They may not be as destructive as computer viruses, but computer worms can be just as dangerous. A computer worm is a malicious component that reproduces itself from one computer to another, in order to take over the entire computer network. Most worms are designed to infiltrate systems by exploiting security weaknesses, and a few also try to change system settings. Even if they don’t, they are still very dangerous as they take up a lot of bandwidth and other valuable resources.

If the worm is malicious and is not only used to breach system security, the code designed to carry out the attack is called payload. Payloads are typically created to change or delete files from the attacked network, extract or encrypt personal information, and demand ransom from the victim.

Despite the fact that many people use the two terms interchangeably, computer worms are not the same as computer viruses.

Types of computer worms

▸File Sharing Worms

Although it is illegal, sharing and transferring files between users is still in use among millions of people around the world. By doing this, you are unconsciously exposing your computers to the threat of file-sharing worms. As with email and instant messaging worms, these programs are disguised as multimedia files with double extensions.

▸Email Worms

The most common way to distribute email worms is through dangerous email attachments. They usually have double extensions so that the receiver thinks they are multimedia files and not malicious programs. When victims click on the attachment, copies of the same infected file will automatically be sent to the addresses in their contact list.

▸Internet worms

As they do with computer networks, computer worms also attack popular web pages that are insufficiently secure. When they manage to infect the page, the computer worms can reproduce on any computer that is being used to access the page in question. From there, the computer worms spread to other computers connected via the internet and local area connections.

▸IRC worms

As with the instant messaging platforms of our time, computer worms spread through messages containing links and attachments. The latter was less effective due to an extra layer of protection that required users to accept incoming files before any transfer could occur.

▸Instant Messaging Worms

Instant messaging worms are exactly the same as email worms, the only difference being the way they spread. Again, they are hidden in the form of attachments or links to web pages. They are often accompanied by short “You have to see this!” to fool the victim.


Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *