CrowdStrike is a global cybersecurity leader with an advanced cloud-native platform that protects endpoints, cloud workloads, identities and data. This Cyber Threat Defender booster packs helps you explore the adversary universe and visualize a larger threat landscape. By studying attackers and their operations, you will learn about their capabilities and intentions.
The CrowdStrike booster packs features various threat adversaries, such as JACKAL, SCATTERED SPIDER and RECESS SPIDER. While countering Attack – Denial threats, such as a SYN Flood, you will also discover how malware analysts, along with cutting-edge AI software known as CrowdStrike Falcon Prevent and Falcon OverWatch, are proactively defending against cyber threats.
An adversary is sending connection requests that are never completing the “Handshake” with the host. This DoS attack causes open ports to become saturated, disrupting access for legitimate users.
Select a System or Server card that your opponent has in play. That target cannot gain any points while this card is in play. At the beginning of your turn before playing any cards, you may change the target to a different System or Server.
A critical error has occurred, resulting in data corruption within your opponent’s software. They’ve been forced to remove it or risk further damage.
Select a Malware or Software card that your opponent has in play. Discard the target along with this card at the end of the round.
SCATTERED SPIDER is an eCrime adversary who conducts targeted social-engineering campaigns primarily against firms specializing in customer relationship management and business-process outsourcing.
Select an opponent. That opponent loses 1 point each round until this card is discarded. While in play, you may play 1 Attack – Phishing or Social Engineering card that does not count toward your playable card limit. Discard this card after 2 rounds.
RECESS SPIDER is a “big game hunting” adversary that deploys PLAY ransomware to opportunistically encrypt victims across several sectors and geographical regions.
Remove 2 points from your opponent while this card is in play. If you have Ransomware in play, remove 3 points instead. Discard this card after 2 rounds.
PLAY Ransomware implements anti-analysis techniques, including call-stack obfuscation, opaque predicates, garbage code, dynamic API function pointer encryption, and user-mode API unhooking.
Select an Asset – System or Server that your opponent has in play; if RECESS SPIDER is in play, you may select an additional System or Server. The selected Assets receive no points while this card is in play. Remove 1 point per round while this card is in play. Discard this card after 2 rounds.
A Mini PC, also known as a small form factor PC, is a compact computer that generally offers the functionality of a desktop or laptop computer but in a smaller and more portable size. Mini PCs are designed to be energy-efficient and save space.
You gain 1 point each round.
Malware analysts meticulously examine malicious software to understand the nature of the threat. They investigate how malware infiltrates systems, the vulnerabilities it exploits, the actions taken, and its current or potential objectives.
You gain 1 point at the end of the round for each Malware card in your opponent’s discard pile, to a max of 4 points. Discard this card at the end of the round.
JACKAL groups – aka hacktivists – are individuals or groups of hackers that form to conduct attacks in support of ideological beliefs, or to protest a geopolitical issue. These attacks often include DDoS, website defacements and data leaks.
When played, search your deck for an Attack card and add it to your hand, then shuffle. Your opponent loses 1 point each round this card is in play and an additional point if you have another Attack – Denial in play. Discard this card after 2 rounds.
Phishing attacks often involve emails that appear to come from a trustworthy source; however, they are actually sent by malicious actors attempting to obtain information they shouldn’t have.
Select an opponent. That opponent loses 1 point per round.
Falcon Prevent is a next-gen antivirus that uses cutting-edge AI, advanced behavioral analysis with indicators of attack, and exploit mitigation to detect advanced and unknown threats.
While in play, this card counters and prevents Attack – Malware cards, including rootkits, from targeting you. Once during your turn, while this card is in play, you may select one Attack – Hack affecting you and discard it.
Global, 24/7 threat hunters proactively hunt hidden and advanced attacks throughout customer environments, rapidly alerting you to new malicious activity as soon as it’s uncovered.
Attach this card to a Defense – Software you have in play. While in play, all opponent’s Attack – Personnel and Adversaries will be discarded after 1 round of play.
An Insider Threat is someone who has authorized access and causes a negative impact to an organization either intentionally or unintentionally.
Remove a Personnel or a Defense – Software, excluding Attack – Personnel, that an opponent has in play. That opponent loses 2 points at the end of the round. Discard this card at the end of the round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.