Welcome! These forums will be deactivated by the end of this year. The conversation continues in a new morph over on Discord! Please join us there for a more active conversation and the occasional opportunity to ask developers questions directly! Go to the PS+ Discord Server.

Malware/Worms/Virii

25 posts / 0 new
Last post
Prime Mover Prime Mover's picture
Malware/Worms/Virii
Malware,worms and virii are described as being common,dangerous and coming in great variety. But I can't find any hard mechanics for what they can do and how they can do it. Been pouring back over the book and I've found a half dozen or more references including programing it and bia's against it Some habitats fear it and scan on arrival for it. It can take over your ecto. So what can it do and how does it do it? Is there a mechanic for it I'm missing?
"The difference between truth and fiction, people expect fiction to make sense."
Rhyx Rhyx's picture
Re: Malware/Worms/Virii
So what can a a virus/worm/malware do? There aren't exactly any pieces of hard data on it in the books, however a good place to start would be AI because infosec counts as an active skill. So most AI seem to have an infosec skill rating at about 40. A good place to start! Now if you want a really cutting edge virus give it a mesh gear modifier, in this case let's make it a next generation device so +20. Your little virus now has an infosec of 60. Not bad little guy! What does it do? What do you want it to do? Viruses today can do a lot of stuff from passive spying to denial of service attacks, I can only imagine what they will be able to do then. In short a virus can make you become the sysadmin for the system you successfully log on into, taking control of it. What can you do with a virus...anything the sysadmin can. I would start looking through programs and scorchers for ideas (pg.331-332 core book) For grins a list: Programs AR Illusions: The "La Vie en Rose" virus puts a pink filter over your AR display while playing Edith Piaf's song http://www.youtube.com/watch?v=rKgcKYTStMc over and over again perpetually. Moderate negative modifier -20 to all mesh actions. Facial/image Recognition: The "Snitch" virus is set to find one specific face and will alert virus' owner of when that person enters the area of the infected system. Can be slaved to Spam, messages, other viruses or even bombs. Sniffer: The "Manchurian Mailman" virus will quietly forward all the messages on a hosts' machine. Spoof: The "Chauffeur" virus will reroute the infected vehicle to a pre-specified location. Popular with kidnappers, criminal kingpins and other people who wish for their locations to be secret. Scorchers Bedlam: The "Strange Eons" virus will slowly start to create some AR illusions that mimic Lovecraftian horror building the tension slowly but steadily. Can be slaved to the Snitch so that the horror only happens around a certain individual, leading the infected to believe that the person is the source. Highly illegal. Nightmare: The "Spiders Spiders Everywhere" virus works well with someone using circadian regulation. Whenever the regulator goes to REM sleep mode, the virus activates the Nightmare program that slowly filters through the dream transforming it into a real very vivid nightmare. Prolonged exposure may cause heavy psychological damage and instill phobias. Shutter: The "In the Land of the Blind" virus recalibrate the hosts entoptic AR interface to set it's gamma very high making it almost impossible to see and locks out the user. Lacks in finesse but gets the job done.
Prime Mover Prime Mover's picture
Re: Malware/Worms/Virii
A great list full of sweet examples that I'm sure we can build on. But I'm curious was this info something left out on purpose, accident or slatted for a future book?
"The difference between truth and fiction, people expect fiction to make sense."
CodeBreaker CodeBreaker's picture
Re: Malware/Worms/Virii
Just a quick aside that may help if you want to design your own semi-intelligent Hacker virus'. The AI examples given in the gear system work on a fairly easy to work out threshold system, where each cost category gets a certain amount of CP to work from. If you wanted to make your own virus AI you can use the ones I worked out when I did my Morph design bit; Low = 75CP (Expected, no Low example AIs to check against) Moderate = 150CP High = 300CP Expensive = 400CP All Aptitudes start at 10 All Aptitudes are limited to a rating of 20 All Active Skills are limited to a rating of 40 All Knowledge Skills are limited to a rating of 90 All CP Costs are equal to those for Character Creation EDIT: Basically I think that such technology has probably developed to a mature level, and any such virus' could be handled by making it an AI with the Infosec skill. Then all you have to do is handle it like it was a person breaking in and fiddling with things.
