Computer worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue.[2] Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time.[3] Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects.
History
The term "worm" was first used in
The second ever computer worm was devised to be an anti-virus software. Named
On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting many computers then on the Internet, guessed at the time to be one tenth of all those connected.[5] During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the worm from each installation at between $200 and $53,000; this work prompted the formation of the CERT Coordination Center[6] and Phage mailing list.[7] Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act.[8]
Conficker, a computer worm discovered in 2008 that primarily targeted Microsoft Windows operating systems, is a worm that employs 3 different spreading strategies: local probing, neighborhood probing, and global probing.[9] This worm was considered a hybrid epidemic and affected millions of computers. The term "hybrid epidemic" is used because of the three separate methods it employed to spread, which was discovered through code analysis.[10]
Features
Independence
Computer viruses generally require a host program.[11] The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks.[12][13]
Exploit attacks
Because a worm is not limited by the host program, worms can take advantage of various operating system vulnerabilities to carry out active attacks. For example, the "Nimda" virus exploits vulnerabilities to attack.
Complexity
Some worms are combined with web page scripts, and are hidden in HTML pages using VBScript, ActiveX and other technologies. When a user accesses a webpage containing a virus, the virus automatically resides in memory and waits to be triggered. There are also some worms that are combined with backdoor programs or Trojan horses, such as "Code Red".[14]
Contagiousness
Worms are more infectious than traditional viruses. They not only infect local computers, but also all servers and clients on the network based on the local computer. Worms can easily spread through
Harm
Any code designed to do more than spread the worm is typically referred to as the "
Some worms may install a
Some special worms attack industrial systems in a targeted manner.
Countermeasures
Worms spread by exploiting vulnerabilities in operating systems.
Vendors with security problems supply regular security updates
Users need to be wary of opening unexpected email,[24][25] and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running malicious code.
Users can minimize the threat posed by worms by keeping their computers' operating system and other software up to date, avoiding opening unrecognized or unexpected emails and running firewall and antivirus software.[26]
Mitigation techniques include:
- Packet-filters
- daemons
- EPP/EDRsoftware
- Nullroute
Infections can sometimes be detected by their behavior - typically scanning the Internet randomly, looking for vulnerable hosts to infect.[27][28] In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.[29]
Worms with good intent
A helpful worm or anti-worm is a worm designed to do something that its author feels is helpful, though not necessarily with the permission of the executing computer's owner. Beginning with the first research into worms at
One study proposed the first computer worm that operates on the second layer of the OSI model (Data link Layer), utilizing topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.[33]
Anti-worms have been used to combat the effects of the
Other examples of helpful worms are "Den_Zuko", "Cheeze", "CodeGreen", and "Millenium".[35]
Art worms support artists in the performance of massive scale ephemeral artworks. It turns the infected computers into nodes that contribute to the artwork.[36]
See also
- List of computer worms
- BlueKeep
- Botnet
- Code Shikara (Worm)
- Computer and network surveillance
- Computer virus
- Computer security
- Email spam
- Father Christmas (computer worm)
- Self-replicating machine
- Technical support scam – unsolicited phone calls from a fake "tech support" person, claiming that the computer has a virus or other problems
- Timeline of computer viruses and worms
- Trojan horse (computing)
- Worm memory test
- XSS worm
- Zombie (computer science)
References
- ^ Barwise, Mike. "What is an internet worm?". BBC. Archived from the original on 2015-03-24. Retrieved 9 September 2010.
- PMID 25978309.
- PMID 22711861.
- ^ ISBN 978-0-06-010559-4.
- ^ "The Submarine". www.paulgraham.com.
- ^ "Security of the Internet". CERT/CC.
- ^ "Phage mailing list". securitydigest.org. Archived from the original on 2011-07-26. Retrieved 2014-09-17.
- ISBN 978-0-314-17719-3.
- PMID 25978309.
- PMID 25978309.
- ^ "Worm vs. Virus: What's the Difference and Does It Matter?". Worm vs. Virus: What's the Difference and Does It Matter?. Retrieved 2021-10-08.
- OCLC 897634290.
- S2CID 2242419.
- ISBN 978-3-319-56972-7
- S2CID 243976629.
- S2CID 15572850.
- ^ Ray, Tiernan (February 18, 2004). "Business & Technology: E-mail viruses blamed as spam rises sharply". The Seattle Times. Archived from the original on August 26, 2012. Retrieved May 18, 2007.
- ^ McWilliams, Brian (October 9, 2003). "Cloaking Device Made for Spammers". Wired.
- ^ "Hacker threats to bookies probed". BBC News. February 23, 2004.
- S2CID 154754335.
- S2CID 154019562.
- ISBN 978-94-6252-012-7.
- ^ "USN list". Ubuntu. Retrieved 2012-06-10.
- ^ "Threat Description Email-Worm". Archived from the original on 2018-01-16. Retrieved 2018-12-25.
- ^ "Email-Worm:VBS/LoveLetter Description | F-Secure Labs". www.f-secure.com.
- ^ "Computer Worm Information and Removal Steps". Veracode. 2014-02-02. Retrieved 2015-04-04.
- .
- ^ "A New Way to Protect Computer Networks from Internet Worms". Newswise. Retrieved July 5, 2011.
- S2CID 1097834.
- S2CID 1639205.
- ^ "Virus alert about the Nachi worm". Microsoft.
- ^ "Root My Roku". GitHub.
- S2CID 3260588.
- ^ "vnunet.com 'Anti-worms' fight off Code Red threat". Sep 14, 2001. Archived from the original on 2001-09-14.
- ^ a b c The Welchia Worm. December 18, 2003. p. 1. Retrieved 9 June 2014.
- ^ Aycock, John (2022-09-15). "Painting the Internet". Leonardo. 42 (2): 112–113 – via MUSE.
External links
- Malware Guide (archived link) – Guide for understanding, removing and preventing worm infections on Vernalex.com.
- "The 'Worm' Programs – Early Experience with a Distributed Computation", John Shoch and Jon Hupp, Communications of the ACM, Volume 25 Issue 3 (March 1982), pp. 172–180.
- "The Case for Using Layered Defenses to Stop Worms", Unclassified report from the U.S. National Security Agency (NSA), 18 June 2004.
- Worm Evolution (archived link), paper by Jago Maniscalchi on Digital Threat, 31 May 2009.