Marco Romano
Intrusion Analyser
Level 18 53993 / 72438
*Rankings computed based on core modules (53993 pts).
Joined in September, 2024
Marco Romano earned 10 badges
Rap Beef
This analyst investigated a themed scenario involving rival hip-hop artists. They used key cybersecurity skills to identify suspicious communications and activities, analyzing internal messages to track unauthorized exchanges and uncover patterns. This exercise reinforced critical skills in data analysis, threat detection, and the application of cybersecurity principles in unconventional contexts.
Issued on: Sep 19, 2024
Valdorian Times
This analyst investigated an email phishing attack in Valdoria that uncovered a politically motivated influence campaign. Using Kusto Query Language (KQL), they analyzed employee roles, email communications, and computer process events, revealing evidence of data exfiltration and manipulation. This exercise reinforced skill in querying data and understanding data integrity within a cybersecurity context.
Issued on: Oct 17, 2024
Solvi Systems
This analyst investigated a cybersecurity incident at Solvi Systems by identifying an attempted XSS attack and tracking a phishing email campaign. Using Kusto Query Language (KQL), they uncovered the threat actor’s reconnaissance efforts, system compromises, and malware activities, providing critical insights for enhancing security measures.
Issued on: Oct 17, 2024
Frognado In Valdoria
This analyst successfully investigated a hacktivist intrusion on FramtidX system. Through their use of Kusto Query Language (KQL), they discovered how the intruders managed to deface the company’s website and internal documents. They followed the activities of the threat actor, from reconnaissance to exfiltration, and uncovered the use of an internal account to further their compromise.
Issued on: Oct 21, 2024
AzureCrest
This analyst investigated a ransomware attack, where cost-cutting measures led to a single point of failure in their systems. This exercise highlighted the risks associated with prioritizing cost over security and reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context.
Issued on: Oct 27, 2024
Castle & Sand
This analyst investigated an easy-level ransomware scenario by identifying adversaries' reconnaissance activities, analyzing themed phishing emails, and tracking ransomware deployment and impact. They used the Kusto Query Language (KQL) to analyze intrusion data and build an understanding of the ransomware attack lifecycle.
Issued on: Oct 28, 2024
Critical Compromise (ICS)
This analyst completed the Critical Compromise in Chicago module, demonstrating their ability to investigate a malware-based attack on a SCADA system. Through their use of Kusto Query Language (KQL), they uncovered the deployment of malicious software that disrupted the power grid. Their investigation helped identify the attack's origin and provided insights into the attackers’ methods, ultimately contributing to the restoration of normal operations and improving defenses for critical infrastructure.
Issued on: Oct 29, 2024
Envolve Labs
This analyst completed the "Envolve Labs" module. They demonstrated skills in using Kusto Query Language (KQL) in their investigation that included identifying phishing campaigns, analyzing command-line activities, and uncovering credential theft and data exfiltration. They also learned to cluster and attribute attacks to specific threat actors, connecting malicious domains and email addresses to threat actor behavior.
Issued on: Oct 31, 2024
Titan Shield
This analyst successfully investigated two highly sophisticated cyberattacks against TitanShield’s sensitive projects, demonstrating advanced investigative skills in identifying social engineering tactics, malicious file execution, and data exfiltration strategies. Using Kusto Query Language (KQL), they unraveled Moonstone Sleet's phishing campaign targeting Project Omega and Crimson Sandstorm’s romance scheme aimed at harvesting critical system and user information. This exercise reinforced skills in threat actor profiling, recognizing social engineering-based reconnaissance on social media, and assessing the broader security implications of protecting intellectual property in a high-stakes defense context.
Issued on: Nov 04, 2024
HopsNStuff
This analyst completed the "HopsNStuff" module, investigating a cyber attack through the analysis of endpoint process events and command-line activities. They demonstrated skills in identifying anomalous file behavior by using Kusto Query Language (KQL) to uncover malicious activities. The investigation highlighted their ability to analyze and deobfuscate malicious PowerShell commands, effectively identifying and responding to data exfiltration techniques.
Issued on: Nov 06, 2024
Marco Romano played 13 games
Envolve Labs: With a twist! 950/950
HopsNStuff 14265/14265
Castle & Sand 13050/13050
DAILY7 🌎🌟 308/3930
A Scandal in Valdoria 🌟 2430/2430
Solvi Systems 2860/2860
AzureCrest - The full version 8790/8790
A Rap Beef (START HERE) 950/950
Jojo's Hospital 580/610
Titan Shield (with Microsoft Defender XDR) 4000/4000
Frognado in Valdoria 1690/1690
Critical Compromise In Chicago - ICS 2870/2870
Valdoria Votes 1250/2750
Issue Badge to Marco Romano
# | Image | Badge | Description | Action |
---|---|---|---|---|
1 | Advanced Persistent Analyst | Someone who failed, got up, and tried again! | ||
2 | Helping Hand | This award is community-nominated! Someone in the KC7 community has recognized this user for their contributions to others! | ||
3 | Notre Dame Challenge | Completed the cybersecurity challenge event at Notre Dame in June 2023 | ||
4 | KC7 Top 10 (2023) | Awarded to top 10 KC7 players in 2023 | ||
5 | Cyber Challenge Series: Team Winner | This badge is issued to KC7 players who were members of a team that placed top 3 in a Blue Team Cyber Challenge event! | ||
6 | Super Fan | This badge is issued to any KC7 player who has completed 3 modules or more! | ||
7 | Most Improved | Someone who really improved over the course of a KC7 event! | ||
8 | Cyber Challenge Series: Winner | This badge is issued to KC7 players who placed top 3 (as an individual) in an Blue Team Cyber Challenge event! | ||
9 | 30 day hot steak | Awarded to a user who has answered a question for 30 days in a row. | ||
10 | 90 day streak | Awarded to a user who has answered a question for 90 days in a row. | ||
11 | Inside Encryptodera - Event Participant | Participant in the February 2024 monthly event featuring the Encryptodera module | ||
12 | The Teacher | Someone who really helped lift up their peers and enabled others to learn! | ||
13 | Bright Future | Someone who shows a lot of potential as a future cyber analyst! | ||
14 | Azure Crest | This analyst investigated a ransomware attack, where cost-cutting measures led to a single point of failure in their systems. This exercise highlighted the risks associated with prioritizing cost over security and reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context. | ||
15 | 2024 SANS New2Cyber CTF Participant | This badge has been awarded to those who took part in the 2024 SANS New2Cyber x KC7 Capture The Flag (CTF) challenge, which involved investigating a ransomware attack on a hospital. | ||
16 | 60 day streak | Awarded to a user who has answered a question for 60 days in a row. | ||
17 | 120 day streak | Awarded to a user who has answered a question for 120 days in a row! | ||
18 | Intro Master |