

{"id":893,"date":"2022-03-12T08:53:21","date_gmt":"2022-03-12T13:53:21","guid":{"rendered":"https:\/\/sites.temple.edu\/socialengineering\/?page_id=893"},"modified":"2026-02-11T09:35:56","modified_gmt":"2026-02-11T14:35:56","slug":"2022-ransomware","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/socialengineering\/2022-ransomware\/","title":{"rendered":"2022 SE Event Theme: The CARE Lab is Hit with Ransomware"},"content":{"rendered":"<p>In 2021 there were 623.3 million recorded ransomware attacks globally, which was an alarming 105% surge over 2020 [<a href=\"https:\/\/www.sonicwall.com\/2022-cyber-threat-report\/?elqCampaignId=13998&amp;sfc=7013h000000MiQZAA0&amp;gclid=CjwKCAiAgbiQBhAHEiwAuQ6BkmbfNdHZWbIdJBPGBn4ut4T3yR5wDxM6JrGQbSMPEUk4O5ClyAmcVxoC7MsQAvD_BwE\" target=\"_blank\" rel=\"noopener\">1<\/a>]. Governments saw a 1,885% increase in ransomware attacks, and the health care industry faced a 755% increase in those attacks in 2021 [<a href=\"https:\/\/www.sonicwall.com\/2022-cyber-threat-report\/?elqCampaignId=13998&amp;sfc=7013h000000MiQZAA0&amp;gclid=CjwKCAiAgbiQBhAHEiwAuQ6BkmbfNdHZWbIdJBPGBn4ut4T3yR5wDxM6JrGQbSMPEUk4O5ClyAmcVxoC7MsQAvD_BwE\" target=\"_blank\" rel=\"noopener\">1<\/a>].<\/p>\n<p><span style=\"font-weight: 400\">Ransomware groups have been known to use OSINT (financial statements, etc.) to set the ransom amount even before they launch their attacks [Stage 1, <\/span><a href=\"https:\/\/krebsonsecurity.com\/2022\/03\/conti-ransomware-group-diaries-part-iii-weaponry\/\"><span style=\"font-weight: 400\">2<\/span><\/a><span style=\"font-weight: 400\">]. In fact, this amount is then demanded in the ransom note. It is also well known that many ransomware attacks use phishing emails as their initial attack vector [Stage 2, <\/span><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-these-are-the-two-most-common-ways-hackers-get-inside-your-network\/\"><span style=\"font-weight: 400\">3<\/span><\/a><span style=\"font-weight: 400\">]. If someone within the target\u2019s organization falls for the phishing email, then the target\u2019s systems are encrypted.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-894\" src=\"https:\/\/sites.temple.edu\/socialengineering\/files\/2026\/02\/RW_script.png\" alt=\"\" width=\"528\" height=\"125\" \/><\/p>\n<p><strong>THEME:<\/strong>\u00a0 <strong>\u201cThe CARE Lab has been hit with ransomware!&#8221;<\/strong>.<span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<p>The <a href=\"http:\/\/sites.temple.edu\/care\" target=\"_blank\" rel=\"noopener\">CARE Lab<\/a> is challenging full-time high school and college students (aged 14+) to gain first-hand cyberattack and cybersecurity experience by participating in a creative and unique social engineering event! <span style=\"text-decoration: underline\">NO TECHNICAL EXPERIENCE IS REQUIRED<\/span>.<\/p>\n<p>Students will play the role of both <b>the adversary (during the application) <\/b>and<b> the defender (during the live event).<\/b><\/p>\n<p><span style=\"font-weight: 400\"><strong>APPLICATION<\/strong><\/span><\/p>\n<p>We want to see your <i>offensive social engineering skills<\/i>. You will put on your adversarial hat and \u201ctarget\u201d the CARE Lab with an emulated ransomware attack.<\/p>\n<p>Your team\u2019s application should include a <strong>5-page (no more) formal report<\/strong> (proper headings, page numbers, etc.) with the following information<\/p>\n<ol>\n<li><b>Ransom amount (1 page)<\/b>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Show us your OSINT findings that help you determine the ransom amount an adversary would demand from the CARE Lab.<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<li style=\"font-weight: 400\"><b>Phishing email<\/b> <b>(2-3 pages)<\/b>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Show us your OSINT findings for the CARE Lab that you are using for your phishing pretext.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Show us your OSINT findings for who you are posing as (the sender of the email).<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Provide us with a phishing email (do not actually phish us!).<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Justify why you think this phishing email will work (thereby introducing ransomware into the CARE Lab\u2019s working environment).<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<li style=\"font-weight: 400\"><b>Ransom note (1 page)<\/b>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">What would your ransom note look like (provide an image or text of the actual note)? What components would it have?<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">The adversarial report should <strong>not be more than 5 pages (double-spaced) in length<\/strong>.<\/span><\/p>\n<p><strong>Note:<\/strong> Try your best with the report! We want to see your creativity and ability &#8211; this will help us plan accordingly.<\/p>\n<p><strong><span style=\"color: #ff0000\">Be sure to check the complete list of <a href=\"https:\/\/sites.temple.edu\/socialengineering\/information\/\" target=\"_blank\" rel=\"noopener\">application materials, eligibility criteria, and FAQs<\/a>.<\/span><\/strong><\/p>\n<p><i><span style=\"color: #ff0000\"><strong>Application deadline: Saturday, April 30, 2022 at 12 pm ET<\/strong>. Register your team here.<\/span><\/i><\/p>\n<p><strong>LIVE COMPETITION (virtual)<\/strong><\/p>\n<p>We want to see your <em>defensive social engineering skills<\/em>. Students will play the role of the defenders who are &#8220;hired&#8221; to help the &#8220;client&#8221; (the CARE Lab) manage the ransomware attack and provide them with a formal report. More details will be available to the <strong>selected teams during the virtual orientation session on Saturday, May 14th (this is not optional)<\/strong>.<\/p>\n<p><em><strong>Competition dates (virtual, these are not optional \u2013 please hold these dates on your calendar):<\/strong><\/em><\/p>\n<p>Graduate Level:\u00a0May 20, 21, 22 (9am-4pm ET)<br \/>\nUndergraduate Level:\u00a0June 3, 4, 5 (9am-4pm ET)<br \/>\nHigh school Level:\u00a0June 10, 11, 12 (9am-4pm ET)<\/p>\n<p><em><strong>Closing ceremonies (virtual): Wednesday, June 15, 3pm-4pm ET (this is not optional \u2013 please hold this date on your calendar)<\/strong><\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1078\" src=\"https:\/\/sites.temple.edu\/socialengineering\/files\/2026\/02\/Sponsor_Logos.png\" alt=\"\" width=\"759\" height=\"261\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2021 there were 623.3 million recorded ransomware attacks globally, which was an alarming 105% surge over 2020 [1]. Governments saw a 1,885% increase in&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/socialengineering\/2022-ransomware\/\">Continue reading<span class=\"screen-reader-text\">2022 SE Event Theme: The CARE Lab is Hit with Ransomware<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"footnotes":""},"class_list":["post-893","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/comments?post=893"}],"version-history":[{"count":2,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/893\/revisions"}],"predecessor-version":[{"id":2915,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/893\/revisions\/2915"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/media?parent=893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}