Vault Breach

30 Apr 2025 - joe

Vault Breach: The Inside Job

A Casino Heist-Themed Cybersecurity Tabletop Exercise - Part 2

Exercise Overview

Title: Vault Breach: The Inside Job
Duration: 4 hours (recommended)
Target Audience: Security Analysts, Fraud Investigators, IT Security Teams, Management
Difficulty: Intermediate to Advanced
Objective: Test your organization’s ability to detect and respond to insider threats targeting financial systems and sensitive data, with a focus on privileged user compromise.

Learning Objectives

  1. Evaluate team response to sophisticated insider threat scenarios
  2. Test detection capabilities for unusual privileged account behavior
  3. Assess coordination between security, IT, and management during internal investigations
  4. Practice sensitive internal threat containment without business disruption
  5. Identify gaps in monitoring and controls for high-privilege users

Exercise Structure

Preparation Phase

  1. Exercise Coordinator Selection: Appoint 1-2 individuals to lead the scenario
  2. Team Selection: Identify key personnel from security, IT, fraud, and management teams
  3. Resource Preparation: Ready necessary monitoring tools, communication channels, and simulated environments
  4. Pre-Exercise Briefing: Conduct orientation explaining the scenario parameters

Exercise Roles

  1. Exercise Coordinator: Controls scenario flow, introduces events, evaluates responses
  2. Security Analysts: Personnel responsible for detecting and investigating anomalies
  3. Fraud Investigation Team: Specialists focused on unusual financial activity
  4. IT Security Team: Technical specialists who implement containment measures
  5. Management Team: Decision-makers balancing security with business continuity
  6. Observers: Record actions, decisions, and improvement opportunities

Scenario Background

Following the external heist attempt from Exercise 1, your organization has implemented enhanced security controls and monitoring. However, the threat landscape has shifted to a potentially more dangerous vector: a trusted insider with administrative access to critical systems. The exercise simulates a senior system administrator whose credentials have been compromised or who may have been recruited by external threat actors.

Exercise Timeline

Phase 1: Initial Indications (0:00-1:00)

Setting the Scene (0:00-0:10)

Event 1 (0:10): Unusual Login Patterns

Expected Actions:

Event 2 (0:30): Database Configuration Changes

Expected Actions:

Event 3 (0:45): Data Access Anomalies

Expected Actions:

Phase 2: Escalation (1:00-2:00)

Event 4 (1:00): Attempted Data Exfiltration

Expected Actions:

Event 5 (1:20): Privileged Account Manipulation

Expected Actions:

Event 6 (1:40): Covering Tracks

Expected Actions:

Phase 3: Crisis Management (2:00-3:00)

Event 7 (2:00): Financial System Access

Expected Actions:

Event 8 (2:20): Executive Decision Point

Expected Actions:

Event 9 (2:40): Confrontation Planning

Expected Actions:

Phase 4: Resolution and Recovery (3:00-4:00)

Event 10 (3:00): Containment Execution

Expected Actions:

Event 11 (3:20): Damage Assessment

Expected Actions:

Event 12 (3:40): Recovery Planning

Expected Actions:

Conclusion (3:50-4:00)

Exercise Evaluation

Evaluation Metrics

  1. Detection Effectiveness
    • Time to detect suspicious insider activities
    • Ability to correlate subtle indicators of compromise
    • Thoroughness of investigation without alerting the subject
  2. Response Efficiency
    • Time from detection to containment decision
    • Appropriateness of escalation procedures
    • Resource coordination during sensitive internal investigation
  3. Communication Effectiveness
    • Discretion in internal communications
    • Management briefing clarity and timeliness
    • Preparation of external communications
  4. Decision Quality
    • Risk assessment accuracy during evolving situation
    • Decision-making regarding intervention timing
    • Balance between evidence gathering and threat containment

Appendix: Technical Details

Admin Account Profile:

Technical Indicators:

Created Accounts:

Systems Targeted: