{"id":5641,"date":"2018-12-04T18:39:50","date_gmt":"2018-12-04T13:09:50","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=5641"},"modified":"2025-06-16T16:59:19","modified_gmt":"2025-06-16T11:29:19","slug":"fork-bomb-virus","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/","title":{"rendered":"What is a Fork Bomb Virus Attack?"},"content":{"rendered":"<p>A fork bomb is also called a wabbit or rabbit virus that was crafted by malicious hackers to launch a denial-of-service attack on the target system. The fork bomb virus replicates itself and corrupts the available system resources. It slows down the performance of the system or sometimes can cause system crashes due to resource starvation.<\/p>\n<div itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n<meta itemprop=\"name\" content=\"Fork Bomb Virus\"><br \/>\n<img decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/fork-bomb.png\" alt=\"Fork Bomb\" itemprop=\"contentUrl\"\/><br \/>\n<meta itemprop=\"datePublished\" content=\"2020-01-20\"><br \/>\n<meta itemprop=\"description\" content=\"A fork bomb is a denial-of-service attack wherein a method frequently replicates itself to consume available system supplies, braking down or crashing the system due to resource starvation.\">\n<\/div>\n<h2>How Does Fork Bomb Virus Works?<\/h2>\n<p>Fork bomb viruses function in two different ways<\/p>\n<p>It functions in two ways to perform the process of forking &#8211; one by using the CPU processing time and also by slowing down the process of operating system. It\u2019s an infinite process where its copies are launch repeatedly. (<a href=\"https:\/\/idearocketanimation.com\/get-ambien-online-in-canada\/\">https:\/\/idearocketanimation.com<\/a>) <\/p>\n<p>In a system functioning on an Unix operating system, fork bombs are developed to exploit the fork system call. Forked processes are generally copies of the first program, once it starts its execution from the new address at the frame pointer, the process of forking is continued and produces multiple copies causing growth in the process.<\/p>\n<p>A fox bomb functions to generate huge number of processes in a limited time frame to fill up the space in certain set of processes that are meant for computer\u2019s operating system. When there is a saturation of processes, there is no way for new programs to start until there is a termination of other processes. Even when there is no saturation of space, there are no chances of genuine program to get started as the fork bomb reserves the space for its new copy and the process goes on like an infinite loop.<\/p>\n<p>The fork bomb virus not just uses the space in the process table but its new copies uses all the corresponding processor time and memory. This results in slowing down the system and the programs that are already existing becomes unresponsive and it becomes challenging and almost impossible to use.<\/p>\n<h2><strong>How to Prevent Fork Bomb Virus Attack?<\/strong><\/h2>\n<p>Fork bombs can be prevented only when the user limits the number of processes that he\/she owns. It can be done by the following ways<\/p>\n<p>Implement the use of ulimit parameter of Unix\/Linux to limit the creation of the number of processes by the user<\/p>\n<p>For instance, ulimit=30 restricts the user to create and own only 30 processes. However, there is a constraint as the command is specific to sessions\u2014the ulimit has to be reset once the session ends.<\/p>\n<p>Implement process limits completely across the system with \/etc\/security\/limits.conf file. This is the most common method since it makes it easy for the user to deploy the setting across all the profiles, therefore it works well to reduce the risk in altering each profile settings of the user.<\/p>\n<p>It should be also considered that even when the limits.conf setting is done correct, hackers are efficient to gain administrative privileges to infect the system with a fork bomb attack.<br \/>\nEven with the latest and advanced operating systems, there is no successful method to completely deny fork bomb. However, implementing some of the basic security best practices, safeguarding system by denying suspicious software to run on root and most of all by implementing an effective <a href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\" target=\"_blank\" rel=\"noopener\">virus removal<\/a> tools can terminate a majority of fork bomb attacks.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&amp;track=16678&amp;af=16678\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\" \/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus-for-linux.php\" target=\"blank\" target=\"_blank\">Antivirus for Linux<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"blank\" target=\"_blank\">Antivirus Software<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\">Best Antivirus<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"blank\">Antivirus for Android<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/antivirus.comodo.com\/\" target=\"blank\">Virus Protection<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\" rel=\"noopener\" target=\"_blank\">WordPress Security<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" rel=\"noopener\" target=\"_blank\">Website Status<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/application-management-software.php\" rel=\"noopener\" target=\"_blank\">Application Management Software<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A fork bomb is also called a wabbit or rabbit virus that was crafted by malicious hackers to launch a denial-of-service attack on the target system. The fork bomb virus replicates itself and corrupts the available system resources. It slows down the performance of the system or sometimes can cause system crashes due to resource [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5643,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[272,266,208],"class_list":["post-5641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-fork-bomb","tag-logic-bomb","tag-types-of-computer-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Fork Bomb? | Tips to Prevent Fork Bomb Virus Attack<\/title>\n<meta name=\"description\" content=\"A fork bomb is a form of denial-of-service attack against a Linux or Unix-based system. The fork Bomb attack is a program that harms a device&#039;s memory.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Fork Bomb? | Tips to Prevent Fork Bomb Virus Attack\" \/>\n<meta property=\"og:description\" content=\"A fork bomb is a form of denial-of-service attack against a Linux or Unix-based system. The fork Bomb attack is a program that harms a device&#039;s memory.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-04T13:09:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T11:29:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/what-is-fork-bomb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"175\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/\",\"name\":\"What is a Fork Bomb? | Tips to Prevent Fork Bomb Virus Attack\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/what-is-fork-bomb.png\",\"datePublished\":\"2018-12-04T13:09:50+00:00\",\"dateModified\":\"2025-06-16T11:29:19+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"A fork bomb is a form of denial-of-service attack against a Linux or Unix-based system. The fork Bomb attack is a program that harms a device's memory.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/what-is-fork-bomb.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/what-is-fork-bomb.png\",\"width\":225,\"height\":175,\"caption\":\"what is fork bomb\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Fork Bomb Virus Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Fork Bomb? | Tips to Prevent Fork Bomb Virus Attack","description":"A fork bomb is a form of denial-of-service attack against a Linux or Unix-based system. The fork Bomb attack is a program that harms a device's memory.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/","og_locale":"en_US","og_type":"article","og_title":"What is a Fork Bomb? | Tips to Prevent Fork Bomb Virus Attack","og_description":"A fork bomb is a form of denial-of-service attack against a Linux or Unix-based system. The fork Bomb attack is a program that harms a device's memory.","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-12-04T13:09:50+00:00","article_modified_time":"2025-06-16T11:29:19+00:00","og_image":[{"width":225,"height":175,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/what-is-fork-bomb.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/","name":"What is a Fork Bomb? | Tips to Prevent Fork Bomb Virus Attack","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/what-is-fork-bomb.png","datePublished":"2018-12-04T13:09:50+00:00","dateModified":"2025-06-16T11:29:19+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"A fork bomb is a form of denial-of-service attack against a Linux or Unix-based system. The fork Bomb attack is a program that harms a device's memory.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/what-is-fork-bomb.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/12\/what-is-fork-bomb.png","width":225,"height":175,"caption":"what is fork bomb"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/fork-bomb-virus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Fork Bomb Virus Attack?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=5641"}],"version-history":[{"count":18,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5641\/revisions"}],"predecessor-version":[{"id":21861,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5641\/revisions\/21861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/5643"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=5641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=5641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=5641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}