A computer worm is a type of malware program whose primary function is to infect other computers while still operating on infected systems.
A computer worm is a type of malware program whose primary function is to infect other computers while still operating on infected systems.
Computer worms are malware that self-replicate to spread to uninfected computers. Worms often use automatic parts and are invisible to the user of the operating system. Usually, worms are only noticed when their uncontrolled replication consumes system resources, slowing down or halting other tasks.
Computer worms spread without user interaction. All that is needed is for the computer worm to work on the infected system. Before networks became widely used, computer worms spread through infected storage media, such as floppy disks, which, when mounted on a system, would infect other connected storage devices. with system. USB is still a popular vector for computer worms.
Computer worms self-replicate to spread to uninfected computers
Computer worms often rely on activities and vulnerabilities in network protocols to propagate. For example, the WannaCry ransomware worm exploited a vulnerability in the first version of the Server Message Block (SMBv1) resource sharing protocol implemented in the Windows operating system. After operating on a newly infected computer, the WannaCry malware begins a search for new potential victims on the network: Systems that respond to SMBv1 requests made by this worm. Worms can continue to spread within an organization in this way. When a person carrying their own device (BYOD) is infected, the worm can spread to other networks, giving hackers more access.
The email worm works by creating and sending outbound messages to all the addresses in the user’s contact list. The messages include a malicious executable that infects the new system when the recipient opens it. Successful email worms often incorporate social engineering methods to prompt users to open attachments.
Stuxnet, one of the most notorious computer worms to date, includes a worm component that spreads malware through the sharing of infected USB devices, as well as system-targeted malware. supervisory control and data acquisition (SCADA), widely used in industrial environments, including electrical utilities, water services, wastewater treatment plants, and many others. Pure computer worms propagate themselves from an infected system to an uninfected system, so it is difficult to minimize the possibility of damage from such computer worms.
An infected system can become unavailable or unreliable as a result of worm propagation, and computer worms are also known to disrupt networks through saturation of network links. with malicious traffic.
There are several types of malicious computer worms:
A computer virus or worm hybrid is a piece of malware that spreads like a worm, but it also modifies program code like a virus – or carries some kind of malicious payload, such as a virus, ransomware or some other type of malware.
Worm bots can be used to infect computers and turn them into zombies or bots, with the aim of using them in coordinated attacks through botnets.
The IM worm spreads through instant messaging services and exploits access to the contact list on the victim’s computer.
Email worms are often distributed as malicious executable files attached to what appear to be regular email messages.
Finally, there is a type of computer worm designed to spread across networks with the aim of providing patches for known security holes. Although this worm has been described and discussed in academia, real-life examples have yet to be found, most likely due to its potential to cause unwanted harm to unexpected response systems. With such software, the greater the ability to eliminate vulnerabilities. In any event, the use of any software that changes the system without the permission of the system owner will subject the publisher to various criminal and civil charges.
Users should practice good network security measures to protect themselves from computer worm infection. Measures that will help prevent the risk of computer worm infection include:
Keeping the operating system and all other software updates and patches up to date will help reduce the risk of newly discovered vulnerabilities. Using a firewall will help reduce the possibility of malware entering the system. Using anti-virus software will help prevent malware from running. Be careful not to click on attachments, links in emails or other messaging apps that could expose the system to malware. Encrypt files to protect sensitive data stored on computers, servers and mobile devices
While some worms are designed to do nothing more than spread themselves to new systems, most worms are related to viruses, rootkits, or other malware.
Follow: Game News Page
Source link: What are Worms? Why are they dangerous to computers?
– Emergenceingames.com