On September 28, 2025, TechCorp's security team spotted odd activity on a workstation, a clear sign of a dangerous cyberattack spreading fast. Sneaky processes, secret network calls, and quick jumps to key servers ended with ransomware blocking critical files.
Welcome to the BlackSuitBreach lab! Step into the role of a top threat hunter and take down a smart attack that began with a phishing trick in a messaging app, used hidden evasion tricks, and led to ransomware chaos. Use Splunk logs and disk image artifacts to dig into the clues, track the attacker's path, and learn how to stop real threats.

Jump into BlackSuitBreach, feel the thrill of the hunt and build skills that make you a cyber hero!
To begin unraveling this attack, our first objective is to determine the platform used for the initial phishing delivery. In many compromises, the first foothold comes from a user interacting with a malicious link in a messaging app, which can lead t