top of page

RED TEAM HACKERS

Rectangle 39940.png

Welcome to the shadowy world where intrigue and cunning meet at the crossroads of technology and subversion. The Red Team is not just a random assortment of cybercriminals; they are a highly organized group of digital infiltrators, each with unique abilities and a common goal—to exploit vulnerabilities and cause chaos.

​

As the offensive group in CyberStrike 24, the Red Team’s primary objective is clear: to challenge the effectiveness of Smart Island City's cybersecurity defenses. By exploiting discovered vulnerabilities, they not only prove their technical prowess but also gain fame and fortune on the dark web. Their activities are not merely disruptive; they serve to demonstrate potential real-world breaches, making each move a lesson in digital defense.

Frame 35.png

Starting Team

Players on the Red Team can choose their role from any available hacker characters in the game or enabled expansions. There are no specifically required team members. Each hacker brings unique skills and strategies to the table, allowing players to tailor their team to their preferred playstyle.

Hacker Profiles

Bot Herder

Rectangle 39941.png
  • Motivation and Ethics: Driven by a quest for power and control, the Bot Herder manipulates compromised machines to execute large-scale attacks. They operate with a self-serving code of ethics, viewing the digital landscape as a domain to dominate.

​

  • Primary Skills and Focus: The Bot Herder specializes in creating and managing botnets—networks of devices infected with malware, known as zombie bots. Their primary tools are sophisticated hacking scripts used to infiltrate networks and install malicious software, enabling DDoS attacks and data theft.​

Freelancer

Rectangle 39941 (1).png
  • Motivation and Ethics: A maverick operator motivated by financial gain and the thrill of hacking, the Freelancer thrives on breaching systems and reaping rewards. Their actions are driven by a desire for dominance and enjoyment of the chaos they create.

​

  • Primary Skills and Focus: The Freelancer excels in deploying ransomware, infiltrating networks, and encrypting valuable data to demand ransoms. Their tactics are ruthless, leaving systems in disarray and adversaries reeling.

Mafioso

Rectangle 39941 (2).png
  • Motivation and Ethics: Blending traditional organized crime with modern cyber strategies, the Mafioso operates with loyalty to their criminal organization, driven by financial gain and empire expansion.

​

  • Primary Skills and Focus: The Mafioso is adept at SIM swapping and phishing, using these techniques to bypass security and extract sensitive information. They utilize hacking scripts to infiltrate secure systems and exploit vulnerabilities.

Info Broker

Rectangle 39941 (3).png
  • Motivation and Ethics: Driven by ambition and opportunism, the Script Kiddie uses ready-made exploit hacking toolkits to gain recognition and prove their capabilities, despite lacking advanced skills.

​

  • Primary Skills and Focus: The Info Broker specializes in acquiring and distributing sensitive information, using phishing techniques and social engineering. They maintain anonymity while conducting trades, leveraging their network to access valuable data.

Script Kiddie

Rectangle 39941 (4).png
  • Motivation and Ethics: Driven by ambition and opportunism, the Script Kiddie uses ready-made exploit hacking toolkits to gain recognition and prove their capabilities, despite lacking advanced skills.

​

  • Primary Skills and Focus: The Script Kiddie deploys a variety of hacking toolkits to achieve their goals, focusing on password attacks and exploiting user authentication systems.

Threat Actor

Rectangle 39941 (5).png
  • Motivation and Ethics: Operating under the directive of rogue governments, the Threat Actor is a well-trained military officer driven by state objectives and personal gain. They operate without regard for legal or ethical implications.

​

  • Primary Skills and Focus: The Threat Actor excels in advanced persistent threats (APTs) and money laundering, using military precision to exploit digital vulnerabilities and secure illicit funds.

Researcher

Rectangle 39941 (6).png
  • Motivation and Ethics: Driven by the pursuit of knowledge and innovation, the Researcher views data theft as a means to accelerate progress. They prioritize discovery over legal and ethical considerations.

