Cybercrime Syndicates
Password Power
Phishing Phoneys
Breaches and Break-ins
Slide Showdown
100

Which of the following is a real threat actor name:

Evil Doers Society (E.D.S.) 

The Caffeinated Coders

Anonymous

Anonymous

100

Secure or Not Secure:

Ins3cureP4$$w*

Secure

100

Phishing emails are a common example of social engineering, but it can take many forms. What is the most common tactic attackers use to manipulate victims into giving up personal information or taking a desired action?

  • Offering free software or prizes 
  • Creating a sense of urgency, trust, or fear 
  • Using technical jargon to sound convincing 

Creating a sense of urgency, trust, or fear 

100

I trick you into clicking a malicious link or opening an attachment that infects your device with malware. What am I?

Phishing attack

100

How was the Optus Breach achieved?

Malware

Exposed API

Social Engineering

Exposed API

200

Which of the following is a real threat actor name:

Cozy bear

Binary Bandits 

The Bug Zappers


Cozy bear

A Russian hacking organisation. The group has the advanced capabilities to launch highly targeted attacks like SolarWinds supply-chain attacks

200

Secure or Not Secure: 

Phronesis2024

Not secure

200

What is the name of a phishing attack that involved using voice calls?

  • Call phishing
  • Vishing
  • V-Scamming

Vishing

200

I lock up your important files and demand a payment to unlock them. What am I?

Ransomware

200

This cyber attack exploited a vulnerability in Microsoft Windows, causing widespread disruptions across the globe in 2017. What was the name of this ransomware attack? 

WannaCry

EternalBlue

BlueKeep

WannaCry

300

Which of the following is a real threat actor name:

The Social Mimics

Lizard Squad

Ronin

Lizard Squad

Lizard Squad has claimed responsibility for launching a string of DDoS attacks against high-profile game-related services 

300

Secure or Not Secure: 

I don't like pineapple on pizza mate


Secure

300

If you see an email with a potentially suspicious link in it. How can you determine if the link directs you to a legitimate site?

  • Hover over the link to see the real destination URL 
  • Copy & paste the link
300

I appear to be a harmless program, but I actually hide malicious code that can steal your data or remotely access your computer. What am I?

Remote Access Trojan

300

This series of cyber attacks, named after a famous board game, targeted critical infrastructure in Iran, including a nuclear facility. What was the name of this cyber attack campaign?

Monopoly Maneuvers

Chess Checkmate 

Stuxnet

Stuxnet