A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Many worms that have been created are only designed to spread, and don’t attempt to alter the systems they pass through. A “payload”, however, is code designed to do more than spread the worm it might delete files on a host system, encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a zombie (an Internet accessible computer compromised by a hacker) under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website’s address.
How Can You Detect Worms? Check for Worms with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Worms as well as a one-on-one tech support service.
Free SpyHunter Remover Details & Terms
There are currently 965 articles listed on worms.
|Name||Threat Level||Detection Count||Date|
|Email-Worm.Win32.Runouce.b||October 19, 2010|
|Email-Worm.Win32.Zhelatin.ml||9/10||0||March 16, 2011|
|Email-Worm.Win32/Tanatos.M||June 11, 2009|
|Email-Worm.Xanax||9/10||0||November 9, 2007|
|Email-Worm.Zafi||9/10||0||October 12, 2007|
|Emold Worm||November 1, 2010|
|Flame||August 14, 2012|
|Folstart||5/10||0||November 14, 2012|
|FUvirus.exe||July 21, 2009|
|Gaobot||9/10||0||August 23, 2008|
|Generic Dropper.xn||July 29, 2011|
|Generic.dx!sve||June 8, 2010|
|Graboid||October 17, 2019|
|H-Worm||September 7, 2015|
|HackTool.WebPhishing||April 28, 2010|
|Hary.A||5/10||0||April 19, 2012|
|Helkern Worm||July 16, 2009|
|HIDDENEXT/Worm.Gen||5/10||0||May 17, 2013|
|Honditost||May 10, 2011|
|I-Worm.Brontok.CJ||February 23, 2010|
|I-Worm.Chir.B||7/10||0||March 12, 2010|
|I-Worm.Generic||June 6, 2008|
|I-Worm.Netsky.Q1||May 6, 2010|
|IM Worm.Win32.Sohanad.bm||April 20, 2011|
|IM-Worm.Win32.Agent.mg||January 21, 2010|