A logic bomb is malware or code that acts on the principle of activation in response to an action or event. The activator of a logic bomb can be the launch of an application, a visit to a certain web page, or a certain time interval.
Traditionally, there are two types of logic bombs.
In the first case, the malicious code is part of a virus complex, the elements of which are a Trojan or keylogger. When the victim visits any site where personal data (login and password) must be entered, the logic bomb is triggered and launches the data theft process.
In the second case, malicious code is embedded in the official program, which operates according to a scenario set by the developer. For example, after a certain period of time, the software starts running with errors or slows down, provoking the user to contact the developer for paid services. Some mobile device developers act in a similar way, building a period of planned obsolescence into their devices and forcing users to purchase new versions of gadgets.