![]() |
|
BoostExploit
(onSupport): Increases any Exploit's power by +2 while Black_Hat is public on the fieldDataTransfer
(onAttack): If an Action card is supporting a Barrier, one Function from that Action can be transferred to this ExploitThese effects allow Black_Hat to be used both as a standalone attacker and as a support card, strengthening other Hackers' offensives or stealing useful Functions mid-attack.
Black_Hat can serve as a key piece in offensive Hacker decks, especially when paired with lower-cost Exploits. Keeping it Public early enables immediate synergy with other attacks through BoostExploit.
The unique DataTransfer ability enables creative disruption — copying support Functions from Admin Actions and turning their defense into offense.
A Black Hat hacker is an individual who exploits systems illegally, often for personal gain, sabotage, or political agendas. Unlike White Hats, their actions are malicious and unauthorized.
Black Hat hackers use vulnerabilities in systems — often leveraging malware, backdoors, phishing schemes, or stolen credentials — to gain access, escalate privileges, or exfiltrate data.
Ghost_Net
: A large cyber-espionage network discovered in 2009 that infiltrated high-profile political targets globally.Shadow_Brokers
: A group that leaked NSA cyberweapons, including EternalBlue, which was later used in WannaCry ransomware.Black Hats pose a major threat to global cybersecurity. Their activities can lead to massive data breaches, financial losses, and geopolitical disruption. The cat-and-mouse dynamic between Black Hats and security systems fuels much of modern InfoSec development.
BoostExploit
reflects how Black Hat hackers often use established attack tools to amplify others' work or coordinate strikes.-DataTransfer
symbolizes the tactic of reappropriating legitimate system tools for malicious use — a hallmark of advanced attacks.