This repository documents my completion of the Datacom Cybersecurity Virtual Experience Program through Forage. In this simulation, I worked as a Cybersecurity Consultant responding to a sophisticated nation-state cyberattack.
π― Simulation Objectives
Task
Description
Status
Task 1
APT Breach Analysis - Investigating APT34 (OILRIG)
β
Completed
Task 2
Comprehensive Cybersecurity Risk Assessment
β
Completed
π Investigated a cyberattack by APT34 (OILRIG) , an Iranian state-sponsored threat group
π‘ Conducted OSINT research using open-source intelligence tools and techniques
πΊοΈ Applied MITRE ATT&CK Framework for threat actor TTP identification
π Produced comprehensive reports with actionable defensive recommendations
βοΈ Performed risk assessment with inherent, current, and target risk ratings
π‘οΈ Developed security measures to improve client's cybersecurity posture
π Repository Structure
Technical Skills
Frameworks & Tools
Soft Skills
Threat Intelligence
MITRE ATT&CK
Report Writing
OSINT Research
Risk Matrix
Stakeholder Communication
Malware Analysis
NIST Framework
Critical Thinking
Incident Response
Defense-in-Depth
Problem Solving
π― Key Findings Summary
Attribute
Details
Also Known As
OILRIG, Helix Kitten, Crambus
Attribution
Iranian Government (State-Sponsored)
Active Since
2014
Primary Targets
Middle East - Government, Energy, Telecom
Motivation
Cyber Espionage / Intelligence Gathering
Notable TTPs
Spear-phishing, Custom Malware, Social Engineering
Risk Scenario
Inherent Risk
Current Risk
Target Risk
Cyberattack (APT)
π΄ HIGH
π‘ MEDIUM
π’ LOW
Natural Disaster
π‘ MEDIUM
π‘ MEDIUM
π’ LOW
Employee Negligence
π΄ HIGH
π‘ MEDIUM
π’ LOW
π Certificate of Completion
Verification Code: 2JdyDHjjxkMJrafHr
Issued by Forage | Signed by Tom Brunskill, CEO & Co-Founder
β If you found this helpful, please consider giving it a star! β