WireLurker Scenario: Tech Startup Development Environment

AppDev Innovations: Mobile app development startup, 95 employees, iOS development focus
Trojan • WireLurker
STAKES
App source code + Developer credentials + Apple Store presence + Startup survival
HOOK
AppDev Innovations is preparing their breakthrough mobile app for App Store launch when developers notice their development Macs and test iPhones exhibiting strange cross-device behavior - development certificates being modified, test apps installing on multiple devices simultaneously, and source code repositories showing unauthorized access across platforms.
PRESSURE
App Store launch Tuesday - source code theft threatens startup survival and investor funding
FRONT • 120 minutes • Advanced
AppDev Innovations: Mobile app development startup, 95 employees, iOS development focus
Trojan • WireLurker
NPCs
  • CEO Jennifer Wong: Leading app launch preparations with infected development environment threatening startup survival
  • Lead iOS Developer Carlos Martinez: Discovering cross-platform infection affecting development Macs and test devices
  • DevOps Engineer Diana Foster: Investigating unauthorized certificate modifications and code repository access
  • CTO Sarah Chen: Coordinating incident response while protecting proprietary app algorithms and development processes
SECRETS
  • Developers downloaded infected Xcode tools from unofficial sources during rapid development cycles
  • Cross-platform malware has access to development certificates, source code, and App Store credentials
  • Proprietary app algorithms and user data collection methods have been compromised across development platforms

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WireLurker Tech Startup Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WireLurker Tech Startup Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

AppDev Innovations

Mobile app development startup, 95 employees, iOS development focus

Key Assets At Risk:

  • App source code
  • Developer credentials
  • Apple Store presence
  • Startup survival

Business Pressure

App Store launch Tuesday - source code theft threatens startup survival and investor funding

Cultural Factors

  • Developers downloaded infected Xcode tools from unofficial sources during rapid development cycles
  • Cross-platform malware has access to development certificates, source code, and App Store credentials
  • Proprietary app algorithms and user data collection methods have been compromised across development platforms

Opening Presentation

“It’s Monday morning at AppDev Innovations, and the mobile development team is in final testing for your breakthrough app launching on the App Store Tuesday. But Lead Developer Carlos Martinez notices something disturbing: test iPhones are installing apps automatically when connected to development Macs, development certificates are being modified across multiple devices simultaneously, and source code repositories show unauthorized access patterns. The cross-platform malware is spreading between Mac workstations and iOS test devices, threatening to compromise your proprietary algorithms and App Store credentials just hours before launch.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Development Macs and test iPhones showing coordinated suspicious behavior across platforms”
  • “Test apps installing automatically on iOS devices without developer authorization”
  • “Development certificates being modified and accessed by unknown processes”
  • “Source code repositories showing unauthorized access from compromised development systems”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals cross-platform trojan targeting Mac-iOS development environments
  • Development tool investigation discovers compromised Xcode installations from unofficial sources
  • Timeline analysis shows infection spreading through USB connections between Macs and test devices

Protector System Analysis:

  • Development environment security analysis shows malware bypassing Mac and iOS protections
  • Source code repository monitoring reveals unauthorized access to proprietary algorithms
  • App Store credential assessment shows potential compromise of developer certificates and signing keys

Tracker Network Investigation:

  • Cross-platform infection tracking reveals Mac-to-iOS propagation through development workflows
  • Development credential monitoring shows unauthorized access across Mac and iOS platforms
  • IP theft investigation suggests systematic exfiltration of proprietary app source code

Communicator Stakeholder Interviews:

  • Developers describe downloading unofficial Xcode tools to speed development timelines
  • DevOps team explains integrated Mac-iOS workflows that spread infection across platforms
  • CEO discusses investor expectations and startup survival depending on successful app launch

Mid-Scenario Pressure Points:

  • Hour 1: CTO discovers proprietary app algorithms may have been exfiltrated to competitors
  • Hour 2: App Store submission deadline approaches with compromised development environment
  • Hour 3: DevOps finds development certificates compromised potentially affecting all future app releases
  • Hour 4: Investors call requesting launch status update threatening funding withdrawal

Evolution Triggers:

  • If malware continues undetected, App Store supply chain could be compromised affecting all users
  • If launch is delayed, startup loses market opportunity and investor funding collapses
  • If source code theft is confirmed, competitive advantage and intellectual property are lost

Resolution Pathways:

Technical Success Indicators:

  • Team identifies cross-platform trojan and Mac-iOS infection mechanisms
  • Development environment security restored through comprehensive malware removal
  • App Store credentials and development certificates verified and secured

Business Success Indicators:

  • App launch proceeds on schedule with verified clean development build
  • Proprietary algorithms and source code protected from competitive theft
  • Startup survival secured through successful product launch and investor confidence

Learning Success Indicators:

  • Team understands cross-platform malware and development environment security
  • Participants recognize software supply chain risks and unofficial tool dangers
  • Group demonstrates coordination between development operations and security response

Common IM Facilitation Challenges:

If Cross-Platform Infection Is Misunderstood:

“Carlos explains that the malware doesn’t just affect Macs or just iPhones - it spreads between both platforms through your development workflow. When developers connect test iPhones to infected Macs, the malware jumps across. How does this cross-platform capability change your containment approach?”

If Launch Pressure Is Underestimated:

“CEO Jennifer reminds you that investors expect the App Store launch Tuesday. Delays mean lost market opportunity, competitive disadvantage, and potential startup closure. But launching with compromised code could affect thousands of users and destroy company reputation. How do you resolve this impossible choice?”

If Development Tool Trust Is Assumed:

“Diana discovered developers downloaded ‘faster’ Xcode builds from unofficial developer forums to meet deadlines. These compromised tools looked legitimate and passed basic checks. How do you balance development speed with tool verification when unofficial sources offer tempting shortcuts?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core cross-platform infection discovery and immediate development environment containment Simplified Elements: Streamlined App Store complexity and supply chain details Key Actions: Identify Mac-iOS malware propagation, implement emergency device isolation, coordinate launch decision

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive development environment investigation and source code protection Added Depth: Software supply chain security and development tool verification Key Actions: Complete forensic analysis of cross-platform infection, coordinate App Store submission, restore development security with verification

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete startup development breach response with investor and market coordination Full Complexity: IP theft assessment, App Store supply chain implications, long-term development security architecture Key Actions: Comprehensive cross-platform malware containment, coordinate investor and market response, implement enhanced development workflow security

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Mobile development security technical depth, cross-platform infection complexity, startup survival strategy Additional Challenges: Mid-scenario investor pressure, App Store deadline, competitive IP theft implications Key Actions: Complete investigation under startup survival constraints, coordinate multi-stakeholder response, implement comprehensive development security while ensuring market launch


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“DevOps Engineer Diana Foster has traced the infection source. During your rapid development cycle, several developers downloaded ‘optimized’ Xcode tools from unofficial developer forums promising faster builds and better performance. These looked legitimate with proper signing, but they contained sophisticated cross-platform malware. The infected development tools gave attackers access to everything - source code, certificates, and the ability to spread to iOS test devices. How does compromise of trusted development tools change your security approach?”

Teaching moment: Development environment security depends on tool verification. Unofficial sources offering ‘faster’ or ‘better’ tools often distribute malware disguised as legitimate developer utilities, compromising entire development workflows.

If team misses Mac-iOS infection coordination:

“Lead Developer Carlos has mapped the infection spread. The malware uses your normal development workflow against you - when developers connect test iPhones to infected Macs for app testing and deployment, the malware automatically installs on the iOS devices. Those infected iPhones then spread malware back to other Macs when connected for testing. Your entire development infrastructure is now cross-platform compromised. How does this Mac-iOS propagation cycle change your containment strategy and rebuild approach?”

Teaching moment: Cross-platform malware exploits integrated workflows between development systems. Mac-iOS trojans like WireLurker spread through normal USB connections during app testing, creating infection cycles that compromise entire development teams.

If team overlooks competitive implications:

“CTO Sarah has completed forensic analysis. Your proprietary algorithms - the unique features that differentiate your app from competitors - have been systematically exfiltrated over the past three weeks. The malware accessed source code repositories, development documentation, and even internal design discussions. Competitors could reverse-engineer your breakthrough features and launch before you do. How does this IP theft change your launch decision and competitive strategy?”

Teaching moment: Development environment malware often targets intellectual property, not just credentials. Attackers stealing proprietary algorithms and source code can provide competitive intelligence or enable supply chain attacks through compromised app releases.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Complete Development Environment Rebuild & Delayed Launch

  • Action: Immediately quarantine all development Macs and test iOS devices, rebuild development environment from verified sources, conduct comprehensive source code audit and re-sign applications with new certificates, delay App Store launch until complete security verification, coordinate investor communication about timeline extension.
  • Pros: Ensures absolute certainty of malware elimination and source code integrity, provides thorough investigation of IP theft and competitive impact, demonstrates commitment to user security and professional development practices, prevents potential App Store supply chain compromise.
  • Cons: Delays launch by 2-4 weeks losing critical market window and first-mover advantage, risks investor funding withdrawal and startup closure, allows competitors to potentially launch similar features first using stolen IP, creates significant morale impact on development team.
  • Type Effectiveness: Super effective against Trojan malmon type; complete environment rebuild prevents cross-platform propagation and ensures development security with zero compromise risk.

Option B: Accelerated Parallel Response & Conditional Launch

  • Action: Conduct intensive 36-hour malware removal and development environment validation using all available resources, implement enhanced Mac-iOS security protocols and tool verification, coordinate expedited source code audit focusing on proprietary algorithms, proceed with conditional App Store submission pending real-time security verification while maintaining investor confidence.
  • Pros: Balances startup survival with security response requirements, provides compressed but thorough cross-platform malware containment, demonstrates agile startup incident management, maintains market opportunity while addressing infection.
  • Cons: Requires extraordinary resource commitment and sustained development team effort, compressed timeline increases risk of incomplete malware removal or missed infection persistence, maintains operational uncertainty during launch phase, intensive stress on technical team and investor relations.
  • Type Effectiveness: Moderately effective against Trojan malmon type; addresses immediate development security concerns while enabling launch, but compressed timeline may not fully eliminate sophisticated cross-platform infections across Mac-iOS ecosystem.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate confirmed infected development systems from App Store submission workflow, implement immediate Mac-iOS verification protocols for clean systems, proceed with app launch using verified uninfected development segment while conducting thorough malware investigation on isolated systems, coordinate phased security restoration aligned with market requirements.
  • Pros: Maintains App Store launch timeline and startup survival, allows market entry with verified clean app build, provides time for comprehensive IP theft investigation and cross-platform security assessment, demonstrates sophisticated risk management balancing multiple critical startup priorities.
  • Cons: Proceeds with partially verified development environment creating reputational risk, requires sustained verification and monitoring of Mac-iOS systems, extended investigation window while app is live in App Store, depends on effectiveness of isolation measures and assumption that clean segment remains uncompromised.
  • Type Effectiveness: Partially effective against Trojan malmon type; addresses immediate launch requirements through isolation, but extended presence of cross-platform malware creates ongoing IP theft risk and potential for App Store supply chain compromise if isolation fails.

Lunch & Learn Materials (75-90 min, 2 rounds)

Session Structure

Total Time: 75-90 minutes Investigation Rounds: 2 rounds (30 min each) Decision Points: 2 major decisions Complexity: Moderate - comprehensive development environment investigation with investor coordination

Round 1: Cross-Platform Development Infection Discovery (30 minutes)

Investigation Clues (Time-Stamped)

T+0 Minutes - Opening Scene: “Monday morning, 9:00 AM. AppDev Innovations is 24 hours from App Store launch - your breakthrough mobile app that determines startup survival. Lead Developer Carlos Martinez notices test iPhones installing apps automatically when connected to development Macs. Development certificates being modified across multiple devices. Source code repositories showing unauthorized access patterns from compromised development systems.”

T+5 Minutes - Detective Investigation: “Forensic analysis reveals compromised Xcode tools downloaded from unofficial developer forums. Timeline shows infection starting six weeks ago when developers sought ‘faster’ build tools to meet deadlines. Cross-platform trojan identified targeting Mac-iOS development environments. Question: What forensic evidence would confirm source code exfiltration?”

T+10 Minutes - Protector System Analysis: “Development environment security scan shows malware bypassing both Mac Gatekeeper and iOS provisioning restrictions. Source code repository monitoring reveals unauthorized access to proprietary algorithms and App Store credentials. Development certificate assessment shows potential compromise affecting all future releases. Question: How do you verify which intellectual property has been exposed?”

T+15 Minutes - Tracker Network Investigation: “Network logs show Mac development systems establishing unauthorized connections when iPhones connect for testing. Development workflow traffic analysis reveals automatic data transfers during normal app deployment. External connections suggest source code exfiltration to competitor development infrastructure. Question: How do you map complete infection spread across development teams?”

T+20 Minutes - Communicator Stakeholder Interviews: “Lead Developer Carlos: ‘We downloaded optimized Xcode from developer forums to speed builds - looked legitimate with proper signing.’ DevOps Engineer Diana: ‘Mac-iOS integration is essential for app testing and deployment workflows.’ CEO Jennifer: ‘App launches Tuesday. Investors expect launch - any delay risks funding collapse and startup closure.’ Question: How do you balance development speed with security verification?”

T+25 Minutes - First Pressure Event: “CTO Sarah discovers preliminary analysis suggests proprietary app algorithms may have been exfiltrated to competitors. She’s considering whether to notify investors immediately or complete investigation first. Series A investors expect launch - security incident disclosure could collapse funding round and kill startup.”

Response Options - Round 1 Decision

Option A: Immediate Investor & App Store Notification - Notify investors and Apple immediately about potential source code exposure - Delay App Store launch pending complete security investigation - Begin comprehensive Mac-iOS malware removal across development environment - Pros: Maintains investor trust through transparency, ensures complete investigation without launch pressure - Cons: Triggers investor funding review and potential withdrawal, startup survival at risk, allows competitors with stolen IP to potentially launch first, 2-3 week delay risks market window closure - Type Effectiveness: Super effective against Trojan malmon type

Option B: Accelerated 24-Hour Investigation & Conditional Launch - Conduct intensive source code breach analysis within launch timeline - Implement emergency Mac-iOS isolation and verification protocols - Launch conditionally while maintaining investigation in parallel - Pros: Balances launch timeline with IP protection investigation, maintains investor confidence - Cons: Compressed timeline risks incomplete breach assessment, proceeds with uncertainty - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Selective Development Team Isolation & Phased Response - Isolate confirmed infected development systems from App Store submission - Use verified clean development segment to complete launch - Investigate compromised segment while maintaining launch timeline - Pros: Maintains launch schedule and startup survival, allows investigation with reduced pressure - Cons: Proceeds with partial verification creating supply chain risk - Type Effectiveness: Partially effective against Trojan malmon type

Facilitation Questions - Round 1

For Investigation Phase: - “How do you determine which source code has been accessed versus potentially at risk?” - “What forensic evidence would prove Mac-to-iOS propagation through development workflows?”

For Decision Phase: - “How do you communicate security incidents to investors without collapsing funding?” - “What verification would prove app is safe for App Store launch?”

Round 2: Source Code Protection & Startup Survival (30 minutes)

Investigation Clues (Time-Stamped)

T+30 Minutes - Evolving Situation: “Based on Round 1 decision, situation develops. If immediate notification: investors demanding detailed security reports and reconsidering funding. If accelerated investigation: development teams discovering deeper infection during 24-hour sprint. If selective isolation: isolated systems revealing systematic IP theft during investigation.”

T+35 Minutes - Source Code Exfiltration Analysis: “Forensic review reveals systematic access to proprietary algorithms - the unique features differentiating app from competitors. Source code, development documentation, internal design discussions all exfiltrated. Competitors could reverse-engineer breakthrough features and launch before you do. IP theft threatens entire startup competitive advantage.”

T+40 Minutes - Cross-Platform Infection Depth: “DevOps Engineer Diana reports 18 Mac development systems and 25 test iPhones compromised. Malware exploited normal USB connections during app testing. Development workflow enabled rapid cross-platform propagation. Complete environment rebuild required for certainty.”

T+45 Minutes - Investor Pressure Escalation: “Lead investor calls: ‘App launches Tuesday or we reconsider our position. Market window is closing - competitors launching similar features next month. Either launch on time or funding may not survive.’ Startup survival depends on maintaining investor confidence while addressing security.”

T+50 Minutes - Competitive IP Threat: “Intelligence reveals competitor launching similar app features next week using concepts suspiciously similar to your proprietary algorithms. Stolen IP may already be in production. First-mover advantage evaporating while investigating security incident.”

T+55 Minutes - Second Pressure Event: “CEO Jennifer must decide: proceed with App Store launch using accelerated verification, delay launch for complete IP protection, or attempt conditional launch with highest-confidence clean systems. Each option has significant startup survival implications. Company future hangs in balance.”

Response Options - Round 2 Decision

Option A: Complete Environment Rebuild & Delayed Launch - Rebuild entire development environment with new Mac-iOS security protocols - Delay App Store launch until complete security verification (2-3 weeks) - Re-sign applications with new certificates after comprehensive IP audit - Pros: Guarantees malware elimination and IP protection - Cons: Delays risk funding collapse and market window closure - Type Effectiveness: Super effective against Trojan malmon type

Option B: Verified Build Launch & Parallel Remediation - Launch using most thoroughly verified development systems - Continue malware removal and security hardening in parallel - Implement enhanced monitoring during launch - Pros: Maintains investor confidence, balances security with startup survival - Cons: Proceeds with some uncertainty - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Conditional Launch & Phased Security - Launch with verified clean segment, highest confidence systems - Continue comprehensive investigation in parallel - Coordinate investor communications about security maturity - Pros: Preserves market timing and startup survival - Cons: Extended uncertainty during critical launch period - Type Effectiveness: Partially effective against Trojan malmon type

