Fork Bomb

Fork Bomb Definition

A fork bomb (also called a rabbit virus, wabbit, or den-n-nis) is a program that repeatedly copies itself until it exhausts a computer’s resources. It’s a type of denial-of-service (DoS) attack, which makes a system unavailable by overwhelming it with internal activity. As a result, a fork bomb can interrupt work, lead to data loss, and disrupt multiple users if the attack runs on a shared server.

Fork bombs mainly affect Unix, Linux, and Unix-based systems like macOS, while Windows devices are generally less vulnerable to this specific type of attack.

How a Fork Bomb Works

A fork bomb is usually a small program or script that runs when it’s executed on a computer. It repeatedly duplicates itself, creating endless copies that compete for processing power and memory.

On Unix and Linux platforms, this behavior comes from the fork command, which normally creates new processes so the operating system can multitask. A fork bomb abuses this command by making the OS launch processes indefinitely, leaving no resources for regular programs.

Because the fork bomb relies on simple built-in commands, it overloads a device from within instead of sending malicious external traffic. Once active, the operating system can’t regain control, which often requires a hard reboot. While fork bombs don’t damage files or hardware, they can cause serious disruption and loss of unsaved data.

Fork Bomb Prevention Tips

Read More

FAQ

No, a fork bomb isn’t usually classed as a virus because it doesn’t move between separate machines or hide inside files. Its impact stays on the device where it runs, though it can still disrupt multiple users if they rely on the same shared server.

Fork bombs are sometimes used in controlled settings such as classrooms or labs. They help demonstrate how operating systems handle resource limits. They can also be used for stress-testing or security research. Outside of these environments, attackers sometimes misuse them to interfere with shared servers. However, their impact is usually limited compared to other types of attacks.

Once a fork bomb starts running, it’s almost impossible to stop. That’s because it creates new processes so quickly your device typically stops responding before you have a chance to react. In most cases, the only way to stop a fork bomb is to perform a hard reboot, which may delete any unsaved work.

The easiest way to recover from a fork bomb is to perform a hard reboot. After rebooting, you should run a security scan and make sure your system is up to date. Additionally, implement easy steps to prevent potential fork bomb attacks in the future.

×

Time to Step up Your Digital Protection

The 2-Year Plan Is Now
Available for only /mo

undefined 45-Day Money-Back Guarantee