Walk through actual security breaches step by step. These interactive case studies reconstruct real attacks so your team can learn from incidents that cost organizations millions.
Each case study traces the full attack chain from initial reconnaissance to final impact. No sign-up required. Free for individual learners.
Investigate Real Breaches
Each case study is based on a documented security incident. You will analyze the attack chain, identify the failures, and understand what should have been done differently.
Security training based on real breaches is more effective than hypothetical scenarios because employees see the actual consequences of the mistakes that led to each incident.
The MGM Resorts breach in September 2023 began with a single social engineering phone call to the IT helpdesk and resulted in over $100 million in losses, ten days of operational disruption, and the compromise of personal data belonging to millions of guests. The OneNote email attack case study traces a business email compromise scheme where attackers monitored an organization's inbox for weeks before sending a fraudulent invoice from a lookalike domain.
Each case study in this catalogue reconstructs the full attack chain from initial reconnaissance through to final impact, teaching employees to recognize the warning signs at every stage. These exercises are free, run in the browser, and require no account.
Frequently Asked Questions
Details about the real-world incidents covered in these case studies.
What is a OneNote email attack?
A OneNote email attack is a type of business email compromise where attackers use malicious OneNote file attachments or OneNote-themed lures to infiltrate corporate email. In documented cases, attackers gained access, silently monitored email threads for weeks, then registered lookalike domains to send fraudulent invoices that matched ongoing conversations.
How do attackers use lookalike domains in BEC fraud?
Attackers register domains that differ by one or two characters from the target company, such as swapping "rn" for "m" or adding a hyphen. After monitoring legitimate email chains, they inject themselves into invoice conversations using these near-identical domains. Recipients often miss the difference because the context, formatting, and timing all match real correspondence.
How did the MGM Resorts breach happen in 2023?
The Scattered Spider threat group called MGM's IT helpdesk, impersonated an employee using publicly available LinkedIn information, and convinced staff to reset credentials. That single 10-minute phone call gave attackers initial access. They then deployed ALPHV/BlackCat ransomware, shutting down hotel systems, slot machines, and booking platforms. MGM reported over $100M in total impact.
What is Scattered Spider?
Scattered Spider is a financially motivated threat group known for social engineering attacks against large organizations. They specialize in helpdesk vishing, SIM swapping, and MFA fatigue attacks to gain initial access. The group has targeted major hospitality, technology, and telecommunications companies, often partnering with ransomware-as-a-service operators like ALPHV/BlackCat for the encryption and extortion phase.
Bring Case Study Training to Your Organization
These case studies are free and require no sign-up. Start investigating real incidents and apply the lessons to your own security program.