Sign in to add this item to your wishlist, follow it, or mark it as ignored

Downloadable Content

This content requires the base game Cyberphobia: Prologue on Steam in order to play.

Buy Ghosts in the Ledger

Buy Special Edition BUNDLE (?)

Includes 2 items: Cyberphobia: Prologue, Ghosts in the Ledger

-10%
$80.98

Buy Zero-Day Edition BUNDLE (?)

Includes 3 items: Cyberphobia: Prologue, Ghosts in the Ledger, Kernel Panic

-10%
$98.97
 

About This Content

A cold trail of cancelled orders, burner custodians, and “round‑trip” transactions points to a dark pool where lives and liabilities are priced the same. Pull forensic threads through shell companies, crash an underground clearinghouse, and decide whether to seize the exchange, burn it, or take a cut. Ghosts in the Ledger turns finance noir into a breach—quiet servers, quiet hallways, and nothing quiet about the consequences.

Ghosts in the Ledger — DLC overview

Genre & tone:
FPS cyber-thriller with finance-noir investigation and infiltration. Low, tense atmosphere; stealth and intel matter as much as gunplay.

Premise (story):
A trail of canceled orders and “round-trip” transactions points to a hidden exchange where black budgets are laundered and lives are priced like options. As a day-coder/night-hacker, you pull threads through shell firms to a climate-controlled server farm doubling as an underground clearinghouse. Decide whether to seize it, burn it, or take a cut.

Playtime:
~2–4 hours for a critical path.

Structure & goals:

  • Map the money: reconstruct trades, link custodians, and unmask the real counterparties.

  • Breach the exchange: infiltrate the off-books facility via three routes (silent, social-engineered, or brute-force hybrid).

  • Decide the outcome: expose, co-opt, or collapse the market—each path reshapes vendors, prices, and faction standing in the main game.

Core mechanics:

  • Forensic Hacking Loop: Gather log fragments (broker notes, FIX messages, cancel/replace trails), run pattern-match puzzles, and unlock physical access points based on who actually owns what.

  • Social-Engineering Toolkit: Proxy badges, voiceprint splices, and fabricated RFIDs to walk past mid-tier security.

  • Silent Takedowns & Utilities: EMP glass, fiber taps, null gel, decoy holo beacons; stealth-first level design with alternative combat paths.

  • Profit vs. Proof: Evidence can be sold for gear/favors or published to sway the world (market swings, vendor stockouts, security posture changes).

  • Heat & Suspicion: A dynamic risk meter ties noise, bodies found, and leaked data to patrol density and forensic countermeasures.

Progression & rewards:

  • New tech tree nodes focused on deanonymization, credential forgery, and silent breaching.

  • Unique weapon mods themed around finance-grade “clean ops” (ghost-serial slides, suppressor rails, shard slugs).

  • Permanent meta-perks if you co-opt the exchange (discounted black-market prices, insider alerts).

Level & encounter design:

  • Street-to-Server Heist: Rooftop delivery ducts, courier tunnels, and a neutral “inspection” lobby with hidden cameras.

  • The Exchange Floor: Bid boards, glass-walled cages, liquid-cool racks; alarms don’t just call guards—they move prices.

  • Cold Rooms & Kill Corridors: Temperature-gated locks, condensation trails that reveal lasers, and fiber runs you can piggyback.

Challenges:

  • Time-boxed clearing sessions: security performs scheduled “net-settlement” sweeps that wipe your breadcrumbs if you miss windows.

  • Counter-intrusion AIs escalate from log scrubbing to active honeypots if you reuse credentials.

  • Moral choices that trade civilian safety and whistleblower protection against lucrative gear pipelines.

Soundtrack & sound design:
Glassy, minimal synth with cold reverb tails; faint exchange ticks and cooling fans as rhythm. Combat peaks add clipped industrial percussion; stealth layers in room-tone drones and LED buzz.

Modes & replayability:

  • New Game+ (Clean Hands / Dirty Ledger): finish without firing a shot or monetize everything—both grant unique cosmetics and vendor access.

  • Score Attack – Silent Takedown Boards: short missions with leaderboards for zero-alert clears and highest “evidence value.”

  • Contracts Mode: remixable mini-heists that reuse spaces with new objectives (swap custodians, different badge tiers, fresh AI routes).

What makes it unique:

  • Treats money flow as a map—following trades literally reveals routes and access.

  • Evidence is currency: sell, leak, or hold for leverage with persistent world effects.

  • A heist where market mechanics (bids, cancels, volatility) meaningfully alter guard behavior and security patterns.

AI Generated Content Disclosure

The developers describe how their game uses AI Generated Content like this:

Artificial intelligence (AI) was leveraged for key aspects of the game's development, including in-game logic, support systems, and certain artistic assets.

Mature Content Description

The developers describe the content like this:

This game is a mature, extremely graphic game containing frequent intense violence, gore, adult themes, frightening psychological horror, and general mature content, including non-graphic cartoon/fantasy violence and derogatory language.

System Requirements

Windows
macOS
SteamOS + Linux
    Minimum:
    • Requires a 64-bit processor and operating system
    • OS: Windows 10 (64-bit)
    • Processor: Intel i3-8100 / Ryzen 3 1200
    • Memory: 4 GB RAM
    • Graphics: GTX 750 Ti / RX 560 / Intel UHD 630
    • Storage: 10 GB available space
    Recommended:
    • Requires a 64-bit processor and operating system
    • OS: Windows 11 (64-bit)
    • Processor: Intel i5-10400 / Ryzen 5 3600
    • Memory: 8 GB RAM
    • Graphics: GTX 1660 / RX 580 / RTX 2060
    • Storage: 10 GB available space
    Minimum:
    • OS: macOS Sonoma or newer
    • Processor: Apple M1 Chip (Standard 8-Core CPU)
    • Memory: 8 GB RAM
    • Graphics: Apple M1 Chip (7-Core or 8-Core GPU)
    • Storage: 10 GB available space
    Recommended:
    • OS: macOS Sonoma or newer
    • Processor: Apple M2 Pro (Base Model) or Apple M1 Pro
    • Memory: 16 GB RAM
    • Graphics: Apple M2/M3 Chip (10-Core or better GPU) or M1 Pro (14-Core GPU)
    • Storage: 10 GB available space
    Minimum:
    • OS: Linux Distribution (e.g., Ubuntu, Fedora, Manjaro, SteamOS 3.0+) with Vulkan support
    • Processor: Intel i3-8100 or newer, 4 cores / Ryzen 3 1200 or newer, 4 cores
    • Memory: 4 GB RAM
    • Graphics: GTX 750 Ti (Must support Vulkan) / RX 560 or similar (Must support Vulkan)
    • Storage: 10 GB available space
    Recommended:
    • OS: Linux Distribution (SteamOS 3.0+ preferred) with latest Vulkan support
    • Processor: Intel i5-10400 or newer, 6 cores-12 threads / Ryzen 5 3600 or newer, 6 cores/12 threads
    • Memory: 8 GB RAM
    • Graphics: GTX 1660 / RTX 2060 or similar (with modern proprietary driver) / RX 580 or equivalent (RadeonSI or AMDGPU-PRO driver)
    • Storage: 10 GB available space
There are no reviews for this product

You can write your own review for this product to share your experience with the community. Use the area above the purchase buttons on this page to write your review.