Page 1466 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1466

Changes in the social media landscape have simply changed the way
               these hoaxes circulate. In addition to email messages, malware hoaxes

               now circulate via Facebook, Twitter, WhatsApp, Snapchat, and other
               social media and messaging platforms.

               For more information on this topic, the myth-tracking website Snopes
               maintains a virus hoax list at https://www.snopes.com/tag/virus-
               hoaxes-realities/.


               Logic Bombs


               Logic bombs are malicious code objects that infect a system and lie
               dormant until they are triggered by the occurrence of one or more
               conditions such as time, program launch, website logon, and so on.
               The vast majority of logic bombs are programmed into custom-built
               applications by software developers seeking to ensure that their work
               is destroyed if they unexpectedly leave the company.

               Like all malicious code objects, logic bombs come in many shapes and

               sizes. Indeed, many viruses and Trojan horses contain a logic bomb
               component. The famous Michelangelo virus caused a media frenzy
               when it was discovered in 1991 because of the logic bomb trigger it
               contained. The virus infected a system’s master boot record through
               the sharing of infected floppy disks and then hid itself until March 6—

               the birthday of the famous Italian artist Michelangelo Buonarroti. On
               that date, it sprang into action, reformatting the hard drives of
               infected systems and destroying all the data they contained.

               More recently, a logic bomb targeted organizations in South Korea in
               March 2013. This malware infiltrated systems belonging to South
               Korean media companies and financial institutions and caused both
               system outages and the loss of data. In this case, the malware attack

               triggered a military alert when the South Korean government
               suspected that the logic bomb was the prelude to an attack by North
               Korea.


               Trojan Horses

               System administrators constantly warn computer users not to

               download and install software from the internet unless they are
   1461   1462   1463   1464   1465   1466   1467   1468   1469   1470   1471