Revision as of 20:47, 10 July 2006 edit63.85.72.242 (talk)No edit summary← Previous edit | Latest revision as of 14:45, 15 November 2024 edit undoBmju (talk | contribs)Extended confirmed users627 edits Undid revision 1257526771 by 89.197.85.202 (talk)Tag: Undo | ||
Line 1: | Line 1: | ||
{{Short description|Self-replicating malware program}} | |||
A '''computer worm''' is a self-replicating ] similar to a ]. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself. They are often designed to exploit the file ] capabilities found on many computers. The main difference between a ] and a worm is that a virus cannot propagate by itself whereas worms can. A worm uses a network to send copies of itself to other systems and it does so without any intervention. In general, worms harm the network and consume bandwidth, whereas viruses infect or corrupt files on a targeted computer. Viruses generally do not affect network performance, as their malicious activities are mostly confined within the target computer itself. | |||
{{about|coding of a worm|the data storage device|write once read many|other uses|Worm (disambiguation)}} | |||
{{distinguish|Computer virus}} | |||
{{pp-move}} | |||
] of the ], showing a message left for ] ] ] by the worm's creator]] | |||
]]] | |||
A '''computer worm''' is a standalone ] ] that replicates itself in order to spread to other computers.<ref>{{cite web|last=Barwise|first=Mike|title=What is an internet worm?|url=http://www.bbc.co.uk/webwise/guides/internet-worms|publisher=BBC|access-date=9 September 2010|archive-url=https://web.archive.org/web/20150324073759/http://www.bbc.co.uk/webwise/guides/internet-worms|archive-date=2015-03-24}}</ref> It often uses a ] to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue.<ref>{{Cite journal|last1=Zhang|first1=Changwang|last2=Zhou|first2=Shi|last3=Chain|first3=Benjamin M.|date=2015-05-15|title=Hybrid Epidemics—A Case Study on Computer Worm Conficker|journal=PLOS ONE|volume=10|issue=5|pages=e0127478|doi=10.1371/journal.pone.0127478|pmid=25978309|pmc=4433115|arxiv=1406.6046|bibcode=2015PLoSO..1027478Z|issn=1932-6203|doi-access=free}}</ref> Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of ], thus controlling and infecting more and more computers in a short time.<ref>{{Cite journal|last=Marion|first=Jean-Yves|date=2012-07-28|title=From Turing machines to computer viruses|journal=Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences|volume=370|issue=1971|pages=3319–3339|doi=10.1098/rsta.2011.0332|pmid=22711861|bibcode=2012RSPTA.370.3319M|issn=1364-503X|doi-access=free}}</ref> Worms almost always cause at least some harm to the network, even if only by consuming ], whereas ] almost always corrupt or modify files on a targeted computer. | |||
Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as the ] and ] showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects. | |||
The name 'worm' was taken from '']'', a ] novel published in 1975 by ]. Researchers (John F Shoch and John A Hupp chose the name in a paper published while they were working at ] ]; ''The Worm Programs'', Comm ACM, 25(3):172-180, 1982)) noted the similarities between their software and the fictional program described by Brunner. So they proposed the name, which has since been widely adopted. | |||
<!-- Who were they and what was the paper? -- see note just above--> | |||
==History== | |||
The first implementation of a worm was by these two researchers at ] in 1978. Shoch and Hupp, originally designed the worm to find idle processors on the network and assign them tasks, sharing the processing load, and so improving the 'CPU cycle use efficiency' across an entire network. They were self-limited so that they would spread no farther than intended. | |||
] source code floppy diskette at the ]]] | |||
The term "worm" was first used in this sense in ]'s 1975 novel, '']''. In the novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it. There's never been a worm with that tough a head or that long a tail!"<ref name=":0">{{Cite book |first=John |last=Brunner |title=The Shockwave Rider |location=New York |publisher=Ballantine Books |year=1975 |isbn=978-0-06-010559-4 |url-access=registration |url=https://archive.org/details/shockwaverider0000brun }}</ref> "Then the answer dawned on him, and he almost laughed. Fluckner had resorted to one of the oldest tricks in the store and turned loose in the continental net a self-perpetuating tapeworm, probably headed by a denunciation group "borrowed" from a major corporation, which would shunt itself from one nexus to another every time his credit-code was punched into a keyboard. It could take days to kill a worm like that, and sometimes weeks."<ref name=":0" /> | |||
The second ever computer worm was devised to be an anti-virus software. Named ], it was created by ] to replicate itself across the ] and delete the experimental ] program (the first computer worm, 1971). | |||
Though it was technically a ], the Christmas Tree Worm was likely the first worm on a worldwide network, spreading across both ]'s own international network and ] in December 1987, bringing both networks to their knees. | |||
On November 2, 1988, ], a ] computer science graduate student, unleashed what became known as the ], disrupting many computers then on the Internet, guessed at the time to be one tenth of all those connected.<ref>{{Cite web|url=http://www.paulgraham.com/submarine.html#f4n|title=The Submarine|website=www.paulgraham.com}}</ref> During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the worm from each installation at between $200 and $53,000; this work prompted the formation of the ]<ref>{{cite web |url=http://www.cert.org/encyc_article/tocencyc.html |title=Security of the Internet |work=CERT/CC }}</ref> and Phage mailing list.<ref>{{cite web |url=http://securitydigest.org/phage/ |title=Phage mailing list |publisher=securitydigest.org |access-date=2014-09-17 |archive-date=2011-07-26 |archive-url=https://web.archive.org/web/20110726143040/http://securitydigest.org/phage/ |url-status=dead }}</ref> Morris himself became the first person tried and convicted under the 1986 ].<ref>{{cite book |last=Dressler |first=J. |title=Cases and Materials on Criminal Law |chapter=United States v. Morris |location=St. Paul, MN |publisher=Thomson/West |year=2007 |isbn=978-0-314-17719-3 }}</ref> | |||
An early worm on the Internet, and the first to attract wide attention, was the ]. It was also termed 'The Internet Worm' by Peter Denning in an article in ] (March-April, 1988) in which he distinguished between a virus and a worm, thereby becoming an early computer zoologist. His definition was more restricted than that of some other computer zoologists of the time (McAfee and Haynes, Computer Viruses, Worms, Data Diddlers, ..., St Martin's Press, 1989). The Morris worm was written by ], at the time a computer science graduate student at ], and released on ], ] using a friend's account on a ] computer. It quickly infected large numbers of computers attached to the ] and caused massive disruption. That it didn't spread even farther and cause more trouble is largely due to some errors in its implementation. It propagated via several bugs in ] ] and related systems, and its component programs (including several versions of ']'). Morris was indentified, confessed, and was later convicted under the US Computer Crime and Abuse Act. He received three years probation, 400 hours community service and a fine in excess of $10,000. | |||
], a computer worm discovered in 2008 that primarily targeted ] operating systems, is a worm that employs three different spreading strategies: local probing, neighborhood probing, and global probing.<ref>{{Cite journal |last1=Zhang |first1=Changwang |last2=Zhou |first2=Shi |last3=Chain |first3=Benjamin M. |date=2015-05-15 |title=Hybrid Epidemics—A Case Study on Computer Worm Conficker |journal=PLOS ONE |language=en |volume=10 |issue=5 |pages=e0127478 |doi=10.1371/journal.pone.0127478 |issn=1932-6203 |pmc=4433115 |pmid=25978309 |bibcode=2015PLoSO..1027478Z |doi-access=free |arxiv=1406.6046 }}</ref> This worm was considered a hybrid epidemic and affected millions of computers. The term "hybrid epidemic" is used because of the three separate methods it employed to spread, which was discovered through code analysis.<ref>{{Cite journal |last1=Zhang |first1=Changwang |last2=Zhou |first2=Shi |last3=Chain |first3=Benjamin M. |date=2015-05-15 |editor-last=Sun |editor-first=Gui-Quan |title=Hybrid Epidemics—A Case Study on Computer Worm Conficker |journal=PLOS ONE |language=en |volume=10 |issue=5 |pages=e0127478 |doi=10.1371/journal.pone.0127478 |issn=1932-6203 |pmc=4433115 |pmid=25978309 |bibcode=2015PLoSO..1027478Z |doi-access=free |arxiv=1406.6046 }}</ref> | |||
In addition to replication, a worm may be designed to do any number of things, such as delete files on a host system, encrypt files in | |||
a ] attack, or send documents via ]. Some more recent worms have been multi-headed and carry other executables as a ]. However, even in the absence of such a payload, a worm can be damaging, if only from the network traffic generated by its reproduction. ], for example, caused a noticeable worldwide Internet slowdown at the peak of its spread. | |||
== Features == | |||
A common payload for worms is a ] in the infected computer; ] and ] are examples which created zombies. These ] are used by ] senders for sending junk email or to cloak their website's address. Spammers are thought to be a source of funding for the creation of such worms | |||
'''Independence''' | |||
, and worm writers have been caught selling lists of ]es of infected machines. Others try to blackmail companies with threatened ] attacks. | |||
Computer viruses generally require a host program.<ref>{{Cite web|title=Worm vs. Virus: What's the Difference and Does It Matter?|url=https://www.avast.com/c-worm-vs-virus|access-date=2021-10-08|website=Worm vs. Virus: What's the Difference and Does It Matter?|language=en}}</ref> The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the ], but can run independently and actively carry out attacks.<ref>{{Cite book|last=Yeo, Sang-Soo.|title=Computer science and its applications : CSA 2012, Jeju, Korea, 22-25.11.2012|date=2012|publisher=Springer|isbn=978-94-007-5699-1|pages=515|oclc=897634290}}</ref><ref>{{Cite journal|last1=Yu|first1=Wei|last2=Zhang|first2=Nan|last3=Fu|first3=Xinwen|last4=Zhao|first4=Wei|date=October 2010|title=Self-Disciplinary Worms and Countermeasures: Modeling and Analysis|journal=IEEE Transactions on Parallel and Distributed Systems|volume=21|issue=10|pages=1501–1514|doi=10.1109/tpds.2009.161|s2cid=2242419|issn=1045-9219}}</ref> | |||
Backdoors, however they may be installed, can be exploited by other malware, including worms. Examples include ], which spreads using the backdoor opened by ], and at least one <!-- which? how soon released after the news went public --> instance of malware taking advantage of the ] backdoor installed by the ] ] software they put on millions of music CDs ending in late 2005. | |||
'''Exploit attacks''' | |||
Whether worms can be useful is a common conundrum amongst theorists in ] and ], beginning with the very first research into them at Xerox PARC. The ] family of worms, for example, tried to download then install patches from Microsoft's website to fix various vulnerabilities in the host system—the ''same'' vulnerabilities the Nachi worm intself exploited. This eventually made the systems affected more secure, but generated considerable network traffic (sometimes more than would have worms they were protecting against), rebooted the machine in the course of patching it, and, maybe most importantly, did its work without the explicit consent of the computer's owner or user. As such, most security experts regard worms as malware, whatever their payload or their writers' intentions. | |||
Because a worm is not limited by the host program, worms can take advantage of various operating system vulnerabilities to carry out active attacks. For example, the "]" virus ] ] to attack. | |||
== Mitigation techniques == | |||
* ]/] enabled network service ]s | |||
'''Complexity''' | |||
* ]s in ] and ] | |||
Some worms are combined with web page scripts, and are hidden in ] pages using ], ] and other technologies. When a user accesses a webpage containing a virus, the virus automatically resides in memory and waits to be triggered. There are also some worms that are combined with ] programs or ], such as "]".<ref>{{Citation|last=Brooks|first=David R.|title=Programming in HTML and PHP|chapter=Introducing HTML|date=2017|pages=1–10|publisher=Springer International Publishing|isbn=978-3-319-56972-7|doi=10.1007/978-3-319-56973-4_1|series=Undergraduate Topics in Computer Science}}</ref> | |||
'''Contagiousness''' | |||
Worms are more infectious than traditional viruses. They not only infect local computers, but also all servers and clients on the network based on the local computer. Worms can easily spread through ]s, ],<ref>{{Cite journal |last1=Deng |first1=Yue |last2=Pei |first2=Yongzhen |last3=Li |first3=Changguo |date=2021-11-09 |title=Parameter estimation of a susceptible–infected–recovered–dead computer worm model |url=http://journals.sagepub.com/doi/10.1177/00375497211009576 |journal=Simulation |language=en |volume=98 |issue=3 |pages=209–220 |doi=10.1177/00375497211009576 |s2cid=243976629 |issn=0037-5497}}</ref> malicious web pages, and servers with a large number of vulnerabilities in the network.<ref>{{Cite journal|last=Lawton|first=George|date=June 2009|title=On the Trail of the Conficker Worm|journal=Computer|volume=42|issue=6|pages=19–22|doi=10.1109/mc.2009.198|s2cid=15572850|issn=0018-9162}}</ref> | |||
==Harm== | |||
Any code designed to do more than spread the worm is typically referred to as the "]". Typical malicious payloads might delete files on a host system (e.g., the ] worm), encrypt files in a ] attack, or ] such as confidential documents or passwords.{{citation needed|date=March 2020}} | |||
Some worms may install a ]. This allows the computer to be remotely controlled by the worm author as a "]". Networks of such machines are often referred to as ] and are very commonly used for a range of malicious purposes, including sending ] or performing ] attacks.<ref>{{Cite news |url=http://seattletimes.nwsource.com/html/businesstechnology/2001859752_spamdoubles18.html |newspaper=The Seattle Times |title=Business & Technology: E-mail viruses blamed as spam rises sharply |date=February 18, 2004 |first=Tiernan |last=Ray |access-date=May 18, 2007 |archive-url=https://web.archive.org/web/20120826193746/http://seattletimes.nwsource.com/html/businesstechnology/2001859752_spamdoubles18.html |archive-date=August 26, 2012 |url-status=dead }}</ref><ref>{{Cite news |url=https://www.wired.com/news/business/0,1367,60747,00.html |title=Cloaking Device Made for Spammers |newspaper=Wired |date=October 9, 2003 |first=Brian |last=McWilliams }}</ref><ref>{{Cite news |url= http://news.bbc.co.uk/1/hi/technology/3513849.stm |work=BBC News |title= Hacker threats to bookies probed |date= February 23, 2004 }}</ref> | |||
Some special worms attack industrial systems in a targeted manner. ] was primarily transmitted through LANs and infected thumb-drives, as its targets were never connected to untrusted networks, like the internet. This virus can destroy the core production control computer software used by chemical, power generation and power transmission companies in various countries around the world - in Stuxnet's case, Iran, Indonesia and India were hardest hit - it was used to "issue orders" to other equipment in the factory, and to hide those commands from being detected. Stuxnet used multiple vulnerabilities and four different zero-day exploits (e.g.: ) in ] and Siemens ] systems to attack the embedded programmable logic controllers of industrial machines. Although these systems operate independently from the network, if the operator inserts a virus-infected drive into the system's USB interface, the virus will be able to gain control of the system without any other operational requirements or prompts.<ref>{{Cite journal|last1=Bronk|first1=Christopher|last2=Tikk-Ringas|first2=Eneken|date=May 2013|title=The Cyber Attack on Saudi Aramco|journal=Survival|language=en|volume=55|issue=2|pages=81–96|doi=10.1080/00396338.2013.784468|s2cid=154754335|issn=0039-6338}}</ref><ref>{{Cite journal|last=Lindsay|first=Jon R.|date=July 2013|title=Stuxnet and the Limits of Cyber Warfare|journal=Security Studies|volume=22|issue=3|pages=365–404|doi=10.1080/09636412.2013.816122|s2cid=154019562|issn=0963-6412}}</ref><ref>{{Cite book|last1=Wang|first1=Guangwei|last2=Pan|first2=Hong|last3=Fan|first3=Mingyu|title=Proceedings of the 3rd International Conference on Computer Science and Service System |chapter=Dynamic Analysis of a Suspected Stuxnet Malicious Code |date=2014|volume=109|location=Paris, France|publisher=Atlantis Press|doi=10.2991/csss-14.2014.86|isbn=978-94-6252-012-7|doi-access=free}}</ref> | |||
== Countermeasures == | |||
Worms spread by exploiting vulnerabilities in operating systems.<!-- NOTE: this statement is erroneous. a Trojan horse is a category similar to a ]. Any program can be a Trojan horse~> If user interaction is required for the malware to spread, it is called a ]. | |||
--> | |||
Vendors with security problems supply regular security updates<ref>{{cite web|url=http://www.ubuntu.com/usn |title=USN list |publisher=Ubuntu |access-date=2012-06-10}}</ref> (see "]"), and if these are installed to a machine, then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a ] is possible. | |||
Users need to be wary of opening unexpected emails,<ref>{{Cite web |url=https://www.f-secure.com/v-descs/iworm.shtml |title=Threat Description Email-Worm |access-date=2018-12-25 |archive-url=https://web.archive.org/web/20180116193554/https://www.f-secure.com/v-descs/iworm.shtml |archive-date=2018-01-16 |url-status=dead }}</ref><ref>{{Cite web|url=https://www.f-secure.com/v-descs/love.shtml|title=Email-Worm:VBS/LoveLetter Description | F-Secure Labs|website=www.f-secure.com}}</ref> and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ] worm, and with the increased growth and efficiency of ] attacks, it remains possible to trick the end-user into running malicious code. | |||
] and ] software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a ] is also recommended. | |||
