Red Stealer
Red Stealer Link: https://cyberdefenders.org/blueteam-ctf-challenges/red-stealer/ Scenario You are part of the Threat Intelligence team in the SOC (Security Operations Center). An executable file has been discovered on a colleague’s computer, and it’s suspected to be linked to a Command and Control (C2) server, indicating a potential malware infection.Your task is to investigate this executable by analyzing its hash. The goal is to gather and analyze data beneficial to other SOC members, including the Incident Response team, to respond to this suspicious behavior efficiently. ...
Reveal
Reveal Link: https://cyberdefenders.org/blueteam-ctf-challenges/reveal/ Scenario You are a forensic investigator at a financial institution, and your SIEM flagged unusual activity on a workstation with access to sensitive financial data. Suspecting a breach, you received a memory dump from the compromised machine. Your task is to analyze the memory for signs of compromise, trace the anomaly’s origin, and assess its scope to contain the incident effectively. File Analysis given zip file. the zip file contains memory dump of the machine. ...
FakeGPT
FakeGPT Link: https://cyberdefenders.org/blueteam-ctf-challenges/fakegpt/ Scenario Your cybersecurity team has been alerted to suspicious activity on your organization’s network. Several employees reported unusual behavior in their browsers after installing what they believed to be a helpful browser extension named “ChatGPT”. However, strange things started happening: accounts were being compromised, and sensitive information appeared to be leaking. Your task is to perform a thorough analysis of this extension identify its malicious components. File Analysis The file fakegpt.zip contains a Chrome extension named “Fakegpt”. It appears to be a browser extension that obfuscates target URLs, making them more difficult to detect during analysis. ...