Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech CyBa Trojan Malware

Status
Not open for further replies.
o8NFdL4.png

| Image Source and OOC |
Image Source: ASCII art by Phillip Kaulfus or LGB, not sure. Re-color by me.
Intent: To create a program capable of electronically keeping information for ransom and add a valuable tool to Jennifer’s virtual toolbox.
Development Thread: N/A

| Roleplay Information |
Name: Cyanide Bandaid
Nickname: CyBa
Manufacturer: Phoenix and J03
Model: CyBa Version 3.5
Affiliation: Phoenix [and friends]
Modularity: Yes [it is code]
Production: It is a program.
Classification: Malware
Material: 1’s and 0’s. Or whatever the star wars equivalent is.

Strengths:
  • Hard to break – Once the information that CyBa wants to hold hostage have been encrypted, it is hard to do much about the malware as the key to the encryption is stored externally on a server of the attackers choosing. This is not to say the encryption is impossible to break, but it is impractical, requiring enormous processing power to get done at a reasonable pace. Because a deadline is usually set for the deletion of the hostage files, it usually prevents the usage of high-powered super computers.
  • Theft – When CyBa have encrypted the target files, the attacker is able to transfer the files onto their own device and use/open/read them.
Weaknesses:
  • Penetration – The CyBa is not a program designed to penetrate security measures and usually relies on the fact that nobody expects the malware to attack them. It is often hidden within non-conspicuous files, send by seemingly legitimate businesses or people. This means that in order to get CyBa onto any major system it would require physical access or the work of a talented slicer.
  • Restricted Access – If the intrusion of the CyBa is spotted in due time, its access to the target files can become restricted. Which obviously hinders it in carrying out its function. However, it is to be noted that due to its subtle nature it is often very hard to spot its presence unless the system is being severely monitored by an experienced slicer.
  • Backup – Make backups of your stuff people. If CyBa attacks a computer with backups and does not get to encrypt the backup files (which it usually attempts to) or if the backup is on a storage unit not linked to the computer, CyBa is of little threat.
| Description |
CyBa is a computer program that can be classified as a Ransomware Trojan. It is usually spread via holonet links, attachments, mail and can also be spread via the use of botnets. It is also not unusual for the CyBa to be used to intentionally target files or people of interest. When CyBa have spread onto a device, it works by either grabbing hold of specific files chosen by the attacker or by grabbing as many files as possible.

While the encryption can’t be broken without immense effort and help from super computers, CyBa’s access to files it have yet to encrypt on the infected computer can become restricted. However, due to the subtle nature of CyBa during its entry phase, it is often very hard to spot its presence unless the system is being severely monitored by an experienced slicer.

After CyBa have entered a system and have encrypted the targeted files, it blocks the usage of the files, making it so the files cannot be opened or used on the infected device or any other device for that matter, as the files are effectively encrypted. After this have been successfully put in place, a message will appear on the infected computer’s dashboard. The message is able to be customized by the attacker, but usually requires the infected devices owner to buy back their encrypted files from the attacker.

Often a deadline is put into the mix, making it so the ransom has to be paid in a certain amount of time. If the ransom is not paid, the files will be deleted from the device and junk files will be spewed onto the computer in order to effectively attempt to overwrite the data on the storage device where the files are located. At times, the files are not deleted, but instead left in the computer. Such a fate is for almost everyone just as bad, as the files are virtually useless without the encryption key or a super computer (and a lot of time).

Cyanide Bandaid was made in a combined effort by the slicers known as J03 and Phoenix, using their individual skills in Malware and Encryption respectively to in combination make a tool of this caliber.

Links:
 
RESEARCH REVIEW
-----
Star Wars Canon:
Pending initial review
------
Starwars Chaos:
Pending initial review
------
WITHOUT DEV THREADS
Pending initial review
------
WITH DEV THREADS
Pending Initial review
------
SUGGESTIONS
Pending Inital review
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom