Have a question?
Message sent Close

Logic Bomb

Logic Bomb

This type of malicious code is a set of instructions secretly and intentionally inserted into a program or software system to carry out a malicious function at a predisposed time and date or when a specific condition is met.

How to avoid logic bomb attack

  • Ensuring that each account on each host is accessible with unique passwords to limit failed login attempts. 
  • Ensuring that the system is securely configured. 
  • Providing users with the required level of authority to limit further access. 
  • Regularly patching systems to make it more challenging for intruders to escalate user privilege. 
  • Establishing a baseline of known processes running on each host at any given moment. 
  • Routinely comparing the baseline to real time operations will help detect rouge processes on the system. 
  • Using software integrity to check if a software has been updated or embedded with a logic bomb.  
  • Verifying all scheduled jobs. 
  • Reviewing logs to detect unusual activities.  
  • Making sure that all hosts, workstations and servers are fitted with an up-to-date antivirus software that uses heuristic and pattern recognition for detection measures. 
  • Timetabling routine scans for connected devices. Files need to be regarded with careful scrutiny as logic codes can be hidden in compressed or zipped files. 
  • Making sure that all purchased software are the legitimate versions and not pirated. 
  • Providing employees with cybersecurity awareness training to enable them to better detect phishing emails along with having a reporting protocol.  
  • Avoiding links in email attachments and other links which look suspicious.