Noodle RAT Scenario: Aerospace Engineering Espionage
APT Espionage • NoodleRAT
STAKES
Defense technology protection + Program delivery integrity + Export-control compliance + Strategic advantage
HOOK
Engineering teams at Vanguard Aerospace report design workstations slowing unpredictably, credential prompts appearing during routine CAD sessions, and encrypted outbound sessions from classified design environments. Security scans show no malicious files on disk, but memory telemetry indicates unauthorized process injection tied to sensitive aerospace projects.
PRESSURE
- Program delivery target: Friday 4:00 PM
- Contract exposure: $420 million
- Engineering scope at risk: next-generation avionics and mission-control software
FRONT • 150 minutes • Expert
APT Espionage • NoodleRAT
NPCs
- Colonel (ret.) James Archer (CEO): Owns executive decisions on program continuity and stakeholder confidence
- Dr. Helen Park (CTO): Leads technical containment and recovery planning
- Dr. Amanda Rodriguez (VP Engineering): Represents design-team delivery risk and engineering impact
- Marcus Chen (CISO): Coordinates evidence preservation and authority engagement
SECRETS
- Security monitoring focused on disk-based indicators and underweighted memory telemetry
- Privileged engineering accounts had broader access than current program segmentation required
- Attackers prioritized design-repository visibility before broad operational disruption
Noodle RAT Scenario: Aerospace Engineering Espionage
APT Espionage • NoodleRAT
STAKES
Defense technology protection + Program delivery integrity + Export-control compliance + Strategic advantage
HOOK
Engineering teams at Aeronautique Etoile report design workstations slowing unpredictably, credential prompts appearing during routine CAD sessions, and encrypted outbound sessions from restricted design environments. Security scans show no malicious files on disk, but memory telemetry indicates unauthorized process injection tied to sensitive aerospace projects.
PRESSURE
- Program delivery target: Friday 16:00
- Contract exposure: EUR 360 million
- Engineering scope at risk: advanced avionics and mission-systems integration
FRONT • 150 minutes • Expert
APT Espionage • NoodleRAT
NPCs
- Jean-Pierre Moreau (President-Directeur General): Owns executive decisions on program continuity and stakeholder confidence
- Dr. Sophie Lambert (Directrice Technique): Leads technical containment and recovery planning
- Dr. Camille Durand (VP Ingenierie): Represents design-team delivery risk and engineering impact
- Antoine Lefebvre (RSSI): Coordinates evidence preservation and authority engagement
SECRETS
- Security monitoring focused on disk-based indicators and underweighted memory telemetry
- Privileged engineering accounts had broader access than current program segmentation required
- Attackers prioritized design-repository visibility before broad operational disruption
Planning Resources
For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:
Noodle RAT Aerospace Engineering Planning Document
Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.
Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:
Noodle RAT Aerospace Engineering Scenario Slides
Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support
Scenario Details for IMs
Hook
“It is Tuesday at 8:10 AM at Vanguard Aerospace. Engineers preparing final design reviews for next-generation avionics projects report abnormal workstation behavior, repeated authentication prompts, and intermittent lockouts in secure collaboration tools. Security teams confirm suspicious outbound traffic from engineering enclaves while disk scans remain clean. Leadership must decide how to contain a likely covert surveillance operation without derailing high-value defense milestones.”
“Initial anomalies were logged at 8:10 AM, with delivery commitments due by Friday 4:00 PM.”
“Operational scope: Aerospace engineering company with 3,000 employees supporting defense and commercial aviation focused on next-generation avionics and mission-control software.”
“(Regional context: US aerospace response.)”
“It is Tuesday at 08:10 at Aeronautique Etoile. Engineers preparing final design reviews for advanced avionics projects report abnormal workstation behavior, repeated authentication prompts, and intermittent lockouts in secure collaboration tools. Security teams confirm suspicious outbound traffic from engineering enclaves while disk scans remain clean. Leadership must decide how to contain a likely covert surveillance operation without derailing high-value aerospace milestones.”
“Initial anomalies were logged at 08:10, with delivery commitments due by Friday 16:00.”
“Operational scope: French aerospace engineering company with 2,500 employees supplying Airbus and defense avionics focused on advanced avionics and mission-systems integration.”
“(Regional context: France aerospace response.)”
Initial Symptoms to Present:
- “Engineering systems show unexplained slowdown and intermittent access conflicts”
- “Security scans find no malicious files despite continued suspicious activity”
- “Restricted design repositories generate abnormal authentication and access events”
- “Outbound encrypted sessions appear from engineering enclaves at unusual intervals”
Key Discovery Paths:
Detective Investigation Leads:
- Timeline reconstruction shows covert access behavior preceding visible disruption
- Access traces indicate focused interest in avionics and integration design artifacts
- Evidence suggests attacker persistence optimized for low-noise surveillance
Protector System Analysis:
- Engineering endpoints show memory anomalies inconsistent with normal toolchains
- Segmentation controls slowed but did not prevent cross-workspace reconnaissance
- Recovery confidence depends on preserving volatile evidence before reset actions
Tracker Network Investigation:
- Network forensics show periodic encrypted beacons from engineering systems
- Traffic patterns indicate staged exfiltration from high-value design repositories
- Infrastructure overlap suggests organized espionage tradecraft rather than opportunistic crime
Communicator Stakeholder Interviews:
- Program teams need clear guidance on what work can continue safely
- Contract stakeholders request immediate confidence statements on deliverable integrity
- Security leadership needs alignment on disclosure thresholds and authority coordination
Mid-Scenario Pressure Points:
- Hour 1: Program management cannot confirm integrity of current design baselines
- Hour 2: Leadership receives indications that sensitive engineering artifacts were accessed
- Hour 3: Government and customer stakeholders request formal incident posture updates
- Hour 4: Delivery confidence declines as unresolved access scope expands
Evolution Triggers:
- If containment is delayed, covert access persists and collection scope grows
- If systems are reset too quickly, critical volatile evidence may be lost
- If communication is delayed, confidence in program governance deteriorates
Resolution Pathways:
Technical Success Indicators:
- Verified removal of covert access paths and restoration of trusted engineering baselines
- Evidence package preserved for authority and investigative coordination
- Monitoring strategy upgraded to detect low-noise persistence behaviors
Business Success Indicators:
- Program leadership issues defensible delivery decisions with documented rationale
- Stakeholder communication remains timely, accurate, and scoped to evidence confidence
- Contract risk is managed through clear governance and milestone reprioritization
Learning Success Indicators:
- Team recognizes covert-surveillance patterns that evade simple disk-based detection
- Participants practice balancing evidence preservation with operational urgency
- Group coordinates engineering, security, and leadership decisions under strategic pressure
Common IM Facilitation Challenges:
If Teams Rush to Reimage Systems:
“Which volatile artifacts are critical before reset actions, and who owns that decision?”
If Program Pressure Overrides Security Discipline:
“What evidence threshold is required before asserting delivery confidence to defense stakeholders?”
If Regulatory Coordination Is Delayed:
“Federal oversight contacts the firm and requests incident status, asking when customers and government stakeholders will be briefed on potential export-controlled data exposure under contractual obligations.”
“CNIL and program authorities request incident status and ask when clients and authorities will be notified of potential personal-data and engineering-data exposure under regulatory timelines.”
Success Metrics for Session:
Template Compatibility
This scenario adapts to multiple session formats with appropriate scope and timing:
Quick Demo (35-40 minutes)
Structure: 2 investigation rounds, 1 decision round
Focus: Core covert-access detection and immediate containment decisions
Key Actions: Scope exposure, preserve evidence, issue first delivery-confidence posture
Lunch & Learn (75-90 minutes)
Structure: 4 investigation rounds, 2 decision rounds
Focus: Parallel forensic triage, program governance, and disclosure sequencing
Key Actions: Build timeline confidence, protect high-value repositories, align stakeholder messaging
Full Game (120-140 minutes)
Structure: 6 investigation rounds, 3 decision rounds
Focus: End-to-end aerospace espionage response under strategic delivery pressure
Key Actions: Coordinate leadership and engineering, decide milestone posture, define durable remediation
Advanced Challenge (150-170 minutes)
Structure: 7-8 investigation rounds, 4 decision rounds
Expert Elements: Counterintelligence tension, delivery-governance conflict, and evidence-quality disputes
Additional Challenges: Ambiguous scope, contractual penalties, and escalating stakeholder scrutiny
This French variation can be adapted to other EU countries during facilitation. EU aerospace contexts share GDPR foundations, but defense and cyber institutions differ by country.
When adapting this scenario, substitute these elements:
| Germany |
BfDI + state DPAs |
BSI |
BAAINBw |
Defense aviation and manufacturing integration |
| Italy |
Garante Privacy |
ACN |
Segretariato Generale della Difesa |
Aerospace and defense consortium dependencies |
| Netherlands |
Autoriteit Persoonsgegevens |
NCSC-NL |
Defensie Materieel Organisatie |
High-value avionics and component supply chains |
| Spain |
AEPD |
INCIBE/CCN-CERT |
DGAM |
Dual-use aerospace programs and export controls |
| Sweden |
IMY |
CERT-SE |
FMV |
Advanced aerospace and defense R&D exposure |
Notes:
- Defense nuance: Program oversight structures differ significantly across EU members and affect disclosure sequence.
- Industrial reality: Supplier-tier exposure can expand quickly in aerospace ecosystems.
- Coordination model: National cyber agencies and defense authorities may require parallel reporting tracks.
Organization names and NPC names can be localized by the IM for the selected EU country.
Quick Demo Materials (35-40 min)
Guided Investigation Clues
- Clue 1 (Minute 5): Security operations at Vanguard Aerospace confirms covert activity in engineering environments with no disk-based malware artifacts.
- Clue 2 (Minute 10): Investigators identify unauthorized reads from repositories tied to next-generation avionics and mission-control software.
- Clue 3 (Minute 15): VP Engineering Dr. Amanda Rodriguez confirms unauthorized reads of avionics architecture files and simulation artifacts tied to active defense deliverables.
- Clue 1 (Minute 5): Security operations at Aeronautique Etoile confirms covert activity in engineering environments with no disk-based malware artifacts.
- Clue 2 (Minute 10): Investigators identify unauthorized reads from repositories tied to advanced avionics and mission-systems integration.
- Clue 3 (Minute 15): VP Ingenierie Dr. Camille Durand confirms unauthorized reads of avionics architecture files and simulation artifacts tied to active defense deliverables.
Pre-Defined Response Options
Option A: Evidence-Preserved Containment
- Action: Isolate high-risk systems, preserve volatile evidence, and execute staged recovery with authority coordination.
- Pros: Improves attribution confidence and long-term defensibility.
- Cons: Slower short-term recovery and immediate delivery pressure.
- Type Effectiveness: Super effective for sustained strategic resilience.
Option B: Delivery-First Continuity
- Action: Maintain broad operations while applying targeted controls to reduce disruption.
- Pros: Supports near-term milestone continuity.
- Cons: Higher risk of ongoing covert collection and uncertain exposure scope.
- Type Effectiveness: Partially effective with elevated strategic risk.
Option C: Phased Confidence Restoration
- Action: Prioritize critical design domains, restore in waves, and sequence disclosure as confidence improves.
- Pros: Balances operational urgency with evidence discipline.
- Cons: Extended ambiguity can strain stakeholder trust.
- Type Effectiveness: Moderately effective when governance remains disciplined.
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Covert Access Discovery (30-35 min)
Investigation Clues:
- Clue 1 (Minute 5): Engineering systems show persistent covert behavior without file-based indicators.
- Clue 2 (Minute 10): Forensics indicate sustained unauthorized visibility into protected design workflows.
- Clue 3 (Minute 15): VP Engineering Dr. Amanda Rodriguez confirms unauthorized reads of avionics architecture files and simulation artifacts tied to active defense deliverables.
- Clue 3 (Minute 15): VP Ingenierie Dr. Camille Durand confirms unauthorized reads of avionics architecture files and simulation artifacts tied to active defense deliverables.
- Clue 4 (Minute 20): Leadership requests immediate containment recommendation with delivery impact estimate.
Round 2: Reporting and Delivery Confidence (30-35 min)
Investigation Clues:
- Clue 5 (Minute 30): Stakeholders request formal confidence statements on program integrity.
- Clue 6 (Minute 40): Federal oversight contacts the firm and requests incident status, asking when customers and government stakeholders will be briefed on potential export-controlled data exposure under contractual obligations.
- Clue 6 (Minute 40): CNIL and program authorities request incident status and ask when clients and authorities will be notified of potential personal-data and engineering-data exposure under regulatory timelines.
- Clue 7 (Minute 50): Program teams request a clear go/no-go decision for near-term milestones.
- Clue 8 (Minute 55): Legal and security functions require documented rationale for disclosure choices.
Round Transition Narrative
After Round 1 -> Round 2:
“FBI Counterintelligence reports similar campaigns where covert surveillance of aerospace design teams continued for months before detection.”
“ANSSI highlights repeated targeting of French aerospace suppliers and warns that prolonged covert access materially increases strategic exposure.”
Facilitation questions:
- “What minimum evidence supports a credible delivery-confidence statement?”
- “Which decisions cannot wait for perfect forensic certainty?”
- “How do you communicate residual uncertainty without eroding trust?”
