"The Zotob worm and several variations of it, known as Rbot.cbq, SDBot.bzh and Zotob.d, infected computers at companies such as ABC , CNN , The Associated Press , The New York Times , and Caterpillar Inc. " — Business Week , August 16, 2005.
30-720: Zotob is a computer worm which exploits security vulnerabilities in Microsoft operating systems like Windows 2000 , including the MS05-039 plug-and-play vulnerability. This worm has been known to spread on Microsoft-ds or TCP port 445. It was declared that the Zotob worms cost an average of $ 97,000 as well as 80 hours of cleanup per company affected. Zotob was derived from the Rbot worm. Rbot can force an infected computer to continuously restart . Its outbreak on August 16, 2005,
60-565: A Cornell University computer science graduate student, unleashed what became known as the Morris worm , disrupting many computers then on the Internet, guessed at the time to be one tenth of all those connected. During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the worm from each installation at between $ 200 and $ 53,000; this work prompted the formation of
90-478: A computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting
120-623: A host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program , but can run independently and actively carry out attacks. Exploit attacks Because a worm is not limited by the host program, worms can take advantage of various operating system vulnerabilities to carry out active attacks. For example, the " Nimda " virus exploits vulnerabilities to attack. Complexity Some worms are combined with web page scripts, and are hidden in HTML pages using VBScript , ActiveX and other technologies. When
150-457: A large number of vulnerabilities in the network. Any code designed to do more than spread the worm is typically referred to as the " payload ". Typical malicious payloads might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a ransomware attack, or exfiltrate data such as confidential documents or passwords. Some worms may install a backdoor . This allows
180-524: A machine, then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a zero-day attack is possible. Users need to be wary of opening unexpected emails, and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick
210-540: A major corporation, which would shunt itself from one nexus to another every time his credit-code was punched into a keyboard. It could take days to kill a worm like that, and sometimes weeks." The second ever computer worm was devised to be an anti-virus software. Named Reaper , it was created by Ray Tomlinson to replicate itself across the ARPANET and delete the experimental Creeper program (the first computer worm, 1971). On November 2, 1988, Robert Tappan Morris ,
240-514: A user accesses a webpage containing a virus, the virus automatically resides in memory and waits to be triggered. There are also some worms that are combined with backdoor programs or Trojan horses , such as " Code Red ". Contagiousness Worms are more infectious than traditional viruses. They not only infect local computers, but also all servers and clients on the network based on the local computer. Worms can easily spread through shared folders , e-mails , malicious web pages, and servers with
270-481: The CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act . Conficker , a computer worm discovered in 2008 that primarily targeted Microsoft Windows operating systems, is a worm that employs three different spreading strategies: local probing, neighborhood probing, and global probing. This worm
300-550: The Ethernet principles on their network of Xerox Alto computers. Similarly, the Nachi family of worms tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without
330-528: The Morris worm and Mydoom showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects. The term "worm" was first used in this sense in John Brunner 's 1975 novel, The Shockwave Rider . In the novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have
SECTION 10
#1732798167800360-538: The Internet randomly, looking for vulnerable hosts to infect. In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer. A helpful worm or anti-worm is a worm designed to do something that its author feels is helpful, though not necessarily with the permission of the executing computer's owner. Beginning with the first research into worms at Xerox PARC , there have been attempts to create useful worms. Those worms allowed John Shoch and Jon Hupp to test
390-406: The advantages of exponential growth , thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth , whereas viruses almost always corrupt or modify files on a targeted computer. Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as
420-413: The biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it. There's never been a worm with that tough a head or that long a tail!" "Then the answer dawned on him, and he almost laughed. Fluckner had resorted to one of the oldest tricks in the store and turned loose in the continental net a self-perpetuating tapeworm, probably headed by a denunciation group "borrowed" from
450-460: The code. " He says it's all about making money, and that he doesn't care if people remove the worm because it's the spyware stuff that he installs that's making him the money, Taylor said in a conversation with me." On August 30, 2005, controversial reports emerged from different anti-virus firms. Sophos declared that several people had access to the Mytob source code (a variant of the worm). On
480-463: The computer to be remotely controlled by the worm author as a " zombie ". Networks of such machines are often referred to as botnets and are very commonly used for a range of malicious purposes, including sending spam or performing DoS attacks. Some special worms attack industrial systems in a targeted manner. Stuxnet was primarily transmitted through LANs and infected thumb-drives, as its targets were never connected to untrusted networks, like
510-436: The consent of the computer's owner or user. Regardless of their payload or their writers' intentions, security experts regard all worms as malware . Another example of this approach is Roku OS patching a bug allowing for Roku OS to be rooted via an update to their screensaver channels, which the screensaver would attempt to connect to the telnet and patch the device. One study proposed the first computer worm that operates on
540-508: The embedded programmable logic controllers of industrial machines. Although these systems operate independently from the network, if the operator inserts a virus-infected drive into the system's USB interface, the virus will be able to gain control of the system without any other operational requirements or prompts. Worms spread by exploiting vulnerabilities in operating systems. Vendors with security problems supply regular security updates (see " Patch Tuesday "), and if these are installed to
570-551: The end-user into running malicious code. Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended. Users can minimize the threat posed by worms by keeping their computers' operating system and other software up to date, avoiding opening unrecognized or unexpected emails and running firewall and antivirus software. Mitigation techniques include: Infections can sometimes be detected by their behavior - typically scanning
600-633: The internet. This virus can destroy the core production control computer software used by chemical, power generation and power transmission companies in various countries around the world - in Stuxnet's case, Iran, Indonesia and India were hardest hit - it was used to "issue orders" to other equipment in the factory, and to hide those commands from being detected. Stuxnet used multiple vulnerabilities and four different zero-day exploits (e.g.: [1] ) in Windows systems and Siemens SIMATICWinCC systems to attack
630-462: The men behind the worm's coding. A signature in the Zotob worm code suggested it was coded by Diabl0 and the IRC server it connects to is the same used in previous version of Mytob. Diabl0 is believed to have incorporated the code of a Russian nicknamed houseofdabus whose journal has been shut down by authorities, just after the arrest of Diabl0. The coder (Ekici) probably paid Diabl0 (Essebar) to write
SECTION 20
#1732798167800660-423: The other hand, F-Secure declared that it has found multiple variants of Mytob that were coded after the arrest of Essebar. Those declarations suggest that Essebar is only a part of a larger group of Dark-side hackers behind the spread of the malware . Computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses
690-400: The performance of massive scale ephemeral artworks. It turns the infected computers into nodes that contribute to the artwork. Reaper (program) Creeper was the first computer worm , while Reaper was the first antivirus software, designed to eliminate Creeper. Creeper was an experimental computer program written by Bob Thomas at BBN in 1971. Its original iteration
720-507: The project, and Tomlinson needed permission to run the program on their machines. In an interview, Tomlinson also stated that there were no unintended effects from running the program. Reaper was the first anti-virus software, designed to delete Creeper by moving across the ARPANET . It was created by Tomlinson in 1972. The conflict between Creeper and Reaper served as inspiration for the programming game Core War , while fictionalized versions of Reaper have been used as antagonists in
750-509: The same deficiencies exploited by the Blaster worm , Welchia infected computers and automatically began downloading Microsoft security updates for Windows without the users' consent. Welchia automatically reboots the computers it infects after installing the updates. One of these updates was the patch that fixed the exploit. Other examples of helpful worms are "Den_Zuko", "Cheeze", "CodeGreen", and "Millenium". Art worms support artists in
780-527: The second layer of the OSI model (Data link Layer), utilizing topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered. Anti-worms have been used to combat the effects of the Code Red , Blaster , and Santy worms. Welchia is an example of a helpful worm. Utilizing
810-452: Was considered a hybrid epidemic and affected millions of computers. The term "hybrid epidemic" is used because of the three separate methods it employed to spread, which was discovered through code analysis. Independence Computer viruses generally require a host program. The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A worm does not need
840-525: Was covered "live" on CNN television, as the network's own computers got infected. Zotob would self-replicate each time the computer rebooted, resulting in each computer having numerous copies of the file by the time it was purged. This is similar to the Blaster (Lovesan) worm. On August 26, 2005, Farid Essebar and Atilla Ekici were arrested in Morocco and Turkey , respectively. They are believed to be
870-529: Was designed to move between DEC PDP-10 mainframe computers running the TENEX operating system using the ARPANET , with a later version by Ray Tomlinson designed to copy itself between computers rather than simply move. This self-replicating version of Creeper is generally accepted to be the first computer worm . Creeper was a test created to demonstrate the possibility of a self-replicating computer program that could spread to other computers. The program
900-486: Was not actively malicious software as it caused no damage to data, the only effect being a message it output to the teletype reading "I'M THE CREEPER : CATCH ME IF YOU CAN" Creeper had a minimal impact on the computers it infected. No more than 28 machines could have been infected, as that was the number of machines running the TENEX operating system on ARPANET. The operators of the machines were also collaborators in
#799200