A logic bomb is a piece of
code intentionally inserted into a
software
Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work.
...
system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting
files
File or filing may refer to:
Mechanical tools and processes
* File (tool), a tool used to ''remove'' fine amounts of material from a workpiece
**Filing (metalworking), a material removal process in manufacturing
** Nail file, a tool used to gent ...
(such as a salary
database trigger), should they ever be terminated from the company.
Software that is inherently malicious, such as
viruses
A virus is a submicroscopic infectious agent that replicates only inside the living cells
Cell most often refers to:
* Cell (biology), the functional basic unit of life
Cell may also refer to:
Locations
* Monastic cell, a small room ...
and
worms Worms may refer to:
*Worm, an invertebrate animal with a tube-like body and no limbs
Places
*Worms, Germany, a city
** Worms (electoral district)
* Worms, Nebraska, U.S.
*Worms im Veltlintal, the German name for Bormio, Italy
Arts and entertai ...
, often contain logic bombs that execute a certain
payload
Payload is the object or the entity which is being carried by an aircraft or launch vehicle. Sometimes payload also refers to the carrying capacity of an aircraft or launch vehicle, usually measured in terms of weight. Depending on the nature of ...
at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as
Friday the 13th or
April Fools' Day
April Fools' Day or All Fools' Day is an annual custom on 1 April consisting of practical jokes and hoaxes. Jokesters often expose their actions by shouting "April Fools!" at the recipient. Mass media can be involved in these pranks, which may b ...
.
Trojans and other
computer viruses that activate on certain dates are often called "
time bombs".
To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that
disables certain functionality after a set time are not normally regarded as logic bombs.
Successful
*In June 2006 Roger Duronio, a
system administrator
A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to en ...
for
UBS, was charged with using a logic bomb to damage the company's computer network, and with securities fraud for his failed plan to drive down the company's stock with activation of the logic bomb. Duronio was later convicted and sentenced to 8 years and 1 month in prison, as well as a $3.1 million restitution to UBS.
*On 20 March 2013, in an attack launched against
South Korea
South Korea, officially the Republic of Korea (ROK), is a country in East Asia, constituting the southern part of the Korea, Korean Peninsula and sharing a Korean Demilitarized Zone, land border with North Korea. Its western border is formed ...
, a logic bomb struck machines and "wiped the hard drives and
master boot record
A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept of MB ...
s of at least three banks and two media companies simultaneously."
Symantec Symantec may refer to:
*An American consumer software company now known as Gen Digital Inc.
*A brand of enterprise security software purchased by Broadcom Inc.
Broadcom Inc. is an American designer, developer, manufacturer and global supplier ...
reported that the malware also contained a component that was capable of wiping Linux machines.
*On 19 July 2019, David Tinley, a contract employee, pleaded guilty for programming logic bombs within the software he created for
Siemens Corporation. The software was intentionally made to malfunction after a certain amount of time, requiring the company to hire him to fix it for a fee. The logic bombs went undetected for two years, but was then discovered while he was out of town and had to hand over the administrative password to his software.
Attempted
*In February 2000, Tony Xiaotong Yu, indicted before a
grand jury
A grand jury is a jury—a group of citizens—empowered by law to conduct legal proceedings, investigate potential criminal conduct, and determine whether criminal charges should be brought. A grand jury may subpoena physical evidence or a ...
, was accused of planting a logic bomb during his employment as a programmer and securities trader at
Deutsche Morgan Grenfell
Morgan, Grenfell & Co. was a leading London-based investment bank regarded as one of the oldest and once most influential British merchant banks. It had its origins in a merchant banking business commenced by George Peabody. Junius Spencer Morgan ...
. The bomb, planted in 1996, had a trigger date of 20 July 2000, but was discovered by other programmers in the company. Removing and cleaning up after the bomb allegedly took several months.
*On 2 October 2003 Yung-Hsun Lin, also known as Andy Lin, changed code on a server at
Medco Health Solutions Inc.'s
Fair Lawn, New Jersey headquarters, where he was employed as a Unix administrator, creating a logic bomb set to go off on his birthday in 2004. It failed to work due to a programming error, so Lin corrected the error and reset it to go off on his next birthday, but it was discovered and disabled by a Medco computer systems administrator a few months before the trigger date. Lin pleaded guilty and was sentenced to 30 months in jail in a federal prison in addition to $81,200 in
restitution
The law of restitution is the law of gains-based recovery, in which a court orders the defendant to ''give up'' their gains to the claimant. It should be contrasted with the law of compensation, the law of loss-based recovery, in which a court ...
. The charges held a maximum sentence of 10 years and a fine of US$250,000.
*On 29 October 2008 a logic bomb was discovered at American mortgage giant
Fannie Mae
The Federal National Mortgage Association (FNMA), commonly known as Fannie Mae, is a United States government-sponsored enterprise (GSE) and, since 1968, a publicly traded company. Founded in 1938 during the Great Depression as part of the N ...
. The bomb was planted by Rajendrasinh Babubhai Makwana, an IT contractor who worked at Fannie Mae's
Urbana, Maryland facility. The bomb was set to activate on 31 January 2009 and could have wiped all of Fannie Mae's 4000 servers. Makwana had been terminated around 1:00p.m. on 24 October 2008 and managed to plant the bomb before his network access was revoked. Makwana was indicted in a Maryland court on 27 January 2009 for unauthorized computer access, convicted on 4 October 2010, and sentenced to 41 months in prison on 17 December 2010.
*In October 2009, Douglas Duchak was terminated from his job as data analyst at the Colorado Springs Operations Center (CSOC) of the U.S.
Transportation Security Administration
The Transportation Security Administration (TSA) is an agency of the United States Department of Homeland Security (DHS) that has authority over the security of transportation systems within, and connecting to the United States. It was created ...
. Surveillance cameras captured images of Duchak entering the facility after hours and loading a logic bomb onto a CSOC server that stored data from the U.S. Marshals. In January 2011, Duchak was sentenced to two years in prison, $60,587 in fines, and three years on probation. At his sentencing, Duchak tearfully apologized as his lawyer noted that at the time of the incident, Duchak's wife was pregnant with their second child. The judge at the sentencing mentioned that this logic bomb planting "incident was an anomaly in an otherwise untarnished work history."
Alleged
Thomas C. Reed wrote in his 2004 book ''
At the Abyss: An Insider's History of the Cold War'' that in 1982, a sabotage occurred on the
Trans-Siberian Pipeline because of a logic bomb. According to Reed, a
KGB operative stole the plans for a sophisticated control system and its software from a Canadian firm, for use on its Siberian pipeline. The
Central Intelligence Agency
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian intelligence agency, foreign intelligence service of the federal government of the United States, officially tasked with gat ...
(CIA) was tipped off by documents in the
Farewell Dossier, and had the company insert a logic bomb in the program for
sabotage
Sabotage is a deliberate action aimed at weakening a polity, effort, or organization through subversion, obstruction, disruption, or destruction. One who engages in sabotage is a ''saboteur''. Saboteurs typically try to conceal their identiti ...
purposes. Critics have contested the authenticity of this account,
and it was reported that the story may be a hoax.
[Mackeown, Patrick (10 August 2006)]
"Bookscape: Short Story - Famous Computer Hoaxes"
Bookscape. Archived on 13 November 2010.
Fictional
{{in popular culture, date=February 2021
*In "Moffett's Ghost", an episode of the ''
Airwolf
''Airwolf'' is an American action military drama television series that centers on a high-technology military helicopter, code-named ''Airwolf'', and its crew. The show follows them as they undertake various exotic missions, many involving e ...
''
television series
A television show – or simply TV show – is any content produced for viewing on a television set which can be broadcast via over-the-air, satellite, or cable, excluding breaking news, advertisements, or trailers that are typically placed ...
, Hawke loses control of the onboard
computer, which was programmed on a timer by Airwolf's creator, Doctor Charles Henry Moffett. Once activated,
Airwolf
''Airwolf'' is an American action military drama television series that centers on a high-technology military helicopter, code-named ''Airwolf'', and its crew. The show follows them as they undertake various exotic missions, many involving e ...
is set to destroy any
aircraft
An aircraft is a vehicle that is able to fly by gaining support from the air. It counters the force of gravity by using either static lift or by using the dynamic lift of an airfoil, or in a few cases the downward thrust from jet engines. ...
in its range.
*In Michael Crichton's book ''
Jurassic Park
''Jurassic Park'', later also referred to as ''Jurassic World'', is an American science fiction media franchise created by Michael Crichton and centered on a disastrous attempt to create a theme park of cloned dinosaurs. It began in 1990 whe ...
'', computer technician Dennis Nedry inserted an object into the mainframe coding for the park that would shut off the entire island's power (including the supply to the electric fences) in order to steal several dinosaur embryos in the chaos. The logic bomb object was named "White Rabbit".