-
Arenamontanus Arenamontanus's picture
Re: Malware/Worms/Virii
Most malware doesn't need stats because it is too minor - leeching a bit of bandwidth to send religious spam to Luna, adding adverts to your AR, copying itself into other places. When my players arrived in Extropia one of the current issues was this month's explosion of microtort spam - literally hundreds of millions of semi-autonomous litigating agents suing everything they interacted with, clogging up spam filters and generally annoying people. But enough muses, AIs and other systems paid their trivial fees to stop annoying them, which of course allowed them to buy more processor time to sue some more. And thanks to nanotech you can even get physical spam: tiny ad-creatures that get in everywhere, touting some product nobody in their right mind want. Except that some might be hacked and run by people or things doing spying.
Extropian
Prime Mover Prime Mover's picture
Re: Malware/Worms/Virii
So am I right in assuming then folks are treating malware as an agi/infomorph/aI for purpose's of interacting with the mesh?
"The difference between truth and fiction, people expect fiction to make sense."
babayaga babayaga's picture
Re: Malware/Worms/Virii
Prime Mover wrote:
So am I right in assuming then folks are treating malware as an agi/infomorph/aI for purpose's of interacting with the mesh?
Not us! :D In our game only the most serious malware is that sophisticated. Generally we model malware simply as an environmental hazard, with specific effects that you can avoid with an Infosec test, perhaps with a bonus if you ask for some favors from friends "in the know" - and of course the usual bonuses about top grade equipment (but penalties from outdated equipment become bonuses instead, because the malware is often not built for old systems!), extra time, related knowledges etc.etc.
Rhyx Rhyx's picture
Re: Malware/Worms/Virii
Oh the only reason I made mine so complex is because I wanted it to be something fight-able that you could spar with and get concrete story driven results. Little tiny Spambots like those described are ubiquitous but I would wager their anti-toxin would be quickly available through crowdsourcing from people who are in the know and annoyed. With Sim-space I'd wager that this battle of Spammers vs Spamees is a daily thing and exactly the sort of stuff your muse takes care of while you're asleep!
Prime Mover Prime Mover's picture
Re: Malware/Worms/Virii
I'm all good with rationalizations...I do it enough myself. But still curious what the intentions of the authors were for these mesh threats.
"The difference between truth and fiction, people expect fiction to make sense."
Thunderwave Thunderwave's picture
Re: Malware/Worms/Virii
Prime Mover wrote:
I'm all good with rationalizations...I do it enough myself. But still curious what the intentions of the authors were for these mesh threats.
To give Storyguides something to play with. These things can litteraly be anything you want/need to help with the story.
icekatze icekatze's picture
Re: Malware/Worms/Virii
hi hi When I read through the mesh rules, I got the distinct impression that hacking into other systems is a very difficult task to undertake and that security on even individual systems is very high. That means that most viruses, even ones using AGI stats are going to spread very slowly, if at all. I agree that nuisance bots will not have very much trouble if someone has access to enough components to install them. The only viruses that I can see working with the same effectiveness and contagiousness that contemporary viruses have would be TITAN made viruses. Those are an entirely different story however.
Arenamontanus Arenamontanus's picture
Re: Malware/Worms/Virii
icekatze wrote:
When I read through the mesh rules, I got the distinct impression that hacking into other systems is a very difficult task to undertake and that security on even individual systems is very high. That means that most viruses, even ones using AGI stats are going to spread very slowly, if at all. I agree that nuisance bots will not have very much trouble if someone has access to enough components to install them.
Actually, if you run the by-the-book numbers you will get a probability that a virus with InfoSec 40 can hack systems that is frighteningly high. When spoofing authentification it first tries to sniff, succeeding in 40% of cases. It then tries to spoof, succeeding in (say) 10% of cases. It will succeed in 4% of attempts. Intrusion: 40% chance of getting through the firewall, then a 50% chance of defeating the InfoSec 40 AI guarding it: success rate 20%. If the virus then uses this system to attack (say) 100 other systems you should expect a multiplication rate of 20: first 1 infected system, then 20, then 400, then 8000... In practice there are no doubt other factors keeping the multiplication rate down, but they are not entirely covered by game system (and there is little point: if you want a Warhol worm you put it in there, if you want a cleaner net you just say security is good enough - roleplaying background antiviral processes is pretty dull).
