Debrief

Biotech R&D Espionage

The Game is Over.

The Learning Starts Now.

Meet Your Adversary

The correct response type: Patient and preservation-first.

Preserve evidence before eradicating – rushing to wipe destroys the forensic artifacts that attribution depends on.

Winnti
Sinicus Furtivus Winntiius (Asia-Pacific 2011)
Backdoor / Nation-State
⭐⭐⭐
Winnti
🔥 ABILITIES
🔥
Supply Chain Delivery
Distributes through legitimate software update mechanisms -- granting initial access without triggering endpoint defences
Signed Kernel Rootkit
Stolen code-signing certificates install a kernel-mode driver that survives reboots and bypasses antivirus (+3 persistence & evasion)
🔮
Passive Dormancy
Completely silent until activated by a specific magic packet -- evades behavioural detection indefinitely
💎 WEAKNESS
💎
Certificate Revocation
Revoking the stolen signing certificate invalidates the kernel driver's trust chain (-3 evasion)

Round by Round

“Let’s reconstruct what just happened – facts first, no analysis yet.”

  • Round 1: What was your first indicator something was wrong?
  • Round 2: What changed your understanding of the incident?
  • Rounds 3–4: What drove your final response decisions?

Your Role’s Perspective

1 minute silent: What did you see that other teams missed?

Then round-robin – 30–60 seconds each:

  • Alpha: What evidence was most and least useful?
  • Bravo: What containment step did you want that never happened?
  • Charlie: What external pressure affected the technical response?
  • IC: Where did you have enough to decide – and where did you hesitate?

Could This Happen Here?

“Could this happen to your organisation? What would be different – and what would be the same?”

Credential Revoked. Path Closed?

“The credential was revoked. Was the attack path closed? What second action was needed?”

What If CFCS Hadn’t Called?

“CFCS tipped you off. What if they hadn’t called? Would your own monitoring have caught this?”

Vendor Notification

“CaliSync’s build pipeline is still compromised. Other organisations are still receiving infected updates. When did you notify the vendor? Who owned that decision?”

Legacy Infrastructure

“HANSEN-SAP-01: 18 months overdue for decommission. No patches. No monitoring. Cloud access through a never-reviewed exception. How many systems like this exist in your organisation right now?”

Bridge to Your World

“Everything we discussed happened in the game. Now make it real.”

  • How does your organisation’s actual IR process compare to what we just practiced?
  • Which gaps from this scenario exist in your real environment right now?
  • If you had to brief your CISO on one insight from this session, what would it be?

Who Owns Fixing This?

After each question: “Who owns fixing this?”

Not “the security team.” Not “IT.” A name. A person. A date.

Your Commitment

Write it down. 2 minutes.

  • STOP – one thing you’ll stop doing
  • START – one thing you’ll start doing
  • CONTINUE – one thing that worked and you’ll keep

Then complete this sentence aloud: “When [situation], I will [specific action].”

Thank you for playing.

malwareandmonsters.com