Logic Bomb

Logic Bomb
This type of malicious code is a set of instructions secretly and intentionally inserted into a program or software system to carry out a malicious function at a predisposed time and date or when a specific condition is met.
How to avoid logic bomb attack
- Ensuring that each account on each host is accessible with unique passwords to limit failed login attempts.
- Ensuring that the system is securely configured.
- Providing users with the required level of authority to limit further access.
- Regularly patching systems to make it more challenging for intruders to escalate user privilege.
- Establishing a baseline of known processes running on each host at any given moment.
- Routinely comparing the baseline to real time operations will help detect rouge processes on the system.
- Using software integrity to check if a software has been updated or embedded with a logic bomb.
- Verifying all scheduled jobs.
- Reviewing logs to detect unusual activities.
- Making sure that all hosts, workstations and servers are fitted with an up-to-date antivirus software that uses heuristic and pattern recognition for detection measures.
- Timetabling routine scans for connected devices. Files need to be regarded with careful scrutiny as logic codes can be hidden in compressed or zipped files.
- Making sure that all purchased software are the legitimate versions and not pirated.
- Providing employees with cybersecurity awareness training to enable them to better detect phishing emails along with having a reporting protocol.
- Avoiding links in email attachments and other links which look suspicious.