N
NEXUSCORP
ALERT

OPERATION NEXUS

5 rounds. Find the insider. Disarm the killswitch. Save the infrastructure.

1

Find the Insider

NEXUS security systems have detected an unauthorized late-night access to Server Room B. Our monitoring flagged an entry at exactly 23:47 on March 15, 2045. This access occurred outside the approved maintenance window and was not pre-authorized. Your first task is to identify the employee who made this access.

2

Trace Communications

You've identified the insider. Now we need to understand what they were planning and who else is involved. The insider may have been communicating with accomplices through NEXUS's internal messaging system. Search their communications to uncover the plot.

3

Map the Network

The insider was working with accomplices. But the conspiracy may extend further. We need to map the full network of potentially compromised employees. Find everyone connected to the insider's direct contacts within 2 degrees of communication, and assess their access levels.

4

Locate the Threat

Intelligence suggests that one of the compromised employees has gained physical access to a critical facility. They booked a room after hours — outside the standard 06:00–20:00 business window. We need to find which employee, which room, and what equipment they had access to.

5

Secure the Server

We've located the threat: Server NX-7042 in the Underground Server Vault (Room F-12) has been compromised through a firmware vulnerability. NEXUS security has released an emergency patch to close the exploit. Your mission is to apply the correct security patch through the NEXUS Control Panel. The control panel requires four things: the server ID, the correct patch ID, an authorization code, and a written justification. According to NEXUS patching procedures, the authorization code follows the format [Badge Number]-[Room Code]. The badge number must belong to an employee with access to the facility where the server is located, and the room code is the facility identifier.