Operation Cyber Shield
Lucy Barker
Created on October 14, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
CEVICHE ESCAPE GAME
Escape games
THUNBERG CASE. TIME SOLDIERS
Escape games
SPACE INVADERS GAME
Escape games
A WORLD OF SPORTS
Escape games
HARRY POTTER ESCAPE GAME
Escape games
MISSION SANTA: MATH BREAKOUT
Escape games
KINGDOM HEARTS ESCAPE ROOM
Escape games
Transcript
Operation Cyber Shield
start
Operation Cyber Shield
Maya Thomas - Chief Information Security OfficerTeam,We are facing a significant breach at the headquarters of Cyber Shield Inc., a leading tech company with high-profile clients and highly classified projects. Secure files have been accessed, system performance has slowed down, and now critical files are disappearing. This is a serious situation.The disruption is already impacting countless businesses, causing revenue loss. Worse still, if these secure files are leaked to the public, top-secret projects could be exposed, posing a risk to national security. We cannot afford to let that happen. We must act immediately.A ransom note has been posted online. Let me be clear—we will not pay. Giving in only invites further attacks from this group and others like them. Our initial analysis points to the breach originating from the laptop of our Chief Security Officer, Brian Clark. That’s where we need to focus our efforts. Head to Clark's office and begin the investigation. Time is of the essence.We need to work out who the hackers are so that we can stop them from causing any further damage.
We're here! We need to get into the laptop... Lets have a look around, there may be some clues that could help uncover the password...
Click here to show interactive elements
File Explorer
Task Manager
We're in! Now, maybe we can work out what the hackers were up to...
Click here to show interactive elements
3
Can we work it out now?
Back to the Cipher Page
How to decode a caesar cipher
"The messenger writes the number that the letters were moved by, next to the message..."
"And then, each letter is moved along the alphabet by a set number..."
"And then, each letter is moved along the alphabet by a set number"
S
R
Q
P
3
Can we work it out now?
Back to the Cipher Page
How to decode a caesar cipher
"The messenger writes the number that the letters were moved by, next to the message..."
"And then, each letter is moved along the alphabet by a set number..."
"And then, each letter is moved along the alphabet by a set number"
S
R
Q
P
3
Can we work it out now?
Back to the Cipher Page
How to decode a caesar cipher
"The messenger writes the number that the letters were moved by, next to the message..."
"And then, each letter is moved along the alphabet by a set number..."
"And then, each letter is moved along the alphabet by a set number"
S
R
Q
P
File Explorer
Task Manager
Ok... Now we know what they're trying to do, we can stop them! Brian is heading to the server room to find the DDM Hard Drive, DDM is a very important client and it would be devistating if this data got into the wrong hands. To find the hard drive, we need to find it's serial number. I know theres a big spreadsheet with all of the project harddrives on it... but where...
File Explorer
Task Manager
Nope, nothing here. Try recents
File Explorer
Task Manager
Nothing here either... Lets look around the office again...
"This looks like morse code... Have we seen something that could help us decode this message? "
Password Protected... Looks like we need to put these numbers in order. Oh wait! Theres something on the back:
o o o o o o o o - - o o - - - o o o o - o - - - - - o o o o
File Explorer
Task Manager
Whats the serial number?
Remember, the name of the project was DDM!
The office is complete! We got everything we needed, lets get to the server room
Wow! Its so dark! Here, use this key card to get into the server room.Oh no! I dropped it! Can you see it anywhere?
Whats going on! Ah, looks like the hackers have disabled the cooling systems! This is bad, we need to fix this now or all the data stored in here could be destroyed!
Hurry! We don't have long before the system malfunctions and all data is lost! Lets get the wires in the right order.
Yes! You did it! Well Done. The data is safe.Hopefully they didn't manage to find the hard drive. Lets look for it. What was the serial number again?Ah yes, S42LKSB426N
We need to find out who is behind this. The phone! Yes, lets take it back to the office and try to get in!
