LockBit Scenario: Transport and Shipping Crisis
Ransomware • LockBit
STAKES
Supply chain continuity + Cargo integrity + Crew and port safety + Contractual reliability
HOOK
Operations teams at Pacific Coast Logistics report vessel-scheduling consoles locking up, cargo-tracking dashboards failing across terminals, and dispatch workstations displaying extortion notes. Network telemetry shows abnormal outbound transfers from shipment-manifest repositories, while threat messages claim customer shipping records and route-planning data were copied and will be released.
PRESSURE
- Deadline for stabilized operations: Friday 6:00 PM
- Cargo units at risk: 11,500
- Active fleet exposure: 50 vessels
- Extortion demand: $6.5 million
FRONT • 120 minutes • Advanced
Ransomware • LockBit
NPCs
- Captain James Archer (CEO): Owns executive decisions on continuity, payment posture, and customer confidence
- Maria Santos (CTO): Leads containment and technical recovery sequencing
- Frank Morrison (Fleet Operations Director): Manages vessel movement and terminal workflow under disruption
- Jennifer Park (CISO): Coordinates evidence handling, reporting, and cyber-authority engagement
SECRETS
- Security hardening on legacy terminal systems was deferred to avoid operational slowdowns
- Backup restoration testing for dispatch infrastructure was incomplete
- Attackers accessed route and manifest repositories before encryption
LockBit Scenario: Transport and Shipping Crisis
Ransomware • LockBit
STAKES
Supply chain continuity + Cargo integrity + Crew and port safety + Contractual reliability
HOOK
Operations teams at Fjord Maritime AS report vessel-scheduling consoles locking up, cargo-tracking dashboards failing across terminals, and dispatch workstations displaying extortion notes. Network telemetry shows abnormal outbound transfers from shipment-manifest repositories, while threat messages claim customer shipping records and route-planning data were copied and will be released.
PRESSURE
- Deadline for stabilized operations: Friday 18:00
- Cargo units at risk: 7,200
- Active fleet exposure: 35 vessels
- Extortion demand: NOK 58 million
FRONT • 120 minutes • Advanced
Ransomware • LockBit
NPCs
- Erik Johansen (Administrerende Direktor/CEO): Owns executive decisions on continuity, payment posture, and customer confidence
- Ingrid Larsen (CTO): Leads containment and technical recovery sequencing
- Olav Hansen (Flatedirektor/Fleet Director): Manages vessel movement and terminal workflow under disruption
- Astrid Eriksen (CISO): Coordinates evidence handling, reporting, and cyber-authority engagement
SECRETS
- Security hardening on legacy terminal systems was deferred to avoid operational slowdowns
- Backup restoration testing for dispatch infrastructure was incomplete
- Attackers accessed route and manifest repositories before encryption
Planning Resources
For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:
LockBit Global Logistics Planning Document
Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.
Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:
LockBit Transport/Shipping Scenario Slides
Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support
Scenario Details for IMs
Hook
“It is Monday at 7:45 AM during the peak pre-holiday shipping surge at Pacific Coast Logistics. Dispatch teams lose access to cargo-tracking and berth-allocation systems, and terminal supervisors report extortion notes spreading across operations consoles. Minutes later, leadership receives messages claiming shipment manifests and customer route data were copied out of the network. With 11,500 cargo units in transit, the company must stabilize operations before safety and contractual obligations collapse.”
“Initial disruption was logged at 7:45 AM, with stabilization required by Friday 6:00 PM.”
“Estimated exposure pace: $38 million in daily disruption and recovery pressure.”
“Operational scope: Shipping and logistics company with 1,200 employees and 50 vessels during peak pre-holiday shipping surge.”
“(Regional context: US maritime response.)”
“It is Monday at 07:45 during the winter North Sea freight surge at Fjord Maritime AS. Dispatch teams lose access to cargo-tracking and berth-allocation systems, and terminal supervisors report extortion notes spreading across operations consoles. Minutes later, leadership receives messages claiming shipment manifests and customer route data were copied out of the network. With 7,200 cargo units in transit, the company must stabilize operations before safety and contractual obligations collapse.”
“Initial disruption was logged at 07:45, with stabilization required by Friday 18:00.”
“Estimated exposure pace: NOK 320 million in daily disruption and recovery pressure.”
“Operational scope: Norwegian shipping company with 800 employees and 35 vessels operating North Sea and Atlantic routes during winter North Sea freight surge.”
“(Regional context: Norway maritime response.)”