Extropian
Prime Mover Prime Mover's picture
Re: Malware/Worms/Virii
PROGRAMMING What it is: Programming is your talent at writing and modifying software code. When you use it: Use Programming to write new programs, modify or patch existing software, break copy protection, fi nd or introduce exploitable fl aws, write virii or worms, design virtual settings, and so on. See the Mesh chapter, p. 234. Programming is also applied when using nanofabrication devices. Specializations: AI Code, Malware, Nanofabrication, Piracy, Simulspace Code So player characters have a means to create it (But no mechanics or guidelines). MALWARE The number of worms, virii, and other malware pro- grams that ripped through computer systems during the Fall was staggering. Many of these were part of the netwar systems prepared by old Earth nation-states and corporations and unleashed on their enemies. Others were products of the TITANs, subversive pro- grams that even the best defenses had trouble stopping. Even 10 years later, many of these are still reappearing, brought back to life by the accessing of some long- forgotten data cache or the accidental infection of a scavenger mucking through old ruins. New ones pop every day. Thats it other then some specialized Titan Virus's which are described as AGI's and the scorchers (which effect cyberbrains) it feels like Malware was implemented but never really fleshed out. I know my players too well and one of them see's he can specialize in Malware I'm going to have to answer the question. "Can I make -----?" And I turn to the book and shake my head, dunno. Guess we stop the game and I'll make something up on the fly? Guess the bottom line is I was just hoping for some official parameters concerning Malware. Not too much to ask considering how many times it's mentioned in the core book and how concerned Transhumanity is with it's effects. Was it cut, left intentionally vague, or to be covered later? Till then I can create on the fly rationalized stopgaps but should I just plan on keeping it that way?
"The difference between truth and fiction, people expect fiction to make sense."
Rhyx Rhyx's picture
Re: Malware/Worms/Virii
Hey Mover, I understand that you want an "official" ruling but I'm a bit scared that you might be reenacting a scene from Waiting for Godot. So far the developers haven't really put the hammer down on any controversial issues so I really doubt that they are gonna come swooping by and give an answer from on high. Personally I like it that way because it leaves more room for interpretation and dialogue. But I guess the bigger issue is why getting an "official" ruling is so important for this malware idea. Are you concerned that your players will squabble over how to implement this? I mean if you're the game master your word should be final, in fact it should override what the book has to say, so it should really override what the book doesn't say. I really don't see why you seem worried. Hacking subversion rules are pretty straight forward, and malware isn't much more than an automated program designed for that task. I really don't see where the creator adjudication has to come from.
Quote:
"Can I make -----?" And I turn to the book and shake my head, dunno. Guess we stop the game and I'll make something up on the fly?
Why even bother stopping? Make one up right here and right now share it with the rest of us and then not only will you be ready when someone pops that question but we will all be ready thanks to you. Isn't that a lot better than waiting for some official to make a call?
MysterFord MysterFord's picture
Re: Malware/Worms/Virii
Rhyx wrote:
Why even bother stopping? Make one up right here and right now share it with the rest of us and then not only will you be ready when someone pops that question but we will all be ready thanks to you. Isn't that a lot better than waiting for some official to make a call?
This is very much my style as well. And given that Eclipse Phase doesn't bother with the illusion of game balance the way some do, it fits well. While there have been times I have contacted authors/developers about an interpretation, what they said wasn't going to change what I had done, I was merely curious about their intent. But, as Rhyx says, ultimately, we each run our own instance of EP, with whatever domain rules we would like. If the book is quiet about a topic, there are a few options: 1. Don't worry about it. It clearly isn't supposed to be an integral part of the game. 2. Make up something on the spot 3. If you feel it is a major issue that needs time and consideration, tell your players that. Perhaps give them an interum ruling to keep the game moving, and then next session tell them how it will work going forward. Make up some technobabble (psychojargon, etc) if there is a discrepancy between the permanent ruling and your spot ruling. This is why we (or at least, I)still play tabletop rpgs, rather than computer rpgs: having a human running things makes it far more interesting and variable than current "AI" is capable of providing.
