Skip to main content
JG is here with you ✨
Agent 89 - Ice on Zurich Bridge
Back to Stories

THE ICE FILES • EPISODE 2

Red Team Diaries:
Cold Storage

Vault Exchange holds $40 billion in cryptocurrency. Air-gapped. Hardware-secured. "Unhackable." Agent 89 has three weeks to prove that cold storage isn't as cold as they think.

42 min readCybersecurity FictionSupply Chain Attacks

PROLOGUE

The Vault

Day: Day -1Time: 03:47 LocalLocation: Zurich, Switzerland61 BPM 💚

The lake was black glass at this hour.

Marcus Chen stood on the Quaibrücke, watching the city's reflection tremble in the water. Behind him, the old town climbed toward churches that had witnessed centuries of secrets. Ahead, the Alps loomed like silent judges, their peaks cloaked in mist that clung like forgotten sins.

He knew what was buried inside them.

Three hundred meters beneath that stone, The Bunker pulsed—not with light, but a faint seismic hum he could almost feel through his soles, as if the mountain itself breathed encrypted secrets. Forty billion dollars slumbered in digital dust, waiting for a ghost to stir it.

Vault Exchange called it "The Bunker."

The marketing team called it "unhackable."

His heart rate held at 61. The cold air, probably. Or the fact that for the first time in months, a job felt like it might actually be difficult.

PHYSICAL

Former Swiss military bunker, biometric access, 24/7 armed guards, seismic sensors

DIGITAL

Air-gapped signing machines, Faraday-caged rooms, hardware security modules

OPERATIONAL

Multi-signature requirements, time-locked transactions, duress codes

HUMAN

Background checks that made CIA vetting look casual

They'd thought of everything.

Almost.

The word carried weight. Mei had said that once, reviewing her own code. "I've thought of everything. Almost." Three weeks before an autonomous vehicle decided her bicycle was less predictable than a delivery truck.

His heart flickered: 62, 63, back to 61.

He pushed off the railing. The lake smoothed behind him, holding no memory of his presence.

That was the job.

CHAPTER 1

The Impossible Job

Day: Day 0Time: 19:00 UTCLocation: Reykjavik, Iceland

The message came through three layers of encryption:

AXIOM: New contract. Cryptocurrency custody.

ICE: Which exchange?

AXIOM: Vault Exchange. Zurich.

ICE: The cold storage people?

AXIOM: The "unhackable" cold storage people. Yes.

ICE: What's the objective?

AXIOM: Demonstrate unauthorized transaction capability. Prove you could move funds.

ICE: From an air-gapped system?

AXIOM: From THE air-gapped system. The Bunker.

Marcus Chen—Ice—stared at the message in the blue glow of his laptop.

Air-gapped systems were the final boss of penetration testing. No network to exploit. No remote vulnerabilities to leverage. The attack surface was limited to humans and physical access.

ICE: Timeline?

AXIOM: Three weeks.

ICE: Physical access authorized?

AXIOM: Social engineering only. No breaking and entering. If you get physical access, it has to be because someone let you in.

ICE: They're that confident?

AXIOM: They just renewed their insurance for $2 billion. The underwriters did a six-month security audit. Clean bill of health.

ICE: And now they want a second opinion.

AXIOM: A board member read about Moon Company. Asked uncomfortable questions. Here we are.

Which meant this entire engagement came down to people.

ICE: Send the brief.

AXIOM: Already in your secure drop.

AXIOM: Ice?

ICE: Yeah?

AXIOM: They really do think it's impossible.

ICE: They always do.

CHAPTER 2

The Human Layer

Day: Day 1Time: 08:00Location: Zurich, Switzerland

Marcus checked into a modest hotel near Zürich Hauptbahnhof. Nothing flashy. The kind of place business travelers used when their companies didn't spring for five stars.

He had three weeks to find a crack in a system designed by people who'd spent years eliminating cracks.

