Type of Worms

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

-Autorun worms spread from USB/thumb drives as well as fixed and mapped drives.

Autorun worms typically drop or download additional malware, usually backdoors and
password stealers.

-The so-called Storm worm is actually not a worm, but rather a family of Trojans that
typically include a backdoor, SMTP relay, P2P communications, email harvester,
downloader, and often a rootkit. The Storm worm spreads via email, using a variety of
subject lines and message text that may masquerade as news articles or other current
events.

-The so-called "U.Z.A. O/S Eliminator" worm appears to have originated in Maldives
sometime in late July or early August 2007. The worm exploits the autorun feature,
enabling it to spread from removable USB/thumb drives to other computers.

-The Freedom 'virus' is a worm that infects local and USB drives, disables access to
Task Manager, Registry Editor and other system utilities, and may try to delete MP3
files found on infected systems. Here's how to clean it.

-MySpace users are yet again a victim of another targeted attack. Dubbed
JS_QSPACE.A by antivirus vendor Trend Micro and JS.Qspace by Symantec, the
Javascript worm exploits a cross-site scripting (XSS) vulnerability embedded in a
malicious Quicktime .MOV file.

-A mass-mailing email worm that also spreads via USB and thumb drives, the
Rontokbro worm - also know as Brontok - takes a multifacted approach to defy
detection and removal.

-Stration is a mass-mailing email worm that attempts to download a file from a remote
server. The worm may inject itself into certain running processes, potentially causing it
to bypass firewalls or other security software.

-An early-morning report on a security mailing list led to the discovery of Yamanner, a
mass-mailing email worm that impacted Yahoo webmail users.

-Hoot Worm Preys on Company


It seems a disgruntled employee targeted their enterprise with a worm that causes
pictures of a rather odd looking owl to print on nearly 40 printers specific to the targeted
firm.
-Nugache Worm
Nugache is a worm that may spread via email, IM, or P2P networks.
-Ransomware: Trojans demand money from victims
Having your computer infected with a virus or other malicious software is upsetting
enough. But over the past year, a new type of attack promises to be even more
disconcerting. Dubbed ransomware, this new attack infects the system, encrypts the
files, and then demands payment from its victims.
-Bagle worm variant warns: 'Lawsuit Against You'
Bagle worm variant that spreads via email and fileshares/P2P networks warns of
'Lawsuit Against You'
-Sober.X Worm Description
Sober.X is a mass-mailing email worm that sends itself in either English or German
depending on the recipient's domain. In addition to mass-mailing, Sober.X terminates
processes related to various antivirus and security programs.
-Slapper worm gets facelift: Linux Lupper worm, aka Plupi and Lupii
The Linux Slapper worm has been given a facelift and this time BBS admins and web
bloggers are the target. The new worm has been given a half dozen new names,
including Linux/Lupper worm Linux.Plupi, Backdoor.Linux.Smal, ELF_LUPPER.A and
Exploit.Linux.Lupii.
-Kelvir Instant Messenger (IM) worm
The most prevalent IM worm is Kelvir family of worms that target MSN Messenger
users.
-AIM worm impersonates iTunes app
IM worms continue to expand their repertoire of social engineering tricks. W32/Olameg-
net, a.k.a. Opanki.Y and AIM/Megalo, installs itself to the Windows System directory as
itunes.exe, presumably trying to disguise itself as the popular Apple iTunes application.
-Mytob.BI worm
Discovered May 31, 2005, Mytob.BI is a mass-mailing email worm that compromises
system security by terminating processes related to various antivirus software, disabling
the XP SP2 firewall, and modifying the HOSTS file to prevent access to antivirus
updates and certain other websites.
-Crog IM worm
The Crog worm edits the system registry to lower security settings, modifies the HOSTS
file to redirect access to various security sites and shuts down processes associated
with various security software.
-Kelvir IM worms
Three new IM worms, Kelvir.A, Kelvir.B, and Kelvir.C were discovered by antivirus
vendors on March 6th and 7th, 2005.
-Bagle.AY worm
Bagle.AY is a mass mailing email and P2P filesharing worm with backdoor and
downloader capabilites. As with previous variants and most modern email worms, the
worm uses its own SMTP engine to spread via email and the From address is spoofed.
CONFICKER C worm

Users of Microsoft computer products are being urged to take precautions to ensure their PCs do not fall victim
to the latest computer worm, which may damage unprotected computers anytime from tomorrow.
The Conficker C worm has already infected millions of computers worldwide but experts fear the hackers will
try to escalate the damage on 1 April.
This computer worm infiltrates your PC over the internet or by a USB connection. Once it is in your computer,
the Conficker C worm digs deep and tries to hide.
Its purpose remains a mystery.
Whoever designed it has instructed it to escalate its work on April Fools' Day. But computer experts say this is
not a joke.
Michael Conway of Renaissance Contingency Services says; 'We simply don't know what it is designed to do
yet. It may be asked to do things, take information on Credit Cards, take other information'.

Editor of PCLive! Niall Kitson says that anytime from tomorrow the Conficker Worm will change its mutation
and reach out to tens of thousands more computers telling them to contact a mainframe and await instructions.
'Microsoft are leading a consortium of experts who are trying to track down the people responsible for the
worm. There is a 250,000 dollar reward on offer for whoever can help bring these people to justice'.
Microsoft stresses the vast majority of users of its products will be already protected but there are three simple
rules to follow to combat the Conficker worm, according to Ronnie Dockery of Microsoft Ireland.
'Keep your Microsoft system operating with up to date security updates, use and implement your firewall, and
use a good anti virus product. Also use sophisticated passwords, and don't open e-mail attachments from
people you don't know'.

You might also like