Industry

Details and instructions
logo

Season 2: System Breach

Complete tasks in seasonal competitions and break into the top rankings!
231 d : 22 h : 15 min
until season ends

Pipeline

Oil and gas corporation Pipeline

At the heart of State F, between the neon glow of skyscrapers and the haze of industrial zones, rose the Pipeline corporation—a giant of the oil and gas industry, holding a network of extraction, refining, and resource distribution. On gray metal platforms, pumps swayed, drawing oil and gas into the hollow guts of pipelines, while the digital eyes of control systems watched over every liter and every byte of data.
But in a world where information had become the new oil, Pipeline found itself in the crosshairs of invisible hunters… Hackers penetrated the production accounting system—the precise flows of oil in the reports turned into lies. An autonomous vessel guiding a tanker toward foreign ports suddenly changed course and at night, with the screech of metal and wailing sirens, struck a reef. A black slick of oil stretched for thousands of kilometers, poisoning marine flora, fishing grounds, and the corporation’s reputation.
In the digital depths, intellectual property, strategic plans, and development roadmaps leaked away. The director’s computer became an open book: financial reports and contracts surfaced online, shares collapsed, key clients severed ties. Employee record systems malfunctioned, operators’ credentials were stolen, and technological parameters—from drilling pumps to separators and conveyors—were manipulated, as if someone were playing with the enterprise’s living tissue.
At the drilling rig, overloaded pumps nearly halted gas extraction. Oil separators malfunctioned due to faulty valves, and altered paint ratios at the plant turned products into defective waste. The tire factory ground to a halt: conveyors stopped while engineers struggled to regain control of the system, feeling the breath of digital ghosts in every line of code.
The intrusion left a trace that vanished in the flow of logs faster than it could be captured. The corporation stood on the brink of chaos: the energy and industrial heart of State F had proven vulnerable to the invisible specters of cyberspace. Here, where oil and data flowed in parallel streams, survival meant not only controlling resources but also mastering the art of repelling attacks in which every byte of information could become a weapon.
Statistics
9 of 12Critical events
26Active hackers

Results

Rank
User
Triggered events
Event points
Discovered vulnerabilities
Vulnerability points
Total points
1
8
35,000
4
1,000
36,000
2
7
32,500
3
800
33,300
3
4
20,000
2
500
20,500
4
5
17,500
4
1,100
18,600
5
5
17,500
3
800
18,300
6
3
12,500
2
800
13,300
7
2
10,000
1
300
10,300
8
2
7,500
2
500
8,000
9
2
7,500
1
300
7,800
10
3
7,500
1
300
7,800
11
2
7,500
1
300
7,800
12
2
5,000
1
300
5,300
13
1
2,500
3
700
3,200
14
1
2,500
1
500
3,000
15
1
2,500
2
500
3,000
16
1
2,500
1
300
2,800
17
1
2,500
1
300
2,800
18
0
0
2
500
500
19
0
0
2
500
500
20
0
0
2
500
500
Overview
Critical events