Educational Simulation
Ransomware Attack
Simulator
Watch a ransomware attack unfold in real-time — from initial breach to file encryption — then see how PUGA's incident response stops it cold.
Attack Scenario
LockBit 3.0 Ransomware via Phishing
An employee opens a malicious attachment. The payload executes, establishes persistence, and begins encrypting file shares. Your monitoring either catches it — or it doesn't.
Choose your scenario: