Simulation note: This mini-site is a controlled teaching artefact for the fictional case study The LotusCare Breach.
It mimics common ransomware “proof pack” patterns. Content is fictional and safe for classroom use.
LotusCare — Proof Pack
A limited proof sample released to demonstrate claimed access. This is not the full dataset.
| Artefact | Type | Access | Description |
|---|---|---|---|
| README.txt | TXT | Open | Attacker statement accompanying the sample release |
| File_Index.txt | TXT | Open | Claimed overview of data allegedly exfiltrated |
| tagger_run_summary.txt | TXT | Open | Timing snapshot of tagged/scored activity (unverified) |
| Client_Intake_Sample.csv | CSV | Open | Excerpt of client intake metadata |
| HR_Employee_List_Redacted.csv | CSV | Open | Partial internal HR records (redacted) |
| Billing_Claims_Excerpt.txt | TXT | Open | Excerpt of billing and financial data |
| Internal_Email_Screenshot.png | PNG | Open | Screenshot of internal email thread referencing backups and integrity checks (fictional) |
Authenticity has not been independently verified. Operator claims can be exaggerated or misleading.