TSIV.ccc

Year of Creation
2020
Creator/Origin
Luna
Current Owner
Luna
 

Description

The Three-Stage Infiltration Virus is written using three lines of natively programmed Computationally Critical Code, or Language L, a language that normally only takes one or two lines of code to achieve most desirable results. The virus is designed to be a fully autonomous agent from the moment it is sent to the moment it achieves it's goal of total access, though success of the virus in breaking through higher security systems can be increased with active external inputs.   The first stage is 'Infiltration & Analysis'. The virus is hidden in the code of another program or file and is primed to be activated by a specific stimulus before being sent to a target. When this stimulus is triggered, such as an infected image being viewed or an infected website being visited, the virus activates on the now infected device. Immediately, the virus will analyze the hardware and operating system of the device, gathering all information that it can without revealing itself. Simultaneously the virus will find any kind of 'cleaner' program or process manager running on the system and bake itself into that program to further disguise itself while it analyzes the infected system. If an ideal program cannot be found it will instead bake itself into several currently active programs in the hopes that at least one of them will always be open to mask itself with. If the virus can determine the hardware of the device and the OS it is running on then it can utilize any vulnerabilities that the virus knows of, pulling from an internal database that is updated bidaily. If it can manage to bypass security measures directly and gain root access then Stage 2 can be skipped. Otherwise it will attempt to use any vulnerabilities as it moves on to Stage 2. The virus is extremely hard to detect while in stage 1, and even afterwards it can be difficult to spot as it only continues its operations while the computer appears to be idle.   The second stage is 'Connection & Siege'. The virus uses any means it can to connect to the internet. If no major vulnerabilities are known or if the OS and/or hardware cannot be determined for whatever reason then the virus will likely be unable to break through the firewall on its own. In this situation the virus can send a small amount of data through another program that is actively uploading, data which is then directed to the LoliOS Servers. The servers can then attempt to break through the device's security using a multitude of methods and the help of the virus from within. It is at this point that external inputs become possible. Once security has been breached, a full connection is established and stage three begins.   The third stage is 'Identification and Documentation' and consists of scanning through all available files and settings on the device. All identifying information, including location data, is compiled and sent to the LoliOS Servers as a first priority task. Immediately following that all files and settings are copied over using an algorithm to determine the priority of each file. Once the process is complete, the virus removes any trace of its actions that it can before removing itself from the infected device as well, in most cases leaving it as if the virus was never there in the first place.

Comments

Please Login in order to comment!