Eesmärk
Aeg
Boonus
Motivatsioon
500

Global cyberattacks known from year 2016 that exploited the SMB EternalBlue vulnerability to deploy ransomware; crippled one of the world's largest shipping firms in just seven minutes.

PETYA and NOTPETYA


Teie eesmärk on: 

Levitage Suurt Sõnumit 4h


500

Vulnerability known from year 2014 in the TLS heartbeat extension packets of OpenSSL that can result in decryption of SSL encrypted communications and access to sensitive information.

HEARTBLEED

Teil on aega:

3 kuud

500

Vulnerability known from 2014 in the Bourne Again Shell that enable remote code execution and allow an attacker to gain control over the targeted system.

SHELLSHOCK, BASHDOOR


Teie boonus on:

Oskate vene ja hiina keelt


500

A decentralised group of hactivists known from year 2003 responsible for dozens of high-profile, global operations over the years.

ANONYMOUS


Teie Motivatsioon on:

Teenite Suurt Juhti

1000

Company attacked in 2011 where intruders issued & used fraudulent site certificates for Iranian domestic survailance.

DIGINOTAR


Teie eesmärk on:

Teenida 100K eurot

1000

Trojan horse known from year 2017 that downloads banking Trojans, usually delivered through spam with malicious download attachments and links. It aims to propagate and steal email addresses and passwords.

EMOTET


Teil on aega:

1 kuu


1000

Vulnerability known from year 2014 in SSL 3.0 that allows attackers to carry out man-in-the-middle attacks to decrypt secure HTTP cookies and steal sensitive information.

POODLE


Teie Boonus on:

Keegi teist töötab partnrei juures

1000

Vulnerability known from year 2017 affecting modern processor chips that gives attackers access to a computer's memory allowing them to steal sensitive information.

SPECTRE


Teie Motivatsioon on:

Olete pantvangis, teid ähvardatakse maha lasta


5000

Targeted espionage campaigne known from year 2011 on industrial data & credentials; thought to be related to Stuxnet. Also the name of self-destructing worm.

DUQU


Teie eesmärk on:

Vallandada Suur Juht (H.S.)

5000

Malware  known from year 2014 that exploits vulnerability in Microsoft Windows OLE Package Manager allowing attackers to download and install malware by embedding OLE files from externa locations on affected system.

SANDWORM


Teil on aega:

14 ööpäeva

5000

Vulnerability known from year 2016 in the copy-on-write mechanism of the Linux kernel that when exploited, allows non-privileged users to modify the read-only state of files in memory.

DIRTYCOW


Teie boonus on:

Teil on kaasosaline äripoolel

5000

State-sponsored cybercriminals known from year 2009 who use aggressive TTPs to target organizations worldwide. Noted for the 2014 Sony breach.

LAZARUS, APPLEWORM


Teid motiveerib:

Nälg perekonnas ja terves suguvõsas

10000

The company that suffered credit and debit card data breach in 2013 because of POS malware.  Approximately 40 million credit and debit card accounts were impacted.

TARGET


Teie eesmärk on:

Kaotage elekter kogu Eestis 4h (neljaks tunniks)

10000

Botnet from year 2016 that targets IoT systems that use factory default usernames and passwords to run massive DDoS attacks, rendering large websites inaccessible and cutting off internet usage.

MIRAI


Teil on aega: 

5 ööpäeva

10000

The group known from 2007 is primarily targeting government agencies, it has received public attention in 2016 after a series of cyber-attacks related to the U.S. Presidential election.

SWALLOTAIL, APT28, SEDNIT, FANCY BEAR


Teie boonus on:

Teie meeskonnaliikmega samas kodus elav inimene töötab BITis




10000

Cyber espionage group known from 2014 that uses cutom backdoors such as Lancafdo.A to target SCADA systems, energy companies, and others across Eastern Europe.

SANDWORM, VOODOO BEAR, BLUE ECHIDNA, IRON VIKING


Teid motiveerib:

Kättemaks

50000

American computer security consultant, author, and convicted hacker, best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.

KEVIN MITNICK


Teie eesmärk on:

Tekitada EEle kahju 10M eurot

50000

Sophistitced worm from year 2008 that infected around 15 million computers globally. Most variants used RPC remote code execution vulnerability (MS08-067) to spread. 

CONFICKER DOWNADUP, DOWNUP, KIDO


Teil on aega:

1 ööpäev

50000

A group known from Dec 2017 is using living off the land tactics and advanced phishing techniques, the group targets government and military organizations across Eastern Europe and Middle East.

GALLMAKER


Teie boonus on:

Keegi teie meeskonnaliikmetest töötab BITis InfoSec osakonnas

50000

This group known from year 2013 uses sophisticated watering hole techniques and open-source malware frameworks to compromise financial firms, energy companies, and more.

BUDWORM Emissary Panda, APT27, WEKBY 2.0


Teid motiveerib:

Iga meeskonnaliige saab 50K puhast raha