What’s a logic bomb?

Print anything with Printful



Logic bombs are malicious code that perform a harmful function when certain conditions are met, such as deleting files. They can be included in harmless or harmful programs and do not spread like viruses. Some are programmed to activate on a specific date or when certain conditions are not met, making them dangerous. The Siberian Pipeline Incident of 1982 is an alleged example of a logic bomb being used to sabotage a Soviet gas pipeline.

A logic bomb is a part of a computer program intended to perform a malicious function when certain conditions are met. For example, an employee might write a program that includes instructions for deleting important files if it is terminated. Logic bombs can be included in an otherwise harmless program or an inherently harmful program such as a virus.

Unlike viruses, logic bombs do not replicate or spread themselves to other systems. Logic bombs can therefore be crafted to target a specific victim without posing any threat to others. The fact that they don’t replicate also makes logic bombs easier to write than other malicious software.

Some logic bombs are programmed to perform a certain function on a certain date, rather than after a specific event. This type of logic bomb is often called a time bomb. Malicious programs such as viruses, worms, and Trojan horses are sometimes programmed to attack the host computer on a certain date, allowing them to spread undetected in the computer system before they become active.

Sometimes, logic bombs are programmed to go off when something doesn’t happen. For example, an employee can design a logic bomb to delete files when they haven’t logged into the system for a month. Logic bombs of this nature are among the most dangerous, as the conditions for their activation can be met in unintended ways. For example, if the programmer hadn’t been fired, but died unexpectedly, there would have been no way to prevent the bomb from activating.

A program that performs a certain function when predetermined conditions are met is generally only considered a logic bomb if the function is both unwanted and unknown to the user. Trial software that stops working after a predetermined amount of time is not usually referred to as a logic bomb, although it works just as well. Logic bombs often sabotage the host system in some way, either by deleting important files or functionality, or by allowing unauthorized access to the user’s system.

One famous incident, allegedly involving a logic bomb, was the Siberian Pipeline Incident of 1982. Allegedly, the US Central Intelligence Agency (CIA) may have used such a technique to sabotage a Soviet gas pipeline. According to the account by National Security Council staffer Thomas C. Reed, a logic bomb was written into the software that the Soviets stole from a Canadian company. The Soviets used the stolen software to control the pipeline and the logic bomb would cause a huge explosion. There were no casualties. Reed’s account has been disputed however, and the explosion may have been due to a different cause, such as faulty construction.




Protect your devices with Threat Protection by NordVPN


Skip to content