Initial Symptoms to Present:
- “Dispatch and berth-allocation consoles display extortion notes and reject operator input”
- “Cargo-tracking dashboards fail across terminals, leaving shipment status uncertain”
- “Operations teams report manifest exports inaccessible for customs and handoff workflows”
- “Threat messages claim copied shipping records will be released unless payment is made”
Key Discovery Paths:
Detective Investigation Leads:
- Timeline analysis shows staged privilege escalation before encryption
- Access logs indicate targeted collection of manifest and route-planning datasets
- Initial vector traces to compromised credentials used in operations support workflows
Protector System Analysis:
- Dispatch, scheduling, and cargo-tracking systems are encrypted across multiple hubs
- Recovery confidence is reduced by incomplete validation of backup integrity
- Segmentation gaps allowed spread from administrative systems into operational tooling
Tracker Network Investigation:
- Exfiltration telemetry confirms outbound transfers from manifest and routing repositories
- External infrastructure patterns align with organized double-extortion operations
- Lateral movement indicates deliberate targeting of high-impact maritime workflows
Communicator Stakeholder Interviews:
- Customers request immediate guidance on cargo delays and documentation integrity
- Terminal leaders need safe-operating guidance while digital systems remain degraded
- Legal and commercial teams require a clear disclosure and contractual-response sequence
Mid-Scenario Pressure Points:
- Hour 1: Vessel sequencing fails at multiple terminals and backlog grows rapidly
- Hour 2: Threat actors publish sample manifest records to prove exfiltration
- Hour 3: Key customers request formal assurance on cargo-location integrity
- Hour 4: Port safety teams warn that degraded digital support raises operational risk
Evolution Triggers:
- If containment is delayed, additional terminal systems lose visibility and control functions
- If recovery starts without validation, compromised systems may re-enter production
- If communication lags, customer trust and contractual flexibility decline sharply
Resolution Pathways:
Technical Success Indicators:
- Verified clean recovery path for dispatch, manifest, and tracking infrastructure
- Evidence package preserved for authority and investigative coordination
- Safe interim operating procedures established for high-priority routes
Business Success Indicators:
- Customer commitments are reprioritized using transparent, risk-based criteria
- Safety and compliance obligations remain intact while systems recover
- Leadership preserves confidence through timely and factual status updates
Learning Success Indicators:
- Team recognizes how ransomware pressure amplifies in maritime logistics networks
- Participants practice balancing operational urgency with evidence discipline
- Group coordinates technical, operational, and executive decisions under deadline pressure
Common IM Facilitation Challenges:
If Safety Is Treated as Secondary:
“Which operations continue safely right now, and which must pause until tracking and manifest integrity are verified?”
If Customer Communication Is Delayed:
“What minimum evidence threshold lets you issue credible route and delay guidance by end of day?”
If Reporting Is Deferred:
“State authorities request incident status and ask when affected customers will be notified of potential shipping-data exposure under privacy and commercial reporting obligations.”
“Datatilsynet requests incident status and asks when affected customers and staff will be notified of potential personal-data exposure under GDPR timelines.”
Success Metrics for Session:
Template Compatibility
This scenario adapts to multiple session formats with appropriate scope and timing:
Quick Demo (35-40 minutes)
Structure: 2 investigation rounds, 1 decision round
Focus: Core dispatch disruption and exfiltration discovery
Key Actions: Protect safe operations, scope data exposure, issue first customer status posture
Lunch & Learn (75-90 minutes)
Structure: 4 investigation rounds, 2 decision rounds
Focus: Parallel containment, route prioritization, and disclosure sequencing
Key Actions: Build incident timeline, validate recovery path, align operational and legal messaging
Full Game (120-140 minutes)
Structure: 6 investigation rounds, 3 decision rounds
Focus: End-to-end maritime ransomware response under active shipping pressure
Key Actions: Coordinate leadership and fleet operations, make payment/disclosure calls, define durable remediation
Advanced Challenge (150-170 minutes)
Structure: 7-8 investigation rounds, 4 decision rounds
Expert Elements: Multi-jurisdiction constraints, contractual disputes, and safety-governance conflicts
Additional Challenges: Uncertain backup trust, cascading route delays, and rising commercial pressure
This Norwegian variation can be adapted to other EU/EEA countries during facilitation. Most countries in this sector share GDPR-aligned notification expectations but differ in maritime and cyber institutions.
When adapting this scenario, substitute these elements:
| Denmark |
Datatilsynet |
CFCS |
Sofartsstyrelsen |
DNV / class society coordination |
| France |
CNIL |
ANSSI |
Affaires Maritimes |
Bureau Veritas and port-state controls |
| Germany |
BfDI + state DPAs |
BSI |
BSH |
Class and insurer evidence requirements |
| Netherlands |
Autoriteit Persoonsgegevens |
NCSC-NL |
ILT |
Port of Rotterdam logistics interdependency |
| Sweden |
IMY |
CERT-SE |
Transportstyrelsen |
Nordic route and ferry-operations overlap |
Notes:
- EEA nuance: Norway is not an EU member but follows GDPR-equivalent obligations through the EEA framework.
- Maritime governance: Port-state and flag-state obligations may require additional coordination during incident response.
- Sector realism: Classification society expectations can materially shape recovery approval for vessel operations.
Organization names and NPC names can be localized by the IM to fit the selected country.
Quick Demo Materials (35-40 min)
Guided Investigation Clues
- Clue 1 (Minute 5): Security operations at Pacific Coast Logistics confirms encryption across dispatch and tracking systems with a demand of $6.5 million.
- Clue 2 (Minute 10): Investigators confirm exfiltration activity from manifest repositories and route-planning systems.
- Clue 3 (Minute 15): Fleet Operations Director Frank Morrison confirms that vessel-stow plans and hazardous-cargo handling instructions are inaccessible, increasing operational safety risk.
- Clue 1 (Minute 5): Security operations at Fjord Maritime AS confirms encryption across dispatch and tracking systems with a demand of NOK 58 million.
- Clue 2 (Minute 10): Investigators confirm exfiltration activity from manifest repositories and route-planning systems.
- Clue 3 (Minute 15): Flatedirektor Olav Hansen confirms that vessel-stow plans and hazardous-cargo handling instructions are inaccessible, increasing operational safety risk.
Pre-Defined Response Options
Option A: Safety-First Recovery Without Payment
- Action: Isolate affected systems, activate safe interim maritime operations, restore from validated backups, and notify stakeholders promptly.
- Pros: Preserves safety governance and reduces dependence on attacker promises.
- Cons: Short-term throughput reduction and contract pressure may increase.
- Type Effectiveness: Super effective for durable operational recovery.
Option B: Payment-Centered Acceleration
- Action: Prioritize payment negotiation to seek rapid decryption while delaying broader disclosure.
- Pros: May shorten outage duration if decryption succeeds.
- Cons: No guarantee on deletion or decryption quality, with high legal and trust risk.
- Type Effectiveness: Partially effective and strategically unstable.
Option C: Evidence-First Phased Recovery
- Action: Preserve forensic evidence, sequence route restoration by criticality, and communicate after initial scope confidence.
- Pros: Improves legal and contractual defensibility of decisions.
- Cons: Delay risk for lower-priority lanes and customer commitments.
- Type Effectiveness: Moderately effective when execution discipline is strong.
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Dispatch Failure and Route Risk (30-35 min)
Investigation Clues:
- Clue 1 (Minute 5): Encryption disrupts dispatch, scheduling, and cargo-tracking workflows.
- Clue 2 (Minute 10): Forensics identify exfiltration of manifests and route data before encryption.
- Clue 3 (Minute 15): Fleet Operations Director Frank Morrison confirms that vessel-stow plans and hazardous-cargo handling instructions are inaccessible, increasing operational safety risk.
- Clue 3 (Minute 15): Flatedirektor Olav Hansen confirms that vessel-stow plans and hazardous-cargo handling instructions are inaccessible, increasing operational safety risk.
- Clue 4 (Minute 20): Threat messages include sample records to increase pressure.
Round 2: Reporting and Commercial Decisions (30-35 min)
Investigation Clues:
- Clue 5 (Minute 30): Leadership receives escalating customer demands for route-status assurance.
- Clue 6 (Minute 40): State authorities request incident status and ask when affected customers will be notified of potential shipping-data exposure under privacy and commercial reporting obligations.
- Clue 6 (Minute 40): Datatilsynet requests incident status and asks when affected customers and staff will be notified of potential personal-data exposure under GDPR timelines.
- Clue 7 (Minute 50): Legal and commercial teams request defensible communication thresholds.
- Clue 8 (Minute 55): Operations leaders request priority lane sequencing for recovery.
Round Transition Narrative
After Round 1 -> Round 2:
“FBI and Coast Guard Cyber report recent maritime incidents where stolen manifests were used to pressure operators into rushed payment decisions.”
“NSM/NorCERT cites the Norsk Hydro 2019 ransomware response as a reminder that maritime and industrial operators can sustain major losses if recovery discipline slips.”
Facilitation questions:
- “What minimum evidence is required before asserting cargo-status confidence to customers?”
- “Which decision must be made now rather than deferred for full certainty?”
- “How do you preserve safety and credibility while communicating uncertainty?”
