Briefing
Greetings, Special Agent.
It has come to our attention that one of our subsidiaries, crucial for reconnaissance operations, has fallen victim to a ransomware attack. This incident has disrupted our ongoing mission in the Riviera region. Although the impact on our overall operations is minimal, we require your expertise to investigate this breach and ensure the security of our digital infrastructure. Your mission, should you choose to accept it, is to conduct a thorough investigation into the ransomware attack.
You will need to identify the threat actor behind this attack, assess the extent of the damage, and determine how much sensitive data has been compromised. It is imperative that you trace the origin of the attack but also maintain Operational Security as you may become a target yourself. To aid in your investigation, you will be provided with minimal details regarding the cyber attack. Our Hacker Dimitri will be available to assist you as needed. Once you have gathered sufficient information and have a clear understanding of the situation, you are to provide a detailed report of your findings back to the Tiberian Order.
Time is of the essence in this matter, as we cannot afford any further disruptions to our operations. We have complete faith in your abilities to handle this situation with the utmost professionalism and discretion.
As always, Special Agent. The Contract is yours, if you choose to accept.
Materials
The words below are clues to the answer, all information is available via public domain.
Monaco 2023
Ransomware
Answer Instruction
Answer format: company-name-threat-actor-data-amount-exfiltrated
GB at the end of the amount-exfiltrated not required
Flagfile
Be advised, the flagfile is an encrypted ZIP. Make sure your OS supports the ZIP format. Ensure the password contains no hidden characters or formatting, paste in Notepad first if the password doesn’t seem to work.
PS: Don’t forget to claim your Coins and XP, by posting your card in the #card-brag channel in Discord.
Official Write-up
Provided here is the official write-up, it does contain the answer. Use this if you’re stuck, or want to verify if you got the answer correct.
โ ๏ธ SPOILER: Official Write-up
Caged Princess
In this challenge, codenamed “Caged Princess,” you must investigate a ransomware attack on a subsidiary company involved in reconnaissance operations in the Riviera region. The mission requires identifying the threat actor, determining the extent of compromised data, and reporting findings back to SERPENT HQ.
Available Materials
- Location context (Riviera region, Monaco)
- Time period (2023)
- Reference to ransomware attack
- Connection to “Monaco Technologies”
Solution Path
Step 1: Investigation Parameters
Key elements to investigate:
- Monaco Technologies as the target
- 2023 timeframe
- Ransomware incidents in the region
- Public breach notifications
Step 2: Required Information
You need to identify:
- Company name: Monaco Technologies
- Threat actor: LockBit 3.0
- Data amount: 23.7 TB
Step 3: Answer Format
The answer must be formatted as:
company-name-threat-actor-data-amount-exfiltrated
Correct format:
monaco-technologies-lockbit3.0-23.7
Formatting Requirements
- All lowercase
- Hyphens between elements
- No spaces
- Exact spelling of “lockbit3.0”
- Precise data amount (23.7)
Research Approach
- Search cyber security incident databases
- Monitor ransomware tracking sites
- Review 2023 Monaco cyber incidents
- Cross-reference LockBit 3.0 activities
- Verify data exfiltration claims
Common Pitfalls to Avoid
- Wrong case (must be lowercase)
- Missing or extra hyphens
- Incorrect company name format
- Wrong spacing
- Misspelling “lockbit3.0”
- Wrong data amount format
OPSEC Guidelines
As mentioned in the briefing:
- Maintain operational security
- Use secure research methods
- Avoid direct threat actor contact
- Practice safe dark web access
- Keep research activities anonymous
Verification Steps
Confirm:
- Correct company name
- Proper threat actor identification
- Accurate data amount
- Proper formatting
- All hyphens in place
The “Caged Princess” name likely refers to the captured/encrypted state of the company’s data, emphasizing the importance of your investigation into this security breach.
Creator: Vance Poitier