Computer Worm

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

I.

Computer Worm
a. A computer worm is a type of malicious software program whose primary function is to
infect other computers while remaining active on infected systems.
b. A computer worm is self-replicating malware that duplicates itself to spread to
uninfected computers. …
c. A computer worm is not to be confused with WORM (write once, read many)

II. Differences between Worms and Viruses

A computer worm is a form of malware, just like its more notorious cousin, the virus. Where
a worm differs from a virus is that typically doesn’t infect or manipulate files on its own.
Instead, it simply clones itself over and over again and spreads via a network (say, the
internet, a local area network at home, or a company’s intranet) to other systems where it
continues to replicate itself.

III. Types of Computer Worms


a. Worm Hybrid or Computer Virus
Is a piece of malware that spreads like a worm, but that also modifies program code like
a virus or else carries some sort of malicious payload, such as a virus, ransomware or
some other type of malware.
b. Zombie or Bot Worm
It’s a self-replicating malware program that resides in current memory (RAM), turns
infected computers zombie or bots and transmits itself to other computers.
It may be used to infect computers and turn them into zombies or bots, with the infect
computers and turn them into zombies or bots, with the internet if using them in
coordinated attacks through botnets.
c. E-mail Worm
Are usually spread as malicious executable files attached to what appear to be ordinary
email messages.
d. Ethical Worm
It is a computer worm designed to propagate across networks with the express purpose
of delivering patches for known security vulnerabilities.

IV. How Computer Worms Spread


a. E-mail
One of the most common ways for computer worms to spread is via email spam. …In
years gone by, worms could hide in the main text of an email, but as a modern email
clients caught on and began blocking direct embedding circa 2010, the risk for this type
of attack is fairly low.
b. Operating System Vulnerabilities
Every operating system has its vulnerabilities (yes even macOS) and some worms are
specifically coded to take advantage of these weak points. Perhaps the most infamous
example is Conficker, a worm first identified in 2008 which exploited vulnerability in a
network service present in may versions of Windows, including Windows 2000,
Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008, and
Windows Server 2008 R2 Beta and Windows 7 Beta. At its peak, Conficker infected as
many as 15 million computers.
c. Instant messaging
Worms can take on similarly deceptive forms in instant messaging software and take
advantage of users who are probably not on high alert when using such services.
d. Smartphones
Globally, there were about 2.8 billion active smartphones being used at the end of 2016,
according to data collated by market intelligence firm Newzoo. With these figures in
mind, it should come as little surprise that worm creators are increasingly turning their
attention to mobile devices.
e. A computer worm infection spreads without user interaction.
All that is necessary is for the computer worms were spread through infected storage
media, such as floppy diskettes, which, when mounted on a system, would infect other
storage devices connected to the victim system. USB drives are still a common vector for
computer worms.
V. How to tell if your computer has a worm
If you suspect your devices are infected with a computer worm, run a virus scan
immediately. Even if the scan come up negative, continue to be protective by following
these steps.
a. Keep an eye on your hard drive space.
When worms repeatedly replicate themselves, they start to use up the free space on
your computer.
b. Monitor speed and performance.
Has your computer seemed a little sluggish lately?
Are some of your programs crashing or not running property? That could be red flag
that a worm is eating up your processing power.
c. Be on the lookout for missing or new files.
One function of a computer worm is to delete and replace files on a computer.

VI. How to Prevent Computer Worm

User should practice good cybersecurity hygiene to protect themselves against being
infected with computer worms. Measures that will help prevent the threat of computer
worm infections include:

a. Keeping up to date with operating systems and all other software patches and updates
will help reduce the risk due to newly discovered vulnerabilities.
b. Using firewalls will help reduce access to systems by malicious software.
c. Using antivirus software will help prevent malicious software from running.
d. Being careful not to click on attachments or links in email or other messaging
applications that may expose systems to malicious software.
e. Phishing is another popular way for hackers to spread worms (and other type of
malware). Always be extra cautious when opening unsolicited emails, especially those
from unknown senders that contain attachment or dubious link.
f. Be sure to invest in a strong internet security to software solution that can help block
these threats. A good product should have anti-phishing technology as well as defenses
against viruses, spyware, ransomware, and other online threats.
g. Encrypt files to protect sensitive data stored on computers, servers and mobile devices.

Although some worms are designed to do nothing more than propagate themselves to new
victim systems, most worms are associated with viruses, rootkits or other malicious
software.

VII. How to remove a Computer Worm


Removing a computer worm can be difficult. In extreme cases, the system may need to be
formatted, and all the software reinstalled.
Used a known safe computer to download any required updates or programs to an external
storage device and then install them on the affected machine. If it is possible to identify the
computer worm infecting the system, there may be specific instructions or tools available to
remove the infection.
The system should be disconnected from the internet or any network, wired or wireless,
before attempting to remove the computer worm; removable storage devices should also
be removed and scanned separately for infections. Once the system

You might also like