Debrief Focus:
- Integrating maritime safety constraints into incident-command decision-making
- Balancing route continuity with legal and contractual obligations
- Maintaining trust when technical confidence evolves across recovery phases
Full Game Materials (120-140 min, 3 rounds)
The Full Game expands from 2 guided rounds to 3 open-ended rounds. Players drive their own investigation using the Key Discovery Paths above rather than timed clues. Round 3 focuses on institutional recovery and maritime-governance redesign.
Round 1: Executive Briefing and Scope Discovery (35-40 min)
CEO Captain James Archer convenes an emergency bridge call and states that vessel movements cannot remain unmanaged through the day. CTO Maria Santos confirms encryption across scheduling, manifest, and dispatch systems. Fleet Operations Director Frank Morrison reports berth sequencing failures at multiple terminals. CISO Jennifer Park requests immediate containment and evidence preservation for FBI and Coast Guard Cyber coordination.
Administrerende Direktor Erik Johansen convenes an emergency bridge call and states that vessel movements cannot remain unmanaged through the day. CTO Ingrid Larsen confirms encryption across scheduling, manifest, and dispatch systems. Flatedirektor Olav Hansen reports berth sequencing failures at multiple terminals. CISO Astrid Eriksen requests immediate containment and evidence preservation for NSM/NorCERT and Kripos coordination, with regulatory alignment to Datatilsynet.
Players investigate openly using role capabilities. Early findings include targeted exfiltration, dispatch encryption, and expanding route risk.
If team stalls: “You can prioritize speed or confidence first. Which path is defensible to customers, crews, and authorities by end of day?”
Round 2: Regulatory Coordination and Deadline Decisions (35-40 min)
- Technical teams complete artifact collection and present route-restoration options with uncertainty bounds.
- Leadership requests a clear recommendation for disclosure timing and operational posture.
- Coordination now spans MTSA and state privacy laws, State attorney general and port authority, FBI and Coast Guard Cyber, US Coast Guard, and ABS stakeholders.
- Coordination now spans GDPR and maritime-sector reporting obligations, Datatilsynet and maritime authorities, NSM/NorCERT and Kripos, Sjofartsdirektoratet, and DNV stakeholders.
Facilitation questions:
- “What controls must be in place before resuming full-volume terminal operations?”
- “How will you document rationale so later review supports your decisions?”
Round 3: Institutional Recovery and Sector Resilience (40-45 min)
Opening: Two weeks later, immediate containment is complete and leadership requests a 90-day remediation roadmap with measurable safety, security, and continuity outcomes.
Pressure events:
- Strategic customers request proof of sustained control improvements
- Insurers and auditors request owner-assigned milestones with measurable risk reduction
- Operations teams request controls that preserve throughput without compromising safety
Victory conditions for full 3-round arc:
- Verified clean baseline for dispatch, manifest, and tracking systems
- Defensible reporting package for authorities, customers, and insurers
- Durable maritime-security controls aligned to operational reality
Debrief Questions
- “Which early indicator most clearly signaled coordinated extortion leverage rather than isolated outage?”
- “How did shipping deadline pressure alter risk tolerance across executive and operations teams?”
- “What evidence was essential for credibility with authorities and major customers?”
- “How can maritime operators strengthen readiness without sacrificing operational efficiency?”
Debrief Focus
- Maritime ransomware incidents combine commercial pressure with safety-critical operational risk
- Defensible response requires synchronized technical, operational, and governance decisions
- Long-term resilience depends on tested recovery, segmentation, and transparent accountability
Advanced Challenge Materials (150-170 min)
Red Herrings and Misdirection
- Routine terminal-maintenance changes overlap with attacker activity and complicate timeline analysis.
- A weather-driven delay appears cyber-related but is operationally independent.
- A rumored insider compromise diverts focus from high-confidence forensic evidence.
Removed Resources and Constraints
- No prebuilt playbook for simultaneous multi-terminal ransomware response
- Backup inventory and restoration runbooks are incomplete across regions
- Emergency procurement for tooling is constrained by governance and approval windows
Enhanced Pressure
- Customers demand same-day confidence statements on cargo integrity and delays
- Port partners request immediate detail before full forensic scope is established
- Executive leadership requires written rationale for every high-impact decision
Ethical Dilemmas
- Delay selected routes for stronger evidence confidence, or restore faster with higher residual risk.
- Issue broad notifications early, or wait for cleaner scope and risk under-reporting.
- Preserve full forensic integrity, or accelerate operational recovery at attribution cost.
Advanced Debrief Topics
- Building maritime doctrine for ransomware plus data-extortion incidents
- Structuring governance when commercial urgency and technical certainty diverge
- Sustaining security investment in safety-critical transport operations