Note to Fannie Mae: Dealing with Logic Bombs

Today, it was revealed that a departing contractor left Fannie Mae with a parting gift – a Logic Bomb designed to take 4000 of the financial giants servers & their data. Since this news broke, a number of concerned CIOs have requested my team for some guidance on how to deal with logic bombs. So here is a quick lesson on these malicious attacks. Read more…

Akshay Aggarwal
Practice Manager (North America & Latam)

Comments

  • Anonymous
    January 31, 2009
    PingBack from http://www.anith.com/?p=4159
  • Anonymous
    February 03, 2009
    The detailed FBI report about the incident is an interesting read. It would have been a real catastrophe had the script got executed. Lucky Fannie Mae :-)One question though.. Do you think such a security design, where in one individual, if he desires, is allowed log on to and run a destructive code on all those 4000+ systems.Also, some intergrity checking of the script files ( like MD5) just before initialization would be a nice idea( Agree to the fact that some one with sufficient access rights will be able to manipulate the checksum database too :-( )
  • Anonymous
    February 04, 2009
    Thanks for the post !The FBI Report on the Fannie Mae incident is a good read. It really surprises that one individual has  access to 4000+ systems with administrative rights. Is such a flat security design suggested ?Also, wouldn't it be a nice practice to checksum the original critcal script files and verifying the scripts against the stored/protected checksums those checksum before initiating.
  • Anonymous
    February 07, 2009
    The comment has been removed