Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

OpenCTI 101 - APT29

PREMIUM

Threat Intel

easy

Identify threat actor TTPs and IOCs for APT29 by navigating and querying the OpenCTI threat intelligence platform.

Tusk Infostealer

Threat Intel

easy

Analyze threat intelligence and malware configuration to identify TTPs, extract IOCs, and track cryptocurrency flow of the Tusk Infostealer campaign.

Red Stealer

Threat Intel

easy

Analyze a suspicious executable using VirusTotal and MalwareBazaar to extract IOCs, identify C2 infrastructure, MITRE ATT&CK techniques, and privilege escalation mechanisms.

3CX Supply Chain

Threat Intel

easy

Reconstruct the 3CX supply chain attack by analyzing compromised MSI and DLL artifacts to identify TTPs and attribute the incident to a threat actor.

IcedID

Threat Intel

easy

Investigate IcedID malware using VirusTotal and threat intelligence platforms to identify IOCs, associated threat actors, and execution mechanisms.

Oski

Threat Intel

easy

Analyze a sandbox report using Any.Run to identify Stealc malware behavior, extract configuration details, and map observed tactics to MITRE ATT&CK.

Yellow RAT

Threat Intel

easy

Analyze malware artifacts using threat intelligence platforms like VirusTotal to identify IOCs, C2 servers, and understand adversary tactics.

T1584.004

PREMIUM

Threat Intel

easy

Apply MISP to manage security events, create attributes, and integrate threat intelligence from data feeds.

T1583.002

PREMIUM

Threat Intel

easy

Analyze a malware campaign using MISP to identify communication patterns and extract key indicators of compromise (IOCs), including malware family and file hashes.

GrabThePhisher

Threat Intel

easy

Analyze a cryptocurrency phishing kit to identify exfiltration methods, extract critical IOCs, and gather threat actor intelligence using local logs and Telegram APIs.

Lespion

Threat Intel

easy

Investigate an insider threat by analyzing GitHub repositories for exposed credentials, using OSINT tools to correlate online accounts, and performing image analysis to identify locations.

RaaS Unfold - RansomHub

PREMIUMNew

Threat Intel

medium

A ransomware empire built on the ashes of its predecessors — trace its origins, expose its operators, and unfold its playbook.

MBuchus

PREMIUM

Threat Intel

medium

Utilize OSINT, VirusTotal, and crt.sh to analyze a multi-stage malvertising campaign, identifying initial access, malware payloads, and attacker infrastructure.

BRabbit

Threat Intel

medium

Reconstruct a Bad Rabbit ransomware attack chain by analyzing phishing, persistence, and MBR modification using dynamic analysis and MITRE ATT&CK.

PhishStrike

Threat Intel

medium

Analyze email headers and threat intelligence to identify phishing indicators, malware persistence, and C2 channels, extracting actionable IOCs.

Trickbot - WIZARD SPIDER

PREMIUM

Threat Intel

medium

Develop threat intelligence skills by analyzing malware behavior, identifying attack techniques, and uncovering command-and-control infrastructure.

Intel101

Threat Intel

medium

Apply open-source intelligence (OSINT) techniques using Whois, Wayback Machine, and Google Lens to investigate digital footprints and extract specific information.