Silent Trader - Mission Headquarters

Overview

Operation Silent Trader

Operation Silent Trader places you at the helm of the Cyber Security Response Team for the London Stock Exchange (LSE), defending one of the world’s largest financial institutions from a highly sophisticated cyberattack.

Your team must safeguard core electronic trading systems while adversaries attempt to manipulate market algorithms and exploit timing discrepancies for profit.

The stakes: continuity of operations, public trust, and the stability of international markets.

Watch a 2:30min video that sets the stage for your Teaming Mission.
Your Team

Cyber Security Response Team

As the Cyber Security Response Team for the London Stock Exchange (LSE), you are responsible for identifying, containing, and remediating cyber threats affecting electronic trading platforms.

You operate in real time under market pressure, coordinating with operations, trading technology, legal and compliance teams, and UK regulators.

  • Monitor and analyse threat intelligence tied to market operations
  • Coordinate rapid containment with trading and network teams
  • Preserve evidence for post-incident review
LSE cyber response team working an incident
High-tempo, time-sensitive cyber response in a live market environment.
Operating context

London Stock Exchange (LSE)

Originating in the late 17th century, the London Stock Exchange has evolved into one of the world’s most significant financial marketplaces, supporting trillions of pounds in market value.

Learn more via LSE’s Market Fundamentals .

Historic and modern London Stock Exchange
From Jonathan’s Coffee House to a global electronic marketplace.

The LSE operates within a strict UK regulatory framework governed by the FCA, Bank of England, and National Cyber Security Centre to preserve market integrity and confidence.

Operating context

Electronic trading at the LSE

Electronic trading has transformed global markets through automation, low-latency networking, algorithmic execution, and regulated post-trade reporting.

Electronic trading workflow
Order → routing → execution → clearing → reporting

How a trade flows

Orders are generated by traders or algorithms, routed to venues based on price and liquidity, executed, then passed to clearing and settlement systems.

Why cyber matters

Each step presents an attack surface. Manipulation or delay can undermine market confidence and trigger regulatory breaches.

Threat environment

Cyber Threat Environment

Financially motivated actors target credentials, deploy ransomware, or manipulate trading data for profit.

Strategically motivated threats aim to erode confidence through disruption, data corruption, or denial of service.

These threats often overlap, compounding operational and reputational risk.

Threat environment

Advanced Persistent Threats (APTs)

Advanced Persistent Threats (APTs) are targeted, long-duration intrusions designed to stay hidden inside critical environments. For the LSE, the risk isn’t only “getting hacked” — it’s an attacker quietly learning systems, exploiting trust relationships, and choosing the moment to manipulate data, disrupt trading, or undermine confidence.


APT lifecycle: reconnaissance, initial intrusion, establish persistence, lateral movement, objective action, maintain access, cover tracks
APT lifecycle — get in → stay in → move → act → stay hidden.

1. Reconnaissance

OSINT and supplier research to identify targets, access pathways, and weak links.

2. Initial intrusion

Credential theft, phishing, or exploitation of exposed services to gain a foothold.

3. Establish persistence

Backdoors, hidden accounts, or command channels to ensure repeatable access.

4. Lateral movement

Privilege escalation and movement toward high-value systems and identity controls.

5. Objective action

Exfiltrate sensitive data, disrupt services, or manipulate trading-relevant information.

6. Maintain access

Redundancy in tooling and credentials to survive containment and remediation.

7. Cover tracks

Log tampering and artefact cleanup to delay detection and complicate forensics.

Pre-Briefing Checklist

Before you advance to the Mission Briefing please ensure:

  • everyone has read the information above
  • your Facilitator and all Team Members share a good video connection
Scroll to Top