Industry

Details and instructions
logo

Season 2: System Breach

Complete tasks in seasonal competitions and break into the top rankings!
214 d : 17 h : 43 min
until season ends

Pipeline

Oil and gas corporation Pipeline

At the heart of State F, between the neon glow of skyscrapers and the haze of industrial zones, rose the Pipeline corporation—a giant of the oil and gas industry, holding a network of extraction, refining, and resource distribution. On gray metal platforms, pumps swayed, drawing oil and gas into the hollow guts of pipelines, while the digital eyes of control systems watched over every liter and every byte of data.
But in a world where information had become the new oil, Pipeline found itself in the crosshairs of invisible hunters… Hackers penetrated the production accounting system—the precise flows of oil in the reports turned into lies. An autonomous vessel guiding a tanker toward foreign ports suddenly changed course and at night, with the screech of metal and wailing sirens, struck a reef. A black slick of oil stretched for thousands of kilometers, poisoning marine flora, fishing grounds, and the corporation’s reputation.
In the digital depths, intellectual property, strategic plans, and development roadmaps leaked away. The director’s computer became an open book: financial reports and contracts surfaced online, shares collapsed, key clients severed ties. Employee record systems malfunctioned, operators’ credentials were stolen, and technological parameters—from drilling pumps to separators and conveyors—were manipulated, as if someone were playing with the enterprise’s living tissue.
At the drilling rig, overloaded pumps nearly halted gas extraction. Oil separators malfunctioned due to faulty valves, and altered paint ratios at the plant turned products into defective waste. The tire factory ground to a halt: conveyors stopped while engineers struggled to regain control of the system, feeling the breath of digital ghosts in every line of code.
The intrusion left a trace that vanished in the flow of logs faster than it could be captured. The corporation stood on the brink of chaos: the energy and industrial heart of State F had proven vulnerable to the invisible specters of cyberspace. Here, where oil and data flowed in parallel streams, survival meant not only controlling resources but also mastering the art of repelling attacks in which every byte of information could become a weapon.
Statistics
12 of 12Critical events
80Active hackers

Results

Rank
User
Triggered events
Event points
Discovered vulnerabilities
Vulnerability points
Total points
1
12
55,000
7
1,600
56,600
2
12
55,000
7
1,600
56,600
3
12
55,000
7
1,600
56,600
4
12
55,000
7
1,600
56,600
5
12
55,000
7
1,600
56,600
6
12
55,000
7
1,600
56,600
7
12
55,000
6
1,600
56,600
8
12
55,000
7
1,600
56,600
9
12
55,000
7
1,600
56,600
10
12
55,000
7
1,600
56,600
11
12
55,000
7
1,600
56,600
12
12
55,000
6
1,600
56,600
13
11
50,000
6
1,400
51,400
14
11
50,000
4
1,100
51,100
15
10
47,500
4
1,000
48,500
16
10
45,000
7
1,600
46,600
17
10
45,000
4
900
45,900
18
10
45,000
3
800
45,800
19
9
37,500
7
1,600
39,100
20
9
37,500
4
900
38,400
Overview
Critical events