A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Many worms that have been created are only designed to spread, and don’t attempt to alter the systems they pass through. A “payload”, however, is code designed to do more than spread the worm it might delete files on a host system, encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a zombie (an Internet accessible computer compromised by a hacker) under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website’s address.
How Can You Detect Worms? Check for Worms with SpyHunter!SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Worms as well as a one-on-one tech support service. Download SpyHunter’s Malware Scanner
to Detect Worms.
There are 788 articles listed on worms.
|Name||Threat Level||Detection Count||Date|
|'U.Z.A. Operating System' Wallpaper||November 17, 2011|
|ACAD/Medre.A||5/10||June 22, 2012|
|ALS.Kenilfe!inf||February 28, 2011|
|Artemis!DD51CDCC10D0||June 8, 2010|
|Autoit.Obfus||9/10||224||September 23, 2009|
|AutoIt/Renocide||5/10||43||December 3, 2010|
|AutoRun.AEC||9/10||11||January 15, 2010|
|Av.exe||March 9, 2010|
|Backdoor.Poebot.AL||8/10||11||November 26, 2010|
|Backdoor.SpyBoter||December 9, 2009|
|BD.Raptra||December 2, 2009|
|Bizex||January 9, 2012|
|Blackout||December 29, 2010|
|Bloodhound.W32.1||9/10||331||December 8, 2009|
|Bofra.A||9/10||May 13, 2009|
|BOO/Whistler.A||5/10||October 31, 2011|
|Brambul||May 9, 2019|
|BrowserModifier.SearchV||2/10||January 7, 2010|
|Conficker||9/10||January 24, 2014|
|Conficker A/B||May 31, 2010|
|Conficker B++||5/10||761||July 10, 2009|
|Conficker.C||5/10||92||June 24, 2009|
|Conficker.e||May 21, 2009|
|Corrupt-EP||July 28, 2010|
|Cridex-B||February 7, 2012|
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9