Analyze malware samples. Identify threat actors.
Analyze malware samples using forensic tools. Identify the malware type and attribute it to known threat actors. Score points for correct identifications.