*The
Tom Clancy
Thomas Leo Clancy Jr. (April 12, 1947 – October 1, 2013) was an American novelist. He is best known for his technically detailed espionage and military-science storylines set during and after the Cold War. Seventeen of his novels have ...
book ''
Debt of Honor'' features a logic bomb installed in the code of various
stock market computers.
*
Hugh Jackman's character in ''
Swordfish'', Stanley Jobson, claims to have "dropped a logic bomb through the trapdoor" while hacking into a
Department of Defense network.
*In the episode "
Scattered
Scattered may refer to:
Music
* ''Scattered'' (album), a 2010 album by The Handsome Family
* "Scattered" (The Kinks song), 1993
* "Scattered", a song by Ace Young
* "Scattered", a song by Lauren Jauregui
* "Scattered", a song by Green Day from ' ...
" of the 2004 re-imagining of ''
Battlestar Galactica'', the
Cylons
The Cylons are the main antagonists of the human race in the ''Battlestar Galactica'' science fiction franchise, making appearances in the original 1978 series, the 1980 series, the 2004 re-imagining, and the spin-off prequel series '' Ca ...
leave a logic bomb in the ship's computers after briefly gaining access to them. It later causes a series of nearly catastrophic system malfunctions.
*In the CIA level of Tom Clancy's ''
Splinter Cell'', a PC and console video game, a conversation can be heard with a reference to a logic bomb.
*In Season 3 of ''
24'',
Nina Myers manipulates
Jack Bauer to unknowingly activate a virus in the CTU computer systems. It is activated by a phone call to a certain number.
*In Season 6, Episode 8 of ''
Spooks'', the Yalta organization sets off a logic bomb planted within the American defense network to shut down all US controlled satellites. It is activated by the entry of a code into a game which causes the logic bomb to copy a virus to all the satellites and shut them down.
*In Series 6, Episode 2 of ''
NCIS NCIS or N.C.I.S. may refer to:
Law enforcement
* National Criminal Intelligence Service, the predecessor to the Serious Organised Crime Agency of the United Kingdom
* Naval Criminal Investigative Service, a United States law enforcement and intelli ...
'',
Abby and
McGee
McGee or McGees may refer to:
People
* McGee (surname), a surname of Irish origin, including a list of people with this surname
Places United States
*McGee, Missouri
*McGees, Washington
*McGee, West Virginia
Games
*McGee (video game series), ''M ...
have a conversation about logic that gives them the idea of using a logic bomb to hack into computers on a US Naval Carrier to access certain files. No details of the bomb itself are seen on screen or discussed at all.
*In Season 9, Episode 12 of ''
Criminal Minds
''Criminal Minds'' is an American police procedural crime drama television series created and produced by Jeff Davis. The series premiered on CBS on September 22, 2005, and originally concluded on February 19, 2020; it was revived in 2022. It ...
'' ("The Black Queen"), a logic bomb is used against the team that begins deleting information with failed attempts to crack the code.
*In Season 2, Episode 5 of ''
Mr. Robot'' ("eps2.3_logic-b0mb.hc"), Elliot discusses the use of a logic bomb to hack FBI agents' Android phones and E Corp's network and applications.
*In the series ''
The Illuminae Files
''Illuminae'' is a 2015 young adult space opera epistolary novel written by Amie Kaufman and Jay Kristoff. This is the first novel of the three book series ''The Illuminae Files''. The story is told through a series of documents; including class ...
'', Kady Grant, Byron Zhang, and AIDAN write a logic bomb to send to the onboard computer of the ''Lincoln''.
*In the video game ''
Tom Clancy's Rainbow Six Siege'', character Dokkaebi is capable of deploying a logic bomb that can override enemy phones and provoke distraction.
*In the "Autofac" episode of
''Electric Dreams'', a logic bomb is the weapon that is used in an attempt to take down the organization that seems to be run solely by autonomous drones and robots and restricts human activities in a post-apocalyptic world.
*In the 2022 film ''
The Batman,'' a thumb drive inserted into Detective Gordon's laptop triggers a logic bomb that emails incriminating evidence to various Gotham City newspapers from Gordon's email address.
See also
*
Time bomb (software)
*
Backdoor (computing)
A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus c ...
*
Easter egg (media)
File:Carl Oswald Rostosky - Zwei Kaninchen und ein Igel 1861.jpg, 250px, An image that reveals an Easter egg when the hedgehog is clicked or tapped. Another Easter egg can be found in a tooltip when a mouse pointer is hovered over the hedgehog. ...
*
Cyberwarfare
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic war ...
*
Stuxnet
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing subs ...
*
Fork bomb
References
Types of malware
Cyberwarfare