Back to the office
The server room is complete! We got everything we needed, lets get back to the office
Lets look around see if we can find a finger print to use to get into the phone...We can use this tape to get the print
Click here to show interactive elements
A
A
10:47
Touch Finger To Unlock
We're In! Greatwork team. Now,we know they bribed Brian to help them...Lets check his bank statement, we may be able to find the bribe...
Search
10:47
Lets look at the most recent statement, see if we can find anything...and its
BANKING APP
Statement: 17/08/24 - 17/09/24
Statement: 17/07/24 - 17/08/24
Statement: 17/06/24 - 17/07/24
Statement: 17/05/24 - 17/06/24
Statement: 17/04/24 - 17/05/24
Statement: 17/03/24 - 17/04/24
Statement: 17/02/24 - 17/03/24
Statement: 17/01/24 - 17/02/24
A
Touch Finger To Unlock
Back To Page
A
Touch Finger To Unlock
Back To Page
A
A
10:52
Touch Finger To Unlock
Ok, we found the bribe, and it was under DCrane. That doesn't give us much...We also know that the bribe was paid on the 17th September... Lets see if DCrane sent Brian anything else that day...
Search
To: Brian ClarkFrom: Anonymous
Did you get it?
File Message Help
Move to FolderOpen Delivery ReportResend or RecallProperties
This is it! Lets find the IP address, then we can figure out where the hacker is and get them...Click on File and then properties to find the IP address...
A
A
10:57
Touch Finger To Unlock
Search
A
A
10:57
Touch Finger To Unlock
We have Damon's Location, we've got him!Now we can end this. Great job team, you stopped the cyber attack!!!
Search
BREEZE
I
P
A
D
D
R
E
S
S
L
O
O
K
U
IP Address Look Up
Nov 1, 2024 . Lookup a geolocation of an IP address including latitude, longitude, city, region and country...
P
What is an IP Address
June 29, 2022 . Internet Protocol (IP) address: unique number given to every device that is connected to the internet, allowing each device to be identified and located...
What is my IP Address
May 1, 2024 . An IP address is an individual number associated with your device. This site will show your public IP Address...
Videos on "IP ADDRESS LOOK UP"
November 12, 2024. Click here to see educational videos on IP addresses and their uses in cybersecurity...
IP Address Look Up
Insert IP Address...
1
9
2
.
0
.
2
.
1
IP Address: 192.0.2.1
Country: United Kingdom
Region: England
City: Nottingham
Latitude: 52.9548
Longitude: -1.1581
INTRODUCTION HERE
We Stopped The Hacker!
INTRODUCTION HERE
Write an awesome subtitle here to provide context
We Stopped The Hacker!
Great Job Team! You did it! Damon Crane was arrested before he could cause any more havok. No Data from Cyber Shield INC was destroyed or stolen, the business is back to full working capacity!Brian Clark has made a huge mistake. He should have disclosed his financial troubles to his superiors, to warn them that he may be vulnerable to bribery. He should have gone to them when he received the bribe.Time to refresh the Anti-Bribery training with the rest of the team...
Ok, we're so close to stopping them! I just need to block them for as long as it takes for the police to shut them down and make their arrests...Lets get to the Cyber Operations Room... from there, we can start putting barriers in place...
Click here to show interactive elements
We got everything we needed from the phone! Right, lets get to the cyber operations room and start slowing down these hackers...
SECURITY BREACH
This is bad! There are security breaches in many of our most secure rooms. We need to stop this!
We need a lock down code... then we can stop them from getting in...Lets have a look around...
Task Manager
AppsInternet ExplorerFile ExplorerTask ManagerBackground ProcessesAntimalware service executableCOM SurrogateColor WatcherRBN Monitoring34667431345MailSearch
End Task
ERROR !
Oh no! It wont let us shut down the task. We'll have to stop them another way...
Hmmm... I don't recognise these processes... It could be the hackers. Lets try and end these tasks...
Search
Home
Docs
Downloads
Recents
ERROR !Your request has timed out.
Hmmm... Maybe in downloads?
There are some letters in the bin. Looks like the Secuirt officer Brian is having some financial troubles, and the hackers tried to bribe him for information. Do you think he took the bribe?
"The Wires have been disconnected. But how do we know what order they go in? We need to figure this out... Quickly!"
How to decode a caesar cipher
A Caesar Cipher is one of the most widely known encryption methods, used by roman emporer Julius Caesar to secretly send messages. A message is written like so:"A monkey is in the fridge"And then, each letter is moved along the alphabet by a set number, lets say four...A -> b c d e M -> n o p q Once every letter is moved along by four, the message is illegible, like so:"e qsroic mw mr xli jvmhki"The messenger would write the number that the letters were moved by, next to the message, like so:"e qsroic mw mr xli jvmhki" 4The intended reader would then move the letters back four letters along the alphabet to crack the code!
Click here for a video on Caesar Ciphers
Hmmm... Why would Brian want to know how to decipher a caesar cipher? Oh!!! Maybe this could tell us how to understand the note from the bin. Lets take a look...
Name: Brian ClarkAge :42Position: Security Officer
Family:Name: Maria ClarkRelationship: WifeAge: 39Name: Sophie ClarkRelationship: DaughterAge: 13
On the shelf, theres a personel file on Brian. Maybe this could give us some clues on what the end of the password might be...
S/N: NM987GH246G
S/N: S42LKSB426NJLKUIIEJHDjioij
Cyber Shield Inc
S/N: OM876HG45CG
S/N: S42LKSB426NJLKUIIEJHDjioij
Cyber Shield Inc
A
Touch Finger To Unlock
I recognise the dog, it looks like the picture from the office. Maybe this is Brian's phone. Maybe he talked to the hackers over the phone. If we get into it, we could find out who is behind the attack.
How to decode a caesar cipher
A Caesar Cipher is one of the most widely known encryption methods, used by roman emporer Julius Caesar to secretly send messages. A message is written like so:"A monkey is in the fridge"And then, each letter is moved along the alphabet by a set number, lets say four...A -> b c d e M -> n o p q Once every letter is moved along by four, the message is illegible, like so:"e qsroic mw mr xli jvmhki"The messenger writes the number that the letters were moved by, next to the message, like so:"e qsroic mw mr xli jvmhki" 4And then, each letter is moved along the alphabet by a set number four letters along the alphabet to crack the code!
Click here for a video on Caesar Ciphers
Hmmm... Why would Brian want to know how to decipher a caesar cipher? Oh!!! Maybe this could tell us how to understand the note from the bin. Lets take a look...
Task Manager
AppsInternet ExplorerFile ExplorerTask ManagerBackground ProcessesAntimalware service executableCOM SurrogateColor WatcherRBN Monitoring34667431345MailSearch
End Task
ERROR !
Oh no! It wont let us shut down the task. We'll have to stop them another way...
Hmmm... I don't recognise these processes... It could be the hackers. Lets try and end these tasks...
BREEZE
I
P
A
D
D
R
E
S
S
L
O
O
K
U
P
IP Address Look Up
Nov 1, 2024 . Lookup a geolocation of an IP address including latitude, longitude, city, region and country...
What is an IP Address
June 29, 2022 . Internet Protocol (IP) address: unique number given to every device that is connected to the internet, allowing each device to be identified and located...
What is my IP Address
May 1, 2024 . An IP address is an individual number associated with your device. This site will show your public IP Address...
Videos on "IP ADDRESS LOOK UP"
November 12, 2024. Click here to see educational videos on IP addresses and their uses in cybersecurity...
S/N: S42LKSB426N
S/N: S42LKSB426NJLKUIIEJHDjioij
Cyber Shield Inc
Nothing here...
They have disabled the cameras. Lets have a look back, find the last thing we saw before they went down...
They have disabled the cameras. Lets have a look back, find the last thing we saw before they went down...
Internet Headers:
Received From: mail.Outlook.comby mx.google.com with ESMTPS id x3si1234567qkf.7.2024.11.11.09.15.29 for <BrianClark@Mail.com>;Tuesday 17th September, 21.04.23 (PST) dkim=pass header.i=@Mail.com header.s=2024 key.status=good;x-sender= 'DamonCrane@Mail.com'SPF: ip=192.0.2.1Subject: BlankMIME-Version: 1.0Content-Type: text/plain; charset="UTF-8"
Thats it! The Hacker is called Damon Crane and now we have his IP address...Go back to the homepage and then we can look up this IP address...