Arenamontanus Arenamontanus's picture
Re: Malware/Worms/Virii
Some of the best malware is simple, like the twitter hack that made the rounds over the last few days. It only took one clever idea and then it spread like wildfire. Meanwhile the stuxnet worm may have been an organized attempt at getting at an Iranian reactor, making use of highly specific details of the Siemens PLC to sabotage certain equipment. That likely required a lot more research and planning. Most hacking PCs do will be somewhere in between. There is no good system to handle leaps of insight ("hey, a lot of browsers might interpret javascript in tweets!"), and the tech development system is probably not good for major projects (it seems more like good for quick-and-dirty engineering, combining existing libraries and scripts rather than the full planning-design-implementation-testing loop).
Extropian
Prime Mover Prime Mover's picture
Re: Malware/Worms/Virii
I agree with everything thats been said and I'll take it in stride and make the best of it. At the start I just assumed I may have missed something or there may have been a clearer answer I wasn't finding. I guess I was just hoping for some clearcut official guidelines. (Mostly due to the fact that other things given such attention in the core book are more clearly explained.) My apologies if I'm sounding like a broken record. *Removing the needle from the vinyl.*
"The difference between truth and fiction, people expect fiction to make sense."
Sepherim Sepherim's picture
Re: Malware/Worms/Virii
We came to face this since one of my players is deep into hacking and wanted to do this kind of things. So we came out with two options: a) As discussed, an AI with Infosec would be for the best worms and such, only for the most elite programs. b) I remember that somewhere in the book, it says that hackers can leave orders set into a system and that they would be fulfilled in order. Like 1.Disconnect camera (12:41) 2.Open door (12:43) 3.Close door (12:45) Well, most virii would work this way as well: 1.Hack into computer 2.Replicate yourself and send yourself to the whole adressbook 3. Show publicity message over the owner's field of vision Something like that. Just assign it a propper Infosec and the rest is in the rulebook.
Prime Mover Prime Mover's picture
Re: Malware/Worms/Virii
Scripting which is something I certainly expect Malware to do. Heres a list of currently defined Malware, I'm messing with it to come up with something for my home games. The Many Faces of Malware According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each. 1. Viruses. The malware that's on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there's no need to belabor the point. 2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own. 3. Wabbits. Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it's not hard to see why: they don't do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine. 4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that's only because they have bigger targets: your financial information, your computer's system resources, and sometimes even massive denial-of-service attack launched by having thousands of computers all try to connect to a web server at the same time. 5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it's possible to be both adware and spyware at the same time.) 6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a "backdoor" onto a computer, providing a network connection for hackers or other malware to enter or for viruses or sp@m to be sent out through. 7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit. 8. Rootkit. The malware most likely to have a human touch, rootkits are installed by crackers (bad hackers) on other people's computers. The rootkit is designed to camouflage itself in a system's core processes so as to go undetected. It is the hardest of all malware to detect and therefore to remöve; many experts recommend completely wiping your hard drive and reinstalling everything fresh. 9. Keyloggers. No prïze for guessing what this software does: yes, it logs your keystrokes, i.e., what you type. Typically, the malware kind of keyloggers (as opposed to keyloggers deliberately installed by their owners to use in diagnosing computer problems) are out to log sensitive information such as passwords and financial details. 10. Dialers. Dialers dial telephone numbers via your computer's modem. Like keyloggers, they're only malware if you don't want them. Dialers either dial expensive premium-rate telephone numbers, often located in small countries far from the host computer; or, they dial a hacker's machine to transmit stolen data. 11. URL injectors. This software "injects" a given URL in place of certain URLs when you try to visit them in your browser. Usually, the injected URL is an affïliate link to the target URL. An affïliate link is a special link used to track the traffïc an affïliate (advertiser) has sent to the original website, so that the original website can pay commissions on any salës from that traffïc. 12. Adware. The least dangerous and most lucrative malware (lucrative for its distributors, that is). Adware displays ads on your computer. The Wikipedia entry on malware does not give adware its own category even though adware is commonly called malware. As Wikipedia notes, adware is often a subset of spyware. The implication is that if the user chooses to allow adware on his or her machine, it's not really malware, which is the defense that most adware companies take. In reality, however, the choice to install adware is usually a lëgal farce involving placing a mention of the adware somewhere in the installation materials, and often only in the licensing agreement, which hardly anyone reads.
