Video email for gmail vs bomb bomb2/18/2024 There are other, somewhat more pedestrian types of positive triggers as well: a logic bomb may go off if someone attempts to open a specified file, for instance, or copy data from one directory to another.Ī negative trigger may be a little harder to understand at first, and maybe the best way to think about it is in terms of the sort of insider threats we noted as a common use case for a logic bomb. The Stuxnet example is a positive trigger: the worm analyses the underlying hardware on which it's running and if it matches the target system it was designed to attack, it spins any attached uranium centrifuges fast enough to destroy them. A positive trigger goes off if something happens, while a negative trigger goes off if something fails to happen. There are two different forms a logic bomb's trigger can take, either positive or negative. In fact, as we'll see in our examples, many logic bombs are hidden inside ordinary computer programs by the people who wrote those programs themselves.Īs the Stuxnet example demonstrates, a logic bomb attack gets its name because the malicious code activates when some logical condition, or trigger, is satisfied: it can be explained as an if-then statement. That said, not all malicious code is malware, and not all logic bombs are delivered via viruses or their kin. and Israeli intelligence to sabotage the Iranian nuclear program, has a payload that will only activate if it determines that it's running on a computer that is part of a specific type of uranium enrichment facility. The part of a piece of malware that actually carries out the attack, known as the payload, can work in a number of different ways, and some of these payloads are themselves logic bombs.įor instance, the famous Stuxnet worm, created by U.S. Unlike a virus, the distinguishing characteristic of a logic bomb isn’t how it spreads, but how it’s triggered.Ī quick note on terminology: Malware comes in different types, including viruses, worms, and Trojans, that are generally defined by how they spread and how they infect computers the details vary, but by and large they are designed to find victims semi-autonomously. While logic bombs are sometimes delivered via the same techniques that can infect your computer with viruses or other malware, more often they're planted by insiders with privileged access to the system being attacked-and can therefore be quite tricky to detect.Ī logic bomb isn’t a virus, but it could be spread by one. The actual code that does the dirty work, sometimes referred to as slag code, might be a standalone application or hidden within a larger program. A logic bomb is a piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions the owner of that computer would consider malicious.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |