconnected? Let me try reconnecting...

You (CEO)

DC_6G WIFI Password

XxxxxXxxnXXxx

Launch

Ah! There it is. Let's start it up.

You (CEO)

BREAKOUT

© 2024 A game by Bert softy

Start game

The

dungeon

Cyber

Greetings, traveller. Welcome to the realm of cybersecurity. I am the Sage, your guide on this journey. There are three levels to complete, each presenting its own challenges. Remember, the path you choose will determine your safety and the safety of us all. Reach the end and defeat the monster that lies there. I wish you good luck for your journey ahead. Live long and prosper.

Start level

Level 1

Watch out, a wandering skeleton is in your way! Get the earth gem by giving the right answer to the question.

LEVEL 1 - EARTH GEM

Encryption

Antivirus

Router

Rawr

Firewall

I'm a barrier around your network, keeping threats at bay. What am I?

An antivirus is software designed to detect, prevent, and remove malware and other malicious softwares from computers and networks.

wrong answer (Antivirus)

Try again

A router is a device that directs data traffic between different networks, enabling devices to connect to the internet or communicate within a local network.

wrong answer (Router)

Try again

Encryption is the process of converting data into a coded format to prevent unauthorized access.

wrong answer (ENCRYPTION)

Try again

LEVEL 1 - eaRth GEM

Next

You nailed it!(Firewall)

A firewall is a security system barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

LEVEL 2 - AIR GEM

Start level

Level 2

Choose the correct answer to get out of the room alive and get the next gem

Choose the correct answer that represents a secure network connection.

http://

https://

HTTP (Hypertext Transfer Protocol) is the foundational protocol used for transmitting data on the web, enabling unauthorized parties to access and read them over the internet easily.

wrong answer (HTTP://)

Try again

LEVEL 2 - AIR GEM

Next level

Well done, genius! (HTTPS://)

HTTPS (Hypertext Transfer Protocol Secure) is an extension of HTTP that uses encryption to secure data transmission between a web browser and server.

Start level

LEVEL 3 - WATER GEM

Level 3

Answer the final question to get the last gem and become a legend!

Two-Function Authorization

Two-Factor Association

Two-Factor Authentication

What does 2FA stand for?

Two-Factor Access

82

96

wrong answer (Two-Function Authorization)

It is a fake security measure requiring users to simultaneously perform two unrelated tasks, like solving a puzzle and entering a password, to access a system.

Be cautious of social engineering tactics that use fake data to deceive and manipulate you.

Try again

wrong answer (Two-Factor Access)

It is a fake method of entry that mandates both verbal confirmation and a secret handshake to grant access to secure locations or data.

Be cautious of social engineering tactics that use fake data to deceive and manipulate you.

Try again

wrong answer (Two-Factor Association)

It is a fake process where two individuals must form a formal partnership to gain access to restricted areas or information.

Be cautious of social engineering tactics that use fake data to deceive and manipulate you.

Try again

Way to go! (Two-Factor Authentication)

2FA is a security process that requires users to provide two different forms of identification, typically something they know (like a password) and something they have (like a mobile device), to verify their identity.

FINAL LEVEL - DRAGON

Defeat the dragon!

How dare you bother me, you fool!

Victory is yours!

Congratulations! You've conquered the dungeon!

You (CEO)

Wow! What an interesting game! A nice way to teach people about cybersecurity and online safety. I wonder who made this....

You (CEO)

Wait, what's this? What's happening!? This doesn't look right.

Restart

You (CEO)

Maybe restarting my computer will help.

You (CEO)

That's better. Wait, something's still off. What's this pop-up? This doesn't look good, especially after what happened today. I should really contact someone about this.

You (CEO)

Oh, that was quick! She's sent me an email. Let's have a look.

You fell victim to a watering hole attack by inadvertently clicking on a file that contained malware. The file you clicked had a .exe file format & the email address was suspicious. View links & file extensions more carefully next time.

