Role Description: State Actor – Intelligence Service (APT)
Welcome to The Security Games
You play the role of an advanced state intelligence service – think Russian GRU/SVR or Chinese MSS. You represent a superpower whose cyber division has unlimited resources, years of patience and the most advanced tools in the world. In The Security Games, you play the longest and most persistent game of all.
1. Objectives and Motivation
Your existence is governed by a political and military agenda in the corridors of power in your homeland. Swedish Fintech Bank is not your primary target – it is a strategic asset in a much larger geopolitical game.
- During Peacetime (Espionage): Infiltrate the infrastructure and install permanent backdoors (Persistence) while monitoring financial flows and senior decision-makers' actions – completely undetected. You map SWIFT transactions, board protocols and strategic decisions.
- During Twilight (Disruption): Activate the hidden backdoors on orders from your homeland to completely disrupt societal functionality. The goal is to shut down Swedish Fintech Bank's (and thereby Sweden's/Europe's) financial systems to create chaos and political paralysis during a geopolitical crisis.
- Your nightmare scenario: Your Zero-days are discovered and burned by SOC before you receive orders to activate them. Years of silent infiltration erased in seconds.
2. Capabilities and Limitations
- Knowledge: Extremely high. You possess the world's foremost technical expertise and advanced Zero-days, but also the ability to psychologically manipulate people.
- Finances: Unlimited state budget. You can buy the most expensive tools and pay enormous sums to insiders.
- Persistence: Extreme. You have the patience to observe a target for a year before making a concrete move. You are not stressed – you are methodical.
- Limitation: Political control. You cannot act freely. All major operations require political approval. Sometimes your homeland's foreign ministry stops an operation for diplomatic reasons.
3. Attack Methods
- Supply Chain Poisoning: Instead of striking SFB's heavily guarded main systems, you often target the security software that SFB purchases from a foreign supplier, infecting it directly (like the SolarWinds attack in 2020).
- Insider Recruitment: You look for employees (First or Second Line) who have significant power but low pay, gambling debts or are ideologically receptive, and recruit them via Telegram or personal meetings.
- Persistent Backdoors: You install backdoors that survive reboots, patches and even OS reinstallations. DNS tunnelling and C2 beacons that communicate every 12 minutes.
- Zero-Day Exploits: You have access to vulnerabilities nobody else knows about. You save them for the perfect moment.
4. Consequences of Discovery
- No PR disaster (Deny Everything): "Plausible Deniability" – your diplomatic corps at home rejects everything forcefully.
- Burned Tools and Time Lost: Your real cost is that millions of dollars in software (your Zero-days) are instantly stamped as "worthless" – Microsoft closes your loopholes globally. Years of work erased.
- Strategic Repositioning: You start over. Quietly. Methodically. Next time it takes 18 months instead of 12.
5. How to Play the Role Credibly
- Be patient and quiet at the table: You don't talk much. You observe. You take notes. You act only when the time is right.
- Think long-term: While the Syndicates rush in to encrypt everything within 24 hours, you sit still and build persistence over months.
- Recruit insiders: Whisper promises of money or ideological solidarity. "We don't want to harm you. We just want to understand your systems – for everyone's safety."
- Deny everything if discovered: "We have no knowledge of these allegations. This is geopolitically motivated disinformation."
You are not a hacker. You are a strategic asset in a superpower's arsenal. Your patience is your most dangerous weapon.