​

  • ​Primary Skills and Focus: The Researcher specializes in uncovering zero-day vulnerabilities and industrial espionage, using sophisticated hacking scripts and phishing tools to extract valuable information.

Spy

Rectangle 39941 (7).png
  • Motivation and Ethics: Employed by governments and organizations, the Spy gathers intelligence and disrupts targets while maintaining plausible deniability. Their actions are driven by strategic objectives and secrecy.

​

  • Primary Skills and Focus: The Spy excels in social engineering and advanced persistent threats (APTs), using phishing attacks to gain access to sensitive information and disrupt critical systems.

Anarchist

Rectangle 39941 (8).png
  • Motivation and Ethics: Driven by a political philosophy to decentralize power and liberate information, the Anarchist seeks to disrupt the status quo and expose hidden truths.

​

  • Primary Skills and Focus: The Anarchist excels in hacking, programming, and networking, using these skills to disrupt oppressive systems and expose injustices. Their primary tools include sophisticated hacking scripts and social engineering tactics.

Maker

Rectangle 39941 (9).png
  • Motivation and Ethics: Motivated by a passion for innovation, the Maker operates in a gray area of ethics, focusing on the technical prowess required to develop cutting-edge gadgets and software.

​

  • Primary Skills and Focus: The Maker excels in creating and modifying gadgets, software, and hardware, using custom hacking scripts and modified devices to exploit security systems.

Scammer

Rectangle 39941 (13).png
  • Motivation and Ethics: Driven by financial gain through deception, the Scammer employs a variety of fraudulent techniques to extract money and sensitive information from victims.

​

  • Primary Skills and Focus: The Scammer specializes in phishing, social engineering, and financial fraud, using these skills to deceive targets and steal valuable assets.

Prankster

Rectangle 39941 (14).png
  • Motivation and Ethics: With a penchant for chaos and disruption, the Prankster uses their skills to cause mischief and confusion for their amusement.

​

  • Primary Skills and Focus: The Prankster excels in hacking scripts and social engineering, using these tools to disrupt systems and create chaos without necessarily seeking financial gain.

Cyberterrorist

Rectangle 39941 (10).png
  • Motivation and Ethics: Focused on illegally distributing digital content, the Digital Pirate operates with a blatant disregard for intellectual property laws.

​

  • Primary Skills and Focus: The Digital Pirate excels in hacking and data theft, using their skills to distribute pirated content and evade law enforcement.

Digital Pirate

Rectangle 39941 (12).png
  • Motivation and Ethics: Driven by ideological goals, the Cyberterrorist aims to inflict maximum damage on critical infrastructure to further their cause.

​

  • Primary Skills and Focus: The Cyberterrorist specializes in advanced cyber warfare techniques, using zero-day exploits and sophisticated hacking scripts to target and disrupt critical systems.

Hi

Rectangle 39941 (2).png
  • Motivation and Ethics: The Cryptographer operates with a relentless drive to unlock and secure the most complex cryptographic systems. Focused on both breaking and creating encryption codes, the Cryptographer aims to gain access to sensitive data while ensuring the security of Red Team communications.


  • Primary Skills and Focus: The Cyberterrorist specializes in advanced cyber warfare techniques, using zero-day exploits and sophisticated hacking scripts to target and disrupt critical systems.


Cryptographer

Rectangle 39941 (2).png
  • Motivation and Ethics: The Cryptographer operates with a relentless drive to unlock and secure the most complex cryptographic systems. Focused on both breaking and creating encryption codes, the Cryptographer aims to gain access to sensitive data while ensuring the security of Red Team communications.


  • Primary Skills and Focus: The Cyberterrorist specializes in advanced cyber warfare techniques, using zero-day exploits and sophisticated hacking scripts to target and disrupt critical systems.


Tech Skills

Each hacker has a skill rating from zero to four for technical skills

  • Breach: Skill in bypassing security systems to gain unauthorized access to data or networks.

​

  • Hack: Ability to manipulate or exploit computer systems and networks to achieve a specific unauthorized outcome.

​

  • Steal: Expertise in illicitly extracting data, funds, or digital assets from secured environments.

​

  • Encrypt: Knowledge of securing information by encoding it, ensuring that only authorized parties can access it.

​

  • Sabotage: The capability to disrupt or damage systems, often leaving them inoperable or compromised.

​

  • Stealth: Skill in performing actions or infiltrations without being noticed, emphasizing undetectability.

Social Skills

And also, for social skills:

  • Disguise: Proficiency in masking one's digital footprint or identity to evade detection.

​

  • Sleight-of-hand: Agility in quickly manipulating devices such as locks or security badge readers to one’s advantage.

​

  • Persuasion: The ability to influence others, often used to manipulate targets or convince them to take certain actions that serve the hacker's goals.

​

  • Charisma: A magnetic trait that allows hackers to attract followers and sway individuals, useful for leadership and deceptive practices.

Composite Skills

Composite Skill

Sneak

Pretend to be an Authorized Employee

Using a combination of stealth and disguise, hackers can infiltrate locations undetected by blending in with the surroundings and avoiding attention.

By leveraging persuasive communication and disguise, hackers can convincingly pose as legitimate employees to gain unauthorized access.

Try to Steal a Badge

Employing stealth and sleight-of-hand techniques, hackers can surreptitiously obtain access badges or other credentials necessary for entry.

Break in with Brute Force

Combining sabotage and stealth, hackers can forcefully breach physical security measures while minimizing detection risk.

Charm

Using charm and persuasive skills, hackers can manipulate individuals to gain access or information without raising suspicion.

Distract

Using charm to captivate attention, hackers create diversions while performing sleight-of-hand actions to gain access or steal information.

Cyberweapons

And also, for social skills:

Rectangle 39947.png

Botnet: A network of compromised computers controlled by a hacker, often used for distributed attacks. An active botnet is formed when there is at least one enabled command & control server and at least one enabled zombie bot. A second backup command & control server is sometimes used to increase the resilience of the weapon, taking over in cases where the primary command & control is unavailable.



 

The botnet components are:

Rectangle 39947 (1).png
  • Command & control server: A remote computer used by cybercriminals or malicious actors to manage and control malware-infected devices or a botnet, enabling them to issue commands, receive stolen data, and orchestrate cyber attacks, all while maintaining covert communication to evade detection.

Rectangle 39947 (2).png
  • Zombie bot: Represents a large fleet of compromised computers or devices that have been infected with malware and are under the remote control of an attacker, often used to participate in malicious activities such as Distributed Denial of Service (DDoS) attacks or spam distribution without the device owner’s knowledge. The more
    zombie bots engaged, the stronger the attack.

Rectangle 39947 (3).png

Zero-Day Exploits: Advanced software vulnerabilities unknown to those interested in mitigating the vulnerability, allowing hackers to bypass network defenses undetected.

Rectangle 39947 (5).png

Phishing Tools: Techniques and tools used to deceive users into providing confidential information such as passwords and other sensitive data. Phishing can be used for online attacks.

Rectangle 39947 (4).png

Ransomware Kits: Software that encrypts data on the victim's system, locking out the legitimate users and demanding a ransom for the decryption key. Ransomware is deployed only after a successful network breach and system hack.

All Red Team hackers can access the Dark Web Marketplace to purchase cyberweapons. Only some of the hackers have the ability to sell data on the Dark Web Marketplace.

Company is Frolic Games Pte. Ltd. (Singapore)


Frolic Games USA LLC (St. Petersburg, Florida, USA)

  • Instagram
  • LinkedIn
  • Youtube
Quick links

Don’t Miss Out! Subscribe to our newsletter for the latest updates, exclusive offers, and sneak peeks into CyberStrike 24. Join the CyberStrike community and stay ahead in the game.

bottom of page