Name: Brian ClarkAge :42Position: Security Officer
Family:Name: Maria ClarkRelationship: WifeAge: 39Name: Sophie ClarkRelationship: DaughterAge: 13
Nothing on here...
S/N: P9356TH132
S/N: S42LKSB426NJLKUIIEJHDjioij
Cyber Shield Inc
Search
Home
Docs
Downloads
Recents
ERROR !Your request has timed out.
Hmmm... Maybe in downloads?
S/N: GF86WR34M09
S/N: S42LKSB426NJLKUIIEJHDjioij
Cyber Shield Inc
Sophie's Birthday
Theres a USB stick on the desk... that symbol... its one of ours... Maybe its important...
There are some letters in the bin. Looks like the Security officer Brian is having some financial troubles, and theres a note but it looks like its encrypted... Maybe the hackers were trying to bribe him. Do you think he did this?
Search
Home
Docs
Downloads
Recents
ERROR !Your request has timed out.
Hmmm... Maybe in downloads?
They have disabled the cameras. Lets have a look back, find the last thing we saw before they went down...
S/N: LPK98734
S/N: S42LKSB426NJLKUIIEJHDjioij
Cyber Shield Inc
How to decode a caesar cipher
A Caesar Cipher is one of the most widely known encryption methods, used by roman emporer Julius Caesar to secretly send messages. A message is written like so:"A monkey is in the fridge"And then, each letter is moved along the alphabet by a set number, lets say four...A -> b c d e M -> n o p q Once every letter is moved along by four, the message is illegible, like so:"e qsroic mw mr xli jvmhki"The messenger would write the number that the letters were moved by, next to the message, like so:"e qsroic mw mr xli jvmhki" 4The intended reader would then move the letters back four letters along the alphabet to crack the code!
Click here for a video on Caesar Ciphers
Hmmm... Why would Brian want to know how to decipher a caesar cipher? Oh!!! Maybe this could tell us how to understand the note from the bin. Lets take a look...
There are no fingerprints on these notes...
Task Manager
AppsInternet ExplorerFile ExplorerTask ManagerBackground ProcessesAntimalware service executableCOM SurrogateColor WatcherRBN Monitoring34667431345MailSearch
End Task
ERROR !
Hmmm... I don't recognise these processes... It could be the hackers. Lets try and end these tasks...
Oh no! It wont let us shut down the task. We'll have to stop them another way...
"The Wires have been disconnected. But how do we know what order they go in? We need to figure this out... Quickly!"
Search
Home
Docs
Downloads
Recents
ERROR !Your request has timed out.
" Ah no, the hacker has gotten into these files. This is not good "
"The request keeps timing out. The hacker must be clogging up the task list to slow down processes. If people can't do their tasks, Cyber Shield and all of their clients could lose a lot of money. Lets take a look at the task manager..."
Its a picture of Brian's dog. Hey! Look at the creased corner. Maybe there is something on the back...
Daisy's Third Birthday! 16/09/24
01/10/24: Mark Tully "Good Morning Brian, I just wanted to touch base w..."
30/09/24: Rochelle Good "Hi Brian, your insurance payments are overdue, co..."
28/09/24: Ace Trust Bank " Good Morning Mr Clark, update on your p..."
25/09/24: Amazon " Your order has been shipped!"
25/09/24: Alison Graham "Hi Brian, I have sorted those forms you were as..."
21/09/24: Sarah Moffit "Brian, I really urgently need that money that I leant..."
19/09/24: LinkedIn "New job opportunities in your area relating to..."
17/09/24: Anonymous " Did you get it?"
15/09/24: NEWS" News updates in your area, a 23 year old man was cha..."
Task Manager
AppsInternet ExplorerFile ExplorerTask ManagerBackground ProcessesAntimalware service executableCOM SurrogateColor WatcherRBN Monitoring34667431345MailSearch
End Task
ERROR !
Oh no! It wont let us shut down the task. We'll have to stop them another way...
