HOME

TheInfoList



OR:

A logic bomb is a piece of
code In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communicati ...
intentionally inserted into a
software Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital comput ...
system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary
database trigger A database trigger is procedural code that is automatically executed in response to certain Event (computing), events on a particular Table (database), table or View (database), view in a database. The trigger is mostly used for maintaining the Dat ...
), should they ever be terminated from the company. Software that is inherently malicious, such as
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are found in almo ...
and
worms The World Register of Marine Species (WoRMS) is a taxonomic database that aims to provide an authoritative and comprehensive catalogue and list of names of marine organisms. Content The content of the registry is edited and maintained by scien ...
, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as Friday the 13th or
April Fools' Day April Fools' Day or April Fool's Day (rarely called All Fools' Day) is an annual custom on the 1st of April consisting of practical jokes, hoaxes, and pranks. Jokesters often expose their actions by shouting "April Fool " at the recipient. ...
. Trojans and other
computer viruses A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" wit ...
that activate on certain dates are often called " time bombs". To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that disables certain functionality after a set time are not normally regarded as logic bombs.


Successful

*In June 2006 Roger Duronio, a
system administrator An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as Server (computing), servers. The ...
for
UBS UBS Group AG (stylized simply as UBS) is a multinational investment bank and financial services firm founded and based in Switzerland, with headquarters in both Zurich and Basel. It holds a strong foothold in all major financial centres as the ...
, was charged with using a logic bomb to damage the company's computer network, and with securities fraud for his failed plan to drive down the company's stock with activation of the logic bomb. Duronio was later convicted and sentenced to 8 years and 1 month in prison, as well as a $3.1 million restitution to UBS. *On 20 March 2013, in an attack launched against
South Korea South Korea, officially the Republic of Korea (ROK), is a country in East Asia. It constitutes the southern half of the Korea, Korean Peninsula and borders North Korea along the Korean Demilitarized Zone, with the Yellow Sea to the west and t ...
, a logic bomb struck machines and "wiped the hard drives and
master boot record A master boot record (MBR) is a type of boot sector in the first block of disk partitioning, partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept ...
s of at least three banks and two media companies simultaneously." Symantec reported that the malware also contained a component that was capable of wiping Linux machines. *On 19 July 2019, David Tinley, a contract employee, pleaded guilty for programming logic bombs within the software he created for
Siemens Siemens AG ( ) is a German multinational technology conglomerate. It is focused on industrial automation, building automation, rail transport and health technology. Siemens is the largest engineering company in Europe, and holds the positi ...
Corporation. The software was intentionally made to malfunction after a certain amount of time, requiring the company to hire him to fix it for a fee. The logic bombs went undetected for two years, but were then discovered while he was out of town and had to hand over the administrative password to his software. *In 2023, researchers discovered that some
Newag Newag S.A. (pronounced ''"nevag"'') is a Polish company, based in Nowy Sącz, specialising in the production, maintenance, and modernisation of railway rolling stock. The company's products include the 14WE, 19WE, 35WE types electric multiple u ...
trains were secretly programmed to deliberately break down after a certain distance, or during maintenance windows, or when onboard GPS confirmed they were located in rivals' workshops for repair.


Attempted

*In February 2000, Tony Xiaotong Yu, indicted before a
grand jury A grand jury is a jury empowered by law to conduct legal proceedings, investigate potential criminal conduct, and determine whether criminal charges should be brought. A grand jury may subpoena physical evidence or a person to testify. A grand ju ...
, was accused of planting a logic bomb during his employment as a programmer and securities trader at Deutsche Morgan Grenfell. The bomb, planted in 1996, had a trigger date of 20 July 2000, but was discovered by other programmers in the company. Removing and cleaning up after the bomb allegedly took several months. *On 2 October 2003 Yung-Hsun Lin, also known as Andy Lin, changed code on a server at Medco Health Solutions Inc.'s
Fair Lawn, New Jersey Fair Lawn is a Borough (New Jersey), borough in Bergen County, New Jersey, Bergen County, in the U.S. state of New Jersey, and a bedroom community, bedroom suburb located northwest of New York City. As of the 2020 United States census, the boro ...
headquarters, where he was employed as a Unix administrator, creating a logic bomb set to go off on his birthday in 2004. It failed to work due to a programming error, so Lin corrected the error and reset it to go off on his next birthday, but it was discovered and disabled by a Medco computer systems administrator a few months before the trigger date. Lin pleaded guilty and was sentenced to 30 months in jail in a federal prison in addition to $81,200 in
restitution Restitution and unjust enrichment is the field of law relating to gains-based recovery. In contrast with damages (the law of compensation), restitution is a claim or remedy requiring a defendant to give up benefits wrongfully obtained. Liability ...
. The charges held a maximum sentence of 10 years and a fine of US$250,000. *On 29 October 2008 a logic bomb was discovered at American mortgage giant
Fannie Mae The Federal National Mortgage Association (FNMA), commonly known as Fannie Mae, is a United States government-sponsored enterprise (GSE) and, since 1968, a publicly traded company. Founded in 1938 during the Great Depression as part of the New ...
. The bomb was planted by Rajendrasinh Babubhai Makwana, an IT contractor who worked at Fannie Mae's
Urbana, Maryland Urbana ( ) is a suburban census-designated place located in Frederick County, Maryland, United States. It lies at the Interstate 270 (Maryland), I-270/Maryland Route 80, MD 80 interchange, approximately south-east of Frederick, Maryland, Frederi ...
facility. The bomb was set to activate on 31 January 2009 and could have wiped all of Fannie Mae's 4000 servers. Makwana had been terminated around 1:00p.m. on 24 October 2008 and managed to plant the bomb before his network access was revoked. Makwana was indicted in a Maryland court on 27 January 2009 for unauthorized computer access, convicted on 4 October 2010, and sentenced to 41 months in prison on 17 December 2010. *In October 2009, Douglas Duchak was terminated from his job as data analyst at the Colorado Springs Operations Center (CSOC) of the U.S.
Transportation Security Administration The Transportation Security Administration (TSA) is an agency of the United States Department of Homeland Security (DHS) that has authority over the security of transportation systems within and connecting to the United States. It was created ...
. Surveillance cameras captured images of Duchak entering the facility after hours and loading a logic bomb onto a CSOC server that stored data from the U.S. Marshals. In January 2011, Duchak was sentenced to two years in prison, $60,587 in fines, and three years on probation. At his sentencing, Duchak tearfully apologized as his lawyer noted that at the time of the incident, Duchak's wife was pregnant with their second child. The judge at the sentencing mentioned that this logic bomb planting "incident was an anomaly in an otherwise untarnished work history."


Alleged

Thomas C. Reed wrote in his 2004 book '' At the Abyss: An Insider's History of the Cold War'' that in 1982, a sabotage occurred on the Trans-Siberian Pipeline because of a logic bomb. According to Reed, a
KGB The Committee for State Security (, ), abbreviated as KGB (, ; ) was the main security agency of the Soviet Union from 1954 to 1991. It was the direct successor of preceding Soviet secret police agencies including the Cheka, Joint State Polit ...
operative stole the plans for a sophisticated control system and its software from a Canadian firm, for use on its Siberian pipeline. The
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
(CIA) was tipped off by documents in the Farewell Dossier, and had the company insert a logic bomb in the program for
sabotage Sabotage is a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization (warfare), demoralization, destabilization, divide and rule, division, social disruption, disrupti ...
purposes. Critics have contested the authenticity of this account, and it was reported that the story may be a hoax.Mackeown, Patrick (10 August 2006)
"Bookscape: Short Story - Famous Computer Hoaxes"
Bookscape. Archived on 13 November 2010.


See also

*
Time bomb (software) In computer software, a time bomb is part of a computer program that has been written so that it will start or stop functioning after a predetermined date or time is reached. The term "time bomb" does not refer to a program that stops functioning ...
*
Backdoor (computing) A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus comput ...
*
Easter egg (media) An Easter egg is a message, image, or feature hidden in software, a video game, a film, or another—usually electronic—medium. The term used in this manner was coined around 1979 by Steve Wright, the then-Director of Software Development in t ...
*
Cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
*
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
*
Fork bomb In computing, a fork bomb (also called rabbit virus) is a denial-of-service (DoS) attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation. ...


References

{{Computer security Types of malware Cyberwarfare