World Library  
Flag as Inappropriate
Email this Article

Logic bomb

Article Id: WHEBN0000796442
Reproduction Date:

Title: Logic bomb  
Author: World Heritage Encyclopedia
Language: English
Subject: Client honeypot, Time bomb (software), Earthcore, Cyberwarfare in the United States, Debt of Honor
Publisher: World Heritage Encyclopedia

Logic bomb

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company.

Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as Friday the 13th or April Fools' Day. Trojans that activate on certain dates are often called "time bombs".

To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that disables certain functionality after a set time are not normally regarded as logic bombs.


  • Supposed logic bombing of the Trans-Siberian Pipeline 1
  • Successful logic bombs 2
  • Attempted logic bombs 3
  • Fictional logic bombs 4
  • See also 5
  • References 6

Supposed logic bombing of the Trans-Siberian Pipeline

It has been reported that in 1982 the Trans-Siberian Pipeline incident occurred because of a logic bomb (it was later reported that this story may be a hoax[1]). A KGB operative was reported to have stolen the plans for a sophisticated control system and its software from a Canadian firm, for use on their Siberian pipeline. The CIA was supposedly tipped off by documents in the Farewell Dossier and had the company insert a logic bomb in the program for sabotage purposes.[2]

Successful logic bombs

  • In June 2006 Roger Duronio, a disgruntled system administrator for UBS, was charged with using a logic bomb to damage the company's computer network, and with securities fraud for his failed plan to drive down the company's stock with activation of the logic bomb.[3][4] Duronio was later convicted and sentenced to 8 years and 1 month in prison, as well as a $3.1 million restitution to UBS.[5]
  • On 20 March 2013 in an attack launched against South Korea, a logic bomb struck machines and "wiped the hard drives and master boot records of at least three banks and two media companies simultaneously." [6][7] Symantec reported that the malware also contained a component that was capable of wiping Linux machines.[8][9]

Attempted logic bombs

  • In February 2000, Tony Xiaotong, indicted before a [10]
  • On 2 October 2003 Yung-Hsun Lin, also known as Andy Lin, changed code on a server at Medco Health Solutions Inc.'s Fair Lawn, New Jersey headquarters, where he was employed as a Unix administrator, creating a logic bomb set to go off on his birthday in 2004. It failed to work due to a programming error, so Lin corrected the error and reset it to go off on his next birthday, but it was discovered and disabled by a Medco computer systems administrator a few months before the trigger date. Lin pleaded guilty and was sentenced to 30 months in jail in a federal prison in addition to $81,200 in restitution. The charges held a maximum sentence of 10 years and a fine of US$250,000.[11][12]
  • Some time prior to 5 November 2003, an unknown party attempted to insert code into the Linux kernel that would result in privilege escalation to root when code was written a certain way. The attempt was caught before the change was committed to version control.[13][14][15]
  • On 29 October 2008 a logic bomb was discovered at American mortgage giant Fannie Mae. The bomb was planted by Rajendrasinh Babubhai Makwana, an IT contractor who worked in Fannie Mae's Urbana, Maryland facility. The bomb was set to activate on 31 January 2009 and could have wiped all of Fannie Mae's 4000 servers. Makwana had been terminated around 1:00pm on 24 October 2008 and managed to plant the bomb before his network access was revoked. Makwana was indicted in a Maryland court on 27 January 2009 for unauthorized computer access,[16][17] convicted on 4 October 2010, and sentenced to 41 months in prison on 17 December 2010.[18]
  • In October 2009, Douglas Duchak was terminated from his job as data analyst at the TSA’s Colorado Springs Operations Center (CSOC). Surveillance cameras captured images of Duchak entering the facility after hours and loading a logic bomb onto a CSOC server that stored data from the U.S. Marshals. In January 2011, Duchak was sentenced to two years in prison, $60,587 in fines, and three years on probation.[19] At his sentencing, Duchak tearfully apologized as his lawyer noted that at the time of the incident, Duchak's wife was pregnant with their second child. The judge at the sentencing mentioned that this logic bomb planting "incident was an anomaly in an otherwise untarnished work history."[20]

