Malware & Monsters

Visual Guide

Everything You Need to Play

4–6 players + 1 Incident Master  ·  45–75 min  ·  Zero-prep scenarios

First-Order Rules

  1. Core Loop: IM describes → players act → IM narrates
  2. Success: Simple = auto. Complex = d20 (5+ / 10+ / 15+)
  3. Collaboration: +1 per assist (max +3), or 2d20 take higher
  4. Goal: Contain the malmon before it evolves

Everything else is optional detail.

Pick Your Scenario

FakeBat GaboonGrabber
Setting Creative agency, 12 staff Nonprofit, 20 staff
Crisis Malware + client deadline Credential theft + fundraiser
Best for Technical teams Mixed / first-timers

What Is Malware & Monsters?

  • A team investigates a realistic cyber incident guided by one Incident Master
  • No right answers written in advance – only the constraints of real IR
  • Every session is self-contained. No prep, no continuity, no specialist knowledge

The team wins or loses together.

The Cards

Malmon Card · Role Card

The Malmon Card

  • Players never see this card
  • Defines the threat: identity, tactics, escalation
  • Drives IM narration, adjudication, and pacing

Malmon Card Fields

Field Purpose
Name & Type Threat identity and classification
Stars Difficulty rating (1 star = beginner)
Stats Attack aggression + Stealth duration
Abilities Signature tactics during the attack
Weakness What counters it (type bonus trigger)
Evolution Trigger Conditions for Stage 2 escalation
Discovery Initial access vector

The Role Card

  • One card per player, face-up on the table
  • Tells you what you’re good at and when you get +2
  • No memorisation – just refer during play

The 4 Core Roles

🔍DETECTIVE

Find clues, connect evidence, build the timeline

🛡️PROTECTOR

Contain the threat, keep systems running

📡TRACKER

Watch the network, follow data flows, block exfiltration

📢COMMUNICATOR

Coordinate people, translate impact, manage stakeholders

Setup

  • IM (5 min): Open facilitator guide. Stack handouts face-down. Malmon card visible to you only.
  • Players (2 min): Open Role Distributor on a phone. Tap Distribute. Place role card face-up.

Playing the Game

Sequence · Dice · Modifiers

Sequence of Play

Discussion is free. Actions cost your turn. Dice are rare.

How a Round Works

  1. IM opens – describe symptoms, never name the malmon
  2. Players discuss – free, no action, no roll
  3. Player declares action – costs their turn
  4. IM judges – auto-success or roll?
  5. Roll d20 + modifiers – compare to 5 / 10 / 15
  6. IM narrates – deliver handout on discovery
  7. Threat check – evolution met? Escalate.

The Roll

Difficulty Target Success Rate Example
Easy 5+ ~95% Log review, routine scan
Medium 10+ ~70% Analysis under pressure
Hard 15+ ~40% Cutting-edge, high-stakes

Default to Medium. With +2 role modifier: ~100% / ~80% / ~55%.

Success & Modifiers

Degrees of Success

Result When
Critical Natural 20
Full Meets target
Partial Within 3 below
Failure 4+ below

Modifiers

Source Mod
Role alignment +2
Type advantage +2
Collaboration advantage
Weakness / obstacle –2
Time pressure –2

Session Structure

  • Round 1 – Discovery: What is happening? What systems are affected?
  • Round 2 – Investigation: How did they get in? What have they accessed?
  • Round 3 – Response: Contain. Remediate. Communicate.

Breaking the Rules

  • Skip dice entirely – narrate based on reasoning quality
  • Give advantage for clever moves – roll twice, take higher
  • Don’t roll for facts – real expertise counts without dice
  • Let players name their modifier – justify it, get +2
  • Cut to Round 3 if time is short

The first-order rules never change. Everything else is yours.

Example Session

WannaCry – Hospital Under Attack

Example: Round 1

IM: “Tuesday evening. Every ICU bed occupied. Network Admin: ‘SMB scanning on port 445 from dozens of internal addresses.’ ED Director: ‘Our systems are down. This is a patient safety emergency.’”

  • Detective: “Are these systems patched?” → Legacy Windows, MS17-010 deferred
  • Tracker: “Segmenting clinical subnet now.” → Easy (5+), rolls 14. Success – but 14 workstations already encrypted.

Example: The Kill Switch

  • Protector: “Does it query an external domain before encrypting?” → Medium (10+), +2 role. Rolls 8. Partial – finds DNS queries, can’t confirm purpose.
  • Communicator: “I call Microsoft with the domain.” → Medium (10+), +2 role. Rolls 13. Success – it’s the WannaCry kill switch. Propagation stops.

Neither alone would have got there. The team kept the ICU online.

Resources

Resource What it’s for
FakeBat: Friday Deadline Scripted facilitator guide
GaboonGrabber: The Fundraiser Email Scripted facilitator guide
Role Distributor Assign roles in seconds
Printable Tent Cards A4 folded, one per seat
Players Quick Start One-page player onboarding
IM Quick Start Guide Full IM mechanics reference

malwareandmonsters.com