1. Quick Reference
| Element | Details |
|---|---|
| Malmon | Raspberry Robin (USB Worm/Stealth) ⭐⭐⭐ |
| Difficulty Tier | Tier 2 (Advanced) |
| Scenario Variant | Financial Branches - Month-End Processing |
| Organizational Context | Community First Bank: 45 branch locations, 1,200 employees, month-end transaction processing |
| Primary Stakes | Customer financial data + Banking operations + Regulatory compliance + Transaction security |
| Recommended Formats | Full Game, Advanced Challenge (120-180 min) |
| Essential NPCs | Janet Foster (Regional Director), Carlos Martinez (IT Security Manager), Diana Chen (Branch Operations Manager), Robert Kim (Compliance Officer) |
Scenario Hook
“Community First Bank is processing peak month-end transactions when branch managers report USB drives used for daily transaction reconciliation and audit procedures are creating suspicious folder-like files spreading through routine banking workflows.”
Victory Condition
Contain USB worm across 45 branches, protect customer financial data, maintain month-end processing, ensure regulatory compliance, secure banking USB workflows.
2. Organization Context
Community First Bank: Regional Banking Network During USB-Driven Transaction Processing
Quick Reference
- Organization: Regional bank with 45 branch locations, 1,200 employees processing customer financial transactions
- Key Assets at Risk: Customer financial data across branch network, Banking operations and transaction processing systems, Financial regulatory compliance, Transaction security
- Business Pressure: Month-end transaction processing peak operations—banking system failures affect customer accounts, financial regulatory compliance at risk during critical processing window
- Core Dilemma: Continue USB-based transaction reconciliation maintaining banking operations BUT allows malware propagation through customer account systems, OR Halt USB use for containment BUT disrupts transaction processing and audit procedures affecting customer services
Detailed Context
Organization Profile
Regional bank with 45 branch locations, 1,200 employees
Key Assets At Risk: - Customer financial data - Banking operations - Regulatory compliance - Financial transaction security
Business Pressure
- Month-end transaction processing - banking system failures affect customer accounts
- Financial regulatory compliance at risk
Cultural Factors
- Bank employees routinely use USB drives for transaction reconciliation, audit procedures, and data transfer between branch locations
- USB malware exploits legitimate banking workflows to spread between customer account systems and financial transaction networks
- Infected systems include customer account databases, transaction processing, and financial audit systems
2-12. Complete Sections
Key Configuration: Month-end timeline pressure, multi-branch coordination, banking regulatory compliance, customer data protection
NPCs:
- Janet Foster: Managing 45 branches during month-end with USB malware spreading
- Carlos Martinez: Investigating USB worm bypassing financial network security
- Diana Chen: Reporting infected USB affecting transaction reconciliation
- Robert Kim: Assessing customer data exposure and regulatory notifications
Response Options: Branch isolation (+3), USB workflow quarantine (+3), transaction system protection (+2)
Round-by-Round: Discovery → Multi-branch spread confirmed → Critical decision on operations vs containment
Type Effectiveness: USB Worm weak to workflow isolation (+3), resists network-only defenses (-1)
Key Challenge: Carlos discovers 45 branches using shared USB procedures, month-end cannot be delayed, customer financial data potentially exposed
Cross-References:
Streamlined planning doc emphasizing multi-branch USB workflow vulnerabilities and financial regulatory compliance during month-end operations.