1. Quick Reference
| Element | Details |
|---|---|
| Malmon | Raspberry Robin (USB Worm/Stealth) βββ |
| Difficulty Tier | Tier 2 (Advanced) |
| Scenario Variant | Financial Branches - Month-End Processing |
| Organizational Context | Community First Bank: 45 branch locations, 1,200 employees, month-end transaction processing |
| Primary Stakes | Customer financial data + Banking operations + Regulatory compliance + Transaction security |
| Recommended Formats | Full Game, Advanced Challenge (120-180 min) |
| Essential NPCs | Janet Foster (Regional Director), Carlos Martinez (IT Security Manager), Diana Chen (Branch Operations Manager), Robert Kim (Compliance Officer) |
Scenario Hook
βCommunity First Bank is processing peak month-end transactions when branch managers report USB drives used for daily transaction reconciliation and audit procedures are creating suspicious folder-like files spreading through routine banking workflows.β
Victory Condition
Contain USB worm across 45 branches, protect customer financial data, maintain month-end processing, ensure regulatory compliance, secure banking USB workflows.
2. Organization Context
Community First Bank: Regional Banking Network During USB-Driven Transaction Processing
Detailed Context
Organization Profile
Regional bank with 45 branch locations, 1,200 employees
Key Assets At Risk: - Customer financial data - Banking operations - Regulatory compliance - Financial transaction security
Business Pressure
- Month-end transaction processing - banking system failures affect customer accounts
- Financial regulatory compliance at risk
Cultural Factors
- Bank employees routinely use USB drives for transaction reconciliation, audit procedures, and data transfer between branch locations
- USB malware exploits legitimate banking workflows to spread between customer account systems and financial transaction networks
- Infected systems include customer account databases, transaction processing, and financial audit systems