• Main Menu
  • Computer Worms


    Computer worms are programs that reproduce, execute independently, and travel across network connections. The key difference between a virus and worm is the manner in which each reproduces and spreads. A virus is dependent upon the host file or boot sector and the transfer of files between computers to spread, whereas a computer worm can execute completely independently and spread on its own accord through network connections.

    The security threat from worms is equivalent to that of viruses. Computer worms are skilled enough to do serious damage such as destroying crucial files in a system, slowing a system down to a large degree, or even causing some critical programs to stop working. Two very prominent examples of worms are the MS-Blaster and Sasser worms.

    Computer Worm Examples

    Robert Morris unleashed the original computer worm (perhaps accidentally) on the Internet in 1988. The Internet Worm used sendmail, fingerd, and rsh/rexec to spread itself across the Internet.

    The SQL Slammer Worm, which was founded in 2003, used a vulnerability in Microsoft SQL Server 2000 to spread itself across the Internet. The Blaster Worm, also founded in 2003, used a vulnerability in Microsoft DCOM RPC to spread itself.

    The Melissa worm founded in 1999, the Sobig worms founded in 2003, and the Mydoom worm founded in 2004 all spread through e-mail. These worms shared some Trojan Horse features in that they spread by tempting a user to open an infected e-mail attachment.

    Mydoom also attempted to spread itself through the peer-to-peer file sharing application called KaZaA. The Mydoom worms attempted a Denial of Service (DoS) attack against SCO and Microsoft.

    Protect yourself against Computer Worms

    Computer worms, like SQL Slammer and Blaster, that spread through vulnerabilities in network services can best be protected against by keeping the anti-virus up to date and installing patches that operating system and application vendors provide.

    Computer worms that spread like Trojan Horse can best be defended against by not opening attachments in e-mails. These infected attachments are not limited to .EXE files. Microsoft Word and Excel files can contain macros that spread infection.

    Videos Related to Computer Worms

    Got Something To Say:

    Your email address will not be published. Required fields are marked *

    Malware
    } 230 queries in 0.394 seconds.