Cyberattack Impacting Digital's systems are locked. The attacker left no name — only clues.

In Cyberattack, you step into the role of a digital investigator, guided by White Hat, your trusted mission assistant. Your task? Reconstruct the attack, follow the traces, and expose who hacked the system — and how.

Solve real-world-inspired cybersecurity challenges, recover lost data, and uncover the final encrypted message that reveals the truth.

8 challenges. 1 hacker. Can you stop them before it’s too late?
🗔   Message from White Hat  
player@cyberattack:~$ ls
Documents/ Downloads/  message.txt
player@cyberattack:~$ cat message.txt

> Welcome, player.

> Impacting Digital has been hit by a sophisticated cyberattack.

> Systems are encrypted. Critical data is inaccessible. No one knows how the attacker got in — but there are clues, scattered across the network.

> That’s where you come in.

> You’ve been selected for your ability to think clearly, act fast, and see what others miss.

> Your mission:
> 1. Gain access to our secure systems.
> 2. Investigate internal communications for signs of compromise.
> 3. Uncover the first breach point and identify the method used.
> 4. Infiltrate a compromised device to extract key information.
> 5. Detect a second security flaw.
> 6. Recover and access critical data from company backups.
> 7. Locate the file that triggered the encryption lockdown.
> 8. Decrypt the final message and expose the group behind the attack.

> I’ll be assisting you from within the Intrusion Detection Center.
> We don’t have much time — the longer they’re inside, the worse it gets.

> Begin the investigation. Track the intrusion. Expose the truth.

> — White Hat


player@cyberattack:~$
Are you ready to help me?
Register now and complete the mission.
image