comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
90<br />
Without that access, they can’t buy food or make money, along with a<br />
thousand other essential things in life. If you threaten or take control<br />
of a node or certain files—through a DOS attack or some sort of malware,<br />
or anything, people will pay for the safe return of their goods.<br />
This sort of criminal activity is usually labeled ransomware.<br />
One specific and popular type of ransomware involves a hacker<br />
penetrating a node’s defenses and then encrypting key files, usually<br />
tied to a data bomb or some malware that will activate if someone<br />
tries to decrypt the files without the correct passcode. Encryption<br />
ransomware works best on individuals, particularly if the data files<br />
are of a sensitive nature, because decryption programs are restricted<br />
to corporate hackers and licensed freelance security consultants.<br />
> In the spirit of the street finding its own uses for things, there<br />
are a lot of tools and tricks that corps use to secure their own nodes<br />
that can be turned around to prevent them from accessing them. My<br />
favorite security trick is to install a passkey requirement on a node<br />
and then reboot it, dumping all the current users. When they go back<br />
to log on, they don’t have the passkey and get blocked.<br />
> Slamm-0!<br />
The corporations are well aware of ransomware and its repercussions,<br />
so don’t be surprised if you’re on the receiving end<br />
of it some time. I knew a Mr. Johnson for NeoNET that paid us<br />
up front but encrypted the certified credstick and slapped some<br />
IC on it as a form of security; we knew the Johnson would pay<br />
because we could see the cred, but we couldn’t spend it until we<br />
finished the run and he gave us the passcode to disarm the IC and<br />
decrypt the cred. Sneaky bastard.<br />
> A lot of data brokers turn around and sell the datafiles they buy<br />
back to their original owners for a significant mark up. The nasty<br />
ones sell the corp encrypted datafiles then charge them more for<br />
the passcode to decrypt them.<br />
> Cosmo<br />
Hacker trickS<br />
More than riggers, hackers focus on the virtual space of the<br />
Matrix rather than the nitty-gritty infrastructure that supports it.<br />
That’s not to say a hacker won’t take optical trunks and mesh networks<br />
into account, but they’re less likely to be scanning the airwaves<br />
or worry about it as long as they have a solid connection to the ‘trix.<br />
Hacking cyberware<br />
Sometimes, it’s easy to forget that all that chrome doesn’t mean<br />
jack shit without the software running it. That is, until you get an<br />
interface problem and two pieces of ‘ware don’t want to talk to each<br />
other—then it comes to the forefront of your mind. Nowadays, it’s<br />
easier to hack cyberware than ever before, and shadowrunners should<br />
pay close attention to how their implants are wired together.<br />
Most cyberware is set up as peripheral nodes connected to<br />
your PAN during implantation, and configured for open access so<br />
that medtechs can access the implants quickly for diagnostics and<br />
repair. Most internal implants are usually accessible with a lowlevel<br />
wireless connection.<br />
> Shadow clinics and street docs with a little programming expertise<br />
can disable this wireless connection if the client asks, arrange for the<br />
implant to send out false diagnostics, or even upgrade the software<br />
without much trouble.<br />
> Butch<br />
> Okay, but does that mean that if I get into a fight with a hacker or<br />
technomancer they can just reach out and turn off my cyberarm?<br />
> Hard Exit<br />
> Maybe, but probably not. Cyberarms and most implants that have<br />
an exposed area on the body often require direct wired connections<br />
through access ports and the like, not a wireless signal. If you’re<br />
really worried about it, you should keep your cyberarm in hidden<br />
mode—or better yet, turn it off. Not always the best option, but it<br />
prevents hacking.<br />
> Butch<br />
Like any other device, implants are susceptible to viruses and<br />
other malware. The devices most at risk to this sort of tampering<br />
are those connected together through direct neural input<br />
(DNI)—in other words, any implant that you can control with<br />
a thought. To prevent a single virus or worm from infecting all<br />
of their systems, many street samurai and other implant-heavy<br />
runners front-load a high firewall on critical access points like<br />
datajacks. If the malware can’t get past the datajack, it can’t infect<br />
the rest of the DNI implants in your system.<br />
> Cyberware hacking can work to your advantage too, though. Just<br />
as an example, most people don’t realize that a smartlink is wireless.<br />
That means you can send a command to your smartgun even<br />
if you’re not holding it. And a hacker can spoof a command to that<br />
smartgun as well.<br />
> DangerSensei<br />
Unwired<br />
Simon Wentworth (order #1132857) 9