Fictional logic bombs

  • In "Moffett's Ghost," an episode of the Airwolf television series, Hawke loses control of the onboard computer, which was programmed on a timer by Airwolf's creator, Doctor Charles Henry Moffett. Once activated, Airwolf is set to destroy any aircraft in its range.
  • In Michael Crichton's book Jurassic Park, computer technician Dennis Nedry inserted an object into the mainframe coding for the park that would shut off the entire island's power (including the supply to the electric fences) in order to steal several dinosaur embryos in the chaos. The logic bomb object was named "White Rabbit."
  • The Tom Clancy book Debt of Honor features a logic bomb installed in the code of various stock market computers.
  • Hugh Jackman's character in Swordfish, Stanley Jobson, claims to have "dropped a logic bomb through the trapdoor" while hacking into a Department of Defense network.
  • In the episode "Scattered" of the 2004 re-imagining of Battlestar Galactica, the Cylons leave a logic bomb in the ship's computers after briefly gaining access to them. It later causes a series of nearly catastrophic system malfunctions.
  • In the CIA level of Tom Clancy's Splinter Cell, a PC and console videogame, a conversation can be heard with a reference to a logic bomb.
  • In the PC strategy game Empire Earth, the Japanese special unit, the Cyber Ninja, has an attack called "Logic Bomb". This bears little resemblance to a real logic bomb, instead simply disabling an enemy building for a brief period.
  • In Season 3 of 24, Nina Myers manipulates Jack Bauer to unknowingly activate a virus in the CTU computer systems. It is activated by a phone call to a certain number.
  • In Series 6, Episode 8 of Spooks, the Yalta organization sets off a logic bomb planted within the American defense network to shut down all US controlled satellites. It is activated by the entry of a code into a game which causes the logic bomb to copy a virus to all the satellites and shut them down.
  • In Series 6, Episode 2 of NCIS, Abby and McGee have a conversation about logic that gives them the idea of using a logic bomb to hack into computers on a US Naval Carrier to access certain files. No details of the bomb itself are seen on screen or discussed at all.
  • In Season 9, Episode 12 of Criminal Minds ("The Black Queen"), a logic bomb is used against the team that begins deleting information with failed attempts to crack the code

See also


  1. ^ Mackeown, Patrick (10 August 2006). "Bookscape: Short Story - Famous Computer Hoaxes". Bookscape. Archived on 13 November 2010.
  2. ^ French, Matthew (26 April 2004). "Tech sabotage during the Cold War". Federal Computer Week. 1105 Media. 
  3. ^ Man accused of crashing UBS servers | The Register
  4. ^ Nightmare On Wall Street: Prosecution Witness Describes 'Chaos' In UBS PaineWebber Attack - News byy InformationWeek
  5. ^ Former UBS Computer Systems Manager Gets 97 Months for Unleashing "Logic Bomb" on Company Network
  6. ^ "Government waging 'war' against people: Kim Zetter".  
  7. ^ "South Korea raises alert after hackers attack broadcasters, banks: Se Young Lee".  
  8. ^ "Remote Linux Wiper Found in South Korean Cyber Attack".  
  9. ^ "South Korean Banks and Broadcasting Organizations Suffer Major Damage from Cyber Attack".  
  10. ^ "Man Indicted in Computer Case".  
  11. ^ Vijayan, Jaikumar. "Unix Admin Pleads Guilty to Planting Logic Bomb". PC World. Retrieved 22 September 2007. 
  12. ^ "'"2.5 Years in Jail for Planting 'Logic Bomb. Slashdot. 
  13. ^ "The Linux Backdoor Attempt of 2003". 
  14. ^ "An attempt to backdoor the kernel". 
  15. ^ "BK2CVS problem". 
  16. ^ Fannie Mae Contractor Indicted For Logic Bomb
  17. ^ Former Employee of Fannie Mae Contractor Convicted of Attempting to Destroy Fannie Mae Computer Data 4 October 2010
  18. ^ Stephen C. Webster (31 December 2010). "Programmer jailed three years over plot to wipe out all of Fannie Mae's financial data".  
  19. ^ TSA Worker Gets 2 Years for Planting Logic Bomb in Screening System 12 January 2011
  20. ^ Springs man sent to prison for hacking into TSA computer 11 January 2011
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.