Users can minimize the threat posed by worms by keeping their computers' operating system and other software up to date, avoiding opening unrecognized or unexpected emails and running ] and antivirus software.<ref>{{cite web |url=http://www.veracode.com/security/computer-worm |title=Computer Worm Information and Removal Steps |publisher=Veracode |access-date=2015-04-04 |date=2014-02-02 }}</ref> | |||
Mitigation techniques include: | |||
* ]s in ] and ] | |||
* ] | * ] | ||
* ]/] enabled network service ]s | |||
* ]/] software | |||
* ] | |||
Infections can sometimes be detected by their behavior - typically scanning the Internet randomly, looking for vulnerable hosts to infect.<ref>{{Cite journal|last1=Sellke |first1=S. H. |last2=Shroff |first2=N. B. |last3=Bagchi |first3=S. |year=2008 |title=Modeling and Automated Containment of Worms |journal=IEEE Transactions on Dependable and Secure Computing |volume=5 |issue=2 |pages=71–86 |doi=10.1109/tdsc.2007.70230 }}</ref><ref>{{Cite news |url=http://newswise.com/articles/view/541456/ |work=Newswise |title=A New Way to Protect Computer Networks from Internet Worms |access-date=July 5, 2011}}</ref> In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.<ref>{{cite journal|doi=10.1016/j.csda.2008.01.028|title=Detection of unknown computer worms based on behavioral classification of the host|journal=Computational Statistics & Data Analysis|volume=52|issue=9|pages=4544–4566|year=2008|last1=Moskovitch|first1=Robert|last2=Elovici|first2=Yuval|last3=Rokach|first3=Lior|s2cid=1097834 }}</ref> | |||
==Worms with good intent== | |||
A '''helpful worm''' or '''anti-worm''' is a worm designed to do something that its author feels is helpful, though not necessarily with the permission of the executing computer's owner. Beginning with the first research into worms at ], there have been attempts to create useful worms. Those worms allowed ] and Jon Hupp to test the ] principles on their network of ] computers.<ref>{{Cite journal|last1=Shoch|first1=John|last2=Hupp|first2=Jon|date=Mar 1982|title=The "Worm" Programs - Early Experience with a Distributed Computation|url=https://vx-underground.org/archive/VxHeaven/lib/ajm01.html|journal=Communications of the ACM|volume=25|issue=3|pages=172–180|doi=10.1145/358453.358455|s2cid=1639205|doi-access=free}}</ref> Similarly, the ] family of worms tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system by exploiting those same vulnerabilities.<ref>{{cite web|title=Virus alert about the Nachi worm|url=http://support.microsoft.com/kb/826234|publisher=Microsoft}}</ref> In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Regardless of their payload or their writers' intentions, security experts regard all worms as ]. Another example of this approach is ] patching a bug allowing for Roku OS to be rooted via an update to their screensaver channels, which the screensaver would attempt to connect to the telnet and patch the device.<ref>{{cite web | url=https://github.com/llamasoft/RootMyRoku#:~:text=In%20the%20past%2C%20Roku%20has%20taken%20some%20creative%20measures%20to%20forcefully%20patch%20jailbroken%20devices.%20One%20such%20example%20was%20an%20update%20to%20the%20screensaver%20channel%20that%20would%20check%20for%20a%20telnet%20service%2C%20connect%20to%20it%2C%20and%20command%20it%20to%20un%2Droot%20and%20update%20the%20device. | title=Root My Roku | website=] }}</ref> | |||
One study proposed the first computer worm that operates on the second layer of the ] (Data link Layer), utilizing topology information such as ] (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.<ref name="semiauto_worm">{{Cite book | doi = 10.1109/ISCC.2010.5546723| chapter = A link-layer-based self-replicating vulnerability discovery agent| title = The IEEE symposium on Computers and Communications| pages = 704| year = 2010| last1 = Al-Salloum | first1 = Z. S. | last2 = Wolthusen | first2 = S. D. | isbn = 978-1-4244-7754-8| s2cid = 3260588}}</ref> | |||
Anti-worms have been used to combat the effects of the ],<ref>{{Cite web|url=http://www.vnunet.com/News/1125206|title=vnunet.com 'Anti-worms' fight off Code Red threat|date=Sep 14, 2001|archive-url=https://web.archive.org/web/20010914021701/http://www.vnunet.com/News/1125206|archive-date=2001-09-14}}</ref> ], and ] worms. ] is an example of a helpful worm.<ref name="Welch">{{cite book | title=The Welchia Worm| date=December 18, 2003|page=1| url=http://www.giac.org/paper/gcih/517/welchia-worm/105720| access-date=9 June 2014}}</ref> Utilizing the same deficiencies exploited by the ], Welchia infected computers and automatically began downloading ] security updates for ] without the users' consent. Welchia automatically reboots the computers it infects after installing the updates. One of these updates was the patch that fixed the exploit.<ref name="Welch"/> | |||
