TOP SECRET // CLASSIFIED // OPERATION: NIGHTFALL
◈ Mission 03 Active

Cyber
Defense

// Security Awareness Training - Level 3 Clearance

PHANTOM-9 is targeting DeepCover agents through everyday attack vectors - weak passwords, phishing emails, social engineering calls, and data exposed on social media.

You will train across four real-world scenarios. Each one teaches a technique attackers use against real people, and what you can do to stop them.

This is not a simulation. These are the actual methods used to compromise accounts, steal identities, and breach organisations every day.

Cyber Defense Training Center
Mission 03 - Select a module to begin
0 / 4 complete
// Choose a training module
📷
Module 01
Phishing Detection
Five emails land in your inbox. Some are real. Some will steal your credentials. Can you tell the difference?
You'll learn: The specific red flags in phishing emails, how attackers spoof domains, and why urgency is a weapon.
Begin Training
📞
Module 02
Social Engineering
Your phone rings. It's "IT Support" - or is it? Navigate a live social engineering call and spot the manipulation in real time.
You'll learn: How pretexting works, what information is dangerous to share, and the one rule that stops most attacks.
Begin Training
🔐
Module 03
Password & Two-Factor Auth
Create a password and watch PHANTOM-9 try to crack it. Then see what happens when they have your password but face three different levels of authentication.
You'll learn: What makes a password strong, how brute force works, and why an authenticator app is your best defence against credential theft.
Begin Training
🕵️
Module 04
OSINT Awareness
Browse a real-looking social media profile. Click what you think is harmless. Watch PHANTOM-9 build a complete attack profile from public posts.
You'll learn: What oversharing enables, how security questions get answered from public data, and what to stop posting.
Begin Training
Module 01: Phishing Detection Tag all 5 emails, then reveal
Inbox (5 messages)
Select an email to read
Module 01: Phishing Detection Review your answers
Emails correctly identified
Review each email below to see what the red flags were.
Module 02: Social Engineering Step 1 of 4
👤
Bob Mitchell
IT Support - DeepCover Agency (Unverified)
Call Active
Your Response
Module 03: Password & Two-Factor Auth Phase 1 of 3
Account Security Rating
0 / 100
Phase 1 of 3 - Password Strength
Choose Your Password
PHANTOM-9 is scanning agent accounts right now. Pick a password for your DeepCover login - then watch the attack terminal on the right to see how it holds up.
Weak
password123
Estimated crack time: < 1 second
Moderate
Summer2024!
Estimated crack time: ~2 days via hybrid attack
Strong
Xk9#mP$vL7@qR2
Estimated crack time: centuries
Or type your own:
Phase 2 of 3 - Second Factor
Choose Your 2FA Method
Your password was just leaked in a data breach. PHANTOM-9 now has it. Pick a second layer of defence.
🚫
No 2FA
Password only. If PHANTOM-9 has it, there is nothing else stopping them.
+0 security points
📱
SMS 2FA
A code is sent to your phone. Stops most attacks, but SIM swapping can bypass it.
+30 security points
🔐
Authenticator App
Time-based codes generated on your device. Never touches the phone network - cannot be intercepted.
+60 security points
Phase 3 of 3 - Attack Result
Analysing...
PHANTOM-9 BREACH TERMINAL STANDBY
// Initializing PHANTOM-9 attack suite v4.7.1...
// Awaiting target configuration...
Module 04: OSINT Awareness Open posts and tap the highlighted text
AC
alex_chen_official 🌎 Public
7 posts 1,284 followers 312 following
Alex Chen
Software Dev 💻 | Dog dad 🐕 | Coffee addict ☕
📍 London, UK
⚠ This is a fully public profile. Open each post and click the underlined text that an attacker could use against this person.
AC
alex_chen_official
⚠ Click the underlined words - these are things an attacker could exploit
🌎 Public post
PHANTOM-9 collecting data
0
of 7 risks found
🕵
OSINT Threat Assessment
PHANTOM-9 analysis complete
How to protect yourself: Set your social profiles to private and audit what you post publicly. Never use real answers for security questions - generate random answers and store them in a password manager. Think before naming pets, family members, or locations in any public caption or bio.
out of 100
Key Takeaway
Mission Complete
Cyber Defense Training - Final Assessment