Debrief Focus:
- Integrating covert-threat forensics with aerospace governance decisions
- Balancing milestone pressure with evidence quality and regulatory obligations
- Preserving confidence when exposure scope evolves over time
Full Game Materials (120-140 min, 3 rounds)
The Full Game expands from 2 guided rounds to 3 open-ended rounds. Players drive their own investigation using the Key Discovery Paths above rather than timed clues. Round 3 focuses on institutional recovery and aerospace governance redesign.
Round 1: Executive Briefing and Scope Discovery (35-40 min)
CEO Colonel (ret.) James Archer convenes an emergency briefing and states that contractual milestones cannot slip without strategic consequences. CTO Dr. Helen Park confirms anomalous memory behavior across engineering systems supporting mission-critical programs. VP Engineering Dr. Amanda Rodriguez reports access irregularities in active design repositories. CISO Marcus Chen requests immediate containment with evidence preservation for FBI Counterintelligence and CISA coordination.
President-Directeur General Jean-Pierre Moreau convenes an emergency briefing and states that contractual milestones cannot slip without strategic consequences. Directrice Technique Dr. Sophie Lambert confirms anomalous memory behavior across engineering systems supporting active programs. VP Ingenierie Dr. Camille Durand reports access irregularities in protected design repositories. RSSI Antoine Lefebvre requests immediate containment with evidence preservation for ANSSI and DGSI coordination under DGA oversight requirements.
Players investigate openly using role capabilities. Early findings include covert repository access, uncertain scope, and rising delivery pressure.
If team stalls: “You can prioritize speed or confidence first. Which path remains defensible to engineering leaders and authorities by end of day?”
Round 2: Regulatory Coordination and Milestone Decisions (35-40 min)
- Technical teams complete artifact collection and present containment/recovery options.
- Leadership requests a clear recommendation for milestone posture and disclosure timing.
- Coordination now spans ITAR, DFARS, and FAA program obligations, Defense contract oversight and federal authorities, FBI Counterintelligence and CISA, and Department of Defense program offices stakeholders.
- Coordination now spans GDPR, CNIL obligations, and defense-program controls, CNIL and defense program supervision, ANSSI and DGSI, and DGA program oversight stakeholders.
Facilitation questions:
- “What controls must be in place before asserting engineering-baseline trust?”
- “How will you document rationale for decisions likely to face later review?”
Round 3: Institutional Recovery and Strategic Resilience (40-45 min)
Opening: Two weeks later, immediate containment is complete and leadership requests a 90-day remediation roadmap with owner-assigned milestones and measurable outcomes.
Pressure events:
- Program stakeholders request evidence of lasting control improvements
- Governance bodies request objective metrics tied to reduced surveillance risk
- Engineering leadership requests controls that preserve delivery capability
Victory conditions for full 3-round arc:
- Verified clean baseline for critical engineering and collaboration systems
- Defensible reporting package for regulators and program stakeholders
- Durable aerospace security controls aligned to operational constraints
Debrief Questions
- “Which early indicator most clearly signaled strategic surveillance rather than isolated technical noise?”
- “How did milestone pressure alter risk tolerance across teams?”
- “What evidence was essential for credibility with authorities and customers?”
- “How can aerospace organizations raise readiness without undermining delivery performance?”
Debrief Focus
- Aerospace espionage incidents combine strategic exposure with high-stakes program pressure
- Defensible response requires synchronized engineering, security, and governance decisions
- Long-term resilience depends on evidence discipline, segmentation, and transparent accountability
Advanced Challenge Materials (150-170 min)
Red Herrings and Misdirection
- A legitimate simulation-tool update overlaps with incident timing and distorts initial triage.
- A separate vendor outage appears related but is operationally independent.
- Internal rumor about intentional data leakage diverts attention from forensic evidence.
Removed Resources and Constraints
- No dedicated playbook for covert engineering-environment surveillance response
- Volatile evidence collection procedures are incomplete across teams
- Immediate external specialist support is delayed by contractual lead time
Enhanced Pressure
- Program leadership demands same-day confidence statements on milestone viability
- Customers request detailed updates before full forensic scope is confirmed
- Executive governance requires written rationale for every high-impact decision
Ethical Dilemmas
- Pause delivery for stronger evidence confidence, or continue with higher residual risk.
- Disclose broad uncertainty early, or wait for cleaner scope at trust risk.
- Preserve full forensic integrity, or accelerate operational restoration with attribution loss.
Advanced Debrief Topics
- Building aerospace doctrine for covert surveillance incidents
- Structuring governance when delivery urgency and technical certainty diverge
- Sustaining long-term security investment in high-pressure engineering environments