Multiplayer Strategy
ATTACK. DEFEND. SURVIVE.
Take the role of a relentless hacker or a vigilant CISO. Plan your moves over hours and days. Every decision counts in the cyberwar.
ROLE: ATTACKER
The Hacker
Probe defenses, launch exploits, pivot through networks, and exfiltrate data before the CISO locks you out. Time your attacks across real hours and days.
ROLE: DEFENDER
The CISO
Monitor your infrastructure, patch vulnerabilities, deploy honeypots, and respond to incidents before the breach goes critical. Every second is a resource.
// ATTACKER ARCHETYPES
Five threat actor profiles
Each archetype mirrors a real-world adversary category defined in the VERIS threat-actor taxonomy and mapped to MITRE ATT&CK group behaviours. Full cross-reference on the Standards page.
CYBERCRIMINAL
AVAILABLE NOWVERIS: External › Criminal
Profit-driven. Deploys ransomware, steals credentials, runs BEC fraud, and sells data on dark-web markets. MITRE groups: FIN7, FIN11, TA505.
HACKTIVIST
COMING SOONVERIS: External › Activist
Ideology-driven. DDoS campaigns, defacement, and document dumps to advance a political or social cause. Examples: Anonymous, Team Poison.
INSIDER THREAT
COMING SOONVERIS: Internal › Disgruntled / Negligent
Trusted access turned weapon. A malicious employee or contractor who abuses legitimate privileges to sabotage or steal.
SCRIPT KIDDIE
COMING SOONVERIS: External › Unaffiliated
Opportunistic and low-skill. Runs pre-packaged exploit kits and scanners without deep understanding of the underlying techniques.
APT
COMING SOONVERIS: External › Nation-state
State-sponsored, long-dwell, stealthy. Targets governments and critical infrastructure. MITRE groups: APT28, APT29, APT41, Lazarus, Sandworm.
// DEFENDER ARCHETYPES
One defender profile — for now
Defenders represent enterprise security functions modelled after real organisational roles and NIST CSF 2.0 response categories. Full control cross-reference on the Standards page.
CISO
AVAILABLE NOWVERIS: Internal › Leadership
Chief Information Security Officer. Oversees risk posture, incident response, patch cadence, and team coordination across the entire infrastructure. Every resource is a trade-off.
MORE PROFILES COMING SOON
HOW IT WORKS
Slow burn. High stakes.
01
Plan your move
Queue actions that execute over minutes, hours, or days.
02
React in real time
Get notified when attacks land or defenses are breached.
03
Adapt your strategy
Every completed action changes the board. Think ahead.
Ready to breach the perimeter?
Private beta is open. Request your access now.
JOIN THE BETA