comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
122<br />
Jingle<br />
Infected Program Types: Common, Hacking<br />
A spam virus, Jingle bombards users of the node (in both<br />
AR and VR) with pop-up advertisements, spam messages, dubious<br />
offers, commercial jingles, or even politically-motivated media<br />
blitzes (anti-corporate, eco, anti-meta, anti-fascist, etc.).<br />
Looper<br />
Infected Program Types: Simsense (Activesofts)<br />
Skillsofts infected with the Looper virus have trouble interacting<br />
with the firmware of the character’s knowsoft link or<br />
skillwires. Whenever the skillsoft is used, the character will be<br />
caught in a feedback loop and will become unable to stop using<br />
the skill forcing the user to repeat an action over and over. The<br />
effect lasts (Virus rating) hours, or until the virus is purged.<br />
pacifist<br />
Infected Program Types: Combat programs<br />
This specialized variant of the Inertia virus specifically targets<br />
programs used in cybercombat. Although it appears as if they<br />
function normally, the virulent code prevents the program from<br />
actually translating damage to the target’s condition monitor or in<br />
the form of lethal biofeedback.<br />
Slave<br />
Infected Program Types: Common, Hacking,<br />
This prankster virus blocks the user from executing certain<br />
actions or commands (accessing an icon, browsing, using a specific<br />
program, transferring cash) until he has followed an “order” from<br />
the virus (for example, reciting a certain political slogan, visiting a<br />
certain Matrix site, donating cred to a certain cause, sent a photo<br />
to certain address, etc.). Though following these orders may slow<br />
the user down, this virus is intended to annoy the user more than<br />
cause lasting damage.<br />
Splice<br />
Infected Program Types: Common, Hacking, Autosoft<br />
Similar to activators or deactivator (p. 116, Augmentation),<br />
the virus either subscribes or unsubscribes the persona to various<br />
nodes without the user’s permission.<br />
Swiss cheese<br />
Infected Program Types: Common, Hacking, Autosoft?<br />
This virus impairs the effectiveness of the commlink’s firewall,<br />
effectively reducing its rating by 1 per copy of the virus in<br />
the node.<br />
ticker<br />
Infected Program Types: Common, Hacking, Autosoft<br />
This virus is designed to try and crash a node after a pre-programmed<br />
amount of time has past. Once the timer has activated,<br />
the virus attempts to crash the OS, rolling its Virus rating x 2 in<br />
place of Hacking + Attack (see Crash Program/OS, p. 223, SR4).<br />
Unplug<br />
Infected Program Types: Common, Hacking<br />
One of the most malevolent viruses out there, Unplug is designed<br />
to reformat a node, deleting the entire OS and all programs<br />
and data within memory. Once it has infected a node, the virus<br />
makes an Virus rating x 2 (System + <strong>Firewall</strong>, 1 minute) Extended<br />
Test. As soon as the reformatting begins, the OS will <strong>alert</strong> all security<br />
and admin users, so that they may take action to eradicate the<br />
virus and cancel the reformatting.<br />
worMS<br />
Worms are reactive and autonomous malware agents used<br />
specifically to target nodes. Worms are designed to spread actively<br />
to achieve certain goals, impair or disrupt computer systems or<br />
commlink networks, delete or encrypt files, acquire and send<br />
documents, or to create zombies and botnets.<br />
Worms are treated as independent intruding agents for rule<br />
purposes, using the Response attribute of the node on which they<br />
are currently operating (or conquering). Although a number of<br />
worms possess the ability to replicate by the means of a special<br />
agent autosoft (p. 112), not all worms require this special program<br />
to be effective malware.<br />
encountering worms<br />
Since worms are basically agents, they cannot be disinfected<br />
or purged by antiviral software—they must instead be overcome<br />
in cybercombat. Another option is to shut down the node, which<br />
dumps the worm.<br />
SaMpLe worMS<br />
Here are a few examples of worm templates designed to perform<br />
different tasks in a node.<br />
Baitworms<br />
Baitworms provoke intrusion alarms in infiltrated nodes to<br />
draw the attention of IC and spiders, allowing the hacker that<br />
deployed it to sneak past the distracted virtual opposition.<br />
Programs: Armor, Attack, Exploit<br />
Autosoft: Replicate<br />
crashworms<br />
Crashworms seek to undermine software integrity, causing<br />
programs to crash or suffer from induced errors. Besides crashing<br />
programs and operating systems, these worms are also sometimes<br />
used to intentionally seed bugs into software loaded onto a node.<br />
To accomplish this, the crashworm must either find a program’s<br />
source code or crack it using Pilot rating (see Piracy, p. 94), and<br />
then insert the bug using the rules for Adding Bugs, p. 119. Hackers<br />
can also load a crashworm with an already buggy program, and<br />
instruct it to overwrite existing software with the buggy version.<br />
Programs: Attack, Browse, Edit, Exploit, Stealth<br />
Autosoft: Replicate<br />
cryptoworm<br />
Cryptoworms are designed for cryptoviral extortion attacks.<br />
Once they have infiltrated a node, they either encrypt network<br />
communications or stored files, preventing other users from accessing<br />
them. While some cryptoworms are used to force the owner<br />
into paying for the encryption keys (so-called “ransomware”),<br />
hackers also use them to temporarily blind or impede security<br />
networks and spiders during runs.<br />
Programs: Browse, Edit, Encrypt, Exploit, Stealth<br />
Unwired<br />
Simon Wentworth (order #1132857) 9