Professional Documents
Culture Documents
Type of Worms
Type of Worms
Type of Worms
Autorun worms typically drop or download additional malware, usually backdoors and
password stealers.
-The so-called Storm worm is actually not a worm, but rather a family of Trojans that
typically include a backdoor, SMTP relay, P2P communications, email harvester,
downloader, and often a rootkit. The Storm worm spreads via email, using a variety of
subject lines and message text that may masquerade as news articles or other current
events.
-The so-called "U.Z.A. O/S Eliminator" worm appears to have originated in Maldives
sometime in late July or early August 2007. The worm exploits the autorun feature,
enabling it to spread from removable USB/thumb drives to other computers.
-The Freedom 'virus' is a worm that infects local and USB drives, disables access to
Task Manager, Registry Editor and other system utilities, and may try to delete MP3
files found on infected systems. Here's how to clean it.
-MySpace users are yet again a victim of another targeted attack. Dubbed
JS_QSPACE.A by antivirus vendor Trend Micro and JS.Qspace by Symantec, the
Javascript worm exploits a cross-site scripting (XSS) vulnerability embedded in a
malicious Quicktime .MOV file.
-A mass-mailing email worm that also spreads via USB and thumb drives, the
Rontokbro worm - also know as Brontok - takes a multifacted approach to defy
detection and removal.
-Stration is a mass-mailing email worm that attempts to download a file from a remote
server. The worm may inject itself into certain running processes, potentially causing it
to bypass firewalls or other security software.
-An early-morning report on a security mailing list led to the discovery of Yamanner, a
mass-mailing email worm that impacted Yahoo webmail users.
Users of Microsoft computer products are being urged to take precautions to ensure their PCs do not fall victim
to the latest computer worm, which may damage unprotected computers anytime from tomorrow.
The Conficker C worm has already infected millions of computers worldwide but experts fear the hackers will
try to escalate the damage on 1 April.
This computer worm infiltrates your PC over the internet or by a USB connection. Once it is in your computer,
the Conficker C worm digs deep and tries to hide.
Its purpose remains a mystery.
Whoever designed it has instructed it to escalate its work on April Fools' Day. But computer experts say this is
not a joke.
Michael Conway of Renaissance Contingency Services says; 'We simply don't know what it is designed to do
yet. It may be asked to do things, take information on Credit Cards, take other information'.
Editor of PCLive! Niall Kitson says that anytime from tomorrow the Conficker Worm will change its mutation
and reach out to tens of thousands more computers telling them to contact a mainframe and await instructions.
'Microsoft are leading a consortium of experts who are trying to track down the people responsible for the
worm. There is a 250,000 dollar reward on offer for whoever can help bring these people to justice'.
Microsoft stresses the vast majority of users of its products will be already protected but there are three simple
rules to follow to combat the Conficker worm, according to Ronnie Dockery of Microsoft Ireland.
'Keep your Microsoft system operating with up to date security updates, use and implement your firewall, and
use a good anti virus product. Also use sophisticated passwords, and don't open e-mail attachments from
people you don't know'.