20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

90<br />

Without that access, they can’t buy food or make money, along with a<br />

thousand other essential things in life. If you threaten or take control<br />

of a node or certain files—through a DOS attack or some sort of malware,<br />

or anything, people will pay for the safe return of their goods.<br />

This sort of criminal activity is usually labeled ransomware.<br />

One specific and popular type of ransomware involves a hacker<br />

penetrating a node’s defenses and then encrypting key files, usually<br />

tied to a data bomb or some malware that will activate if someone<br />

tries to decrypt the files without the correct passcode. Encryption<br />

ransomware works best on individuals, particularly if the data files<br />

are of a sensitive nature, because decryption programs are restricted<br />

to corporate hackers and licensed freelance security consultants.<br />

> In the spirit of the street finding its own uses for things, there<br />

are a lot of tools and tricks that corps use to secure their own nodes<br />

that can be turned around to prevent them from accessing them. My<br />

favorite security trick is to install a passkey requirement on a node<br />

and then reboot it, dumping all the current users. When they go back<br />

to log on, they don’t have the passkey and get blocked.<br />

> Slamm-0!<br />

The corporations are well aware of ransomware and its repercussions,<br />

so don’t be surprised if you’re on the receiving end<br />

of it some time. I knew a Mr. Johnson for NeoNET that paid us<br />

up front but encrypted the certified credstick and slapped some<br />

IC on it as a form of security; we knew the Johnson would pay<br />

because we could see the cred, but we couldn’t spend it until we<br />

finished the run and he gave us the passcode to disarm the IC and<br />

decrypt the cred. Sneaky bastard.<br />

> A lot of data brokers turn around and sell the datafiles they buy<br />

back to their original owners for a significant mark up. The nasty<br />

ones sell the corp encrypted datafiles then charge them more for<br />

the passcode to decrypt them.<br />

> Cosmo<br />

Hacker trickS<br />

More than riggers, hackers focus on the virtual space of the<br />

Matrix rather than the nitty-gritty infrastructure that supports it.<br />

That’s not to say a hacker won’t take optical trunks and mesh networks<br />

into account, but they’re less likely to be scanning the airwaves<br />

or worry about it as long as they have a solid connection to the ‘trix.<br />

Hacking cyberware<br />

Sometimes, it’s easy to forget that all that chrome doesn’t mean<br />

jack shit without the software running it. That is, until you get an<br />

interface problem and two pieces of ‘ware don’t want to talk to each<br />

other—then it comes to the forefront of your mind. Nowadays, it’s<br />

easier to hack cyberware than ever before, and shadowrunners should<br />

pay close attention to how their implants are wired together.<br />

Most cyberware is set up as peripheral nodes connected to<br />

your PAN during implantation, and configured for open access so<br />

that medtechs can access the implants quickly for diagnostics and<br />

repair. Most internal implants are usually accessible with a lowlevel<br />

wireless connection.<br />

> Shadow clinics and street docs with a little programming expertise<br />

can disable this wireless connection if the client asks, arrange for the<br />

implant to send out false diagnostics, or even upgrade the software<br />

without much trouble.<br />

> Butch<br />

> Okay, but does that mean that if I get into a fight with a hacker or<br />

technomancer they can just reach out and turn off my cyberarm?<br />

> Hard Exit<br />

> Maybe, but probably not. Cyberarms and most implants that have<br />

an exposed area on the body often require direct wired connections<br />

through access ports and the like, not a wireless signal. If you’re<br />

really worried about it, you should keep your cyberarm in hidden<br />

mode—or better yet, turn it off. Not always the best option, but it<br />

prevents hacking.<br />

> Butch<br />

Like any other device, implants are susceptible to viruses and<br />

other malware. The devices most at risk to this sort of tampering<br />

are those connected together through direct neural input<br />

(DNI)—in other words, any implant that you can control with<br />

a thought. To prevent a single virus or worm from infecting all<br />

of their systems, many street samurai and other implant-heavy<br />

runners front-load a high firewall on critical access points like<br />

datajacks. If the malware can’t get past the datajack, it can’t infect<br />

the rest of the DNI implants in your system.<br />

> Cyberware hacking can work to your advantage too, though. Just<br />

as an example, most people don’t realize that a smartlink is wireless.<br />

That means you can send a command to your smartgun even<br />

if you’re not holding it. And a hacker can spoof a command to that<br />

smartgun as well.<br />

> DangerSensei<br />

Unwired<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!