Time Bombs: Malware with Delayed Execution
Did you know that there’s malware that behaves just like cliched ticker-bombs from Hollywood blockbusters? It enters the system and waits there, sometimes for ages, with the timer slowly but inevitably counting towards the destructive explosion. Or in our case — execution. Once the time comes, a cyber-bomb like this can be devastating.
Time bombs are notoriously difficult to detect. They may not leave any signs of malicious activity for a while. There is even a chance that your network is infected with a time bomb right now.?
That’s why it’s worth learning about the dangers this type of malware brings and how to deal with them.
What are Time Bombs?
Time bombs are a subcategory of logic bombs — programs with delayed execution that are designed to run when they detect that certain conditions are being met. For example, it could be reaching a specific date or detecting certain user behavior on the target machine. Although software like this doesn’t have to be malicious, sometimes it’s used by threat actors to create devious malware.?
Logic bombs can enter a network and sit there undetected for prolonged periods of time, until a set date of execution. Sometimes it could months, or even years.
When the time comes, they act just like any other malware, potentially inflicting great damages to your network or your machine.
Where Time Bombs can be Used?
There are a lot of scenarios where attackers can use time-bombs instead of typical instantly executing malware.?
领英推荐
Famous Time Bomb Examples
Time bombs are not particularly uncommon, but there are a few that made an especially big splash. Let’s look at them in detail.
Jerusalem malware
The first malware pandemic (an outbreak of computer viruses that affected multiple countries) was triggered by nothing other than a time bomb. This MS-DOS malware is the reason many cybersecurity professionals still fear Friday the thirteenth.
As you probably already guessed, Jerusalem, also known as “Friday the 13th” was designed to execute on the spooky date of any year except for 1987. Since Friday 13s aren’t very common, most of the time the malware could spread completely stealthily.
The malware was notoriously known for deleting any file that the victim interacted with if the calendar showed Friday the 13th. Apart from that, on any regular date, Jerusalem slowed down affected PC-XT machines by up to five times.
Win95.CIH or Chernobyl malware
Released in 1998, Chernobyl was arguably the most destructive malware of its time. It was one of the first computer viruses that not only damaged software but also affected the hardware of infected machines.
This malware was set to execute on the 26th of April — the date of the infamous 26 Chernobyl disaster. Win95.CIH was able to wipe out all information on system hard drives as well as damage BIOS on certain motherboards. Chernobyl was the malware that revealed the BIOS overwriting vulnerability, showing that malware could be destructive to hardware just as well as to software.
How to Prevent Time Bomb Attacks?
A malware that does not immediately produce any indicators of malicious activity can be tricky to detect. However, you can follow some basic best practices to greatly increase the chances of noticing the danger in time.?