Logic bomb
   HOME

TheInfoList



OR:

A logic bomb is a piece of code intentionally inserted into a
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary
database trigger A database trigger is procedural code that is automatically executed in response to certain events on a particular table or view in a database. The trigger is mostly used for maintaining the integrity of the information on the database. For exam ...
), should they ever be terminated from the company. Software that is inherently malicious, such as
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Since Dmitri Ivanovsky's ...
and
worms Worms may refer to: *Worm, an invertebrate animal with a tube-like body and no limbs Places *Worms, Germany Worms () is a city in Rhineland-Palatinate, Germany, situated on the Upper Rhine about south-southwest of Frankfurt am Main. It had ...
, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as Friday the 13th or
April Fools' Day April Fools' Day or All Fools' Day is an annual custom on 1 April consisting of practical jokes and hoaxes. Jokesters often expose their actions by shouting "April Fools!" at the recipient. Mass media can be involved in these pranks, which may ...
.
Trojans Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * '' Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 189 ...
and other computer viruses that activate on certain dates are often called " time bombs". To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that disables certain functionality after a set time are not normally regarded as logic bombs.


Successful

*In June 2006 Roger Duronio, a
system administrator A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to en ...
for UBS, was charged with using a logic bomb to damage the company's computer network, and with securities fraud for his failed plan to drive down the company's stock with activation of the logic bomb. Duronio was later convicted and sentenced to 8 years and 1 month in prison, as well as a $3.1 million restitution to UBS. *On 20 March 2013, in an attack launched against
South Korea South Korea, officially the Republic of Korea (ROK), is a country in East Asia, constituting the southern part of the Korean Peninsula and sharing a land border with North Korea. Its western border is formed by the Yellow Sea, while its eas ...
, a logic bomb struck machines and "wiped the hard drives and master boot records of at least three banks and two media companies simultaneously." Symantec reported that the malware also contained a component that was capable of wiping Linux machines. *On 19 July 2019, David Tinley, a contract employee, pleaded guilty for programming logic bombs within the software he created for Siemens Corporation. The software was intentionally made to malfunction after a certain amount of time, requiring the company to hire him to fix it for a fee. The logic bombs went undetected for two years, but was then discovered while he was out of town and had to hand over the administrative password to his software.


Attempted

*In February 2000, Tony Xiaotong Yu, indicted before a grand jury, was accused of planting a logic bomb during his employment as a programmer and securities trader at Deutsche Morgan Grenfell. The bomb, planted in 1996, had a trigger date of 20 July 2000, but was discovered by other programmers in the company. Removing and cleaning up after the bomb allegedly took several months. *On 2 October 2003 Yung-Hsun Lin, also known as Andy Lin, changed code on a server at Medco Health Solutions Inc.'s
Fair Lawn, New Jersey Fair Lawn is a borough in Bergen County, New Jersey, United States, and a bedroom suburb located northwest of New York City. As of the 2020 United States Census, the borough’s population was 34,940, which constituted a 7.7% increase from 32, ...
headquarters, where he was employed as a Unix administrator, creating a logic bomb set to go off on his birthday in 2004. It failed to work due to a programming error, so Lin corrected the error and reset it to go off on his next birthday, but it was discovered and disabled by a Medco computer systems administrator a few months before the trigger date. Lin pleaded guilty and was sentenced to 30 months in jail in a federal prison in addition to $81,200 in
restitution The law of restitution is the law of gains-based recovery, in which a court orders the defendant to ''give up'' their gains to the claimant. It should be contrasted with the law of compensation, the law of loss-based recovery, in which a court ...
. The charges held a maximum sentence of 10 years and a fine of US$250,000. *On 29 October 2008 a logic bomb was discovered at American mortgage giant
Fannie Mae The Federal National Mortgage Association (FNMA), commonly known as Fannie Mae, is a United States government-sponsored enterprise (GSE) and, since 1968, a publicly traded company. Founded in 1938 during the Great Depression as part of the N ...
. The bomb was planted by Rajendrasinh Babubhai Makwana, an IT contractor who worked at Fannie Mae's Urbana, Maryland facility. The bomb was set to activate on 31 January 2009 and could have wiped all of Fannie Mae's 4000 servers. Makwana had been terminated around 1:00p.m. on 24 October 2008 and managed to plant the bomb before his network access was revoked. Makwana was indicted in a Maryland court on 27 January 2009 for unauthorized computer access, convicted on 4 October 2010, and sentenced to 41 months in prison on 17 December 2010. *In October 2009, Douglas Duchak was terminated from his job as data analyst at the Colorado Springs Operations Center (CSOC) of the U.S.
Transportation Security Administration The Transportation Security Administration (TSA) is an agency of the United States Department of Homeland Security (DHS) that has authority over the security of transportation systems within, and connecting to the United States. It was created ...
. Surveillance cameras captured images of Duchak entering the facility after hours and loading a logic bomb onto a CSOC server that stored data from the U.S. Marshals. In January 2011, Duchak was sentenced to two years in prison, $60,587 in fines, and three years on probation. At his sentencing, Duchak tearfully apologized as his lawyer noted that at the time of the incident, Duchak's wife was pregnant with their second child. The judge at the sentencing mentioned that this logic bomb planting "incident was an anomaly in an otherwise untarnished work history."


