Back to Floor
Attack Tactics • Room 1
Anatomy of an Attack
Not all attacks are created equal. Understanding the difference between a loud DDoS and a silent APT (Advanced Persistent Threat) changes how you investigate.
Attackers use distinct vectors like Phishing, Supply Chain compromises, and Credential Stuffing. Recognizing the initial vector is the first step in remediation.
Knowledge Check
Prove your understanding to clear the room (Rewards XP)
Drag items to their correct zone (or tap item then tap zone on mobile)
Ransomware
Botnet
APT
Phishing
Encrypts files for extortion
Network of hijacked devices
Stealthy, long-term espionage
Social engineering via email