What RaaS group that has been active since September 2019 and has ranked as the most prolific and destructive group, in the cybercriminal world of ransomware.
LockBit
Who eats crayons all members must be included (Answers have to be in the form of members who currently are in CTI)
Garrett, Jermaine, Andrea, We will accept Tommy and Brian
What does GIAC stand for?
Global Information Assurance Certification
Provide 3 search engine operators
Quotations, filetype:, intitle:, And/Or, *, intext:, -
Who were the original CTI directors (Answer must be first and last names)
Erica Braun, Calvin Bryant
Russian cyberespionage group that has been linked to some of the most destructive incidents of the past decade, including the power outages in Ukraine in 2015 and 2016, the 2017 NotPetya supply chain attack?
Sandworm, Telebots, Electrum, Voodoo Bear, Iron Viking
Who is our solo dolo costie (Answers have to be in the form of members who currently are in CTI)
Nicholas
How can intelligence from well-known cyber attacks be used to improve current cybersecurity practices? CHOOSE ALL THAT APPLY:
a) Developing new encryption standards
b) Understanding attacker tactics
c) Enhancing incident response plans
d) Designing user-friendly interfaces
e) Training staff on social engineering
B, C, E
How many entries does the first page of the Cyber Advisory have?
10
When Gabe joined CTI as an intern who was his team lead?
Andrew
Who is responsible for TeamPhisher vulnerability? We briefed this today who payed attention?
Storm-0423, Sangria tempest
What does ARMY stand for?
A Recruiter Misled You
During the __________ phase of the Cyber Kill Chain, the adversary exploits a vulnerability to execute code on the victim’s system.
a) Reconnaissance
b) Exploitation
c) Delivery
d) Installation
Exploitation
Describe what is on both sides of a Threat card
Answer pending
Before the current team breakdown, internal and external used to be on a rotation for the collections schedule. How long was that rotation?
2 weeks
What Russian-backed threat actor is most known for compromising the Hillary Clinton campaign, Democratic National Committee, and the Democratic Congressional Campaign Committee, all as part of an effort to compromise the U.S. presidential election?
Fancy Bear, APT28, Blue Delta
What does Navy stand for?
Never again volunteer yourself
Which of the following is an example of a logical fallacy that could hinder accurate analysis?
a) Hasty generalization
b) Data normalization
c) Algorithm bias
d) Redundancy elimination
Hasty generalization
Who was the last CTI member to receive a degree?
Lydia
What colors hives no longer exist
Orange, Yellow
This financially motivated group targets retail, hospitality and entertainment industries. The group has previously conducted several spearphishing campaigns using the downloader PUNCHBUGGY and POS malware PUNCHTRACK.
FIN8, ATK113, G0061
What popular pizza brand is based around WWI ace pilot?
Red Baron Pizza or Manfred van something unpronounceable (Yeah hes german)
When analyzing intelligence, which cognitive bias involves favoring information that confirms preexisting beliefs or theories?
a) Availability bias
b) Confirmation bias
c) Anchoring bias
d) Hindsight bias
Confirmation bias
What # investigation report is CTI on for the year?
024-24
What country was CTIs HR rep visiting next
Iceland