

30 mins

Physical

5 players
the breach.
One rogue hacker. Five suspects. Endless office gossip. They’ve locked your files and left behind a trail of digital breadcrumbs... and now it’s up to you to work out who slipped up, how they did it, and where it all went wrong. Get it right and you’ll win the decryption key. Get it wrong? Better start rewriting your incident report.
The Scenario.
A ransomware attack has locked down your organisation's systems — and the hackers are playing games. Literally.
They claim they only needed one set of stolen credentials to get in. Now, they’ve given you five suspects, five possible methods of compromise, and five locations it could’ve happened. If your team can crack the case and identify the right combination, they'll hand over the decryption key. Get it wrong? Game over.

the suspects.

Paula Sinclair
Polished, powerful, and perpetually in motion. Her bag’s been stolen before (long story), and she swears she locked her laptop this time.

mike patterson
Holds the keys, knows the building inside out, and is trusted by everyone. But physical access means digital opportunity.

emily fraser
She manages Paula’s diary, inbox, and sometimes her stress levels. With access to everything the CEO sees, Emily’s account would be gold for an attacker.

sasha lin
Creative, confident, and always connected. Sasha’s the company’s voice online - but did she share more than just brand updates?

jason malik
The go-to guy when “have you tried turning it off and on again” doesn’t work. He’s got access… and maybe someone else did too.
Learning Outcomes.
-
social engineering
Across voice and social media...
-
password hygiene
Understanding authentication including MFA
-
remote working risks
Distractions galore, open screens, shared workspaces...
-
incident response
Teamwork, decision making under pressure...
what you'll experience
It's cool AF, we promise.
You’ll investigate suspicious activity using fake IT logs, phone records, and internal emails, piecing together the trail of a cunning hacker. Along the way, you’ll unlock physical boxes, unearth red herrings, and collaborate to eliminate suspects. Expect fake intranet sites, interactive phone calls, and some very dodgy digital footprints. It’s hands-on, fast-paced, and full of twists — everything you need to uncover who slipped up, how it happened, and where the breach began.
Let's make cyber training fun (no, really).
Whether it’s an escape room, a CTF, or a bespoke workshop, we’ll help your team build skills they’ll actually use.