The Enchanted Scroll
Phishing Attack Leading to Network Compromise
A cunning enchantment disguised as a routine missive has ensnared one of your realm's trusted servants. The deception has breached your outer defences, granting dark forces a foothold within the fortress walls. As the scope of the infiltration becomes clear, the race begins to purge the corruption before the enemy plunders your treasury.
Compliance Frameworks
🛡️ Roles & Party Members
War Chief Required
Incident CommanderLeads the response team, makes containment and escalation decisions
Arcane Engineer Required
IT Operations LeadProvides technical context, assesses system impact, manages endpoint containment
Shadow Watcher Required
SOC AnalystAnalyses phishing artefacts, traces lateral movement, monitors for further compromise
Keeper of the Codex Required
Compliance / DPOAssesses data exposure, regulatory notification obligations under GDPR and FCA rules
Town Crier Optional
Communications LeadDrafts internal warnings to staff, manages external communications if required
Guild Master Optional
HR RepresentativeSupports affected staff, advises on conduct aspects if negligence is suspected
High Council Elder Optional
Senior ManagementProvides executive decision authority, approves client notifications
⚡ Inject Timeline
The Poisoned Missive — A Lure Takes Hold
T+0 MinutesIt is 09:15 UTC on a Monday morning. The IT Service Desk receives a call from a relationship manager in the Wealth Management division. They report unusual behaviour on their workstation after clickin...
The Spreading Blight — Lateral Movement Detected
T+20 MinutesThe SOC's investigation escalates. Endpoint Detection and Response (EDR) telemetry reveals that one of the compromised users — a senior relationship manager — had their workstation accessed remote...
The Reckoning — Containment and Recovery
T+35 MinutesTwelve hours into the incident, containment is underway but significant challenges remain. The threat actor has been ejected from the network, all compromised credentials have been rotated, and affect...
📋 Debrief Questions
Post-Battle Assessment
- Were email security controls adequate to detect and block the phishing campaign?
- Was the incident escalation pathway clear and timely?
- Were credential compromise procedures effective — including MFA enforcement and password rotation?
- How effective was internal communication to staff during the incident?
- Were regulatory notification obligations understood and met within required timelines?
- What improvements to phishing awareness training are needed?