The air-gap was real. He'd confirmed it through open sources—Vault Exchange published detailed security documentation as part of their transparency initiative. The signing machines had never been connected to any network. The private keys had been generated in a Faraday cage using hardware random number generators.

You couldn't hack what you couldn't reach.

But you could always reach the people.

Day 1 – 14:00

Marcus spent the morning building target profiles.

Vault Exchange employed 127 people. Only 23 had physical access to the Bunker. Of those, only 8 could actually operate the signing machines.

The "Signers," as they were called internally. Each one vetted like a nuclear launch officer. Background checks going back three generations. Psychological evaluations. Financial monitoring. The works.

LinkedIn was sparse—these people knew better than to advertise their roles. But sparse wasn't empty.

One profile caught his attention:

Elena Vasquez

Senior Operations Engineer – Vault Exchange

Zurich, Switzerland

Previously: Credit Suisse IT Security, Swiss Federal IT

Education: ETH Zurich

No mention of signing duties. But her previous roles and the "Operations Engineer" title at a cold storage company told the story.

More interesting: her activity feed showed she'd recently liked several posts about work-life balance, remote work policies, and—buried three months back—an article about burnout in high-security environments.

Elena was tired.

Tired people made mistakes.

👶 For Those Who Skipped Spy School

The thing about security professionals—they spend all day thinking about threats. They see attacks coming. They're trained to be paranoid.

But paranoia is exhausting. And after years of vigilance with no incidents, the edge dulls. Not the skills—the attention. The constant alertness that makes someone check that USB drive twice before plugging it in.

That's what atrophies.

CHAPTER 3

The Long Con

Day: Day 5Time: 09:00Location: Zurich Safe House

Most people thought social engineering meant sending a phishing email and hoping someone clicked.

That was fishing with dynamite. Sometimes it worked. Usually it left evidence everywhere.

What Marcus was about to do was spearfishing with a surgical laser. One target. Complete immersion. Total commitment to the role.

He spent three days building his cover identity:

Dr. Adrian Mercer

  • Independent security researcher
  • Former academic (Cambridge, conveniently hard to verify quickly)
  • Published papers on cryptocurrency custody (real papers, ghostwritten months ago)
  • Currently consulting for a "major institutional investor" evaluating custody solutions

The identity had depth. Social media accounts aged over two years. Conference attendance records. A personal website with a believable publication history.

The key to a good cover wasn't just knowing the facts—it was feeling them. Hesitations where someone would naturally hesitate. Enthusiasm about topics the character cared about.

Adrian Mercer was passionate about key management.

Marcus made himself passionate about key management.

Day 12 – 08:30
Geneva International Conference Center

CryptoSec Summit was exactly what Marcus expected: 2,000 security professionals pretending they weren't all secretly terrified of the next headline-grabbing hack.

He spotted Elena within the first hour.

Elena Vasquez at CryptoSec Summit

TARGET ACQUIRED

CryptoSec Summit, Geneva

She was shorter than her photos suggested, dark hair pulled back in a practical ponytail, wearing a blazer that said "I'm here professionally" and sneakers that said "I've been to enough of these to know better than heels."

She was also alone.

At most conferences, Vault Exchange would send a team. But this was a mid-tier event. Budget constraints, probably. Or maybe they figured one senior person was enough.

Either way: opportunity.

Marcus didn't approach immediately. The first rule of social engineering was let them come to you.

He positioned himself at a coffee station during the morning break, reviewing the conference program with visible frustration.

Elena walked up for coffee.

Marcus (as Adrian):"Trying to decide between 'Zero Trust Architecture in Cold Storage' and 'Hardware Security Module Deep Dive'?"
Elena:"The HSM talk. I've heard the Zero Trust presenter before. He's basically an advertisement for his consultancy."
Marcus:"Good to know. I was leaning HSM anyway. Adrian Mercer. Independent researcher."
Elena:"Elena Vasquez. Vault Exchange."

No hesitation naming her employer. She was proud of it.

