computer worm is fundamentally similar to viruses in that they are computer software or program that recreate utilitarian duplicates of themselves (usually to other computer systems via network connections) and frequently, but not always, contain some functionality that will interfere with the normal use of a computer or a software. Unlike viruses, however, it exists as separate entities; they do not attach themselves to other files or software. Because of their similarity to viruses, it also is often referred to as viruses.
An especially notorious occurrence happened in 1988. A PC worm since named the Morris worm caused many thousands, if not millions, of dollars in harm, and its maker was convicted under the Computer Fraud and Abuse Act.
In recent worm attacks such as the much-discussed Blaster Worm, it has been designed to burrow into your system and enable malicious users to control your Pc remotely.
Types of Computer Worms
- Email Worms- Email-Worm spread through infected email messages as an attachment or a link to an infected website, when clicked, it infects the computer, or it will send an attachment that, when opened, will start the infection. Once it is installed, it scans the host PC for an email tends to contained on it. It will then begin the procedure again, sending it with no contribution from the client. A well-known example of this type of worm is the “ILOVEYOU” worm, which infected millions of computers worldwide in 2000.
- IRC Worms- IRC Worm spread through IRC chat channels, sending infected files or links to infected websites.
- Internet Worms- Internet worm is totally autonomous programs. They use an infected machine to scan the Internet for other vulnerable machines. At the point when a defenseless machine is found, it will taint it and start the procedure once more. Internet worm is often created to exploit recently discovered security issues on machines that haven’t installed the latest operating system and security updates.
- Instant Messaging Worms- Instant Messaging Worms spread by sending links to the contact list of instant messaging applications.
- File-sharing Networks Worms- File-sharing worms take advantage of the fact that file-sharers do not know exactly what they are downloading. It duplicates itself into a common envelope with an unassuming name. At the point when another client on the system downloads documents from the common envelope, they will unwittingly download the worm, which at that point duplicates itself and rehashes the procedure. In 2004, worms called “Phatbot” infected millions of computers in this way, and had the ability to steal personal information, including credit card details, and send spam on an unprecedented scale.