- Computer worm
A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Many worms that have been created are only designed to spread, and don't attempt to alter the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload free" worms can cause major disruption by increasing network traffic and other unintended effects. A "payload" is code in the worm designed to do more than spread the worm–it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address. Spammers are therefore thought to be a source of funding for the creation of such worms, and the worm writers have been caught selling lists of IP addresses of infected machines. Others try to blackmail companies with threatened DoS attacks.
Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which spreads better using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005.[dubious ]
Worms with good intent
Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system–by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user.
Some worms, such as XSS worms, have been written for research to determine the factors of how worms spread, such as social activity and change in user behavior, while other worms are little more than a prank, such as one that sends the popular image macro of an owl with the phrase "O RLY?" to a print queue in the infected computer. Another research proposed what seems to be the first computer worm that operates on the second layer of the OSI model (Data link Layer), it utilizes topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.
Most security experts regard all worms as malware, whatever their payload or their writers' intentions.
Protecting against dangerous computer worms
Worms spread by exploiting vulnerabilities in operating systems. Vendors with security problems supply regular security updates (see "Patch Tuesday"), and if these are installed to a machine then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a Zero-day attack is possible.
Users need to be wary of opening unexpected email, and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running a malicious code.
Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.
In the April–June, 2008, issue of IEEE Transactions on Dependable and Secure Computing, computer scientists describe a potential new way to combat internet worms. The researchers discovered how to contain the kind of worm that scans the Internet randomly, looking for vulnerable hosts to infect. They found that the key is for software to monitor the number of scans that machines on a network sends out. When a machine starts sending out too many scans, it is a sign that it has been infected, allowing administrators to take it off line and check it for viruses.. In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer. 
- ACLs in routers and switches
- TCP Wrapper/libwrap enabled network service daemons
The actual term "worm"' was first used in John Brunner's 1975 novel, The Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it... There's never been a worm with that tough a head or that long a tail!"
On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting perhaps 10% of the computers then on the Internet and prompting the formation of the CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act.
- Computer surveillance
- Computer virus
- Helpful worm
- Timeline of notable computer viruses and worms
- Trojan horse (computing)
- XSS Worm
- ^ Ray, Tiernan (February 18, 2004). "Business & Technology: E-mail viruses blamed as spam rises sharply". The Seattle Times. http://seattletimes.nwsource.com/html/businesstechnology/2001859752_spamdoubles18.html.
- ^ McWilliams, Brian (October 9, 2003). "Cloaking Device Made for Spammers". Wired. http://www.wired.com/news/business/0,1367,60747,00.html.
- ^ "Unavailable". http://www.channelnewsasia.com/stories/afp_world/view/68810/1/.html.
- ^ "Uncovered: Trojans as Spam Robots". heise online. http://www.heise.de/english/newsticker/news/44879.
- ^ "Hacker threats to bookies probed". BBC News. February 23, 2004. http://news.bbc.co.uk/1/hi/technology/3513849.stm.
- ^ Al-Salloum, Z.; et al. (2010). "A Link-Layer-Based Self-Replicating Vulnerability Discovery Agent". ISCC 2010.. IEEE. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5546723
- ^ USN list | Ubuntu
- ^ Information on the Nimda Worm
- ^ Sellke, S. H.; Shroff, N. B.; Bagchi, S. (2008). "Modeling and Automated Containment of Worms". IEEE Transactions on Dependable and Secure Computing 5 (2): 71–86. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4509574&arnumber=4358715&count=10&index=3.
- ^ "A New Way to Protect Computer Networks from Internet Worms". Newswise. http://newswise.com/articles/view/541456/. Retrieved july 05 2011.
- ^ Moskovitch R., Elovici Y., Rokach L. (2008), Detection of unknown computer worms based on behavioral classification of the host, Computational Statistics and Data Analysis, 52(9):4544-4566, DOI 10.1016/j.csda.2008.01.028
- ^ Brunner, John (1975). The Shockwave Rider. New York: Ballantine Books. ISBN 0060105593.
- ^ "The Submarine". http://www.paulgraham.com/submarine.html#f4n.
- ^ During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the virus from each installation was in the range of $200–53,000. Possibly based on these numbers, Harvard spokesman Clifford Stoll estimated the total economic impact was between $100,000–10,000,000. "Bs2.com homepage". http://www.bs2.com/cvirus.htm#anchor111400. Retrieved 20 November 2010.
- ^ "Security of the Internet". CERT/CC. http://www.cert.org/encyc_article/tocencyc.html.
- ^ "Phage mailing list". securitydigest.org. http://securitydigest.org/phage/.
- ^ Dressler, J. (2007). "United States v. Morris". Cases and Materials on Criminal Law. St. Paul, MN: Thomson/West. ISBN 9780314177193.
- Vernalex.com's Malware Removal Guide – Guide for understanding, removing and preventing worm infections
- John Shoch, Jon Hupp "The "Worm" Programs – Early Experience with a Distributed Computation"
- The Case for Using Layered Defenses to Stop Worms
- Worm Evolution Paper from Digital Threat
Malware Infectious malware Concealment Malware for profit By operating system Protection Countermeasures
Wikimedia Foundation. 2010.
Look at other dictionaries:
computer worm — E com a computer virus that does not try to damage the files it infects. Its objective is instead to replicate itself as quickly and as often as possible. Computer worms are a major drain on the Internet because they clog up bandwidth … The ultimate business dictionary
Hybris (computer worm) — Computer virus | Fullname = W95/Hybris Common name = Hybris Technical name = W95/Hybris mm Aliases = Snow White, Hahaha Family = Hybris Classification = Worm Type = Mass mailer Subtype = Win32 worm IsolationDate = September 2001 Isolation =… … Wikipedia
Looksky (computer worm) — Computer virus | Fullname = Looksky Common name = Looksky Technical name = W32/Looksky mm (family) Family = Looksky Aliases = MultiDropper.Looksky Classification = Worm Type = Windows Subtype = E mail worm IsolationDate = October 2005 Isolation … Wikipedia
Zotob (computer worm) — The Zotob worm and several variations of it, known as Rbot.cbq, SDBot.bzh and Zotob.d, infected computers at companies such as ABC, CNN, The Associated Press, The New York Times, and Caterpillar Inc. mdash; Business Week, August 16, 2005.Zotob is … Wikipedia
Sasser (computer worm) — Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable network port (as do certain other worms).… … Wikipedia
Code Red (computer worm) — Code Red Type Server Jamming Worm The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft s IIS web server. The Code Red worm was first discovered and researched by eEye Digital… … Wikipedia
Witty (computer worm) — The Witty worm is a computer worm that attacks the firewall and other computer security products written by a particular company, Internet Security Systems (ISS). It was the first worm to take advantage of vulnerabilities in the very pieces of… … Wikipedia
WANK (computer worm) — The WANK Worm was a computer worm that attacked DEC VMS computers in 1989 over the DECnet.Political messageThe WANK worm had a distinct political message attached, and it was the first major worm to have a political message.Dreyfus, Suelette.… … Wikipedia
Blaster (computer worm) — The Blaster Worm (also known as Lovsan or Lovesan) was a computer worm that spread on computers running the Microsoft operating systems: Windows XP and Windows 2000, during August 2003. The worm was first noticed and started spreading on August… … Wikipedia
Sobig (computer worm) — The Sobig Worm was a computer worm that infected millions of Internet connected, Microsoft Windows computers in August 2003.Although there were indications that tests of the worm were carried out as early as August 2002, Sobig.A was first found… … Wikipedia