Victory Conditions

Technical Success: - ✅ Cross-platform trojan identified and Mac-iOS infection mechanisms understood - ✅ Development environment security restored or rebuild plan established

Business Success: - ✅ Investor relationships preserved through professional incident management - ✅ App launch executed or rescheduled with confidence maintained

Learning Success: - ✅ Team understands cross-platform malware in development environments - ✅ Participants recognize software supply chain risks

Debrief Topics

Technical Discussion: - Cross-platform malware propagation through Mac-iOS development workflows - Unofficial development tool supply chain risks

Business Impact: - Startup survival pressures versus IP protection requirements - Investor confidence management during security incidents

Decision Analysis: - Trade-offs between launch timing and security verification - Balancing market opportunity with IP protection


Full Game Materials (120-140 min, 3 rounds)

Session Structure

Total Time: 120-140 minutes Investigation Rounds: 3 rounds (30-35 min each) Decision Points: 3 major decisions with escalating complexity Complexity: High - complete startup breach response with investor coordination

(Following established pattern: Round 1 includes initial Mac-iOS infection discovery with detailed forensic analysis across development environment, proprietary algorithm exposure, investor funding implications. Round 2: Comprehensive source code exfiltration with competitor intelligence, App Store credential compromise, market timing pressures. Round 3: Long-term development security architecture, investor trust rebuilding, competitive positioning, potential Series B preparation.)

Key Full Game Elements

Round 1: Mac-iOS infection discovery, source code assessment, investor disclosure decision, launch timing pressure Round 2: IP theft scope analysis, competitive threat intelligence, App Store security, funding implications Round 3: Long-term development security, investor trust rebuilding, market positioning, growth strategy

Victory Conditions

Technical Success: - ✅ Cross-platform trojan eliminated with comprehensive verification - ✅ Mac-iOS development workflow security architecture implemented

Business Success: - ✅ Investor relationships preserved, app launched successfully, competitive positioning maintained

Learning Success: - ✅ Team demonstrates sophisticated decision-making balancing security, development operations, and startup survival


Advanced Challenge Materials (150-170 min, 3+ rounds)

Session Structure

Total Time: 150-170 minutes Investigation Rounds: 4 rounds (30-35 min each) Complexity: Expert - complete startup crisis with multi-dimensional investor management Expert Elements: Mobile development security depth, App Store supply chain complexity, startup survival strategy

Enhanced Setup

Pre-Game Context: “AppDev Innovations is mobile development startup with breakthrough app launching Tuesday. App represents 18 months development and entire company value proposition. Series A funding ($8M) depends on successful launch demonstrating market traction. Competitor startups aggressively pursuing same market space. Mac-iOS integrated workflow enables rapid iteration but creates security vulnerabilities. Lead investor considering Series B commitment - security incident could impact funding and startup viability.”

Role-Specific Confidential Information: - Detective: Preliminary forensics suggest infection timing coincides with ex-employee joining competitor - potential insider threat - Protector: Development certificates compromised affecting all future App Store releases, requiring complete re-provisioning - Tracker: Intelligence suggesting competitor connections to exfiltration servers - potential corporate espionage - Communicator: Lead investor already concerned about burn rate - security incident could trigger funding withdrawal

Key Advanced Challenge Elements

Round 1: Initial infection with insider threat angle, investor disclosure decision, App Store security coordination Round 2: Algorithm theft including core differentiating features, competitive intelligence, funding impact Round 3: Operational launch execution, real-time monitoring, investor decision point Round 4: Long-term strategic recovery, development security positioning, Series B preparation

Complete Victory Conditions

Technical Mastery: - ✅ Cross-platform trojan eliminated, Mac-iOS security architecture implemented, source code verified secure

Business Excellence: - ✅ Investor relationships preserved, app launched successfully, competitive positioning strengthened

Learning & Development: - ✅ Sophisticated understanding of cross-platform malware in development contexts, mastery of startup crisis management

Strategic Outcomes: - ✅ Company identity established, investor confidence recovered, long-term growth trajectory secured

Comprehensive Debrief Topics

Technical Deep Dive: - Cross-platform malware in Mac-iOS development workflows, unofficial development tool supply chain risks

Startup Impact Analysis: - Investor confidence management, launch timing pressures, IP protection imperatives

Strategic Decision Framework: - Investor notification timing, launch decision-making under crisis, long-term positioning evolution

Crisis Management Principles: - Multi-stakeholder coordination, cascading consequences, startup survival decision-making

Industry Lessons: - Mobile development security challenges, software supply chain vulnerabilities, security as competitive factor