Educational Simulation

Ransomware Attack
Simulator

Watch a ransomware attack unfold in real-time — from initial breach to file encryption — then see how PUGA's incident response stops it cold.

Attack Scenario
LockBit 3.0 Ransomware via Phishing
An employee opens a malicious attachment. The payload executes, establishes persistence, and begins encrypting file shares. Your monitoring either catches it — or it doesn't.
Ransomware Phishing Vector Lateral Movement
Choose your scenario: