A logic bomb is a piece of code, a set of instructions secretly and intentionally inserted into a software system, so that if particular conditions are met it will “detonate,” setting off and carrying out malicious functions that cause harmful effects.  Examples may include corrupting the hard drive, deleting files, stealing data or taking your device over.

In an article by Caleb Townsend on January 15, 2020 from US Cybersecurity Magazine entitled, “Logic Bombs:  How to Prevent Them”, the author wrote that logic bombs are often used with viruses, worms, and Trojan horses.  He further wrote that in order to count as a logic bomb, they must (a) lie dormant for a specific amount of time, (b) have a payload that is unknown to the user, and (c) be triggered by a specific condition.

Logic bombs are timed to do maximum damage even before being noticed.   Townsend referred to several options of how to prevent logic bombs.  First, make sure within the company’s disaster recovery plans, logic bombs are discussed and how to deal with them. 

Second, it is critical for businesses to periodically scan all files to make sure there is nothing hidden in them.

Third, update your anti-virus and anti-malware software regularly.

Fourth, avoid pirated software as this is a popular method for delivering malware.

Fifth, train employees on how to spot “phishing” emails.

Finally, never trust unsecured web links for they may lead to an infected site.  https://www.uscybersecurity.net/logic-bombs