Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Logic bomb
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Successful == *In June 2006 Roger Duronio, a [[system administrator]] for [[UBS AG|UBS]], was charged with using a logic bomb to damage the company's computer network, and with securities fraud for his failed plan to drive down the company's stock with activation of the logic bomb.<ref>[https://www.theregister.co.uk/2006/06/08/ubs_hack_attack Man accused of crashing UBS servers | The Register]</ref><ref>{{Cite web |url=http://www.informationweek.com/showArticle.jhtml?articleID=188702216 |title=Nightmare On Wall Street: Prosecution Witness Describes 'Chaos' In UBS PaineWebber Attack - News by InformationWeek |access-date=8 December 2006 |archive-date=28 October 2007 |archive-url=https://web.archive.org/web/20071028151137/http://www.informationweek.com/showArticle.jhtml?articleID=188702216 |url-status=dead }}</ref> Duronio was later convicted and sentenced to 8 years and 1 month in prison, as well as a $3.1 million restitution to UBS.<ref>[http://www.usdoj.gov/usao/nj/press/files/pdffiles/duro1213rel.pdf Former UBS Computer Systems Manager Gets 97 Months for Unleashing "Logic Bomb" on Company Network] {{webarchive |url=https://web.archive.org/web/20070930064933/http://www.usdoj.gov/usao/nj/press/files/pdffiles/duro1213rel.pdf |date=30 September 2007 }}</ref> *On 20 March 2013, in an attack launched against [[South Korea]], a logic bomb struck machines and "wiped the hard drives and [[master boot record]]s of at least three banks and two media companies simultaneously."<ref>{{cite magazine | title=Government waging 'war' against people: Kim Zetter | url= https://www.wired.com/threatlevel/2013/03/logic-bomb-south-korea-attack/ | magazine=[[Wired (magazine)|Wired]]|access-date=3 April 2013}}</ref><ref>{{cite news | title=South Korea raises alert after hackers attack broadcasters, banks: Se Young Lee | date= 20 March 2013 | url= https://www.reuters.com/article/net-us-korea-cyber-outage-idUSBRE92J06F20130320 | work=[[Reuters]]|access-date=3 April 2013| last1= Lee | first1= Se Young }}</ref> [[NortonLifeLock|Symantec]] reported that the malware also contained a component that was capable of wiping Linux machines.<ref>{{cite web | title=Remote Linux Wiper Found in South Korean Cyber Attack | url= http://www.symantec.com/connect/blogs/remote-linux-wiper-found-south-korean-cyber-attack | archive-url= https://web.archive.org/web/20130324015507/http://www.symantec.com/connect/blogs/remote-linux-wiper-found-south-korean-cyber-attack | url-status= dead | archive-date= 24 March 2013 | publisher=[[NortonLifeLock|Symantec]]|access-date=3 April 2013}}</ref><ref>{{cite web | title=South Korean Banks and Broadcasting Organizations Suffer Major Damage from Cyber Attack | url= http://www.symantec.com/connect/blogs/south-korean-banks-and-broadcasting-organizations-suffer-major-damage-cyber-attack | archive-url= https://web.archive.org/web/20130324013008/http://www.symantec.com/connect/blogs/south-korean-banks-and-broadcasting-organizations-suffer-major-damage-cyber-attack | url-status= dead | archive-date= 24 March 2013 | publisher=[[NortonLifeLock|Symantec]]|access-date=3 April 2013}}</ref> *On 19 July 2019, David Tinley, a contract employee, pleaded guilty for programming logic bombs within the software he created for [[Siemens]] Corporation.<ref>{{cite web |title=Siemens Contract Employee Intentionally Damaged Computers by Planting Logic Bombs into Programs He Designed |url=https://www.justice.gov/usao-wdpa/pr/siemens-contract-employee-intentionally-damaged-computers-planting-logic-bombs-programs |website=www.justice.gov |publisher=United States Department of Justice |access-date=9 September 2019 |language=en |date=19 July 2019}}</ref> The software was intentionally made to malfunction after a certain amount of time, requiring the company to hire him to fix it for a fee. The logic bombs went undetected for two years, but were then discovered while he was out of town and had to hand over the administrative password to his software.<ref>{{cite news |last1=Cimpanu |first1=Catalin |title=Siemens contractor pleads guilty to planting logic bomb in company spreadsheets |url=https://www.zdnet.com/article/siemens-contractor-pleads-guilty-to-planting-logic-bomb-in-company-spreadsheets/ |access-date=9 September 2019 |work=ZDNet |language=en}}</ref> *In 2023, researchers discovered that some [[Newag]] trains were secretly programmed to deliberately break down after a certain distance, or during maintenance windows, or when onboard GPS confirmed they were located in rivals' workshops for repair.<ref>{{cite web |url=https://hackaday.com/2023/12/06/the-deere-disease-spreads-to-trains/ |title=The Deere Disease Spreads To Trains |last1=List |first1=Jenny |work=Hackaday |access-date=2023-12-06 |date=2023-12-06 }}</ref><ref>{{cite web |url=https://zaufanatrzeciastrona.pl/post/o-trzech-takich-co-zhakowali-prawdziwy-pociag-a-nawet-30-pociagow|title=O trzech takich, co zhakowali prawdziwy pociąg – a nawet 30 pociągów|access-date=2023-12-06|date=2023-12-05|website=Zaufana Trzecia Strona|language=pl}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)