An organization's critical systems suffer a sudden failure after a former employee's user account is deleted. Investigation reveals that a hidden script was set to execute upon the removal of this account, leading to the malfunction. Which type of malicious attack does this scenario represent?
This scenario represents a logic bomb, which is malicious code embedded within a system that activates when specific conditions are met—such as the deletion of a user account. Logic bombs are often used by insiders to cause harm after they leave an organization. Unlike rootkits that hide their presence to maintain ongoing access, worms that replicate to spread across networks, or ransomware that encrypts data for ransom, a logic bomb lies dormant until triggered by a particular event.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a logic bomb and how does it work?
Open an interactive chat with Bash
How can organizations protect themselves from logic bombs?
Open an interactive chat with Bash
What are some other types of malware similar to logic bombs?