ARCHIVED OPERATIONS

RECOLLECTIONS

Relive the most significant cyber events in history. Step into the shoes of the attackers, defenders, and analysts. Understand the strategy, the code, and the impact of legendary exploits.

Global Impact
Real-world scenarios
Multi-Perspective
Red, Blue, & Purple Team
Operation Olympic Games
Expert
2010

Operation Olympic Games

Target: Natanz Nuclear Facility

Relive the most sophisticated cyber-weapon in history. Infiltrate an air-gapped industrial network, manipulate SCADA systems, and sabotage uranium enrichment centrifuges while maintaining complete stealth.

Attack
Defend
Analyze
The Ransomware Outbreak
Intermediate
2017

The Ransomware Outbreak

Target: Global Enterprise Network

Unleash or defend against the EternalBlue exploit. Experience the rapid propagation of a wormable ransomware that crippled the NHS and organizations worldwide.

Attack
Defend
Analyze
Credit Bureau Breach
Beginner
2017

Credit Bureau Breach

Target: Equifax Web Portal

Exploit a known Apache Struts vulnerability to exfiltrate sensitive data of 147 million people.

Attack
Defend
Analyze
Supply Chain Compromise
Expert
2020

Supply Chain Compromise

Target: SolarWinds Orion Platform

The ultimate stealth attack. Inject malicious code into a trusted software update build pipeline.

Attack
Defend
Analyze
The Heartbleed Bug
Beginner
2014

The Heartbleed Bug

Target: OpenSSL Implementation

Exploit a buffer over-read vulnerability in the OpenSSL library. Leak memory contents without leaving a trace.

Attack
Defend
Analyze
Mirai Botnet
Intermediate
2016

Mirai Botnet

Target: IoT Devices

Assemble a massive botnet of insecure IoT devices using default credentials. Launch record-breaking DDoS attacks.

Attack
Defend
Analyze
NotPetya
Advanced
2017

NotPetya

Target: Global Shipping & Logistics

Analyze the most destructive cyberattack in history. A wiper malware that caused over $10 billion in damages.

Attack
Defend
Analyze
Colonial Pipeline Attack
Intermediate
2021

Colonial Pipeline Attack

Target: Critical Infrastructure

Investigate the ransomware attack that shut down the largest fuel pipeline in the U.S.

Attack
Defend
Analyze
Log4Shell
Beginner
2021

Log4Shell

Target: Java Logging Library

Scan and exploit the "Internet on Fire" vulnerability. A zero-day in Log4j allowed RCE on millions of servers.

Attack
Defend
Analyze
The Morris Worm
Advanced
1988

The Morris Worm

Target: The Early Internet (ARPANET)

Return to the dawn of cyber warfare. Analyze the first worm released on the Internet.

Attack
Defend
Analyze
Code Red
Beginner
2001

Code Red

Target: Microsoft IIS Web Servers

A legendary worm that infected 359,000 servers in less than 14 hours. It defaced websites with "HACKED BY CHINESE!" and launched attacks on the White House.

Attack
Defend
Analyze
ILOVEYOU
Beginner
2000

ILOVEYOU

Target: Email Users

The virus that broke the hearts of millions. A simple VBScript attached to an email with the subject "ILOVEYOU" caused billions in damages.

Attack
Defend
Analyze
Target Data Breach
Intermediate
2013

Target Data Breach

Target: Retail Giant POS

How a simple HVAC vendor compromise led to the theft of 40 million credit card numbers during the holiday shopping season.

Attack
Defend
Analyze
The Great Las Vegas Outage
Intermediate
2023

The Great Las Vegas Outage

Target: MGM Resorts International

Experience the modern face of cybercrime. A 10-minute phone call to a help desk dismantled a multi-billion dollar casino enterprise through "Vishing" and MFA fatigue.

Attack
Defend
Analyze
The SWIFT Heist
Advanced
2016

The SWIFT Heist

Target: Bangladesh Central Bank

A heist of cinematic proportions. Hackers infiltrated the bank's network, compromised the SWIFT terminal, and attempted to steal nearly $1 billion.

Attack
Defend
Analyze

More Archives Declassified Soon

Our intelligence team is constantly declassifying new operations.