"The difference between truth and fiction, people expect fiction to make sense."
Arenamontanus Arenamontanus's picture
Re: Malware/Worms/Virii
Prime Mover wrote:
3. Wabbits. Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it's not hard to see why: they don't do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.
I guess forkbombs is a good example of this. While unambitious, it is amazing how many computers still in this day lock up when running main(){while(1){fork();}}... And in EP, seriously clogging up enemy machines with processes is a great weapon.
Quote:
9. Keyloggers. No prïze for guessing what this software does: yes, it logs your keystrokes, i.e., what you type. Typically, the malware kind of keyloggers (as opposed to keyloggers deliberately installed by their owners to use in diagnosing computer problems) are out to log sensitive information such as passwords and financial details.
In EP you have versions that record sound, visuals or mesh signals - no matter how secure your password and computer is, if somebody can look over your shoulder's when you type it your security has been breached. There is a reason AI doorknobs are so popular as security - your biometrics can be stolen, the walls hear your password and maybe your muse leaked your ID late one night at a bar...
Quote:
11. URL injectors. This software "injects" a given URL in place of certain URLs when you try to visit them in your browser.
Generally code injection (getting some scripting information into what is apparently non-script information) can be used for all of these. Twitter had problems with a javascript injection, and this weekend some enterprising hackers tried it on votes in the Swedish election! http://alicebobandmallory.com/articles/2010/09/23/did-little-bobby-table... In EP, this is the machine version of basilisk hacks. Imagine a visual pattern like a barcode that makes bots with a particular (bad) software go to a mesh site where they download a "patch" that allows the creator to control them. Let's not forget botnets: taking over a lot of systems and integrating them into a network that can do your bidding, such as sending spam, attempt hack attacks, or do distributed denial of service attacks. In EP there are transhuman botnets too... you should be careful to check that the egobridge is clean!
Extropian
The Doctor The Doctor's picture
Re: Malware/Worms/Virii
Arenamontanus wrote:
Some of the best malware is simple, like the twitter hack that made the rounds over the last few days. It only took one clever idea and then it spread like wildfire. Meanwhile the stuxnet worm may have been an organized attempt at getting at an Iranian reactor, making use of highly specific details of the Siemens PLC to sabotage certain equipment. That likely required a lot more research and planning.
A frightening amount of planning. As I understand it (and I would still love to get my hands on a copy of that beastie to dissect), Stuxnet was packing four zero-day vulnerabilities (systems cracker strategy usually states that using more than one too often will lead to the white hats finding out about the vulnerability in question and publicizing it, thus negating your advantage) in its infiltration payload plus what appears to be native support for at least one SCADA protocol. There was also the news article that claimed that it was extraterrestrial in origin (Exsurgent? BD), but that is beside the point.
Arenamontanus wrote:
Most hacking PCs do will be somewhere in between. There is no good system to handle leaps of insight ("hey, a lot of browsers might interpret javascript in tweets!")
I generally let my players come up with stuff like that and make an Infosec roll (modified by how awesome an idea it is and how much coffee I had that morning).
Arenamontanus wrote:
and the tech development system is probably not good for major projects (it seems more like good for quick-and-dirty engineering, combining existing libraries and scripts rather than the full planning-design-implementation-testing loop).
Perhaps something could be ported from the Rolemaster system (Cyberspace had rules for long-term in-character engineering projects).
The Doctor The Doctor's picture
Re: Malware/Worms/Virii
Prime Mover wrote:
3. Wabbits. Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it's not hard to see why: they don't do anything to spread to other machines.
They are usually referred to as /foo/ bombs (i.e., fork bombs) due to how they replicate.
Prime Mover wrote:
7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.
Exploits are not usually classified as malware; it is more accurate to say that they are implemented as stand-alone utilities or packaged as the payloads of other pieces of software (for example, a worm's propagation module). Malware can contain exploits, but an exploit in itself is not usually malware.
Prime Mover wrote:
10. Dialers. Dialers dial telephone numbers via your computer's modem. Like keyloggers, they're only malware if you don't want them. Dialers either dial expensive premium-rate telephone numbers, often located in small countries far from the host computer; or, they dial a hacker's machine to transmit stolen data.
More and more rare as modems vanish. They will probably start appearing as mobile phone malware in force in a few years. Their applicability to Eclipse Phase, however, would involve making heavy use of the Mesh to make themselves a nuisance.
Arenamontanus Arenamontanus's picture
Re: Malware/Worms/Virii
I think an important new kind of malware manipulates rep blogs. Some fake reports, others subtly change what you write or who you write it about.
Extropian
icekatze icekatze's picture
Re: Malware/Worms/Virii
hi hi I am very curious about how one can protect their muse from hacks. My previous reading of the rules led me to believe that systems were mostly secure, but going by this thread that seems to not be the case. So how does one keep their muse intact? It seems like if they were getting compromised by spam-bots all the time, people would just stop using them.
Decivre Decivre's picture
Re: Malware/Worms/Virii
Statistically, most malware could be represented in-game very easily as simply having the computer skills and software necessary to do whatever task you presume the malware is designed to do. Only malware that is so advanced that it is capable of thought would require any more than the minimum amount of write-up... merely making note of it's skill for the purposes of checks should be adequate. Then keep a simple guide to remind you the individual steps that the virus goes through when it attacks a system. Basic viruses will follow a fairly linear series of steps when attacking a system, and those that are more complex can be handled as AI.
Prime Mover wrote:
Scripting which is something I certainly expect Malware to do. Heres a list of currently defined Malware, I'm messing with it to come up with something for my home games. The Many Faces of Malware According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.
Those malware classifications you gave aren't exactly taxonomic, and many of them fit under multiple labels. The largest majority of all viruses are trojans, but are often also spyware and backdoors. All viruses that aren't trojans utilize exploits, meaning that those two labels alone could encompass all malware. In that same vein, virus and worm could easily encompass every type of malware there is: is the malicious code hidden within other data, or will it run independently? On the other hand, most of these labels do not necessarily reference things that are exclusively malicious, and it's not just keyloggers and dialers. Exploits are vital to the homebrew community that modifies software and hardware... and one could hardly call that malware. Keyloggers are a specialized form of spyware, and many forms of spyware are not necessarily malware (the example you gave was a keylogger installed to find a problem; another example would be the anonymous data tracking that many programs have today). People (including me) create backdoors into their own systems so they may utilize remote computing: controlling your own computer over the net, such as from your phone. Certain DRM software designed to prevent piracy comes in rootkit form (although many would argue that this IS a form of malware, since it threatens to violate customer rights and prevent them from using their software as they wish to). Many free versions of paid software offset the cost through adware. Even URL injectors can exist in non-malware form with parental internet control software.
The Doctor wrote:
A frightening amount of planning. As I understand it (and I would still love to get my hands on a copy of that beastie to dissect), Stuxnet was packing four zero-day vulnerabilities (systems cracker strategy usually states that using more than one too often will lead to the white hats finding out about the vulnerability in question and publicizing it, thus negating your advantage) in its infiltration payload plus what appears to be native support for at least one SCADA protocol. There was also the news article that claimed that it was extraterrestrial in origin (Exsurgent? BD), but that is beside the point.
Most of the IT community is very interested in Stuxnet, because it seems very clear that this software is either years in the making, or made by some of the brightest minds in the blackhat community with government-level funding. It's a massive virus at half a megabyte, and is written in multiple programming languages. It's digitally signed with two stolen certificates. It can be updated through p2p. It was also efficiently designed to not shut down the PLCs it infects. It's a pretty amazing piece of software. This might even the first in the next generation of malware, and the start of the digital warfare age.
Transhumans will one day be the Luddites of the posthuman age. [url=http://bit.ly/2p3wk7c]Help me get my gaming fix, if you want.[/url]