Retry

Click Retry, reverse the time and go back to the previous checkpoint

VIRUS INSTALLED

This document is password protected

nnn

ceo@datacorp.com

Email Address

Strong Password

Terminal

Strong Password

XxxxxxxnxXxx

Continue

FILE 01

Fantastic work! You've cracked the code, and the password you discovered is unbreakable for a million years. Don't believe me?https://www.passwordmonster.com/ use this link to test your password next time you create one.

A secure connection has been set. With all this chaos around us, having a secure communication channel is crucial. This will help keep our conversations under lock and key until we figure out who's behind this attack.

Regarding the malware found on your system. I may have some information to share with you that's linked with the recent attack. Here's what I've found so far. It seems like gibberish, but just in case have a look and see if it leads to any new information.

Terminal

Terminal

Enter the gang's name

xxxxxxxxxx

Continue

"bytebandit", I think I've heard of it before. Give me a second to see if I can dig up some information on it. I think I had a file on them kept somewhere.

Terminal

Continue

FILE 02

"bytebandit", I think I've heard of it before. Give me a second to see if I can dig up some information on it. I think I had a file on them kept somewhere.

Retry

Here we go. Why don't you have a look and let me know if you come across anything significant or noteworthy. You seem to have a keen eye for this stuff. Let me know if you find anything that could help us in our efforts to address this threat.

Terminal

Start Trace

Okay, looks like I have to find out their location. Let's hope they're not hiding it using a Virtual Private Network [VPN]. Those things make it near impossible to trace.

You (CEO)

Enter the location's name

xxxxxxxxxx

Well, well, well. They should have used a VPN. Without that it was too easy getting their data, real location and sensitive information. Even someone like me could do it. Lessons learnt, I guess.

You (CEO)

Boiler Room

Found it! It's happening at Boiler Room, in London.

Continue

That's brilliant! Thanks to that, I've uncovered something huge. It appears that a major bug bounty has been orchestrated by the hackers, and is set to take place tomorrow night at the"boilerroom". We need to prepare ourselves for what we're up against.

Try searching the network traffic in this area. I think they might be working out of a place over there.

FILE 02

Retry

Here we go. Why don't you have a look and let me know if you come across anything significant or noteworthy. You seem to have a keen eye for this stuff. Let me know if you find anything that could help us in our efforts to address this threat.

Terminal

Next Night

Are you ready? We might be getting late.

Rin (IT Head)

This is it. Boiler room, London. The location of the bug bounty. Remember, our objective is to gather as much intel as possible without drawing attention to ourselves. Stay vigilant and be prepared for anything.

Rin (IT Head)

It looks like it's already begun. Time isn't on our side. Let's make this quick. I'll keep watch on our surroundings to ensure we're not detected. You get on with the hack.

Rin (IT Head)

Your task is to locate one of the systems containing our breached data and sensitive information. The information can be crucial, in taking down the gang, and retrieving the information they stole from us.

Rin (IT Head)

Click-and-Drag
Not here
Not here
Try here
Not here
1. WannaCry Ransomware 2017 (Completed)2. The Yahoo Attack 2014 (Completed)3. Adobe Cyberattack 2013 (Completed)4. Estonia Cyberattack 2007 (Completed)5. Ukraine PowerGrid Attack 2015 (Completed)6. The NASA Cyberattack 1999 (Completed)7. MOVEit 2023 (Completed)8. The PlayStation Network Attack 2011 (Completed)9. The Melissa Virus 1999 (Completed)10. CapitalOne Data Breach 2019 (Completed)11. Kamikaze Love 2014 (Completed)12. DataCorp InfoLeak 2024 (In Progress...)

11

Top cyber attacks

INPUT

Key to transfer files

nnxxxxxxxxxxx

TRANSFER COMPLETED

SUBMIT

I think they've caught on to us. Let's move quickly! Make a run for the exit!!!

Rin (IT Head)

(Rin got shot)Don't help, just go! Run! I don't think I'll make it out of here. They're closing in fast. Just run!

Rin (IT Head)

Rin

They're catching up quick. I need to shake them off. Got to think fast and stay focused. There's no room for error. I need to escape or I am going to be in a tough spot.

You (CEO)

You (CEO)

Phew!! Finally, I think I've lost them. It's time to head back home. Kinda hard to process everything that just happened. Maybe a moment of peace might help or I might need something a bit stronger.

Few Hours Later

Next Night

Next Night

Man, what a day! I think I could do with a drink right now.*takes a sip* Finding some comfort where I can.

You (CEO)

*plugs in the USB drive*Guess I should create a Data Back-up of the information, just in case.Here we go again, another code to crack. Alright, show me what you've got this time. Hmm, maybe it's a Caesar cipher? Or perhaps something in Latin?

You (CEO)

USB Decryption Code

nnnnnnn

BACK-UP COMPLETED

SUBMIT

Woah! That's... I need to get this into the right hands ASAP! It was a good idea to back it up too!

You (CEO)

Good evening. I'm Detective Dexter Morgan, Cyber Crime Unit, M.I.B. We've been keeping an eye on you ever since your involvement in recent events with the byte bandits. We got a tip that you may have some information regarding the attackers and some sensitive information. May I come in?

Detective Morgan

Ofcourse! Here you go....

Good evening, sir. I'm sorry, but how do I know you are who you say you are? Can I see some ID first?

You (CEO)

Detective Morgan

Sorry, Detective. Given how the past few days have gone, I must take these precautions. Come in, I might have something you may find of value.

You (CEO)

Here, this is the data you were talking about. It has some sensitive information on the "Byte Bandits". Someone died for it. So please put it to good use. I'm sure you'll know what to do with it.

You (CEO)

Dead or Alive?

"I AM ALIVE, R",what does it mean?

You (CEO)

What's that? it sounds familiar. Is it Morse Code?

You (CEO)

Help us make the experience better

Click here for Feedback Form

Thanks for playing our game

Credits

Researcher: Gayatri Muglikar

Tester: Architha Ramesh

SFX & VFX: Jordan A. Rocha

Animation & Puzzles: Prajwal Singh

Screenplay & Story: Shobhit Purva

Wifi connected using 
Password: D@tacOrp6GLtd

506c61636520697320626f696c

6572726f6f6d2c204c6f6e646f6e

6572726f6f6d2c204c6f6e646f6e

506c61636520697320626f696c

Wifi connected using 
Password: D@tacOrp6GLtd
Primi septem numeri

USB Decrypt!on Code

Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Primi septem numeri

USB Decrypt!on Code

Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Wifi connected using 
Password: D@tacOrp6GLtd
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully copied using 
password: 0112358
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Wifi connected using 
Password: D@tacOrp6GLtd
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully copied using 
password: 0112358
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Avoid connecting to public or open Wi-Fi networks. They are often unsecured and can expose your personal information to hackers. Use a secure, private network instead. Stay safe!

UNSECURE WIFI

Wifi connected using 
Password: D@tacOrp6GLtd
Successfully copied using 
password: 0112358
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Wifi connected using 
Password: D@tacOrp6GLtd
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Wifi connected using 
Password: D@tacOrp6GLtd
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using 
Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully copied using 
password: 0112358
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully copied using 
password: 0112358
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully copied using 
password: 0112358
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Avoid connecting to public or open Wi-Fi networks. They are often unsecured and can expose your personal information to hackers. Use a secure, private network instead. Stay safe!

UNSECURE WIFI

Successfully copied using 
password: 0112358
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd
Successfully breached using 
Password: 11cyberattack
Successfully located using 
Information: boilerroom
Successfully discovered using Information: bytebandit
Secure line connected using Password: E$c/-\p3tH!s
File access granted using Password: 694
Wifi connected using 
Password: D@tacOrp6GLtd