WireLurker Scenario: Media Company

WireLurker Scenario: Media Company

Cascade Media Group: US media production company, 300 employees, Final Cut Pro and Logic Pro workflows
Media Production Spyware Incident • WireLurker
STAKES
Broadcast reliability + Unreleased content protection + Production pipeline trust
HOOK
Cascade Media Group reports repeated crashes in Mac production suites, unauthorized trust prompts on connected mobile devices, and abnormal outbound transfer spikes from post-production storage. Editors lose confidence in unreleased media integrity as export queues and project timelines diverge from expected baselines during final broadcast preparation.
PRESSURE
  • On-air stabilization checkpoint at 20:00
  • Ongoing disruption places USD 1.4M and output from 300 employees at risk
FRONT • 120 minutes • Intermediate
Cascade Media Group: US media production company, 300 employees, Final Cut Pro and Logic Pro workflows
Media Production Spyware Incident • WireLurker
NPCs
  • Robert Chen (CEO): Managing commercial pressure and public confidence during production instability
  • Jessica Wu (Head of Production): Prioritizing critical outputs while editing capacity degrades
  • Ryan Cooper (IT Director): Leading containment across macOS workstations and media storage services
  • Karen Shah (Post-Production Lead): Escalating integrity concerns for final cuts and delivery masters
SECRETS
  • Creative teams used unverified plugins under deadline pressure
  • Shared rendering infrastructure lacked segmentation between active shows and archives
  • Connected-device workflows bypassed stricter trust controls during rapid edits

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WireLurker Media Company Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WireLurker Media Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support

Scenario Details for IMs

Hook

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Editing and audio post tools crash during final export windows”
  • “Connected mobile devices present unexpected trust and sync prompts”
  • “Outbound transfer traffic spikes from high-value media storage segments”
  • “Final-cut timeline metadata differs from trusted production baselines”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic logs reveal unauthorized transfer staging for unreleased media assets
  • Workstation analysis confirms trojanized creative utilities with persistence hooks
  • Timeline reconstruction links first compromise behavior to unverified plugin deployment

Protector System Analysis:

  • Monitoring confirms lateral movement across post-production workstations and attached devices
  • Integrity checks expose gaps in signing trust and plugin approval workflows
  • Segmentation analysis shows weak boundaries between active projects and core storage systems

Tracker Network Investigation:

  • Transfer mapping highlights repeated movement targeting unreleased high-value cuts
  • Dependency analysis identifies concentration risk in shared rendering and export services
  • Distribution telemetry indicates potential impact on downstream content publication channels

Communicator Stakeholder Interviews:

  • Production leadership requests clear criteria for safe on-air readiness
  • Technical leadership needs immediate decisions on containment versus continuity tradeoffs
  • Executive leadership requires evidence-based messaging for partners and audience stakeholders

Mid-Scenario Pressure Points:

  • Hour 1: Partner teams ask if release windows remain on schedule
  • Hour 2: Editorial leadership requests temporary exceptions to continue final edits
  • Hour 3: Public chatter suggests leaked clips may already be circulating
  • Hour 4: Leadership demands a defensible live-readiness recommendation

Evolution Triggers:

  • If containment lags, unreleased assets continue transferring beyond controlled boundaries
  • If connected devices remain unrestricted, persistence channels survive workstation cleanup
  • If release integrity checks are shortened, compromised media can enter distribution workflows

Resolution Pathways:

Technical Success Indicators:

  • Team blocks active exfiltration and contains spread across production systems
  • Final assets pass trusted integrity validation before release promotion
  • Hardening controls enforce signed-tool trust and managed device connectivity

Business Success Indicators:

  • On-air decisions are made using verified technical confidence, not deadline pressure alone
  • Stakeholder communication remains transparent, timely, and operationally accurate
  • Production continuity is preserved while protecting unreleased content value

Learning Success Indicators:

  • Team demonstrates practical response patterns for macOS/mobile malware in media workflows
  • Participants balance continuity goals with release assurance requirements
  • Group defines durable controls for plugin governance and post-production data trust

Common IM Facilitation Challenges:

If Release Assurance Is Declared Too Early:

“You have partial recovery, but what evidence proves final media assets are safe for distribution?”

If Deadlines Override Containment:

“Production wants immediate exceptions. Which exceptions are tolerable, and which reopen the same compromise pathway?”

If Partner Messaging Trails Reality:

“Commercial and audience stakeholders need updates now. What can you state with confidence versus what must remain conditional?”

Success Metrics for Session:

Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 2 investigation rounds, 1 decision round
Focus: Fast containment and release-integrity triage
Simplified Elements: Guided clues and constrained response pathways
Key Actions: Stop transfer channels, isolate risk workflows, validate final media masters

Lunch & Learn (75-90 minutes)

Structure: 4 investigation rounds, 2 decision rounds
Focus: Production continuity during active spyware disruption
Added Depth: Signing trust enforcement, storage segmentation, and partner communication cadence
Key Actions: Sequence secure restoration and maintain confidence through evidence-based updates

Full Game (120-140 minutes)

Structure: 6 investigation rounds, 3 decision rounds
Focus: End-to-end media incident command under live release pressure
Full Complexity: Containment, release assurance, and executive communication governance
Key Actions: Integrate production, security, and leadership decisions into a defensible go/no-go call

Quick Demo Materials (35-40 min)

Guided Investigation Clues

  • Clue 1 (Minute 5): “Outbound transfer telemetry targets unreleased media paths in active post-production directories.”
  • Clue 2 (Minute 10): “Toolchain review identifies trojanized creative utilities in current workflows.”
  • Clue 3 (Minute 15): “Connected-device channels remain an active persistence and data-exposure vector.”

Pre-Defined Response Options

Option A: Hard Containment and Distribution Pause

  • Action: Isolate affected production/storage segments, suspend non-essential synchronization, and hold final distribution pending integrity validation.
  • Pros: Maximizes confidence and rapidly reduces additional leakage.
  • Cons: Immediate schedule pressure and reduced throughput.
  • Type Effectiveness: Strong against active spyware transfer behavior.

Option B: Phased Continuity with Strict Guardrails

  • Action: Preserve limited clean production lanes while remediating compromised hosts and enforcing trusted tooling policies.
  • Pros: Maintains partial delivery momentum while reducing risk.
  • Cons: Operationally complex and dependent on strict validation discipline.
  • Type Effectiveness: Moderate when segmentation and policy controls are enforced consistently.

Option C: Deadline-First Production Continuity

  • Action: Prioritize immediate release milestones, apply selective remediation, and postpone broader lock-down actions.
  • Pros: Supports short-term schedule commitments.
  • Cons: Highest residual exposure risk and weaker confidence in release integrity.
  • Type Effectiveness: Weak against persistent exfiltration campaigns.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Containment and Integrity Baseline (30-35 min)

Investigation clues:

  • “Compromise behavior aligns with unverified plugin deployment in active production lanes.”
  • “Final assets show integrity divergence across export and packaging stages.”
  • “Connected-device workflows amplify persistence risk despite workstation cleanup.”
  • “Leadership needs minimum-assurance criteria before confirming live-readiness.”

Facilitation questions:

  • “Which assets and systems are required for a safe minimum live release?”
  • “What controls must be non-negotiable before reopening full production?”
  • “How do production and security maintain one coherent external status narrative?”

Round 1→2 Transition

Containment reduces immediate risk, but release confidence now depends on whether validation evidence is strong enough for live distribution commitments.

Round 2: Go/No-Go Decision Under Pressure (30-35 min)

Developments:

  • “Recovery paths exist, but confidence differs across production and distribution workflows.”
  • “Commercial pressure increases for timeline certainty despite incomplete forensic closure.”
  • “Leadership must choose between faster release and stronger assurance with potential delay.”

Facilitation questions:

  • “What assurance threshold makes on-air release defensible?”
  • “If delay is required, how do you communicate impact while protecting trust?”
  • “Which temporary controls should become permanent policy after incident closure?”

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Compromise and Transfer Suppression (30 min)

Media production enters crisis as malware behavior collides with live release deadlines and high-value content exposure risk.

Round 2: Workflow Recovery and Confidence Management (35 min)

Partial restoration creates tradeoffs between schedule speed and confidence in final asset integrity.

Round 3: Strategic Hardening and Release Governance (35 min)

Immediate pressure declines, and leadership defines durable controls for tooling trust, storage boundaries, and incident-informed release standards.

Debrief Focus (Full Game)

  • Why media production ecosystems are high-value malware targets under deadline pressure
  • How release pace can erode or strengthen assurance quality
  • What evidence standards should govern high-impact distribution decisions
  • Which governance upgrades best reduce recurrence risk without stalling production

Advanced Challenge Materials (150-170 min, 3+ rounds)

Red Herrings and Misdirection

  • Legitimate synchronization bursts that resemble malicious transfer spikes
  • Scheduled rendering activity that generates noise similar to compromise indicators
  • Parallel service issues that distract teams from highest-risk data paths

Removed Resources and Constraints

  • No external specialist support available during first-phase response
  • Incomplete ownership mapping for archived media workflows
  • Limited visibility on personally connected production devices

Enhanced Pressure

  • Partner confidence degrades faster than technical certainty improves
  • Internal teams demand risky exceptions to protect schedule commitments
  • Public scrutiny intensifies while forensic conclusions remain incomplete

Ethical Dilemmas

  • Whether to announce partial breach scope early or wait for stronger evidence
  • Whether to prioritize broadcast timing over higher release assurance
  • Whether to enforce strict device controls that materially reduce production velocity

Advanced Debrief Topics

  • Ethics of incident communication in live media environments
  • Governance tradeoffs between release speed and defensible assurance
  • Practical hardening patterns for macOS and mobile-centric post-production operations