After downsizing its IT department, your company terminated its system administrator. Exactly at midnight on the day after the administrator's last day, every network server's data was wiped. Forensic analysis shows that the former employee had embedded malicious code in the environment that activated at the specified time. Which term best describes this type of malware attack?
Malicious code that waits for a specific condition-such as a particular date, time, or user action-before executing its payload is called a logic bomb. The code remains dormant and unknown to authorized users until the trigger occurs. Cryptomalware and other ransomware variants encrypt data and demand payment, while a worm focuses on self-replication and propagation, not on timed destruction.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a logic bomb differ from other types of malware like ransomware or worms?
Open an interactive chat with Bash
What are the common ways logic bombs can be introduced into a system?
Open an interactive chat with Bash
What tools or processes can be used to detect and prevent logic bomb attacks?