Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Hacks & Attacks

Throwback attack: The U.S. hits Russia with the first logic bomb attack

  • Tyler Wall
  • April 14, 2022
Courtesy: CFE Media and Technology
Courtesy of CFE Media and Technology
Total
1
Shares
0
1
0
0

In the midst of the Cold War, the Central Intelligence Agency (CIA) launched a trojan horse code, dubbed a logic bomb, on the Soviet Union. This attack would go down in history as one of the largest and most effective cyberattacks the United States ever unleashed on another nation and would severely cripple the Soviet Union. To this day, the effects of the attack are still being felt.

The logic bomb

A logic bomb is a “trojan horse” program that is activated when certain conditions are met. It is traditionally meant to have harmful effects on the chosen target — typically, a shutdown of a software, which can cripple a business or infrastructure.

Since this attack, there have been other logic bombs. One of the larger-scale logic bomb attacks occurred in 2019 at Siemens. A Siemens employee had been planting logic bombs in spreadsheets that constantly made them shut down. Siemens needed to constantly ask that employee to fix the issue, until they discovered that he was the one causing the problems.

The Deception Program

Gus W. Weiss, a White House policy adviser on technology and intelligence, played a major role in planning the attack on the Soviet Union. He discovered that the Soviets were in need of pipeline control software. As a result, their government created a branch called Directorate T to carry out research and steal new technologies from the Western world. An insider under the code name “Farewell” provided further information and documentation to the U.S. government of the heists performed by the KGB sector.

According to a Washington Post article, the documents provided by the agent “showed the Soviets had stolen valuable data on radar, computers, machine tools and semiconductors.” This disgusted Weiss, who stated that “our science was supporting their national defense.”

In January 1982, Weiss presented a plan to CIA Director William J. Casey that involved creating a new technology for the KGB to steal; one that would only work for a period of time before failing and causing damage. The plan was named the Deception Program, but this kind of attack is now called a logic bomb.

Thomas Reed, a U.S. national security official, stated that, “In order to disrupt the Soviet gas supply, its hard currency earnings from the West and the internal Russian economy, the pipeline software that was to run the pumps, turbines and valves was programmed to go haywire, after a decent interval, to reset pump speeds and valve settings to produce pressures far beyond those acceptable to pipeline joints and welds.”

Casey went on to present Weiss’ plan to then-President Ronald Reagan, who put the program into motion.

In June 1982, there was an explosion in the Siberian Pipeline in the Soviet Union, creating a fire so massive it could be seen from space. Given the covert nature of this operation and without knowledge of where the faulty technology would end up, the U. S. government was unsure of what caused the explosion. They would soon learn it was an offshoot of the Deception Program.

Reagan’s hand

It has been heavily debated as to how great a role Reagan played in the execution of the operation. Reagan’s U.S. National Security Adviser revealed that Reagan approached Weiss about wanting a covert operation to take down the KGB, so he was at least aware of a plan to hinder the Soviet Union.

The aftermath and fallout

The Soviet Union denied any U.S. involvement with the pipeline explosion, claiming that it was a construction issue, according to RISI.

The impact on the Soviet Union was crushing. The pipeline explosion had both an economic and psychological effect, hurting the country’s gas supply and creating uncertainty about what other pieces of equipment were compromised.

Since then, logic bombs have made other appearances, such as in the previously mentioned Siemens incident. They are common in today’s world; however, they are preventable through using updated antivirus software, training all employees to avoid phishing emails and untrusted links, and reporting any suspicious activity.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Tyler Wall

Tyler Wall is an Associate Editor at CFE Media and Technology.

Related Topics
  • CFE Content
  • Featured
Previous Article
Courtesy: Brett Sayles
  • Strategies

Securing energy infrastructure from cyber threats

  • Sourabh Suman
  • April 13, 2022
Read More
Next Article
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
  • Uncategorized

Automated manufacturing cybersecurity risks

  • Rebecca Jess
  • April 17, 2022
Read More
You May Also Like
Read More

How a desert water utility helped protect critical infrastructure

A robot powered by OSARO’s machine learning system picks consumer goods. Courtesy: A3/OSARO
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT