A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Many worms that have been created are only designed to spread, and don’t attempt to alter the systems they pass through. A “payload”, however, is code designed to do more than spread the worm it might delete files on a host system, encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a zombie (an Internet accessible computer compromised by a hacker) under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website’s address.
How Can You Detect Worms? Check for Worms with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Worms as well as a one-on-one tech support service.
Free SpyHunter Remover Details & Terms
There are currently 965 articles listed on worms.
|Name||Threat Level||Detection Count||Date|
|IM-Worm.Win32.Kelvir.k||July 6, 2011|
|IM-Worm.Win32.Sohanad.as||9/10||10||July 2, 2010|
|IM-Worm.Win32.Sohanad.qc||9/10||28||March 22, 2011|
|IM-Worm.Win32.Sohanad.qi||5/10||0||September 7, 2011|
|IM-Worm.Win32.Sohanad.qr||February 25, 2011|
|IM-Worm.Win32.VB.bn||January 12, 2010|
|IM-Worm.Win32.XorBot.a||8/10||122||February 7, 2011|
|IM-Worm.Win32.Yahos||December 13, 2010|
|IM-Worm.Win32.Yahos.hb||March 22, 2011|
|IM-Worm.Win32.Yahos.hh||February 22, 2011|
|IM-Worm.Win32.Zeroll.g||August 12, 2011|
|IM-Worm.Win32.Zeroll.i||8/10||281||October 15, 2010|
|IM.Worm.VB.as||9/10||0||January 11, 2010|
|Imbot.AC||5/10||0||July 26, 2012|
|Invitation Card.zip||June 29, 2009|
|IRC-Worm.DOS.Loa||April 15, 2011|
|IRC-Worm.Fagot||5/10||452||December 8, 2011|
|IRC-Worm.Navidad||September 19, 2011|
|Java.Cogyeka||5/10||0||July 9, 2012|
|JS.Brapps||2/10||51||July 1, 2013|
|JS.Phremous||5/10||0||May 2, 2012|
|Kepsy||5/10||0||January 30, 2013|
|Kido||May 10, 2010|
|Koobface||5/10||24||March 3, 2009|
|Koobface.C||9/10||0||July 20, 2009|