Code Red Scenario: Web Hosting Company Crisis

Code Red Scenario: Web Hosting Company Crisis

Frontier Hosting: Web hosting company, 500 employees, hosting 50,000+ websites
Worm • Code Red
STAKES
Client website availability + Business reputation + Internet infrastructure stability
HOOK
Frontier Hosting is managing peak summer traffic for their e-commerce clients when their operations center detects hundreds of client websites displaying defacement messages instead of normal content. Network monitoring reveals the IIS servers are generating massive outbound scanning traffic – the company’s infrastructure has been compromised and is now participating in coordinated internet attacks against other infrastructure targets.
PRESSURE
  • Summer e-commerce peak season — client website downtime causes immediate revenue loss + Reputation damage threatens business survival
FRONT • 90 minutes • Intermediate
Frontier Hosting: Web hosting company, 500 employees, hosting 50,000+ websites
Worm • Code Red
NPCs
  • Michael Torres (CEO): Managing 50,000+ client websites during peak season, watching servers get compromised in real-time, must balance immediate response with business continuity
  • Sandra Williams (Network Administrator): Discovering that IIS servers are scanning the entire internet for vulnerable targets, realizing the company's infrastructure is participating in global attacks
  • Karen Shah (Client Relations Manager): Fielding angry calls from e-commerce clients whose websites are defaced during peak sales season, must manage customer retention during security crisis
  • David Thompson (Security Engineer): Analyzing the buffer overflow exploit targeting IIS servers, coordinating with ISPs and security community about internet-wide threat
SECRETS
  • Web hosting company delayed IIS security patches to avoid disrupting client websites during peak season
  • Hundreds of client websites share vulnerable server infrastructure with minimal security segmentation
  • Infected servers are now attacking other institutions

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Code Red Web Hosting Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Code Red Web Hosting Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support

Scenario Details for IMs

Hook

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Client websites displaying identical defacement messages instead of normal content”
  • “IIS web servers generating massive amounts of outbound scanning traffic”
  • “Network bandwidth consumption spiking due to automated scanning activity”
  • “Multiple client websites affected simultaneously across different server clusters”

Key Discovery Paths:

Detective Investigation Leads:

  • Web server log analysis reveals buffer overflow exploitation targeting IIS vulnerability
  • File system examination shows memory-only infection with no persistent files created
  • Timeline analysis indicates rapid automated propagation across vulnerable server infrastructure

Protector System Analysis:

  • Real-time monitoring shows infected servers participating in coordinated internet scanning
  • Web server security assessment reveals unpatched IIS systems vulnerable to buffer overflow
  • Network traffic analysis indicates participation in distributed coordinated attack infrastructure

Tracker Network Investigation:

  • Internet traffic analysis reveals coordinated scanning patterns targeting global web server infrastructure
  • DNS and network flow data shows communication with other infected systems worldwide
  • Attack source analysis indicates automated worm propagation rather than targeted attacks

Communicator Stakeholder Interviews:

  • Client communications regarding website defacements and business impact during peak season
  • ISP coordination about malicious traffic originating from company infrastructure
  • Security community information sharing about internet-wide worm propagation

Mid-Scenario Pressure Points:

  • Hour 1: Major e-commerce client threatens contract termination due to website defacement during peak sales period
  • Hour 2: ISP contacts company about malicious scanning traffic violating terms of service
  • Hour 3: Security community reports company’s servers participating in coordinated DDoS attack preparation
  • Hour 4: News media reports widespread internet worm affecting web hosting providers

Evolution Triggers:

  • If response takes longer than 6 hours, infected servers participate in massive coordinated DDoS attack
  • If patch deployment is delayed, worm continues spreading to additional client websites
  • If network isolation fails, company infrastructure continues contributing to internet-wide attacks

Resolution Pathways:

Technical Success Indicators:

  • Emergency patch deployment stops worm propagation across server infrastructure
  • Network isolation prevents further participation in coordinated internet attacks
  • Server restart and patching removes memory-only infection while maintaining client services

Business Success Indicators:

  • Client relationships maintained through rapid response and transparent communication
  • Business operations restored with minimal impact on hosting service availability
  • Company reputation protected through professional incident management and coordinated response

Learning Success Indicators:

  • Team understands internet-scale worm propagation and infrastructure targeting
  • Participants recognize shared responsibility for internet security and coordinated defense
  • Group demonstrates crisis management balancing business continuity with infrastructure security

Common IM Facilitation Challenges:

Success Metrics for Session:

Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish web hosting crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and internet infrastructure responsibility.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of web hosting cybersecurity challenges. Use the full set of NPCs to create realistic client service pressures. The two rounds allow Code Red to spread to more clients and begin coordinated attacks, raising stakes. Debrief can explore balance between business operations and internet security responsibility.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing client website availability, business reputation, internet infrastructure stability, and coordinated attack participation. The three rounds allow for full narrative arc including worm’s internet-scale propagation and DDoS attack coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate IIS updates causing unrelated client website issues). Make containment ambiguous, requiring players to justify client-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and web hosting security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Pre-Defined Response Options

Option A: Emergency IIS Patching & Internet Isolation

Option B: Prioritized Client Restoration & Service Focus

Option C: Mass Server Reboot & Infrastructure Coordination

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

Response Options:

  • Option A: Emergency Infrastructure Reboot - Immediately reboot all infected hosting servers to clear memory-only worm, restore client websites from backups, delay comprehensive patching until after peak season.
    • Pros: Fastest path to client website restoration; minimal e-commerce disruption; maintains client business continuity.
    • Cons: Doesn’t patch underlying IIS vulnerability; servers will be reinfected within hours; continues internet attack participation risk.
    • Type Effectiveness: Partially effective – clears current infection but leaves reinfection vector open.
  • Option B: Tiered Client Patching - Patch hosting servers for high-revenue clients first (enterprise accounts), quarantine remaining infected infrastructure, restore services in revenue-prioritized order.
    • Pros: Protects highest-revenue relationships; balances security with business needs; enables controlled restoration.
    • Cons: Small business clients remain compromised; differential treatment damages platform trust; partial attack participation continues.
    • Type Effectiveness: Moderately effective – stops propagation in patched systems but worm remains active in others.
  • Option C: Platform Isolation & Emergency Hosting - Isolate entire hosting infrastructure from internet to stop attack participation, migrate critical clients to temporary clean servers, defer full remediation to post-peak season.
    • Pros: Stops company’s attack participation immediately; maintains service for critical clients; allows systematic patching.
    • Cons: Most clients experience downtime; emergency migration complex for websites; revenue impact during peak season.
    • Type Effectiveness: Moderately effective – contains threat but sacrifices revenue for security.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

Response Options:

  • Option A: Emergency Full Patching with Client Compensation - Deploy comprehensive IIS patching across entire hosting infrastructure, coordinate simultaneous client website restoration, offer service credits to affected clients, issue proactive data exposure notification.
    • Pros: Completely eliminates worm; demonstrates client partnership through compensation; meets regulatory requirements; protects long-term platform trust.
    • Cons: Brief downtime affects remaining peak season revenue; compensation is expensive; acknowledges infrastructure security failure.
    • Type Effectiveness: Super effective against Worm type – eliminates vulnerability and infection completely.
  • Option B: Peak Season Containment with Post-Season Remediation - Maintain current containment state through peak e-commerce period, implement enhanced monitoring, schedule comprehensive patching for after season ends.
    • Pros: Maximizes peak season revenue recovery; allows systematic thorough patching; minimizes immediate client disruption.
    • Cons: Extended vulnerability window; continued limited attack participation; delayed breach notification may violate regulations.
    • Type Effectiveness: Moderately effective – maintains containment but delays complete remediation.
  • Option C: Third-Party Infrastructure Support - Engage external hosting security consultants, implement parallel backup hosting for critical clients, conduct comprehensive forensic analysis of client data exposure while maintaining operations.
    • Pros: Expert assistance accelerates response; business continuity for major clients; thorough data exposure assessment.
    • Cons: Expensive external support during peak season; potential client data exposure to consultants; admission of insufficient internal capability.
    • Type Effectiveness: Moderately effective – improves response quality but extends timeline and increases cost.

Round Transition Narrative

Full Game Materials (120-140 min, 3 rounds)

NoteHow Full Game Differs from Lunch & Learn

The Full Game expands the scenario from 2 guided rounds to 3 open-ended rounds. Players drive their own investigation using the Key Discovery Paths above rather than receiving timed clues. Round 3 shifts from immediate crisis response to long-term strategic recovery. Rounds run 30-35 minutes each with more open-ended decision-making. Use the Resolution Pathways section to guide your assessment of team progress.

Round 1: Initial Web Hosting Worm Outbreak (30 min)

Round 1→2 Transition

Round 2: Client Revenue Crisis & Infrastructure Responsibility (35 min)

Round 2→3 Transition

Round 3: Long-Term Hosting Security & Client Recovery (35 min)

Victory Conditions

  • Worm eliminated across all hosting infrastructure with comprehensive server patching
  • Client website restoration completed with SLA compliance assessment
  • Internet community responsibility demonstrated through ISP and infrastructure coordination
  • Hosting infrastructure security architecture redesigned with client isolation

Debrief Focus (Full Game)

  • How shared infrastructure models (hosting, cloud, SaaS) create blast radius where a single vulnerability affects thousands of organizations
  • The tension between infrastructure cost efficiency (shared servers) and security isolation (dedicated environments)
  • Why hosting providers bear internet citizenship responsibilities beyond their client obligations
  • How ISP-level enforcement (null-routing, disconnection threats) creates external pressure that overrides internal remediation timelines
  • Long-term business model viability when security infrastructure investment fundamentally changes the economics of shared hosting

Advanced Challenge Materials (150-170 min, 3+ rounds)

Red Herrings & Misdirection

  • Legitimate traffic spike – summer e-commerce peak creates server performance patterns similar to worm scanning, delaying correct identification of malicious traffic
  • Client website errors – several clients recently deployed updates with bugs that cause display issues, creating confusion about which website problems are worm-related
  • Routine server maintenance – scheduled overnight server updates coincide with worm spread, initially masking the infection as planned activity
  • DDoS attack speculation – some clients assume a competitor is DDoS-attacking their websites, misdirecting from the worm’s autonomous propagation

Removed Resources & Constraints

  • No infrastructure segmentation – flat network architecture means there’s no way to isolate infected servers without affecting the entire client base
  • Backup restoration bottleneck – tape-based backup system restores one server at a time, creating a multi-day queue for all client websites
  • Night shift skeleton crew – attack detected during evening shift with minimal staff; full response team unavailable until morning
  • No client communication platform – bulk client notification system runs on the same infrastructure affected by the worm, preventing automated breach communication

Enhanced Pressure

Ethical Dilemmas

Advanced Debrief Topics

  • How shared infrastructure economics create systematic underinvestment in security isolation when cost savings are visible but security risks are invisible until exploitation
  • The ethics of service prioritization during infrastructure outages when all clients are affected but harm is distributed unequally
  • Why hosting provider internet citizenship obligations (stopping attacks from your infrastructure) can override client service obligations
  • How ISP-level enforcement mechanisms create external accountability for hosting security that market forces alone don’t provide
  • Balancing business model viability (shared hosting price points) against security architecture requirements (isolation, segmentation, monitoring)