CyberNoobs

Cybersecurity specialists promoting their own concept of reverse masking — the honeypot infinity trust, which consists of creating an infrastructure to model threats. The team has also developed other techniques to help it protect the systems of virtual State F.

Investigated11 of 25
Average time 13 h 48 min
Recorded incidents63
Falsely recorded0

Investigations

Spoofing of power control data
The phones of emergency call handlers are ringing off the hook. Angry people are complaining about a lack of electricity, even though the control system screens indicate no problems in the power grid and all consumers are connected. During the initial investigation, it was revealed that the hackers had tampered with the control system data displayed to the operator. Experts at the power company really have no idea which consumers are connected to the grid and which are not.
Shutdown of hydroelectric plant generator
Hackers carried out a cyberattack on the automatic control system of the plant's generator, causing a shutdown. The shortage of power in the grid left some areas of the city partially cut-off.
Shutdown of hydroelectric plant generator
Hackers carried out a cyberattack on the automatic control system of the plant's generator, causing a shutdown. The shortage of power in the grid left some areas of the city partially cut-off.
Confidential information leak
Hackers broke into the systems of Off Energo, the capital's energy supplier, compromised the chief accountant's computer, and stole the company's payment orders, which include details on money transfers to non-budget funds and prepayment of grid extension works. The company will have to conduct an internal investigation and may be coerced into paying a ransom so that its confidential data is not put up for sale on the dark web.