20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

122<br />

Jingle<br />

Infected Program Types: Common, Hacking<br />

A spam virus, Jingle bombards users of the node (in both<br />

AR and VR) with pop-up advertisements, spam messages, dubious<br />

offers, commercial jingles, or even politically-motivated media<br />

blitzes (anti-corporate, eco, anti-meta, anti-fascist, etc.).<br />

Looper<br />

Infected Program Types: Simsense (Activesofts)<br />

Skillsofts infected with the Looper virus have trouble interacting<br />

with the firmware of the character’s knowsoft link or<br />

skillwires. Whenever the skillsoft is used, the character will be<br />

caught in a feedback loop and will become unable to stop using<br />

the skill forcing the user to repeat an action over and over. The<br />

effect lasts (Virus rating) hours, or until the virus is purged.<br />

pacifist<br />

Infected Program Types: Combat programs<br />

This specialized variant of the Inertia virus specifically targets<br />

programs used in cybercombat. Although it appears as if they<br />

function normally, the virulent code prevents the program from<br />

actually translating damage to the target’s condition monitor or in<br />

the form of lethal biofeedback.<br />

Slave<br />

Infected Program Types: Common, Hacking,<br />

This prankster virus blocks the user from executing certain<br />

actions or commands (accessing an icon, browsing, using a specific<br />

program, transferring cash) until he has followed an “order” from<br />

the virus (for example, reciting a certain political slogan, visiting a<br />

certain Matrix site, donating cred to a certain cause, sent a photo<br />

to certain address, etc.). Though following these orders may slow<br />

the user down, this virus is intended to annoy the user more than<br />

cause lasting damage.<br />

Splice<br />

Infected Program Types: Common, Hacking, Autosoft<br />

Similar to activators or deactivator (p. 116, Augmentation),<br />

the virus either subscribes or unsubscribes the persona to various<br />

nodes without the user’s permission.<br />

Swiss cheese<br />

Infected Program Types: Common, Hacking, Autosoft?<br />

This virus impairs the effectiveness of the commlink’s firewall,<br />

effectively reducing its rating by 1 per copy of the virus in<br />

the node.<br />

ticker<br />

Infected Program Types: Common, Hacking, Autosoft<br />

This virus is designed to try and crash a node after a pre-programmed<br />

amount of time has past. Once the timer has activated,<br />

the virus attempts to crash the OS, rolling its Virus rating x 2 in<br />

place of Hacking + Attack (see Crash Program/OS, p. 223, SR4).<br />

Unplug<br />

Infected Program Types: Common, Hacking<br />

One of the most malevolent viruses out there, Unplug is designed<br />

to reformat a node, deleting the entire OS and all programs<br />

and data within memory. Once it has infected a node, the virus<br />

makes an Virus rating x 2 (System + <strong>Firewall</strong>, 1 minute) Extended<br />

Test. As soon as the reformatting begins, the OS will <strong>alert</strong> all security<br />

and admin users, so that they may take action to eradicate the<br />

virus and cancel the reformatting.<br />

worMS<br />

Worms are reactive and autonomous malware agents used<br />

specifically to target nodes. Worms are designed to spread actively<br />

to achieve certain goals, impair or disrupt computer systems or<br />

commlink networks, delete or encrypt files, acquire and send<br />

documents, or to create zombies and botnets.<br />

Worms are treated as independent intruding agents for rule<br />

purposes, using the Response attribute of the node on which they<br />

are currently operating (or conquering). Although a number of<br />

worms possess the ability to replicate by the means of a special<br />

agent autosoft (p. 112), not all worms require this special program<br />

to be effective malware.<br />

encountering worms<br />

Since worms are basically agents, they cannot be disinfected<br />

or purged by antiviral software—they must instead be overcome<br />

in cybercombat. Another option is to shut down the node, which<br />

dumps the worm.<br />

SaMpLe worMS<br />

Here are a few examples of worm templates designed to perform<br />

different tasks in a node.<br />

Baitworms<br />

Baitworms provoke intrusion alarms in infiltrated nodes to<br />

draw the attention of IC and spiders, allowing the hacker that<br />

deployed it to sneak past the distracted virtual opposition.<br />

Programs: Armor, Attack, Exploit<br />

Autosoft: Replicate<br />

crashworms<br />

Crashworms seek to undermine software integrity, causing<br />

programs to crash or suffer from induced errors. Besides crashing<br />

programs and operating systems, these worms are also sometimes<br />

used to intentionally seed bugs into software loaded onto a node.<br />

To accomplish this, the crashworm must either find a program’s<br />

source code or crack it using Pilot rating (see Piracy, p. 94), and<br />

then insert the bug using the rules for Adding Bugs, p. 119. Hackers<br />

can also load a crashworm with an already buggy program, and<br />

instruct it to overwrite existing software with the buggy version.<br />

Programs: Attack, Browse, Edit, Exploit, Stealth<br />

Autosoft: Replicate<br />

cryptoworm<br />

Cryptoworms are designed for cryptoviral extortion attacks.<br />

Once they have infiltrated a node, they either encrypt network<br />

communications or stored files, preventing other users from accessing<br />

them. While some cryptoworms are used to force the owner<br />

into paying for the encryption keys (so-called “ransomware”),<br />

hackers also use them to temporarily blind or impede security<br />

networks and spiders during runs.<br />

Programs: Browse, Edit, Encrypt, Exploit, Stealth<br />

Unwired<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!