A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Many worms that have been created are only designed to spread, and don’t attempt to alter the systems they pass through. A “payload”, however, is code designed to do more than spread the worm it might delete files on a host system, encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a zombie (an Internet accessible computer compromised by a hacker) under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website’s address.
How Can You Detect Worms? Check for Worms with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Worms as well as a one-on-one tech support service.
Free SpyHunter Remover Details & Terms
There are currently 965 articles listed on worms.
|Name||Threat Level||Detection Count||Date|
|Koobface.LP||5/10||0||November 15, 2012|
|Lily Jade||8/10||0||May 29, 2012|
|M32/Blaster.worm||May 10, 2011|
|Mal/AutoInf-A||August 12, 2009|
|Mal/Bifrose-Z||May 25, 2010|
|Mal/Emogen-I||May 5, 2011|
|Mal/EncPk-ALC||5/10||0||August 1, 2013|
|Mal/EncPk-MX||December 1, 2009|
|Mal/EncPk-OJ||June 25, 2010|
|Mal/OLE2SC-A||July 2, 2010|
|Mal/Palevo-A||5/10||0||December 7, 2011|
|Mal/SillyFDC-G||September 2, 2010|
|Mal/SillyFDC-Z||5/10||0||November 30, 2012|
|Mal/VB-BL||May 27, 2010|
|Mal/VB-CG||5/10||1||July 22, 2010|
|Mal/Zbot-U||May 25, 2010|
|Malware.Changeup||5/10||0||January 8, 2010|
|Malware.Dotex||9/10||0||March 15, 2010|
|Malware.Drowor||July 14, 2010|
|Malware.Gammima||December 18, 2009|
|Malware.Gammima!rem||December 14, 2010|
|Malware.Harakit||November 9, 2009|
|Malware.Harakit!rem||October 8, 2010|
|Malware.Imaut||February 18, 2010|
|Malware.Imaut.B!rem||9/10||0||January 14, 2011|