Alleged

Thomas C. Reed Thomas Care Reed (born March 1, 1934) was the 11th Secretary of the Air Force from January 2, 1976 to April 6, 1977 under Gerald Ford and Jimmy Carter.Laurie, Clayton. Leaders of the National Reconnaissance Office 1961–2001. Office of the Hist ...
wrote in his 2004 book '' At the Abyss: An Insider's History of the Cold War'' that in 1982, a sabotage occurred on the Trans-Siberian Pipeline because of a logic bomb. According to Reed, a
KGB The KGB (russian: links=no, lit=Committee for State Security, Комитет государственной безопасности (КГБ), a=ru-KGB.ogg, p=kəmʲɪˈtʲet ɡəsʊˈdarstvʲɪn(ː)əj bʲɪzɐˈpasnəsʲtʲɪ, Komitet gosud ...
operative stole the plans for a sophisticated control system and its software from a Canadian firm, for use on its Siberian pipeline. The
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA) was tipped off by documents in the
Farewell Dossier The Farewell Dossier was the collection of documents that Colonel Vladimir Vetrov, a KGB defector "en place" (code-named "Farewell"), gathered and gave to the Direction de la surveillance du territoire (DST) in 1981–82, during the Cold War. ...
, and had the company insert a logic bomb in the program for
sabotage Sabotage is a deliberate action aimed at weakening a polity, effort, or organization through subversion, obstruction, disruption, or destruction. One who engages in sabotage is a ''saboteur''. Saboteurs typically try to conceal their identitie ...
purposes. Critics have contested the authenticity of this account, and it was reported that the story may be a hoax.Mackeown, Patrick (10 August 2006)
"Bookscape: Short Story - Famous Computer Hoaxes"
Bookscape. Archived on 13 November 2010.


Fictional

{{in popular culture, date=February 2021 *In "Moffett's Ghost", an episode of the ''
Airwolf ''Airwolf'' is an American action military drama television series that centers on a high-technology military helicopter, code-named ''Airwolf'', and its crew. The show follows them as they undertake various exotic missions, many involving e ...
''
television series A television show – or simply TV show – is any content produced for viewing on a television set which can be broadcast via over-the-air, satellite, or cable, excluding breaking news, advertisements, or trailers that are typically placed be ...
, Hawke loses control of the onboard computer, which was programmed on a timer by Airwolf's creator, Doctor Charles Henry Moffett. Once activated,
Airwolf ''Airwolf'' is an American action military drama television series that centers on a high-technology military helicopter, code-named ''Airwolf'', and its crew. The show follows them as they undertake various exotic missions, many involving e ...
is set to destroy any
aircraft An aircraft is a vehicle that is able to fly by gaining support from the air. It counters the force of gravity by using either static lift or by using the dynamic lift of an airfoil, or in a few cases the downward thrust from jet engine ...
in its range. *In Michael Crichton's book '' Jurassic Park'', computer technician Dennis Nedry inserted an object into the mainframe coding for the park that would shut off the entire island's power (including the supply to the electric fences) in order to steal several dinosaur embryos in the chaos. The logic bomb object was named "White Rabbit". *The
Tom Clancy Thomas Leo Clancy Jr. (April 12, 1947 – October 1, 2013) was an American novelist. He is best known for his technically detailed espionage and military-science storylines set during and after the Cold War. Seventeen of his novels have ...
book ''
Debt of Honor ''Debt of Honor'' is a techno-thriller novel, written by Tom Clancy and released on August 17, 1994. A direct sequel to '' The Sum of All Fears'' (1991), Jack Ryan becomes the National Security Advisor when a secret cabal of Japanese industria ...
'' features a logic bomb installed in the code of various stock market computers. *
Hugh Jackman Hugh Michael Jackman (born 12 October 1968) is an Australian actor. Beginning in theatre and television, he landed his breakthrough role as James "Logan" Howlett / Wolverine in the 20th Century Fox ''X-Men'' film series (2000–2017), a role ...
's character in '' Swordfish'', Stanley Jobson, claims to have "dropped a logic bomb through the trapdoor" while hacking into a
Department of Defense Department of Defence or Department of Defense may refer to: Current departments of defence * Department of Defence (Australia) * Department of National Defence (Canada) * Department of Defence (Ireland) * Department of National Defense (Philipp ...
network. *In the episode " Scattered" of the 2004 re-imagining of '' Battlestar Galactica'', the
Cylons The Cylons are the main antagonists of the human race in the '' Battlestar Galactica'' science fiction franchise, making appearances in the original 1978 series, the 1980 series, the 2004 re-imagining, and the spin-off prequel series '' C ...
leave a logic bomb in the ship's computers after briefly gaining access to them. It later causes a series of nearly catastrophic system malfunctions. *In the CIA level of Tom Clancy's ''
Splinter Cell ''Tom Clancy's Splinter Cell'' is a series of stealth action-adventure video games, the first of which was released in 2002, and their tie-in novels that were endorsed by Tom Clancy. The series follows Sam Fisher, a highly trained agent of a ...
'', a PC and console video game, a conversation can be heard with a reference to a logic bomb. *In Season 3 of '' 24'', Nina Myers manipulates
Jack Bauer Jack Bauer is a fictional character and the protagonist of the Fox television series '' 24''. His character has worked in various capacities on the show, often as a federal agent of the Counter Terrorist Unit (CTU) based in Los Angeles, and w ...
to unknowingly activate a virus in the CTU computer systems. It is activated by a phone call to a certain number. *In Season 6, Episode 8 of '' Spooks'', the Yalta organization sets off a logic bomb planted within the American defense network to shut down all US controlled satellites. It is activated by the entry of a code into a game which causes the logic bomb to copy a virus to all the satellites and shut them down. *In Series 6, Episode 2 of '' NCIS'', Abby and McGee have a conversation about logic that gives them the idea of using a logic bomb to hack into computers on a US Naval Carrier to access certain files. No details of the bomb itself are seen on screen or discussed at all. *In Season 9, Episode 12 of ''
Criminal Minds ''Criminal Minds'' is an American police procedural crime drama television series created and produced by Jeff Davis. The series premiered on CBS on September 22, 2005, and originally concluded on February 19, 2020; it was revived in 2022. It ...
'' ("The Black Queen"), a logic bomb is used against the team that begins deleting information with failed attempts to crack the code. *In Season 2, Episode 5 of ''
Mr. Robot ''Mr. Robot'' is an American drama thriller television series created by Sam Esmail for USA Network. It stars Rami Malek as Elliot Alderson, a cybersecurity engineer and hacker with social anxiety disorder, clinical depression and dissociati ...
'' ("eps2.3_logic-b0mb.hc"), Elliot discusses the use of a logic bomb to hack FBI agents' Android phones and E Corp's network and applications. *In the series '' The Illuminae Files'', Kady Grant, Byron Zhang, and AIDAN write a logic bomb to send to the onboard computer of the ''Lincoln''. *In the video game ''
Tom Clancy's Rainbow Six Siege ''Tom Clancy's Rainbow Six Siege'' is an online tactical shooter video game developed by Ubisoft Montreal and published by Ubisoft. It was released worldwide for Microsoft Windows, PlayStation 4, and Xbox One on December 1, 2015; the game was ...
'', character Dokkaebi is capable of deploying a logic bomb that can override enemy phones and provoke distraction. *In the "Autofac" episode of ''Electric Dreams'', a logic bomb is the weapon that is used in an attempt to take down the organization that seems to be run solely by autonomous drones and robots and restricts human activities in a post-apocalyptic world. *In the 2022 film '' The Batman,'' a thumb drive inserted into Detective Gordon's laptop triggers a logic bomb that emails incriminating evidence to various Gotham City newspapers from Gordon's email address.


See also

* Time bomb (software) *
Backdoor (computing) A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus co ...
*
Easter egg (media) File:Carl Oswald Rostosky - Zwei Kaninchen und ein Igel 1861.jpg, 250px, An image that reveals an Easter egg when the hedgehog is clicked or tapped. Another Easter egg can be found in a tooltip when a mouse pointer is hovered over the hedgehog ...
* Cyberwarfare *
Stuxnet Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing subs ...
*
Fork bomb In computing, a fork bomb (also called rabbit virus or wabbit) is a denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unav ...


References

Types of malware Cyberwarfare