1. Quick Reference

Element Details
Malmon Raspberry Robin (USB Worm/Stealth) ⭐⭐⭐
Difficulty Tier Tier 2 (Advanced)
Scenario Variant Financial Branches - Month-End Processing
Organizational Context Community First Bank: 45 branch locations, 1,200 employees, month-end transaction processing
Primary Stakes Customer financial data + Banking operations + Regulatory compliance + Transaction security
Recommended Formats Full Game, Advanced Challenge (120-180 min)
Essential NPCs Janet Foster (Regional Director), Carlos Martinez (IT Security Manager), Diana Chen (Branch Operations Manager), Robert Kim (Compliance Officer)

Scenario Hook

“Community First Bank is processing peak month-end transactions when branch managers report USB drives used for daily transaction reconciliation and audit procedures are creating suspicious folder-like files spreading through routine banking workflows.”

Victory Condition

Contain USB worm across 45 branches, protect customer financial data, maintain month-end processing, ensure regulatory compliance, secure banking USB workflows.


2. Organization Context

Community First Bank: Regional Banking Network During USB-Driven Transaction Processing

Quick Reference

  • Organization: Regional bank with 45 branch locations, 1,200 employees processing customer financial transactions
  • Key Assets at Risk: Customer financial data across branch network, Banking operations and transaction processing systems, Financial regulatory compliance, Transaction security
  • Business Pressure: Month-end transaction processing peak operations—banking system failures affect customer accounts, financial regulatory compliance at risk during critical processing window
  • Core Dilemma: Continue USB-based transaction reconciliation maintaining banking operations BUT allows malware propagation through customer account systems, OR Halt USB use for containment BUT disrupts transaction processing and audit procedures affecting customer services

Detailed Context

Organization Profile

Regional bank with 45 branch locations, 1,200 employees

Key Assets At Risk: - Customer financial data - Banking operations - Regulatory compliance - Financial transaction security

Business Pressure

  • Month-end transaction processing - banking system failures affect customer accounts
  • Financial regulatory compliance at risk

Cultural Factors

  • Bank employees routinely use USB drives for transaction reconciliation, audit procedures, and data transfer between branch locations
  • USB malware exploits legitimate banking workflows to spread between customer account systems and financial transaction networks
  • Infected systems include customer account databases, transaction processing, and financial audit systems

2-12. Complete Sections

Key Configuration: Month-end timeline pressure, multi-branch coordination, banking regulatory compliance, customer data protection

NPCs:

  • Janet Foster: Managing 45 branches during month-end with USB malware spreading
  • Carlos Martinez: Investigating USB worm bypassing financial network security
  • Diana Chen: Reporting infected USB affecting transaction reconciliation
  • Robert Kim: Assessing customer data exposure and regulatory notifications

Response Options: Branch isolation (+3), USB workflow quarantine (+3), transaction system protection (+2)

Round-by-Round: Discovery → Multi-branch spread confirmed → Critical decision on operations vs containment

Type Effectiveness: USB Worm weak to workflow isolation (+3), resists network-only defenses (-1)

Key Challenge: Carlos discovers 45 branches using shared USB procedures, month-end cannot be delayed, customer financial data potentially exposed

Cross-References:


Streamlined planning doc emphasizing multi-branch USB workflow vulnerabilities and financial regulatory compliance during month-end operations.