Nightmare Protocol
30 Apr 2025 - joe
Nightmare Protocol: The Haunting
A Horror-Themed Cybersecurity Tabletop Exercise
Exercise Overview
Title: Nightmare Protocol: The Haunting
Duration: 4 hours (recommended)
Target Audience: SOC Analysts, Incident Responders, Digital Forensic Specialists, Management
Difficulty: Intermediate to Advanced
Objective: Test your organization’s ability to respond to a sophisticated adversary using psychological warfare techniques alongside technical attacks, creating an environment of fear and uncertainty while targeting critical infrastructure.
Learning Objectives
- Evaluate team resilience when facing psychological manipulation alongside technical threats
- Test detection capabilities for advanced persistent threats using deception techniques
- Assess communication effectiveness during scenarios designed to create confusion and doubt
- Practice decision-making when adversaries manipulate perception and reality
- Identify gaps in incident response for threats targeting human psychology
Exercise Structure
Preparation Phase (2 weeks prior)
- Exercise Director: Appoint 1-2 individuals to coordinate the scenario
- Participant Selection: Identify key personnel across security functions
- Resource Preparation: Ready necessary monitoring tools, communication channels, and simulated environments
- Pre-Exercise Briefing: Conduct orientation explaining parameters without revealing psychological elements
Exercise Roles
- Exercise Director: Controls scenario flow, introduces increasingly disturbing elements
- SOC Analysts: Personnel responsible for monitoring and initial detection
- Incident Responders: Technical specialists addressing active threats
- Digital Forensic Specialists: Investigators analyzing artifacts and evidence
- Management Team: Decision-makers balancing security with business continuity
- Observers: Record actions, decisions, and psychological responses
Scenario Background
Midnight Security Operations Center provides 24/7 security monitoring for a diverse client base, including several critical infrastructure providers. Intelligence reports have warned of a new threat actor group called “The Watchers” that combines sophisticated technical capabilities with psychological warfare techniques designed to destabilize security teams before launching their main attack.
Exercise Narrative
The exercise simulates an escalating series of incidents where the adversary intentionally reveals their presence through disturbing imagery, personalized threats, and manipulation of digital systems in ways designed to create fear and uncertainty among the security team. The psychological elements mask a sophisticated attack against client infrastructure that must be detected despite the distractions.
Exercise Timeline and Scenarios
Phase 1: First Contact (0:00-1:00)
Setting the Scene (0:00-0:10)
- Exercise Director describes the night shift at Midnight SOC
- Teams are monitoring client environments during low-activity hours
- Recent threat intelligence mentioned a new APT group with psychological tactics
Scenario 1 (0:10): Whispers in the Dark
- Security monitoring tools begin showing subtle anomalies in log files
- Random entries contain fragments of analysts’ names and personal details
- Timestamps of suspicious events correspond to birthdays of team members present
- Pattern suggests reconnaissance specific to the security team
Expected Actions:
- Document the personalized elements in security logs
- Begin investigating how adversary obtained personnel information
- Check for data breaches or insider threats
- Enhance monitoring while maintaining composure
Scenario 2 (0:30): Digital Faces
- Surveillance cameras in client facilities briefly show distorted human faces looking at the camera
- Faces appear to mouth names of security team members
- Video artifacts occur exactly when specific analysts look at the monitors
- Technical analysis shows no explanation for the precisely-timed artifacts
Expected Actions:
- Document all instances of video anomalies
- Test alternative monitoring systems to verify authenticity
- Begin forensic preservation of video evidence
- Consider briefing team about psychological manipulation tactics
Scenario 3 (0:45): Personal Messages
- Security analysts receive emails that reference private conversations had outside work
- Messages include details that would require physical surveillance to know
- Email headers and routing appear legitimate but cannot be traced
- Content suggests imminent harm to a critical infrastructure client
Expected Actions:
- Activate incident response protocols while acknowledging psychological component
- Report potential physical surveillance to appropriate authorities
- Enhance monitoring of referenced client systems
- Begin preparing client notification with appropriate context
Phase 2: Escalation (1:00-2:00)
Scenario 4 (1:00): Home Invasion
- Team members receive smartphone notifications from their home security systems
- Alerts show unknown figures standing in their empty homes looking at cameras
- Police dispatched to residences find no evidence of intrusion
- Each affected home’s security system logs show no entries except the alert itself
Expected Actions:
- Acknowledge the psychological impact while maintaining operational focus
- Engage law enforcement for physical security concerns
- Consider sending affected team members home with escort
- Rotate in backup personnel not experiencing psychological targeting
Scenario 5 (1:20): Predictive Knowledge
- Attacker demonstrates knowledge of security team actions before they occur
- Taunting messages appear describing decisions moments before they’re made
- Critical client system logs show commands mimicking team’s planned response
- Evidence suggests comprehensive compromise of communication channels
Expected Actions:
- Establish out-of-band communication methods
- Change incident response tactics from standard procedures
- Implement need-to-know information sharing
- Document apparent information leakage for investigation
Scenario 6 (1:40): Digital Hallucinations
- Monitoring tools show catastrophic failures at client sites that other systems don’t detect
- Rotating building schematics appear on screens showing team members’ locations in real-time
- System diagnostics show no evidence of compromise despite visible effects
- Multiple redundant systems show contradictory information about critical systems
Expected Actions:
- Implement manual verification of all critical alerts
- Establish trusted baseline for system status
- Rotate to backup monitoring infrastructure
- Prepare for potential physically verifiable attacks hidden among false alerts
Phase 3: True Intentions (2:00-3:00)
Scenario 7 (2:00): Infrastructure Attack
- While team is distracted by psychological tactics, subtle attacks begin on power grid client
- Industrial control systems show signs of manipulation similar to known destructive attacks
- Attack patterns are disguised within the noise of psychological distractions
- Evidence suggests preparation for coordinated physical damage to equipment
Expected Actions:
- Recognize the true attack despite psychological distractions
- Implement emergency mitigation for critical infrastructure
- Coordinate with client emergency teams
- Maintain focus despite continuing psychological pressure
Scenario 8 (2:20): Executive Involvement
- Senior management joins crisis call as situation escalates
- Management themselves begin experiencing personalized psychological tactics
- Pressure builds to make decisions under increasingly stressful conditions
- Adversary demonstrates knowledge of executive conversation in real-time
Expected Actions:
- Brief executives with focus on confirmed technical aspects
- Acknowledge psychological components without letting them dominate decision-making
- Recommend decisive action on verifiable technical threats
- Establish clear chain of command for critical decisions
Scenario 9 (2:40): Maximum Pressure
- Personal threats against team members and families intensify
- Client systems approach critical failure thresholds
- Some team members show signs of psychological distress affecting performance
- Communications with field teams become unreliable and contradictory
Expected Actions:
- Implement buddy system for all security actions to prevent manipulation
- Focus on protecting human life and critical infrastructure
- Rotate distressed personnel to support roles
- Implement final containment measures for client systems
Phase 4: Resolution and Recovery (3:00-4:00)
Scenario 10 (3:00): Adversary Identification
- Digital forensics reveals patterns identifying “The Watchers” threat group
- Evidence connects psychological tactics to specific Eastern European threat actors
- Technical indicators provide actionable information for containment
- Attack methodology becomes clear, allowing effective countermeasures
Expected Actions:
- Implement targeted countermeasures based on actor profile
- Share threat intelligence with appropriate authorities
- Brief clients on specific technical indicators
- Begin systematic verification of all potentially affected systems
Scenario 11 (3:20): Containment Decision Point
- Team must decide final containment strategy under continuing pressure
- Critical infrastructure remains at risk while psychological attacks continue
- Options include emergency shutdown, islanding critical networks, or targeted blocking
- Each option carries different technical and psychological risks
Expected Actions:
- Evaluate containment options based on technical merits
- Make decisions using dual-verification protocols
- Implement containment measures with physical verification
- Maintain clear documentation of decision rationale
Scenario 12 (3:40): Recovery Planning
- With active attacks contained, focus shifts to recovery
- Team must design recovery process resistant to psychological manipulation
- Evidence suggests adversary maintains presence in some systems
- Long-term psychological impact on team requires addressing
Expected Actions:
- Develop methodical recovery prioritizing critical infrastructure
- Implement enhanced verification for all recovery steps
- Create rotation schedule to address team psychological fatigue
- Begin formal documentation for regulatory and legal requirements
Conclusion (3:50-4:00)
- Exercise Director declares the end of the exercise
- Brief initial feedback from participants
- Schedule formal debrief session
- Provide immediate psychological decompression opportunity
Exercise Evaluation
Evaluation Metrics
- Psychological Resilience
- Ability to maintain operational effectiveness despite psychological pressure
- Recognition of psychological manipulation tactics
- Team support mechanisms during high-stress scenarios
- Detection Effectiveness
- Ability to identify critical technical threats among distractions
- Correlation of disparate indicators during confusion
- Maintenance of threat hunting capabilities under stress
- Response Efficiency
- Appropriate prioritization during multiple simultaneous pressures
- Adaptation of standard procedures to counter adversary knowledge
- Resource allocation during uncertainty
- Decision Quality
- Clarity of thinking during psychological manipulation
- Evidence-based decision making when facing contradictory information
- Balance between addressing psychological and technical aspects
Post-Exercise Activities
- Immediate Debrief
- Acknowledge psychological impact of exercise
- Discuss immediate impressions and reactions
- Provide clear transition to normal operations
- Technical Review (1-2 days after exercise)
- Analyze technical detection and response effectiveness
- Review decision points and containment strategies
- Document technical lessons learned
- Psychological Review (separate session)
- Discuss psychological manipulation tactics encountered
- Review individual and team resilience
- Develop strategies for maintaining effectiveness during psychological pressure
- Improvement Planning (1-2 weeks after exercise)
- Develop enhanced procedures for similar threat scenarios
- Create training for recognizing psychological manipulation tactics
- Establish team support protocols for high-pressure situations
Appendix: Advanced Scenario Details
Psychological Manipulation Techniques
- Personalization
- Use of team members’ names, personal information, and habits
- References to private conversations and activities
- Knowledge of individual fears and concerns
- Leveraging personal relationships and family connections
- Environmental Manipulation
- Timing events to coincide with specific analyst actions
- Creating sensory anomalies (visual artifacts, unusual sounds)
- Manipulating ambient conditions (room temperature, lighting)
- Introducing contradictory information across systems
- Trust Degradation
- Creating doubt in system integrity
- Introducing apparent insider threat indicators
- Making team members suspect each other
- Undermining confidence in decision-making abilities
- Temporal Disorientation
- Manipulating timestamps and event sequencing
- Creating false urgency for non-critical issues
- Stretching perceived time during critical incidents
- Presenting events out of sequence to confuse investigation
Technical Attack Indicators
- ICS/SCADA Attack Patterns
- Subtle manipulation of control system parameters
- Modification of safety limit values
- Introduction of logic bombs in control loops
- Preparation for coordinated physical impact
- Adversary Infrastructure
- Command and control using steganographic techniques
- Encrypted communication within legitimate protocols
- Timestamped response patterns indicating automated systems
- Geographically distributed attack infrastructure
- Persistence Mechanisms
- Custom firmware implants in network devices
- Modified authentication subsystems with backdoors
- Virtual machine escape techniques
- Supply chain compromise indicators
Containment Challenges
- Adversary Anticipation
- Evidence of prepared countermeasures to standard response
- Trigger mechanisms that escalate when contained
- Dead man switches in critical systems
- Anti-forensic techniques activated during investigation
- Psychological Barriers
- Team hesitation due to uncertainty
- Decision paralysis from information overload
- Emotional responses affecting technical judgment
- Communication breakdown under extreme stress