Industry
Details and instructions
Season 2: System Breach
Complete tasks in seasonal competitions and break into the top rankings!
231 d : 22 h : 15 min
until season ends
Pipeline
Oil and gas corporation Pipeline
At the heart of State F, between the neon glow of skyscrapers and the haze of industrial zones, rose the Pipeline corporation—a giant of the oil and gas industry, holding a network of extraction, refining, and resource distribution. On gray metal platforms, pumps swayed, drawing oil and gas into the hollow guts of pipelines, while the digital eyes of control systems watched over every liter and every byte of data.
But in a world where information had become the new oil, Pipeline found itself in the crosshairs of invisible hunters… Hackers penetrated the production accounting system—the precise flows of oil in the reports turned into lies. An autonomous vessel guiding a tanker toward foreign ports suddenly changed course and at night, with the screech of metal and wailing sirens, struck a reef. A black slick of oil stretched for thousands of kilometers, poisoning marine flora, fishing grounds, and the corporation’s reputation.
In the digital depths, intellectual property, strategic plans, and development roadmaps leaked away. The director’s computer became an open book: financial reports and contracts surfaced online, shares collapsed, key clients severed ties. Employee record systems malfunctioned, operators’ credentials were stolen, and technological parameters—from drilling pumps to separators and conveyors—were manipulated, as if someone were playing with the enterprise’s living tissue.
At the drilling rig, overloaded pumps nearly halted gas extraction. Oil separators malfunctioned due to faulty valves, and altered paint ratios at the plant turned products into defective waste. The tire factory ground to a halt: conveyors stopped while engineers struggled to regain control of the system, feeling the breath of digital ghosts in every line of code.
The intrusion left a trace that vanished in the flow of logs faster than it could be captured. The corporation stood on the brink of chaos: the energy and industrial heart of State F had proven vulnerable to the invisible specters of cyberspace. Here, where oil and data flowed in parallel streams, survival meant not only controlling resources but also mastering the art of repelling attacks in which every byte of information could become a weapon.
Statistics
9 of 12Critical events
26Active hackers
Results
Rank
User
Triggered events
Event points
Discovered vulnerabilities
Vulnerability points
Total points