Hmmm... I don't recognise these processes... It could be the hackers. Lets try and end these tasks...
Nothing...
Search
Home
Docs
Downloads
Recents
ERROR !Your request has timed out.
Hmmm... Maybe in downloads?
Name: Brian ClarkAge :42Position: Security Officer
Family:Name: Maria ClarkRelationship: WifeAge: 39Name: Sophie ClarkRelationship: DaughterAge: 13
On the shelf, theres a personel file on Brian. Maybe this could give us some clues on what the end of the password might be...
This is it! Remember the order of the wires
Sophie's Birthday
How to decode a caesar cipher
A Caesar Cipher is one of the most widely known encryption methods, used by roman emporer Julius Caesar to secretly send messages. A message is written like so:"A monkey is in the fridge"And then, each letter is moved along the alphabet by a set number, lets say four...A -> b c d e M -> n o p q Once every letter is moved along by four, the message is illegible, like so:"e qsroic mw mr xli jvmhki"The messenger would write the number that the letters were moved by, next to the message, like so:"e qsroic mw mr xli jvmhki" 4The intended reader would then move the letters back four letters along the alphabet to crack the code!
Click here for a video on Caesar Ciphers
Hmmm... Why would Brian want to know how to decipher a caesar cipher? Oh!!! Maybe this could tell us how to understand the note from the bin. Lets take a look...
No Fingerprints...
A
Touch Finger To Unlock
I recognise the dog, it looks like the picture from the office. Maybe this is Brian's phone. Maybe he talked to the hackers over the phone. If we get into it, we could find out who is behind the attack.
A
Touch Finger To Unlock
I recognise the dog, it looks like the picture from the office. Maybe this is Brian's phone. Maybe he talked to the hackers over the phone. If we get into it, we could find out who is behind the attack.
1
2
3
4
HINT! Remember we could see the wires on one of the cameras, before they were disconnected!
Daisy's Third Birthday! 16/09/24
Its a picture of Brian's dog. Hey! Look at the creased corner. Maybe there is something on the back...
It's corrupted!!!It's all broken up. Maybe we can put this back together..and its
Click when you've solved the puzzle
It looks like Brian wrote his password down. Not very safe practice but it helps us right now! Ah no!... looks like he spilled coffee on the Post-It, we can't read the end. Maybe something lying around here could help us figure it out...
Task Manager
AppsInternet ExplorerFile ExplorerTask ManagerBackground ProcessesAntimalware service executableCOM SurrogateColor WatcherRBN Monitoring34667431345MailSearch
End Task
ERROR !
Oh no! It wont let us shut down the task. We'll have to stop them another way...
Hmmm... I don't recognise these processes... It could be the hackers. Lets try and end these tasks...
S/N: HYU765FH98P
S/N: S42LKSB426NJLKUIIEJHDjioij
Cyber Shield Inc
A
Touch Finger To Unlock
I recognise the dog, it looks like the picture from the office. Maybe this is Brian's phone. Maybe he talked to the hackers over the phone. If we get into it, we could find out who is behind the attack.
Ah yes! The USB. Lets plug it in and see what happens
How to decode a caesar cipher
A Caesar Cipher is one of the most widely known encryption methods, used by roman emporer Julius Caesar to secretly send messages. A message is written like so:"A monkey is in the fridge"And then, each letter is moved along the alphabet by a set number, lets say four...A -> b c d e M -> n o p q Once every letter is moved along by four, the message is illegible, like so:"e qsroic mw mr xli jvmhki"The messenger would write the number that the letters were moved by, next to the message, like so:"e qsroic mw mr xli jvmhki" 4The intended reader would then move the letters back four letters along the alphabet to crack the code!
Click here for a video on Caesar Ciphers
Hmmm... Why would Brian want to know how to decipher a caesar cipher? Oh!!! Maybe this could tell us how to understand the note from the bin. Lets take a look...
Sophie's Birthday
Theres a USB stick on the desk... that symbol... its one of ours... Maybe its important...
There! We've got one. We'll use the tape to get it off of the laptop. Then we can use it to get into the phone...