Skip to main content
Akira Ransomware: Full Kill Chain IR operation cover
AdvancedSIEMXDRFirewallPRO

Akira Ransomware: Full Kill Chain IR

Step into the shoes of a Tier 3 SOC Analyst to investigate a high-impact ransomware intrusion by the Howling Scorpius group (Akira). This scenario covers the full lifecycle of a modern double-extortion attack, from initial VPN credential abuse and SEO poisoning to lateral movement, credential dumping, and final data exfiltration. You will need to correlate evidence across SIEM logs, XDR process trees, and Firewall traffic to reconstruct the timeline and identify the root cause of the breach.

1h 30m
10 tasks
850 points
Pro

Start this operation

Requires a Pro subscription.

View Pro Plans

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Tracing the External Infiltration Point

50

At 2025-08-01T09:14:56.565Z, a high-priority alert indicated a potential unauthorized access attempt targeting our internal file server. Analyze the network traffic logs to determine which external entity initiated the connection that bypassed the standard perimeter filters.

SOC{...}Hint available
2

Uncovering the Persistent Shadow: Malicious Artifact Identification

100

An unauthorized process execution was detected on corp-wks-42 at 2025-08-01T11:44:54.495Z, originating from a temporary directory. You must investigate the telemetry to find the unique cryptographic identifier of the file that was used to establish an initial foothold.

SOC{...}Hint available
3

Identifying C2 Communications from compromised workstation

50

Following a suspicious process execution on corp-wks-101, network logs indicate a potential data exfiltration attempt or beaconing behavior. Review the network telemetry to determine which external infrastructure the host was communicating with at the time of the alert.

SOC{...}Hint available
4

Tracing the Origin of Evidence

100

During the timeline reconstruction of the incident on dc-prod-01, an unusual execution was detected. To verify the integrity of our telemetry, we need to confirm which specialized logging agent reported this specific activity at 2025-08-01T09:20:06.485Z.

SOC{...}Hint available
5

Identifying the Ransomware Impact on File Servers

100

Around 2025-08-14T03:00:00Z, several automated alerts triggered indicating unauthorized data encryption on file-srv-01. You must investigate the XDR panel to determine which specific sub-technique or technique was mapped to this disruptive activity.

SOC{...}Hint available
6

Unusual Persistence Investigation on dc-prod-01

100

After gaining initial access, the adversary attempted to stabilize their connection to the domain controller. Using the firewall logs, determine which destination port was targeted during the suspicious inbound traffic spike from the unknown external source.

SOC{...}Hint available
7

Identifying Remote Network Beaconing Target

50

After the initial compromise on corp-wks-42, the attacker attempted to pivot deeper into the internal network. Analyze the endpoint logs from the morning of August 4th to determine which production asset was targeted during the lateral movement phase.

SOC{...}Hint available
8

Identifying Anomalous Network Persistence

100

An alert triggered for a suspicious outbound connection from a high-value domain controller. You must analyze the network telemetry to determine which local process initiated this traffic to ensure it is not a masquerading attempt or a malicious beacon.

SOC{...}Hint available
9

Mapping the Adversary Tactic

100

An alert was triggered on corp-wks-42 involving the itadm account. You need to determine the specific phase of the attack lifecycle that the adversary was attempting to execute when they interacted with the local security authority process.

SOC{...}Hint available
10

Tracing Persistence Mechanisms on corp-wks-101

100

A high-severity alert triggered on corp-wks-101 involving the user asmith. Investigation into the behavioral logs suggests a shell was used to modify registry keys for persistence; you must determine the exact initiating process name that spawned this activity.

SOC{...}Hint available

10 tasks · 850 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
Firewall log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Advanced

Complex multi-stage investigations. Realistic noise, ambiguous indicators, lateral movement.

Prerequisites

  • Basic understanding of security alerts
  • Experience with log analysis tools
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts
  • Familiarity with Firewall concepts

Ready to investigate?

This operation requires a Pro subscription.

View Pro Plans

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more