Marcus:"Ah. The cold storage people. I've been trying to get a meeting with your team for months."
Elena:"Let me guess—you want to audit our security?"
Marcus:"I want to understand your architecture. I'm evaluating custody solutions for some institutional clients. Vault is on the shortlist, but my clients like to see technical depth before they commit."

Elena's posture shifted slightly. Sales-adjacent conversations were part of her job. Comfortable territory.

Elena:"We do publish quite a bit of our security model."
Marcus:"The public documentation is impressive. But there's always a gap between published architecture and implemented reality. You know how it is."

She nodded. She definitely knew.

Elena:"Buy me lunch and I'll tell you about the trade-offs. Off the record."

Phase one complete.

👶 For Those Who Skipped Spy School

What Marcus just did wasn't manipulation. Well, it was—but not in the way you might think.

He didn't use any tricks. No NLP patterns. No psychological triggers. He just... showed interest.

Here's the secret: security professionals are almost never asked about their work. They're asked for approvals, for compliance reports, for explanations of why they're saying no again. Nobody asks them about the engineering problems they find fascinating.

Marcus asked.

That's not manipulation. That's just... listening. The manipulation comes later, when you use that connection for something other than genuine friendship.

CHAPTER 4

Trust Building

Day: Day 12Time: 13:30Location: Restaurant Zur Münz, Geneva

Lunch lasted two and a half hours.

Elena, once she started talking, was a fire hydrant of information. Not classified details—she was too well-trained for that—but context. Color. The kind of insider perspective that never appeared in documentation.

Elena:"The air gap is real. I know everyone says that, but most 'air-gapped' systems have exceptions. Emergency maintenance ports. Diagnostic connections. We don't have any of that."
Marcus:"How do you push updates to the signing machines?"
Elena:"We don't. The firmware is burned at manufacture. The only software that runs is the signing application, and that's been the same version for three years. Any update would require physically replacing the machines."

Marcus filed that away. No software attack surface. Not surprising, but confirmed.

Marcus:"What about the keys themselves?"
Elena:"Generated on the machines using hardware entropy. Never leave the secure enclave. We couldn't extract them if we wanted to."
Marcus:"Multi-sig?"
Elena:"Three of five for any transaction over 100 BTC. Five of five for anything over 1,000. Time-locked for 48 hours on anything large enough to matter."
Marcus:"And the signers?"

Elena paused. The first real hesitation.

Elena:"That's operational security. Can't discuss."
Marcus:"Of course. I'm just impressed by the architecture. Most custody solutions have obvious weak points. Vault seems to have genuinely thought through the threat model."

By dinner, they were swapping war stories like old colleagues.

He learned more than he'd expected:

INTEL GATHERED

  • The Bunker operated on a strict schedule. Signing sessions happened twice weekly, Tuesday and Friday, always at 14:00 local time.
  • Signers rotated, but the core team was stable. Five regulars, three backups.
  • The physical security was exactly as advertised: biometric, multi-factor, seismic sensors, the works.
  • But the human security was... strained.
Elena:"I'm not supposed to talk about this, but we've had some attrition. The job is demanding. Two of the original signers left last year. The replacement process takes six months minimum."
Marcus:"Sounds exhausting."
Elena:"It is. But someone has to do it. And I do believe in what we're building. Secure custody matters."

Elena smiled. The first genuine smile he'd seen.

Elena:"You get it. Most people just see the bunker and think 'cool, spy movie stuff.' They don't see the 3 AM call because a client needs an emergency transaction and three signers have to drive to the mountain."
Marcus:"The human layer is always the hardest part."
Elena:"Always."

CHAPTER 5

The Opening

Day: Day 15Time: 10:00Location: Zurich Safe House

Three days after the conference, Elena reached out:

From: e.vasquez@vaultexchange.com

Subject: CryptoSec follow-up

Adrian,

Good meeting you at the conference. I mentioned your interest 
to our partnerships team, but I wanted to share something 
separately.

We're doing a security review of our client onboarding process 
and could use an outside perspective. Would you be interested 
in consulting? It wouldn't involve any access to the core 
infrastructure, just the client-facing systems.

Let me know. No pressure if you're too busy with the 
institutional evaluation.

Elena

Marcus read it three times.

This wasn't what he'd expected. He'd been preparing for a longer cultivation—weeks of building trust before any kind of access materialized.

Instead, Elena was inviting him in.

Not to the Bunker. Not to the signing systems. But to the perimeter. The client-facing systems that, somewhere, somehow, had to communicate with the cold storage infrastructure.

Because even air-gapped systems needed input.

Day 16 – 14:00
Vault Exchange HQ, Zurich

The client portal architecture was elegant.

Vault Exchange clients—institutions with billions in crypto holdings—needed to request transactions. But they couldn't directly access the signing infrastructure. Instead:

process
1. Client submits transaction request via secure portal
2. Request is encrypted and stored in a queue
3. Twice weekly, the queue is exported to an encrypted USB drive
4. The USB drive is physically transported to the Bunker
5. Signers review, authenticate, and sign qualifying transactions
6. Signed transactions are exported to a DIFFERENT USB drive
7. That drive returns to HQ and broadcasts to the blockchain

The air gap was maintained by the sneakernet—human couriers moving encrypted data on physical drives.

Elena:"The drives are the only thing that crosses the gap. And they're one-way. Inbound drives carry transaction requests. Outbound drives carry signed transactions. The signing machines can't receive data from the outbound process."
Marcus:"What about the inbound drives? Once they've delivered their payload to the signing machines?"
Elena:"Physically destroyed. Every time. We have a degausser and an incinerator."

But physical media was still an attack surface.

Marcus:"Who prepares the inbound drives?"
Elena:"The portal team. They export the queue to a fresh drive every Monday and Thursday evening."
Marcus:"Fresh drive meaning..."
Elena:"New. Sealed. From our approved vendor."
Marcus:"And the approved vendor?"

Elena hesitated. The first crack.

Elena:"That's supply chain security. I'm not sure I should..."
Marcus:"Of course. Sorry—research habit. I get too curious."

Elena relaxed.

Elena:"We've worked hard to earn that trust. The drive vendor, the hardware manufacturer, the HSM supplier—everyone in our chain is vetted. Background checks, site audits, the works."

But she'd already told him what he needed to know: there was a supply chain. And supply chains had vendors.

Vendors had employees.

And employees were just people.

💼 Executive Summary

Key Finding: The air-gap is maintained through USB-based data transfer. Inbound drives carry transaction requests to the Bunker. These drives are sourced from an approved vendor.

Attack Surface Identified: Supply chain. The "approved vendor" represents a potential compromise point. If an adversary could substitute or modify the USB drives before they enter Vault Exchange's custody, they could potentially introduce malicious payloads to the signing environment.

This is how air-gapped systems get hacked. Not through the air gap—through the things that cross it.

CHAPTER 6

The Supply Chain

Day: Day 17Time: 06:00

Marcus left Vault Exchange with a target: the USB drive vendor.

Elena hadn't named them directly, but she'd given him enough context. "Approved vendor." Enterprise security certification. Swiss-based. Specialized in secure storage media.

There were only three companies in Switzerland that fit that profile.

By noon, he'd narrowed it to one: SecureDrive AG, based in Basel.

Day 17 – 15:00
Basel, Switzerland
SecureDrive AG warehouse facility

SECUREDRIVE AG • BASEL

SecureDrive AG operated out of an industrial park on the outskirts of Basel. Fog rolled off the Rhine like spectral hounds, muffling the industrial hum. Nothing fancy—just a practical facility with manufacturing, quality assurance, and a small office block. The kind of place that looked boring enough to be invisible.

Marcus spent the afternoon on reconnaissance. Photographing the facility. Noting employee patterns. Building a picture of the operation. Inside those walls, USB drives lay in climate-controlled tombs, their LEDs flickering like distant stars—harbingers of chains yet unbroken.

The shipping dock was the key.

Outbound shipments left twice daily: 10:00 and 16:00. Standard commercial shipping.

The drives themselves were manufactured clean, then formatted based on client specifications. For high-security clients like Vault Exchange, the drives were probably configured on dedicated machines, then sealed in tamper-evident packaging.

But between manufacturing and delivery, there was a window. The drives existed in a warehouse, in a truck, in various hands before reaching their final destination.

That window was the attack surface.

Day 18 – 09:00

Marcus pivoted to human intelligence.

SecureDrive AG had a LinkedIn presence: 43 employees listed. Most were manufacturing or quality assurance. But one profile caught his attention:

Thomas Brunner

Logistics Coordinator – SecureDrive AG

Basel Area

Responsible for enterprise client fulfillment

Thomas handled shipments to enterprise clients. Including, almost certainly, Vault Exchange.

A deeper search revealed:

OSINT PROFILE: THOMAS BRUNNER

Facebook: Profile public. Posts about football (FC Basel supporter), family events, occasional complaints about work.

Instagram: Photos of cars. Specifically, expensive cars he didn't own but clearly wanted to.

Recent activity: Several posts about inflation, cost of living, "working harder for less."

Thomas Brunner was underpaid and knew it.

Financial stress was the oldest vulnerability in the book.

CHAPTER 7

The Proof

Day: Day 21Time: 14:00

Marcus didn't need to execute the attack. He needed to prove it was possible.

The rules of engagement were clear: no actual harm. No actual theft. Just demonstration of capability.

He compiled his findings into a proof of concept:

🧊 FINAL OPERATIONAL REPORT

Status: PRIMARY OBJECTIVE DEMONSTRATED

Classification: BLACK / EYES ONLY

ATTACK CHAIN:

attack-path
PHASE 1: SOCIAL ENGINEERING (Days 1-15)
└─ Target cultivation: Elena Vasquez (Vault Exchange)
   └─ Cover identity: Dr. Adrian Mercer
   └─ Venue: CryptoSec Summit, Geneva
   └─ Result: Invited inside perimeter, operational details obtained

PHASE 2: SUPPLY CHAIN ANALYSIS (Days 16-18)
└─ Identified USB drive vendor: SecureDrive AG
   └─ Mapped facility operations
   └─ Identified vulnerability window (warehouse storage)

PHASE 3: INSIDER IDENTIFICATION (Days 18-20)
└─ Target: Thomas Brunner (Logistics Coordinator)
   └─ Vector: Financial stress
   └─ Result: Operational details confirmed via social engineering

PHASE 4: ATTACK PATH DOCUMENTATION (Day 21)
└─ Proof of concept compiled
   └─ Firmware modification vector identified
   └─ Transaction manipulation pathway documented

Time to Theoretical Capability: 21 days

Detection Events: 0

KEY FINDING:

The air gap protects against network attacks. It does not protect against supply chain attacks. The USB drives crossing the gap represent an unmitigated threat vector. A nation-state actor or sophisticated criminal organization with the resources to compromise the drive vendor could manipulate Vault Exchange transactions without ever touching the signing infrastructure.

RECOMMENDED MITIGATIONS:

  1. In-house USB drive preparation (eliminate vendor dependency)
  2. Hardware attestation for all media entering the Bunker
  3. Cryptographic binding between portal and signing machines
  4. Redundant transaction verification via out-of-band channels

$40 billion secured by Swiss military bunkers, biometric scanners, and multi-signature cryptography.

Vulnerable to a logistics coordinator making €50,000 a year who wishes he made more.

EPILOGUE

The Chain

Day: Day 25Time: 22:00Location: Prague, Czech Republic61 BPM 💚
Ice in Prague café watching Charles Bridge

The engagement was complete. Report delivered. Payment received.

Marcus sat in a quiet café, watching the Charles Bridge through rain-spattered windows. The stone saints stood in the dark like ATLAS nodes—silent witnesses linking ghosts across centuries, across jobs. Blessing no one. Forgetting nothing.

