Introducing The Cloud Hunting Games CTF: Test Your Cloud Incident Response Skills

Wiz is excited to announce “The Cloud Hunting Games”, a new hands-on Capture the Flag (CTF) challenge designed to test your cloud incident response skills.

Can you save ExfilCola’s secret recipe?

What happens when a startup with a promising secret soda formula gets hit with a data extortion threat?

That’s the scenario behind our latest cloud security Capture the Flag (CTF) challenge: The ExfilCola Incident. Players step into the shoes of an incident response expert tasked with investigating a suspicious breach at ExfilCola, a fictional soda startup with one very real problem: someone claims to have stolen their secret recipe.

Your mission? Unfold the steps of the attacker, trace them back to the initial access point, and make sure that the secret formula is safe.

Why did we build this challenge?

Cloud threats are evolving fast. Whether it’s data exfiltration, ransomware, or resource hijacking, defenders need hands-on experience with real-world tactics to stay ahead. This CTF is designed to give players a taste of a real-world cloud incident investigation based on common TTPs seen in the wild.

Claim your cloud incident response certificate

All registered participants who complete the challenge will earn a spot on our leaderboard and receive an official certificate to recognize their cloud incident response skills.

Are you ready to stop the leak?

Inspired by real-world cloud attacks, The Cloud Hunting Games CTF challenge gives you a hands-on way to sharpen your incident response skills.

Start Investigation

The Cloud Hunting Games CTF was designed by the expert Wiz Research team. Questions or need assistance? Contact us at research@wiz.io or on X @wizresearch/@nirohfeld/@DerorTc/@AbbyMCH

Continue reading

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management