Computer worm

related topics
{system, computer, user}
{specie, animal, plant}
{math, number, function}
{work, book, publish}
{law, state, case}
{disease, patient, cell}
{car, race, vehicle}

A computer worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.



Many worms that have been created are only designed to spread, and don't attempt to alter the systems they pass through. However, as the Morris worm and Mydoom showed, the network traffic and other unintended effects can often cause major disruption. A "payload" is code designed to do more than spread the worm–it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address.[1] Spammers are therefore thought to be a source of funding for the creation of such worms,[2][3] and the worm writers have been caught selling lists of IP addresses of infected machines.[4] Others try to blackmail companies with threatened DoS attacks.[5]

Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which spreads better using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005.[dubious ]

Full article ▸

related documents
Rn (newsreader)
Finger protocol
Tagged Image File Format
Corel Paint Shop Pro
Fault management
Manchester Mark I
Amiga 1000
Virtual machine
Broadcast domain
Packet analyzer
VESA Display Data Channel
Sinclair ZX80
Apple Attachment Unit Interface
Killer application
Atari Transputer Workstation
Data service unit
Frequency-shift keying
Sega 32X
RAM disk
Burnt-in timecode
Frame (telecommunications)
Executable and Linkable Format
Secure cryptoprocessor
Direct-sequence spread spectrum
Μ-law algorithm
Joint Tactical Information Distribution System