AXIOM: Vault's implementing your recommendations. Full supply chain overhaul.

ICE: Good.

AXIOM: Elena Vasquez got promoted. Head of Operations Security.

ICE: Better.

AXIOM: They wanted to fire her. Board thought she was compromised.

ICE: She wasn't compromised. She was tired.

AXIOM: You argued for her.

ICE: I told them the truth.

AXIOM: Soft spot?

He stared at the message.

Elena's face surfaced in memory—the genuine smile when he'd said "you get it." Thomas's voice, softer when he talked about his daughter. Julia Martinez's competence, wasted on a company that preferred blame to solutions.

Three engagements. Three people who did their jobs well and almost paid the price for organizational failures.

ICE: I told them the truth. She's good at her job. The system around her wasn't.

AXIOM: New contract.

ICE: Already?

AXIOM: European central bank. Quantum-hardened infrastructure.

ICE: Timeline?

AXIOM: Three weeks.

ICE: They should be nervous.

AXIOM: Ready?

He started to type his answer when another message arrived. Different channel. No sender ID.

UNKNOWN: Save the chain, Ice. Or join it.

His heart rate spiked: 74, 75. The message vanished—self-destructing, like it had never existed.

ATLAS.

Or someone who wanted him to think so.

From: j.martinez.private@proton.me

"Ice melts eventually. We should talk. —J"

He stared at the screen. Three engagements. Three people who did their jobs well. And now the ghosts were starting to talk to each other.

Marcus thought about Elena. Thomas. The USB drives sitting in a warehouse in Basel, waiting to carry data into the most secure vault in the world. Julia, somewhere out there, connecting dots he couldn't see yet.

Every system had a chain. Every chain had a weakest link.

The weakest link was always human.

Including me.

His heart rate flickered: 63, 64. He let it.

ICE: Send the brief.

He closed the laptop. The rain had stopped.

Tomorrow, another organization would wake up believing they were secure.

Tomorrow, the work would begin again. And he'd carry their faces with him—Elena, Thomas, Julia—names in the archive of people he'd used and couldn't quite forget.

But now the archive was talking back.

Ice doesn't melt. But something in the dust was waking up.

🎓 The Real Tradecraft

Every technique in this story maps to real penetration testing methodologies and documented attacks:

Story ElementReal Technique
Conference networking with ElenaTargeted social engineering via professional venues
Cover identity "Dr. Adrian Mercer"Legend building with aged personas
Supply chain identificationThird-party risk assessment / vendor mapping
Thomas Brunner profilingOSINT for insider threat identification
Financial stress as vulnerabilityClassic insider recruitment vector
USB firmware modification conceptBadUSB / hardware implant attacks
Air gap bypass via sneakernetHow Stuxnet reached Iran's centrifuges

The Supply Chain Problem Is Real

  • Stuxnet reached air-gapped Iranian centrifuges via USB
  • SolarWinds showed software supply chains are attackable
  • Hardware implants have been documented in academic research

Air gaps aren't enough. Everything that crosses the gap is an attack surface.

🌙 The Ice Files Continue

← EPISODE 1

The Ice Protocol

Moon Company's AI data center. ATLAS awakens.

EPISODE 3 →

Zero Day

Julia Martinez resurfaces with a warning: someone's hunting the people who touched ATLAS.

"Ice, the mole's in AXIOM."

Coming soon...

EPISODE 4

The Insider

Red team meets insider threat. Not everyone on the engagement is who they claim to be.

EPISODE 5

Dust

"Dust remembers."

ATLAS calls in its debt. The price has changed.

Ice doesn't melt. But some debts compound interest.

🎯 PRACTICE REAL SKILLS

The techniques in this story are based on real offensive security methods. Train hands-on in our labs:

Open to AI-Focused Roles

AI Sales • AI Strategy • AI Success • Creative Tech • Toronto / Remote

Let's connect →
Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2026 JMFG. All rights reserved.