TRACE THE SIGNAL

You boot into a secure Linux distro from a thumb drive. Packet-sniffing tools activated. The chase is on.

You start analyzing the malware’s traffic patterns. It’s bouncing through multiple proxies, but one of them… slips.

"...Ping back detected. Server in Bucharest."

What do you do next?

  1. Attempt to connect and infiltrate the Bucharest server.
  2. Alert international cybercrime units about the IP.
  3. Send a fake payload to confuse the hackers.