CybeRisk

Multiplayer Strategy

ATTACK. DEFEND. SURVIVE.

Take the role of a relentless hacker or a vigilant CISO. Plan your moves over hours and days. Every decision counts in the cyberwar.

ROLE: ATTACKER

The Hacker

Probe defenses, launch exploits, pivot through networks, and exfiltrate data before the CISO locks you out. Time your attacks across real hours and days.

ROLE: DEFENDER

The CISO

Monitor your infrastructure, patch vulnerabilities, deploy honeypots, and respond to incidents before the breach goes critical. Every second is a resource.

// ATTACKER ARCHETYPES

Five threat actor profiles

Each archetype mirrors a real-world adversary category defined in the VERIS threat-actor taxonomy and mapped to MITRE ATT&CK group behaviours. Full cross-reference on the Standards page.

CYBERCRIMINAL

AVAILABLE NOW

VERIS: External › Criminal

Profit-driven. Deploys ransomware, steals credentials, runs BEC fraud, and sells data on dark-web markets. MITRE groups: FIN7, FIN11, TA505.

HACKTIVIST

COMING SOON

VERIS: External › Activist

Ideology-driven. DDoS campaigns, defacement, and document dumps to advance a political or social cause. Examples: Anonymous, Team Poison.

INSIDER THREAT

COMING SOON

VERIS: Internal › Disgruntled / Negligent

Trusted access turned weapon. A malicious employee or contractor who abuses legitimate privileges to sabotage or steal.

SCRIPT KIDDIE

COMING SOON

VERIS: External › Unaffiliated

Opportunistic and low-skill. Runs pre-packaged exploit kits and scanners without deep understanding of the underlying techniques.

APT

COMING SOON

VERIS: External › Nation-state

State-sponsored, long-dwell, stealthy. Targets governments and critical infrastructure. MITRE groups: APT28, APT29, APT41, Lazarus, Sandworm.

// DEFENDER ARCHETYPES

One defender profile — for now

Defenders represent enterprise security functions modelled after real organisational roles and NIST CSF 2.0 response categories. Full control cross-reference on the Standards page.

CISO

AVAILABLE NOW

VERIS: Internal › Leadership

Chief Information Security Officer. Oversees risk posture, incident response, patch cadence, and team coordination across the entire infrastructure. Every resource is a trade-off.

MORE PROFILES COMING SOON

HOW IT WORKS

Slow burn. High stakes.

01

Plan your move

Queue actions that execute over minutes, hours, or days.

02

React in real time

Get notified when attacks land or defenses are breached.

03

Adapt your strategy

Every completed action changes the board. Think ahead.

Ready to breach the perimeter?

Private beta is open. Request your access now.

JOIN THE BETA