LOGIC BOMB

Logic bomb is a piece of code of malware that contains malicious code that is directly installed into a network,application or software or a operating system.It will be ejected into a system with intention of causing Damage to critical infrastructure.It infiltrates data from the storage of it's address of location.They are very dangerous as they are time dormant for extended periods and very difficult to detect.Main function comprises of cleaning hard drives,Deleting files and corrupting data. To increase damage of this attack logic bombs are used with trojan,horses, worms and viruses of the suitable kind. Primary intention of this attack is to cyber sabotage (an indival or group of individuals) to disrupt, damage and destroy systems,networks,powergrids and transportation systems. cyber-sabotage from someone inside a corporation or organization who has been granted access to sensitive information, as opposed to other types of malware that break into a secure system. If employees fear they are about to be fired, the logic bomb might be a tool for them to get back at the organization. Because they are the only ones capable of delaying, employing the help of a logic bomb and dispersing it every day might be a perfect approach for them. Airports has increasingly become reliant on technology and the threat of cyberattacks will continue to grow. To stay ahead of this evolving threat, airports must invest in advanced cybersecurity measures, such as artificial intelligence and machine learning, to detect and prevent attacks before they occur.Preventing logic bomb attacks requires a multi-layered approach, including regular system audits, employee background checks, and implementing strict access controls. It is also important to have a response plan in place in case of an attack, including procedures for isolating infected systems and restoring data.

Mode of operation of a logical bomb is :

  • Detecting sources of information and data.
  • Deleting data in all sources
  • Restricting user access
  • Dormant Backdoors
  • Corruption and stealing of data

Payload is Unknown until it triggers payload carries out the malicious activity as it is a component of malware. It carries out the destruction.

Case Story Of Logic Bomb against Indira Gandhi Airport in New Delhi.

Common User passenger processing system (CUPPS) is a centralised operating system that contains the passenger operation of New Delhi's Indira Gandhi International Airport. The system integrates critical functions such as scheduled/delayed time of arrivals/departures,check-in schedules and reservation system. In 2011, a remopte attack was launched against CUPPS by ejecting malicious code. This attack disabled the system forced most of the check in counters to shutdown immediately were many of them were reverted to manual checking. Resulted to delay of 50 flights . After, Investigation it was revealed that attack was launched by three employees who were primitively present at installation and assisting of CUPPS system at New Delhi Airport. It was done with the intention of demanding higher wages and when they were refused.

5 Tips to Secure Your Online Accounts

In today's digital world, it's more important than ever to protect your online accounts. Here are five tips to help you get started:

  • Use strong passwords and don't reuse them for multiple accounts.
  • Enable two-factor authentication for added security.
  • Be careful about the information you share online.
  • Keep your software up to date.
  • Be wary of phishing scams.

By following these tips, you can help to make your online accounts more secure and protect yourself from cyberattacks.