HomeVulnerabilityLogic bombs defined: Definition, examples, prevention

Logic bombs defined: Definition, examples, prevention

What does a logic bomb assault do?

Because the Stuxnet instance demonstrates, a logic bomb assault will get its identify as a result of the malicious code prompts when some logical situation, or set off, is happy: It may be defined as an if-then assertion. There are two types a logic bomb’s set off can take: constructive or unfavorableA constructive set off goes off if one thing occurs, whereas a unfavorable set off goes off if one thing failsto occur. Stuxnet is a constructive set off: The worm analyzes the underlying {hardware} and if it matches the system it was designed to assault, it spins any hooked up uranium centrifuges quick sufficient to destroy them. There are different, considerably extra pedestrian sorts of constructive triggers as effectively: A logic bomb could go off if somebody makes an attempt to open a specified file, as an example, or copy knowledge from one listing to a different.

A unfavorable set off is finest undersood by way of the kind of insider threats we famous as a typical use case for a logic bomb. As an illustration, a disgruntled worker, suspecting they’re about to be fired, could plant a logic bomb on the corporate servers that may erase useful company knowledge at 10 a.m. until its creator intervenes. So long as the worker maintains entry to the system, they’ll cease the bomb from going off, which can give them leverage within the dispute with their employer — or at the least depart them happy that their firing might be adopted by chaos as soon as they’re gone.

See also  That low cost webcam? HiatusRAT could also be focusing on it, FBI warns

The precise habits of a logic bomb can vary broadly. In relation to the insider threats that make up a lot of the logic bomb panorama, a number of sorts of assault are significantly frequent, together with file or laborious drive deletions, both as a ransom risk or act of revenge, or knowledge exfiltration, as a part of a plan to make use of privileged data in future employment.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular