• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / infosec / What are Internet Worms and why are they so dangerous?

What are Internet Worms and why are they so dangerous?

30/06/2020 10:24 by Anastasis Vasileiadis

We no longer hear much about internet worms, but they are still an important part of system malware.

But what are worms, how do they spread and how are they used by hackers?worm - What are Internet Worms and why are they so dangerous?

 

Internet worms are spreading like parasites in the real world

Worms, unlike viruses or trojans, exploit a computer's pre-existing security vulnerabilities at the operating system level. Worms are also standalone software or files and are usually spread over a network of computers (for example, your home or work network), rather than through software downloads.

The operation of an Internet Worm is similar to that of a real parasite. An internet worm replicates itself on as many servers as possible without attempting to cause any serious damage.

A worm will not corrupt your files or your computer. A Worm will slow down a computer or network by absorbing hardware resources or Internet bandwidth.

However, some Worms carry malicious payloads (code that makes your computer vulnerable to other malicious programs). As Worms can be quietly (and safely) replicated on networks, they do a great job of large-scale virus attacks or ransomware attacks  in governments and businesses.

Modern Internet Worms usually carry payloads

By themselves, Worms are mostly harmless. Sure, they slow down computers and turn high-speed networks into slow ones, but compared to viruses that destroy files and ransomware causing damage of hundreds of thousands of dollars , Worms are absolutely nothing. This happens unless Worm has a payload.

Rarely do hackers create worms without payload. Remember, worms target system vulnerabilities. In the age of frequent software updates, these vulnerabilities change every week. Now, when a hacker spreads a worm, tech companies know there is an operating system vulnerability. Once technology companies detect the worm through internal tests or reports from antivirus companies, they respond immediately by repairing the vulnerability that strikes the worm.

So instead of wasting a very good system vulnerability on a worm, modern hackers focus their efforts on large-scale payloads attacks. The Mydoom Worm 2004, for example, contained a payload RAT, which allowed hackers to gain access to infected computers remotely. As the worms spread over networks, hackers gained access to many different computers and used that access to launch DDOS attacks on their website. SCO Group .

In the past, when system vulnerabilities were high and updates were rare, worms without any payload prevailed. These worms were easy to set up even by novice hackers and usually just slow down the computers to frustrate the average user.

And while some of these worms like Worm Morris , created to raise awareness of software vulnerabilities, have had the unintended effect of slowing down computers.

Worms are easy to avoid

Theoretically, worms should be harder to avoid than most other malware.

Worms can move through a network without your knowledge, and viruses and trojans must be downloaded manually on a computer. Due to frequent system updates and built-in antivirus software, you do not have to worry too much about worms.

Just update your operating system and antivirus program (enable automatic updates) and you will be fine. If you are still using Windows XP, Windows 7  who no longer receive new updates you may have a problem!

You can get a worm by downloading some software or even opening an infected email attachment. If you want to protect yourself from malware (including worms), do not download files or open email attachments from sources you do not trust.

Use Anti-Virus to protect and secure your computer

Windows computers have trusted Windows Defender antivirus software. It may automatically scan your computer for viruses, but it's worth running manually to make sure.

Sure, hackers can create malware that bypasses antivirus software, but they rarely waste this malware on small companies and individuals. Dangerous payload worms are usually intended for large companies, governments and wealthy entrepreneurs. If an antivirus program does not detect worms, then you are probably not at risk.

What are Internet Worms and why are they so dangerous? was last modified: 23 January, 2021, 10: 04 mm by Anastasis Vasileiadis

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: infosectag: Internet Worms, worms, worms

You May Also Like

Google Play Protect is finally protected on Android
Presentation of Bitdefender Internet Security 2016
The winners of the Comodo Internet Security Pro 2015 contest

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « Edge Microsoft Edge: why import data from other browsers?
Next Post: Is it safe to preview your email? email the best hosting providers (without affil links) »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.