Haramaya University: Institute of Technology
Haramaya University: Institute of Technology
Haramaya University: Institute of Technology
INSTITUTE OF TECHNOLOGY
Computer Stream
worm
name id
Kaleb Adamu 1304/09
Submitted to MR wehib.A
DATE:4/14/2021
WORMS Definition
A computer worm is a malicious piece of software that replicates itself from one computer to another with the goal of
overtaking the entire network of computers . If a worm is indeed malicious and not just used to breach the system security,
the code designed to carry out the attack is referred to as the payload. Payloads are usually created to change or delete files
on a target network, extract personal data from them, or encrypt them and seek a ransom from the victim.
Types of Computer Worms
1. Internet Worms
These computer worms target popular websites with insufficient security. When they manage to infect the
site, internet worms can replicate themselves onto any computer being used to access the website in
question.
2. Email Worms
Email worms are most often distributed via compromised email attachments. They usually have double
extensions (for example, .mp4.exe or .avi.exe) so that the recipient would think that they are media files and
not malicious computer programs. When the victims click on the attachment, copies of the same infected file
will automatically be sent to addresses from their contacts list.
3. Instant Messaging Worms
Instant messaging worms are exactly the same as email worms, the only difference is , they are masked as
attachments or clickable links to websites. They are often accompanied by short messages like “LOL” or
“You have to see this!” to trick the victim into thinking that their friend is sending them a funny video to
look at.
4. File-Sharing Worms
these programs are disguised as media files with dual extensions.
When the victim opens the downloaded file they will download the worm to their computer. Even if it
seems that users have downloaded an actual playable media file, an executable malicious file could be
hidden in the folder and discreetly installed when the media file is first opened.
5. IRC Worms
Internet Relay Chat (IRC) is a messaging app that is mostly outdated nowadays but was all the rage at the
turn of the century. Same as with today’s instant messaging platforms, computer worms were distributed via
messages containing links and attachments. The latter was less effective due to an extra layer of protection
that prompted users to accept incoming files before any transfer could take place.
Harmful Effects of Computer Worms
worm can send email using an address book stored on the computer and it can inconspicuously open TCP
ports to create holes in your security so they can bypass your firewall and infect any other computer that
your computer communicates with.phishing emails while very few also try to change the system settings .it
also cause harm to their host networks by consuming bandwidth and overloading web servers.Computer
worms can also contain “payloads” that damage host computers. . Payloads are commonly designed to steal
data or delete files. Some payloads even create backdoors in host computers that allow them to be controlled
by other computers.
signature of worm
Freezing/crashing , Slow computer performance
Irregular web browser performance , Programs opening and running automatically
Missing/modified files
Appearance of strange/unintended desktop files or icons
Operating system errors and system error messages
Emails sent to contacts without the user’s knowledge