YOUR CONTRACT: Infiltrate the breached sectors. Isolate the malware.
WARNING: The system's dead-man switch will violently eject unauthorized signatures. You will be disconnected. Recover the encrypted data echoes on your way out to learn the system's rules.