MOD CRISIS CONTROL CENTER

DEFEND AGAINST PUDDING INTRUSION

ANALYTICS STATUS BOARD

PASSWORD SECURITY

Last password: Secure

PUDDING progress: 35%

2FA STATUS

Last attempt: Successful

Next code in: 42s

PHISHING DEFENSE

Detected: 3/5

PUDDING hints: 1 active

RISK ASSESSMENT

Current risk: Medium

Policy strength: 68%

PUDDING ACTIVITY

> PUDDING scanning Workstation 1...

> PUDDING attempting to bypass 2FA...

SECURITY ENGINEER

WORKSTATION 1: PASSWORD FORTRESS

Create a password stronger than the last. PUDDING learns from each attempt.

Last password: P@ssw0rd123!

PUDDING crack time: 12 hours

IDENTITY SPECIALIST

WORKSTATION 2: 2FA GATEWAY

Complete two-factor authentication to gain capabilities against PUDDING.

2FA CODE: 00:30
7 9 2 4 8 1
INCIDENT RESPONDER

WORKSTATION 3: PHISHING HUNTER

Identify phishing attempts to gain tools against PUDDING.

From: "MOD IT Support" Subject: Urgent: Password Reset Required
NEW

Dear Employee,

Our systems have detected unusual activity on your account. To prevent unauthorized access, you must reset your password immediately by clicking the link below:

https://mod-support-reset.com/secure

Failure to reset within 24 hours will result in account suspension.

Sincerely,
MOD IT Security Team

PUDDING HINTS

  • > Check sender email address
  • > Hover over links before clicking

PHISHING INDICATORS

  • Urgent language
  • Suspicious link
  • Personalized greeting
POLICY MANAGER

WORKSTATION 4: RISK STRATEGIST

Create security policies to prevent future PUDDING attacks.

SCENARIO #PUD-4872

PUDDING has compromised an employee's credentials through a phishing attack. The employee has access to sensitive but not classified systems. PUDDING is attempting lateral movement through the network.

Low Medium High Critical