BodyLast challengeCampaign nameNext challengeCampaign nameStatus
IGTFNovember 2015
October 2019IGTF-RATCC4-2019In progress
EGIMarch 2019SSC6 19.03

Completed

Campaign information

Campaigns can target different constituencies and may overlap. The description of the constituency given here should be sufficient for a human to asses if there is a significant overlap in community, it need not be a detailed description or a list of addresses (which would be a privacy concern since this page is public). Challenges can also probe to different 'depths': anywhere from just checking if a contact address does not bounce, to testing if the organisation contacted can do system memory forensic analysis and engage effectively with LE. The proposed rough classification is now:

See also https://www.eugridpma.org/agenda/47/contribution/6/material/slides/0.pptx for some background.

Please do not post sensitive data to this Wiki - it is publicly viewable for now.

IGTF-RATCC4-2019

CampaignIGTF-RATCC4-2019
PeriodOctober 2019
Initiator contactInteroperable Global Trust Federation IGTF (rat@igtf.net)
Target communityIGTF Accredited Identity Providers

Target type

own constituency of accredited authorities
Target community size~80 entities, ~60 organisations, ~50 countries/economic areas
Challenge format and depthemail to registered public contacts
expecting human response (by email reply) within policy timeframe
Current phasePreparatory communications sent
Summary or reportnot yet available

EGI Security Service Challenge 6 (19.03)

CampaignEGI-SSC6-19.03
PeriodMarch 2019
Initiator contactEGI CSIRT (csirt@mailman.egi.eu)
Target communityEGI Federation members: service providers and selected user communities

Target type

own constituency of service providers
Target community size~70 organisations, ~14 countries/IOs
Challenge format and depth

simulated user-level system intrusion using (non-weaponized) crafted malware

expecting communications with federation CSIRT, log analysis and correlation, and forensic investigation

should follow established procedures and communications reponse deadlines

Current phaseCompleted
Summary or report

summary available upon request

description of challenge format and malware publicly available: https://indico.cern.ch/event/739878/contributions/3380156/attachments/1840866/3018165/gdb-20190508.pdf