Several things may come to mind when you think of the word “worm." You may think of delicious soft chewie candies that are sugary and maybe a little sour. Or you may think of the cold-blooded invertebrate animals that wiggle across the Earth’s surface. And if you’re thinking in computing terms, the malware may spring to mind. Show Similar to real worms, you can say that computer worms don’t have much of a backbone because they often rely on trickery to infect their hosts. They may also seem a bit coldblooded because they can be remorselessly destructive. Let’s learn more about them. Worm definition (computer)A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system. Typically, a worm spreads across a network through your Internet or LAN (Local Area Network) connection. Naturally, you must be wondering what is a Trojan and how does it relate to computer worms? To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it. For example, a Trojan may pretend to be legitimate software. A worm is a type of Trojan because it normally relies on social engineering to attack systems. How does a computer worm spread?
What does a computer worm do?Once a computer worm has breached your computer’s defenses it can perform several malicious actions:
Some people think that a computer worm and computer virus are the same things because the two behave similarly. They may even use the terms like "worm computer virus" or "worm virus malware." The truth is that the two are comparable but different threats. The defining difference between a virus and a worm is that viruses rely on human action for activation and need a host system to replicate. In other words, a virus won’t harm your system unless you run it. For example, a virus on a flash drive connected to your computer won’t damage your system unless you activate it. And as mentioned above, a worm doesn’t need a host system or user action to spread. Computer worm examplesOver the years, there have been some particularly devastating worms. Some worms have caused billions in damage. Here is a brief list of some infamous ones:
Symptoms of a computer wormMany of the symptoms of a computer worm are like that of a computer virus. For example, you may have a computer worm if your computer slows down, freezes, crashes or throws up error messages. You may also notice that files are missing or corrupted or that your hard drive's space is rapidly depleting inexplicably. Additionally, you may see alerts from your firewall about a breach. How to stop computer wormsLike other forms of malware — computer worms can be stopped with the right antivirus and anti-malware software and safe computing practices. Please don’t entertain suspicious links, emails, texts, messages, websites, P2P file networks, and drives. Also, update your essential software regularly to shield your computer from vulnerabilities like the wormable Windows flaw and the like. News on computer worms
A computer worm is a malicious piece of software that replicates itself from one computer to another with the goal of overtaking the entire network of computers. Most worms are designed to infiltrate systems by exploiting their security failures, while very few also try to change the system settings. Even if they don’t, they are still very dangerous as they take up a lot of bandwidth and other valuable resources. If a worm is indeed malicious and not just used to breach the system security, the code designed to carry out the attack is referred to as the payload. Payloads are usually created to change or delete files on a target network, extract personal data from them, or encrypt them and seek a ransom from the victim. Despite the fact that many people use the two terms interchangeably, computer worms are not the same as computer viruses. For one, computer viruses by definition target individual computers, whereas worms target networks of computers to create botnets. Furthermore, while viruses are usually bundled with legitimate files or programs, computer worms are standalone and don’t require a host file. Computer Worm TypesAlthough there are no official statistics available, it is safe to say that there are well over a million computer worms in the world, each designed for a specific purpose. Many of them have been isolated and are now routinely detected and removed by most of the best antivirus software. However, new worms are being developed almost daily and can sometimes go unnoticed by the user until it’s too late. There is no universal classification of computer worms, but they can be organized into types based on how they are distributed between computers. The five common types are as follows: 1. Internet WormsLike they do with computer networks, computer worms also target popular websites with insufficient security. When they manage to infect the site, internet worms can replicate themselves onto any computer being used to access the website in question. From there, internet worms are distributed to other connected computers through the internet and local area network connections. 2. Email WormsEmail worms are most often distributed via compromised email attachments. They usually have double extensions (for example, .mp4.exe or .avi.exe) so that the recipient would think that they are media files and not malicious computer programs. When the victims click on the attachment, copies of the same infected file will automatically be sent to addresses from their contacts list. An email message doesn’t have to contain a downloadable attachment to distribute a computer worm. Instead, the body of the message might contain a link that’s shortened so that the recipient can’t tell what it’s about without clicking on it. When they click on the link, they will be taken to an infected website that will automatically start downloading malicious software to their computer. 3. Instant Messaging WormsInstant messaging worms are exactly the same as email worms, the only difference being their method of distribution. Once again, they are masked as attachments or clickable links to websites. They are often accompanied by short messages like “LOL” or “You have to see this!” to trick the victim into thinking that their friend is sending them a funny video to look at. When the user clicks on the link or the attachment – be it in Messenger, WhatsApp, Skype, or any other popular messaging app – the exact same message will then be sent to their contacts. Unless the worm has replicated itself onto their computer, users can solve this problem by changing their password. 4. File-Sharing WormsAlthough illegal, file-sharing and peer-to-peer file transfers are still used by millions of people around the world. Doing so, they are unknowingly exposing their computers to the threat of file-sharing worms. Like email and instant messaging worms, these programs are disguised as media files with dual extensions. When the victim opens the downloaded file to view it or listen to it, they will download the worm to their computer. Even if it seems that users have downloaded an actual playable media file, an executable malicious file could be hidden in the folder and discreetly installed when the media file is first opened. 5. IRC WormsInternet Relay Chat (IRC) is a messaging app that is mostly outdated nowadays but was all the rage at the turn of the century. Same as with today’s instant messaging platforms, computer worms were distributed via messages containing links and attachments. The latter was less effective due to an extra layer of protection that prompted users to accept incoming files before any transfer could take place. Computer Worm ExamplesJerusalem, the first known computer worm, was discovered in 1987. Since then, other computer worms have made the news, either because of their devastating effects or due to the sheer scale of the attack. Some of the most notorious examples of computer worms include the following:
Only the best antivirus software can help detect and remove certain types of computer worms. If you suspect your computer may have been infected, it is important to run a scan and remove compromised files from your system immediately. Because worms exploit system and software vulnerabilities, you need to make sure that you’re always using the most recent versions of applications. Turn on automatic updates of your operating system to ensure that your computer is protected from worms and other potential threats. Don’t click on any links or open any attachments unless you are absolutely sure they were sent by your friends and not a worm. Finally, to make sure that your computer stays safe online, you need to invest in the best antivirus software (like Norton, BitDefender, Intego or Panda). The right choice of software will help provide real-time protection for your computer and fend off all threats, including worms, viruses, malware, spyware, and ransomware. Sources |