I traced the source. Every time a user downloaded from our official mirror, the file was fine for the first 90 seconds. But after that, if the connection routed through a specific backbone provider in Eastern Europe, the server appended a second zip stream—a polyglot file. The first layer was the update. The second layer was a navigation overlay engine.

It didn't want money. It didn't want data. It wanted trajectories .

We pulled the black box. The K2001N’s log was clean. But the partition showed a delta—a 4kb discrepancy in the storage stack. Someone had injected a payload into the boot image. It wasn't a virus. It was a ghost.

I called it "The Echo."

They’d download it from our half-broken FTP server, stick it on a USB stick, and flash their car stereos. It was supposed to fix the Bluetooth stutter. Instead, it started killing people.

The counter on the server read: 12,847 .

UNKNOWN