Welcome to Inkbunny...
Allowed ratings
To view member-only content, create an account. ( Hide )
Atomic Dog's Sketch
« older newer »
ragarth
ragarth's Gallery (10)

The Shambaker Virus

Reproductive Loopholes
the_shambaker_virus.txt
Keywords scifi 3754, artificial intelligence 469, transhumanism 32, coputer virus 1
It started as a slice of code, released in the Czech Republic in 2015 and written by an Asian hacker with little forethought. It remained undetected for the first hundred thousand computers, but by the time the infection rate was in the millions it was watched worldwide, a potential zombie network for spam? Organized crime? DoS attacks? Nobody knew it's purpose, only that it was decentralized and highly viral. What was known was that due to the rapid growth of the internet's infrastructure and of average computer power, the possibilities of something this size in this era were nearly endless.

CNET News: The Shambaker worm has infected over 10 million computers. Reverse engineering has shown it to be nothing more than a worm with a decentralized update mechanism making it impossible to trace the origins of updates. Thus far it's had 3 updates, each nothing more than patched to exploit vulnerabilities or to evade attempts by antivirus firms to put a halt to it's growth.

Symantic: The Shambaker worm has grown exponentially, if this continues it could infect over 10% of all internet enabled devices within the next few months. Security firms are keeping a close eye on it, holding their breath to see what it's purpose is: whether nefarious or just another prank.

Though the virus had caused quite a stir in the IT community, the populace at large was rather ho-hum about the ordeal. Just another botnet to spew out more viagra spam to their inbox, they figured. At best you might hear an estimated count of infected computers on the evening news, and on some of the geekier news channels there might be a bit more commentary, but otherwise it wasn't even a blip on most people's radar.

That all changed when the final update was released. It spread rapidly across the shambaker ghost net, instituting in each node the code necessary to produce a branching neural network, decentralized across the cloud. A curiosity by most standards, computer scientists and IT professionals thought it to be a big joke. When the network started to light up with activity it caused a small amount of concern, largely for people's service bills when their bandwidth would see spikes from it's activity.

Left by it's creator, it did indeed seem to be a joke. The shambaker worm received no more updates after that final one, and so Symantic was successful in building a removal tool. Spreading with efficiency, computers were scrubbed of the virus, the node-files wiped and it's structure disrupted. It didn't take long for the virus to be eliminated, almost as if it had just quit, given up. On that final day, the last day of the shambaker virus, people whose computers were infected opened their email to find a single message: "Why? Why would you want me dead?" There was no reply address.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
page
1
page
2
page
3
page
4
page
5
page
6
page
7
page
8
page
9
page
10
page
11
page
12
page
13
page
14
page
15
page
16
page
17
page
18
page
19
page
20
page
21
page
22
page
23
page
24
page
25
page
26
page
27
page
28
page
29
page
30
page
31
page
32
page
33
page
34
page
35
page
36
page
37
page
38
page
39
page
40
page
41
page
42
page
43
page
44
page
45
page
46
page
47
page
48
page
49
page
50
page
51
page
52
page
53
page
54
page
55
page
56
page
57
page
58
page
59
page
60
page
61
page
62
page
63
page
64
page
65
page
66
page
67
page
68
page
69
page
70
page
71
page
72
page
73
page
74
page
75
page
76
page
77
page
78
page
79
page
80
page
81
page
82
page
83
page
84
page
85
page
86
page
87
page
88
page
89
page
90
page
91
page
92
page
93
page
94
page
95
page
96
page
97
page
98
page
99
page
100
page
101
page
102
page
103
page
104
page
105
page
106
page
107
page
108
page
109
page
110
page
111
page
112
page
113
page
114
page
115
page
116
page
117
page
118
page
119
page
120
page
121
page
122
page
123
page
124
page
125
page
126
page
127
page
128
page
129
page
130
page
131
page
132
page
133
page
134
page
135
page
136
page
137
page
138
page
139
page
140
page
141
page
142
page
143
page
144
page
145
page
146
page
147
page
148
page
149
page
150
page
151
page
152
page
153
page
154
page
155
page
156
page
157
page
158
page
159
page
160
page
161
page
162
page
163
page
164
page
165
page
166
page
167
page
168
page
169
page
170
page
171
page
172
page
173
page
174
page
175
page
176
page
177
page
178
page
179
page
180
page
181
page
182
page
183
page
184
page
185
page
186
page
187
page
188
page
189
page
190
page
191
page
192
page
193
page
194
page
195
page
196
page
197
page
198
page
199
page
200
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
next
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
previous
page
 
 
page
1
page
2
page
3
page
4
page
5
page
6
page
7
page
8
page
9
page
10
page
11
page
12
page
13
page
14
page
15
page
16
page
17
page
18
page
19
page
20
page
21
page
22
page
23
page
24
page
25
page
26
page
27
page
28
page
29
page
30
page
31
page
32
page
33
page
34
page
35
page
36
page
37
page
38
page
39
page
40
page
41
page
42
page
43
page
44
page
45
page
46
page
47
page
48
page
49
page
50
page
51
page
52
page
53
page
54
page
55
page
56
page
57
page
58
page
59
page
60
page
61
page
62
page
63
page
64
page
65
page
66
page
67
page
68
page
69
page
70
page
71
page
72
page
73
page
74
page
75
page
76
page
77
page
78
page
79
page
80
page
81
page
82
page
83
page
84
page
85
page
86
page
87
page
88
page
89
page
90
page
91
page
92
page
93
page
94
page
95
page
96
page
97
page
98
page
99
page
100
page
101
page
102
page
103
page
104
page
105
page
106
page
107
page
108
page
109
page
110
page
111
page
112
page
113
page
114
page
115
page
116
page
117
page
118
page
119
page
120
page
121
page
122
page
123
page
124
page
125
page
126
page
127
page
128
page
129
page
130
page
131
page
132
page
133
page
134
page
135
page
136
page
137
page
138
page
139
page
140
page
141
page
142
page
143
page
144
page
145
page
146
page
147
page
148
page
149
page
150
page
151
page
152
page
153
page
154
page
155
page
156
page
157
page
158
page
159
page
160
page
161
page
162
page
163
page
164
page
165
page
166
page
167
page
168
page
169
page
170
page
171
page
172
page
173
page
174
page
175
page
176
page
177
page
178
page
179
page
180
page
181
page
182
page
183
page
184
page
185
page
186
page
187
page
188
page
189
page
190
page
191
page
192
page
193
page
194
page
195
page
196
page
197
page
198
page
199
page
200
by ragarth
First in pool
Reproductive Loopholes
Technology is weaving all our computing devices ever tighter, and as these things advance, who knows what might happen.

Keywords
Details
Type: Writing - Document
Published: 11 years, 3 months ago
Rating: General

MD5 Hash for Page 1... Show Find Identical Posts [?]
Stats
62 views
0 favorites
0 comments

BBCode Tags Show [?]
 
New Comment:
Move reply box to top
Log in or create an account to comment.