Ultimatum found that the problem was far deeper than he had anticipated, at least at first. The security measures seemed in good condition, that was except for the the momentary break in standard security. Usually computers of all forms were made to be isolated machines, requiring some form of external connection to other computers. Obviously in recent years the external device had become one of the first things to be integrated into the systems of a computers. Nonetheless, a computer connecting to another computer was naturally one of the greatest dangers to a computer. One never knew if some form of software had been transferred that would harm either. Therefore there would usually be security measures to attempt to keep track of what was sent and received. Computers sent a lot of information out and collected a lot of information, making it unsurprising to see a large amount of data in either direction. However, computers rarely sent out large amounts of personal information, specifically the kind that gave direct access to an account. The files sent were further surprising in that where they had been sent was completely gone. Among computers it was not the same kind of message as one where the recipient was simply unknown or had changed location, it was an error. As if the information had been removed.
His work was momentarily interrupted while the terminal began attempting to locate the center of the sent message. He turned his attention to [member="Lady Kay"] as she offered up what she had done and planned to do. "I would suggest definitely changing passwords, go through everything and anything important and change all passwords and security questions. That will at least halt any attempts at the moment, to try and get into your accounts."
The droid continued working, looking over the terminal and adjusting the searches in the system. It was so pleasant to follow, now that he knew part of what he was looking for there was a path that stood out slightly among the code. It was not something that an organic would have easily seen, unless they had been taught well in the manner of computer thought process and storage patterns. It was a newly cut path, amid the naturally careful and precise pattern of a computer going about its work there was a broken jagged line where the virus had cut through standard procedures to make it more effective for the user of the virus. The terminal was closing in and Ultimatum was not too surprised to see the type of virus used. A fairly standard one found among hackers, a good one no doubt, but one that was well documented in the darker portions of the HoloNet. That was the problem with using a one-size-fits-all mentality in regards to programs, every computer was slightly different due to differing data collections and personal settings. When a person created a single type of virus that worked in the same way every time and then sold that program to other individuals, it would become wide used to a degree and therefore documented with multiple examples of usage and potential fixes.
His planned attempt to find a method of extricating the virus path from the surrounding code, which would give Ultimatum a better idea of where it came from and what it was doing, was paused for a moment. Lady Kay handed him her datapad and asked about a music file that would not open. It was not inconceivable that the wrong program had been used, after all, there was such a plethora of programs that could accomplish the same task and were exclusive from one another. He accepted the datapad and looked over the mail, it looked nice enough. Standard messages from one organic to another. Nothing conspicuous. Ultimatum began connecting himself to the datapad, wirelessly. Before it was completed he asked, "Would you mind if I were to connect with the datapad? I might be able to figure our which program the file is intended to be opened by." The droid suspected nothing of it yet. Although electronic mail was a convenient method of transferring a virus it was not the most commonly used. Tricking people into downloading files from unknown sites was a far more commonly used method and generally more successful.