The Crypt of Encrypted Shadows
Ransomware Attack on Core Banking Infrastructure
A devastating ransomware attack strikes the heart of your banking fortress. Encrypted shadows spread across your domain as a dark sorcerer demands tribute in cursed coin. Your realm's most guarded secrets — the portfolios of ultra-high-net-worth patrons — hang in the balance.
Compliance Frameworks
🛡️ Roles & Party Members
War Chief Required
Incident CommanderLeads the response team, makes containment and escalation decisions
Arcane Engineer Required
IT Operations LeadProvides technical context, assesses system impact, proposes containment actions
Shadow Watcher Required
SOC AnalystInterprets alerts, provides forensic indicators, monitors detection tooling
Keeper of the Codex Required
Compliance / DPOAssesses regulatory notification obligations, advises on breach classification
Loremaster Optional
Legal CounselAdvises on legal exposure, privilege, law enforcement engagement
Herald of the Realm Optional
Client RelationsManages client communication strategy, assesses reputational impact
High Council Elder Optional
Senior ManagementProvides executive-level decision authority, approves external communications
Town Crier Optional
Communications LeadDrafts holding statements, manages media and social media response
⚡ Inject Timeline
Initial Detection — The First Tremor
T+0 MinutesIt is 07:42 UTC on a Tuesday morning. The Security Operations Centre (SOC) receives a Priority 1 alert from the Endpoint Detection and Response (EDR) platform. Multiple workstations on the Private Cli...
Escalation and Scope Expansion — The Shadow Deepens
T+15 MinutesThe SOC has completed initial triage. The attack vector has been identified as a phishing email received by a senior relationship manager at 07:12 UTC. The email contained a macro-enabled Excel attach...
Client and Media Pressure — The Siege Tightens
T+30 MinutesA financial journalist from a national broadsheet has contacted the Communications team, stating they have received a tip-off about a cyber attack at the bank. They are requesting comment before a 14:...
Recovery Decisions — The Path to Restoration
T+45 MinutesThe containment team has successfully isolated all affected endpoints and halted lateral movement. The threat actor's C2 channel has been blocked at the perimeter firewall and DNS sinkhole. However, ...
📋 Debrief Questions
Post-Battle Assessment
- Was the ransomware detected and contained effectively?
- Were regulatory notification obligations understood and met?
- Was the ransom payment decision handled appropriately?
- Were client communications timely and effective?
- Were backup and recovery procedures adequate?
- What improvements should be made to prevent recurrence?