The breach spreads

It didn’t stop with Sky, It never does.
By the time Baz isolated Sky’s machine, the payload had already moved.
Mo Taylor’s files, encrypted.
Shared project folders, locked down.
Client proposals, gone.
Backups, compromised.
Meetings cancelled.
Emails frozen.
Phones ringing.
Jo’s name now attached to apology emails.
Sky sits at their desk, staring at the black screen.
No one’s shouting.
No one’s pointing fingers.
But they don’t need to.
It only took one click.
One decision.
Not malicious.
Not careless.
Just normal human behaviour, with no map, no plan, no protection.
Baz debriefs later:
“It was just a CV.
Just a file.
Just enough to open the door.”
And somewhere, hidden between the corrupted code and encrypted drives, the attacker known as Lure smiles:
Reflection:
Breaches aren’t just technical failures.
They’re human ones.
Gaps in awareness.
Gaps in culture.
Gaps waiting for someone—anyone—to fall through.
This scenario reflects a real world tactic used against businesses of every size.
NCSC's Cyber Essentials calls for:
- User training
- Clear escalation paths
- Regular awareness exercises
Because without them, trust becomes a vulnerability.
What’s next?
- Replay Shadow file #001 and make different decisions
- Return to the Shadow Files Index
- Download the Cyber Resilience Starter Kit
Shadow File #002 – Glitch in the Routine… coming soon...
Stay in the Loop
New Shadow Files are coming soon; where your decisions shape the story.
Sign up to be the first to know when a new case goes live.
