Infrastructure Scenario Tests

We test Corax against real-world infrastructure failures across every vendor, platform, and scenario. Browse the results below.

21,502
Total Tests
100.0%
Pass Rate
21,502
Passed
0
Failed

WatchGuard AuthPoint MFA Outage

PASS

The WatchGuard AuthPoint cloud MFA service becomes unreachable, preventing all multi-factor authentication for VPN, web applications, and network access across the organization.

SecurityPattern: SERVER_ERRORSeverity: CRITICALConfidence: 85%Remote Hands21 correlated

Sophos Intercept X False Positive Blocking Business App

PASS

Sophos Intercept X behavioral analysis blocks a legitimate custom in-house application as ransomware due to its file encryption behavior (the app encrypts documents for secure transfer), preventing a critical business process.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands21 correlated

Sophos Central EDR Quarantine Storm

PASS

A Sophos Central Intercept X update causes the EDR engine to quarantine a critical Windows system DLL across all managed endpoints, rendering 300 workstations unable to run key business applications.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands20 correlated

Sophos XG WAF Rule Blocking Customer Portal

PASS

A Sophos XG 330 web application protection rule blocks legitimate customer portal traffic by flagging JSON API payloads as SQL injection attempts, preventing all customer-facing operations.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands21 correlated

Cryptojacking on Production Servers — CPU Exhaustion

PASS

An attacker deploys cryptocurrency mining malware on 5 production servers after exploiting an unpatched vulnerability in a web management interface. The miners consume 90%+ CPU across all affected servers, causing severe performance degradation for production workloads. The mining pool connections are obfuscated through DNS-over-HTTPS to avoid detection.

SecurityPattern: HIGH_CPUSeverity: CRITICALConfidence: 95%Auto-Heal57 correlated

Insider Threat — Systematic Data Exfiltration by Departing Employee

PASS

A senior database administrator who submitted their resignation 2 weeks ago is systematically exfiltrating customer data. The DBA is running bulk SELECT queries during off-hours, compressing the results, and uploading them to a personal cloud storage account via HTTPS. DLP sensors detect the anomalous data transfer patterns.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands47 correlated

Zero-Day Exploit Detected — Active Exploitation of Unpatched Vulnerability

PASS

A zero-day remote code execution vulnerability in the Apache Struts framework is being actively exploited against the organization's public-facing Java applications. The EDR detects suspicious process execution patterns consistent with the exploit. CISA has not yet issued an advisory but threat intel feeds show active exploitation in the wild.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands46 correlated

Supply Chain Compromise — Malicious NPM Package

PASS

A popular NPM package used across the organization's Node.js microservices is compromised via a maintainer account takeover. The malicious version exfiltrates environment variables (including database credentials and API keys) to an attacker-controlled endpoint. The compromised package was automatically pulled in during a routine CI/CD build.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands42 correlated

MFA Bypass via SIM Swap — Executive Account Takeover

PASS

An attacker performs a SIM swap attack on the CEO's mobile carrier to intercept SMS-based MFA codes. Using previously phished credentials and the intercepted MFA codes, the attacker gains access to the CEO's email, financial systems, and wire transfer approval authority. The attacker initiates a fraudulent wire transfer for $2.4M.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands42 correlated

Privilege Escalation via Sudo Misconfiguration

PASS

An attacker with a low-privilege shell exploits a misconfigured sudoers entry that allows NOPASSWD execution of a text editor (vim). The attacker uses vim's shell escape to gain root access on 4 production servers. The misconfiguration was deployed via Ansible to all servers in the 'webservers' group.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands42 correlated

Brute Force SSH Attack — Distributed Botnet

PASS

A distributed botnet launches a coordinated brute force SSH attack against the organization's public-facing servers. Over 50,000 login attempts per hour from 2,000+ unique IP addresses. Several service accounts with weak passwords are compromised. The attackers establish reverse shells on 3 servers.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 85%Remote Hands51 correlated

Managed Firewall Policy Push Failure — Client Exposed

PASS

A firewall policy update pushed to 8 client firewalls fails on 3 of them, leaving those clients with an incomplete ruleset that allows unrestricted outbound traffic. The policy push failure went unnoticed because the management platform showed a false success status.

SecurityPattern: FIREWALL_RULE_BLOCKSeverity: CRITICALConfidence: 85%Remote Hands36 correlated

Client VPN Credential Compromise — Unauthorized Access

PASS

A client's VPN credentials are found on a dark web dump. Unauthorized connections are detected from foreign IPs through the client's site-to-site VPN tunnel. The attacker is pivoting through the VPN to access internal resources. Immediate tunnel teardown and credential rotation required.

SecurityPattern: VPN_TUNNEL_DOWNSeverity: CRITICALConfidence: 90%Remote Hands42 correlated

Ransomware Lateral Movement via SMB

PASS

Ransomware (LockBit 3.0 variant) is detected spreading laterally via SMB (port 445) from a compromised workstation. The malware is encrypting shared drives and attempting to reach backup servers. 3 file servers already affected. EDR alerts are firing but automated containment is not configured.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands57 correlated

Multi-Tenant DNS Poisoning Attack

PASS

An attacker compromises the internal DNS server and injects fraudulent A records for banking and M365 login pages. Users are redirected to phishing pages that harvest credentials. The poisoned cache affects 3 client tenants on the MSP's shared DNS infrastructure.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands56 correlated

Ransomware Encryption Detected on File Server

PASS

A ransomware attack is actively encrypting files on the primary file server. Hundreds of files are being renamed with .encrypted extension. Multiple users report locked files. The attack originated from a phished employee workstation.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands13 correlated
PreviousPage 2 of 2

Every scenario is tested against Corax's Neural Engine in a production environment with AI-powered root cause analysis.

Tests run continuously as new infrastructure patterns are added.