A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Many worms that have been created are only designed to spread, and don’t attempt to alter the systems they pass through. A “payload”, however, is code designed to do more than spread the worm it might delete files on a host system, encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a zombie (an Internet accessible computer compromised by a hacker) under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website’s address.
How Can You Detect Worms? Check for Worms with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Worms as well as a one-on-one tech support service.Download SpyHunter's Malware Scanner to Detect Worms
There are currently 962 articles listed on worms.
|Name||Threat Level||Detection Count||Date|
|'U.Z.A. Operating System' Wallpaper||March 19, 2009|
|ACAD/Medre.A||5/10||0||June 22, 2012|
|ALS.Kenilfe!inf||February 28, 2011|
|Artemis!DD51CDCC10D0||June 8, 2010|
|Autoit.Obfus||9/10||2||September 23, 2009|
|AutoIt/Renocide||5/10||0||December 3, 2010|
|AutoRun.AEC||9/10||0||January 15, 2010|
|Av.exe||March 8, 2010|
|Backdoor.Agobot.lo||8/10||0||July 24, 2009|
|Backdoor.Agobot.s||8/10||0||July 24, 2009|
|Backdoor.Agobot.wk||8/10||0||July 24, 2009|
|Backdoor.Agobot.y||8/10||0||July 24, 2009|
|Backdoor.Poebot.AL||8/10||0||November 26, 2010|
|Backdoor.SpyBoter||December 9, 2009|
|BD.Raptra||December 2, 2009|
|Bizex||January 9, 2012|
|Blackout||December 29, 2010|
|Bloodhound.W32.1||9/10||22||December 4, 2009|
|Bofra.A||9/10||0||August 17, 2007|
|BOO/Whistler.A||5/10||1||October 31, 2011|
|Brambul||May 9, 2019|
|BrowserModifier.SearchV||2/10||0||December 24, 2009|
|Conficker||9/10||7||January 27, 2009|
|Conficker A/B||May 31, 2010|
|Conficker B++||5/10||123||February 21, 2009|