We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is a Logic Bomb?

Niki Acker
Updated: May 16, 2024

A logic bomb is a portion of a computer program intended to execute a malicious function when certain conditions are met. For example, an employee may write a program including the instructions that important files be deleted if he or she is terminated. Logic bombs may be included in an otherwise innocuous program or in an inherently malicious program like a virus.

Unlike viruses, logic bombs do not replicate themselves or spread to other systems on their own. Logic bombs can therefore be made to target a specific victim without posing any threat to others. The fact that they do not replicate also makes logic bombs easier to write than other malicious software.

Some logic bombs are programmed to execute a certain function on a certain date, rather than after a specific event. This type of logic bomb is often called a time bomb. Malicious programs like viruses, worms, and Trojan horses are sometimes programmed to attack the host computer on a certain date, allowing them to spread undetected throughout the computer system before they become active.

Sometimes, logic bombs are programmed to activate when something does not happen. For example, an employee may design a logic bomb to delete files when he or she has not logged into the system for a month. Logic bombs of this nature are among the most dangerous, since the conditions for their activation can be met in unintentional ways. For example, if the programmer was not fired, but died unexpectedly, there would be no way to prevent the bomb from being activated.

A program that executes a certain function when predetermined conditions are met is usually only considered a logic bomb if the function is both unwanted and unknown to the user. Trial software that ceases to work after a predetermined period of time is not usually referred to as a logic bomb, though it works the same way. Logic bombs often sabotage the host system in some way, deleting important files or functionality, or allowing unauthorized access to the user's system.

One famous incident, allegedly involving a logic bomb, was the Siberian Pipeline incident of 1982. Supposedly, the United States Central Intelligence Agency (CIA) may have used such a technique to sabotage a Soviet natural gas pipeline. According to the account of National Security Council staffer Thomas C. Reed, a logic bomb was written into software that the Soviets stole from a Canadian firm. The Soviets used the stolen software to control the pipeline, and the logic bomb allegedly resulted in a huge explosion. There were no casualties. Reed's account has been disputed, however, and the explosion may have been due to a different cause, such as faulty construction.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Niki Acker
By Niki Acker
"In addition to her role as a EasyTechJunkie editor, Niki Foster is passionate about educating herself on a wide range of interesting and unusual topics to gather ideas for her own articles. A graduate of UCLA with a double major in Linguistics and Anthropology, Niki's diverse academic background and curiosity make her well-suited to create engaging content for WiseGeekreaders. "
Discussion Comments
By Armas1313 — On Feb 09, 2011

This is a very helpful tool for an innovator. If I were to come up with a new algorithm which could change world history, I could ensure my own survival by keeping it hidden and promising people that if I was killed, the logic bomb would destroy the programming containing a logic bomb. Employees can also ensure that they keep their jobs by inserting necessary conditions into a system. This is always risky business, however.

Niki Acker
Niki Acker
"In addition to her role as a EasyTechJunkie editor, Niki Foster is passionate about educating herself on a wide range...
Learn more
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.