Other examples of helpful worms are "Den_Zuko", "Cheeze", "CodeGreen", and "Millenium".<ref name="Welch"/> | |||
Art worms support artists in the performance of massive scale ephemeral artworks. It turns the infected computers into nodes that contribute to the artwork.<ref>{{Cite journal |last=Aycock |first=John |date=2022-09-15 |title=Painting the Internet |url=https://muse.jhu.edu/article/236371/pdf |journal=Leonardo |volume=42 |issue=2 |pages=112–113 |via=MUSE}}</ref> | |||
==See also== | ==See also== | ||
*] | * ] | ||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] – unsolicited phone calls from a fake "tech support" person, claiming that the computer has a virus or other problems | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
==References== | |||
{{reflist|40em}} | |||
==External links== | ==External links== | ||
* (archived link) – Guide for understanding, removing and preventing worm infections on Vernalex.com. | |||
* - List of viruses and worms 'in the wild' (i.e. regularly encountered by anti-virus companies) | |||
* , John Shoch and Jon Hupp, ''Communications of the ACM'', Volume 25 Issue 3 (March 1982), pp. 172–180. | |||
* - Listed worm descriptions and removal tools. | |||
* , Unclassified report from the U.S. National Security Agency (NSA), 18 June 2004. | |||
* - Worms overview by a famous security researcher. | |||
* (archived link), paper by Jago Maniscalchi on Digital Threat, 31 May 2009. | |||
* | |||
* - Guide for understanding, removing and preventing worm infections | |||
* | |||
* RFC 1135 The Helminthiasis of the Internet | |||
* - A site providing tips/advice on preventing and removing viruses. | |||
* ], ], ], ] ] | |||
{{Malware}} | |||
{{Information security}} | |||
{{ |
{{Authority control}} | ||
{{DEFAULTSORT:Computer Worm}} | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] |
Latest revision as of 14:45, 15 November 2024
Self-replicating malware program This article is about coding of a worm. For the data storage device, see write once read many. For other uses, see Worm (disambiguation). Not to be confused with Computer virus.A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects.
History
The term "worm" was first used in this sense in John Brunner's 1975 novel, The Shockwave Rider. In the novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it. There's never been a worm with that tough a head or that long a tail!" "Then the answer dawned on him, and he almost laughed. Fluckner had resorted to one of the oldest tricks in the store and turned loose in the continental net a self-perpetuating tapeworm, probably headed by a denunciation group "borrowed" from a major corporation, which would shunt itself from one nexus to another every time his credit-code was punched into a keyboard. It could take days to kill a worm like that, and sometimes weeks."
The second ever computer worm was devised to be an anti-virus software. Named Reaper, it was created by Ray Tomlinson to replicate itself across the ARPANET and delete the experimental Creeper program (the first computer worm, 1971).
On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting many computers then on the Internet, guessed at the time to be one tenth of all those connected. During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the worm from each installation at between $200 and $53,000; this work prompted the formation of the CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act.
Conficker, a computer worm discovered in 2008 that primarily targeted Microsoft Windows operating systems, is a worm that employs three different spreading strategies: local probing, neighborhood probing, and global probing. This worm was considered a hybrid epidemic and affected millions of computers. The term "hybrid epidemic" is used because of the three separate methods it employed to spread, which was discovered through code analysis.
Features
Independence
Computer viruses generally require a host program. The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks.
Exploit attacks
Because a worm is not limited by the host program, worms can take advantage of various operating system vulnerabilities to carry out active attacks. For example, the "Nimda" virus exploits vulnerabilities to attack.
Complexity
Some worms are combined with web page scripts, and are hidden in HTML pages using VBScript, ActiveX and other technologies. When a user accesses a webpage containing a virus, the virus automatically resides in memory and waits to be triggered. There are also some worms that are combined with backdoor programs or Trojan horses, such as "Code Red".
Contagiousness
Worms are more infectious than traditional viruses. They not only infect local computers, but also all servers and clients on the network based on the local computer. Worms can easily spread through shared folders, e-mails, malicious web pages, and servers with a large number of vulnerabilities in the network.
Harm
Any code designed to do more than spread the worm is typically referred to as the "payload". Typical malicious payloads might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a ransomware attack, or exfiltrate data such as confidential documents or passwords.
Some worms may install a backdoor. This allows the computer to be remotely controlled by the worm author as a "zombie". Networks of such machines are often referred to as botnets and are very commonly used for a range of malicious purposes, including sending spam or performing DoS attacks.
Some special worms attack industrial systems in a targeted manner. Stuxnet was primarily transmitted through LANs and infected thumb-drives, as its targets were never connected to untrusted networks, like the internet. This virus can destroy the core production control computer software used by chemical, power generation and power transmission companies in various countries around the world - in Stuxnet's case, Iran, Indonesia and India were hardest hit - it was used to "issue orders" to other equipment in the factory, and to hide those commands from being detected. Stuxnet used multiple vulnerabilities and four different zero-day exploits (e.g.: ) in Windows systems and Siemens SIMATICWinCC systems to attack the embedded programmable logic controllers of industrial machines. Although these systems operate independently from the network, if the operator inserts a virus-infected drive into the system's USB interface, the virus will be able to gain control of the system without any other operational requirements or prompts.
Countermeasures
Worms spread by exploiting vulnerabilities in operating systems. Vendors with security problems supply regular security updates (see "Patch Tuesday"), and if these are installed to a machine, then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a zero-day attack is possible.
Users need to be wary of opening unexpected emails, and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running malicious code.
Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.
Users can minimize the threat posed by worms by keeping their computers' operating system and other software up to date, avoiding opening unrecognized or unexpected emails and running firewall and antivirus software.
Mitigation techniques include:
- ACLs in routers and switches
- Packet-filters
- TCP Wrapper/ACL enabled network service daemons
- EPP/EDR software
- Nullroute
Infections can sometimes be detected by their behavior - typically scanning the Internet randomly, looking for vulnerable hosts to infect. In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.
Worms with good intent
A helpful worm or anti-worm is a worm designed to do something that its author feels is helpful, though not necessarily with the permission of the executing computer's owner. Beginning with the first research into worms at Xerox PARC, there have been attempts to create useful worms. Those worms allowed John Shoch and Jon Hupp to test the Ethernet principles on their network of Xerox Alto computers. Similarly, the Nachi family of worms tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Regardless of their payload or their writers' intentions, security experts regard all worms as malware. Another example of this approach is Roku OS patching a bug allowing for Roku OS to be rooted via an update to their screensaver channels, which the screensaver would attempt to connect to the telnet and patch the device.
One study proposed the first computer worm that operates on the second layer of the OSI model (Data link Layer), utilizing topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.
Anti-worms have been used to combat the effects of the Code Red, Blaster, and Santy worms. Welchia is an example of a helpful worm. Utilizing the same deficiencies exploited by the Blaster worm, Welchia infected computers and automatically began downloading Microsoft security updates for Windows without the users' consent. Welchia automatically reboots the computers it infects after installing the updates. One of these updates was the patch that fixed the exploit.
Other examples of helpful worms are "Den_Zuko", "Cheeze", "CodeGreen", and "Millenium".
Art worms support artists in the performance of massive scale ephemeral artworks. It turns the infected computers into nodes that contribute to the artwork.
See also
- List of computer worms
- BlueKeep
- Botnet
- Code Shikara (Worm)
- Computer and network surveillance
- Computer virus
- Computer security
- Email spam
- Father Christmas (computer worm)
- Self-replicating machine
- Technical support scam – unsolicited phone calls from a fake "tech support" person, claiming that the computer has a virus or other problems
- Timeline of computer viruses and worms
- Trojan horse (computing)
- Worm memory test
- XSS worm
- Zombie (computer science)
References
- Barwise, Mike. "What is an internet worm?". BBC. Archived from the original on 2015-03-24. Retrieved 9 September 2010.
- Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2015-05-15). "Hybrid Epidemics—A Case Study on Computer Worm Conficker". PLOS ONE. 10 (5): e0127478. arXiv:1406.6046. Bibcode:2015PLoSO..1027478Z. doi:10.1371/journal.pone.0127478. ISSN 1932-6203. PMC 4433115. PMID 25978309.
- Marion, Jean-Yves (2012-07-28). "From Turing machines to computer viruses". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. 370 (1971): 3319–3339. Bibcode:2012RSPTA.370.3319M. doi:10.1098/rsta.2011.0332. ISSN 1364-503X. PMID 22711861.
- ^ Brunner, John (1975). The Shockwave Rider. New York: Ballantine Books. ISBN 978-0-06-010559-4.
- "The Submarine". www.paulgraham.com.
- "Security of the Internet". CERT/CC.
- "Phage mailing list". securitydigest.org. Archived from the original on 2011-07-26. Retrieved 2014-09-17.
- Dressler, J. (2007). "United States v. Morris". Cases and Materials on Criminal Law. St. Paul, MN: Thomson/West. ISBN 978-0-314-17719-3.
- Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2015-05-15). "Hybrid Epidemics—A Case Study on Computer Worm Conficker". PLOS ONE. 10 (5): e0127478. arXiv:1406.6046. Bibcode:2015PLoSO..1027478Z. doi:10.1371/journal.pone.0127478. ISSN 1932-6203. PMC 4433115. PMID 25978309.
- Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2015-05-15). Sun, Gui-Quan (ed.). "Hybrid Epidemics—A Case Study on Computer Worm Conficker". PLOS ONE. 10 (5): e0127478. arXiv:1406.6046. Bibcode:2015PLoSO..1027478Z. doi:10.1371/journal.pone.0127478. ISSN 1932-6203. PMC 4433115. PMID 25978309.
- "Worm vs. Virus: What's the Difference and Does It Matter?". Worm vs. Virus: What's the Difference and Does It Matter?. Retrieved 2021-10-08.
- Yeo, Sang-Soo. (2012). Computer science and its applications : CSA 2012, Jeju, Korea, 22-25.11.2012. Springer. p. 515. ISBN 978-94-007-5699-1. OCLC 897634290.
- Yu, Wei; Zhang, Nan; Fu, Xinwen; Zhao, Wei (October 2010). "Self-Disciplinary Worms and Countermeasures: Modeling and Analysis". IEEE Transactions on Parallel and Distributed Systems. 21 (10): 1501–1514. doi:10.1109/tpds.2009.161. ISSN 1045-9219. S2CID 2242419.
- Brooks, David R. (2017), "Introducing HTML", Programming in HTML and PHP, Undergraduate Topics in Computer Science, Springer International Publishing, pp. 1–10, doi:10.1007/978-3-319-56973-4_1, ISBN 978-3-319-56972-7
- Deng, Yue; Pei, Yongzhen; Li, Changguo (2021-11-09). "Parameter estimation of a susceptible–infected–recovered–dead computer worm model". Simulation. 98 (3): 209–220. doi:10.1177/00375497211009576. ISSN 0037-5497. S2CID 243976629.
- Lawton, George (June 2009). "On the Trail of the Conficker Worm". Computer. 42 (6): 19–22. doi:10.1109/mc.2009.198. ISSN 0018-9162. S2CID 15572850.
- Ray, Tiernan (February 18, 2004). "Business & Technology: E-mail viruses blamed as spam rises sharply". The Seattle Times. Archived from the original on August 26, 2012. Retrieved May 18, 2007.
- McWilliams, Brian (October 9, 2003). "Cloaking Device Made for Spammers". Wired.
- "Hacker threats to bookies probed". BBC News. February 23, 2004.
- Bronk, Christopher; Tikk-Ringas, Eneken (May 2013). "The Cyber Attack on Saudi Aramco". Survival. 55 (2): 81–96. doi:10.1080/00396338.2013.784468. ISSN 0039-6338. S2CID 154754335.
- Lindsay, Jon R. (July 2013). "Stuxnet and the Limits of Cyber Warfare". Security Studies. 22 (3): 365–404. doi:10.1080/09636412.2013.816122. ISSN 0963-6412. S2CID 154019562.
- Wang, Guangwei; Pan, Hong; Fan, Mingyu (2014). "Dynamic Analysis of a Suspected Stuxnet Malicious Code". Proceedings of the 3rd International Conference on Computer Science and Service System. Vol. 109. Paris, France: Atlantis Press. doi:10.2991/csss-14.2014.86. ISBN 978-94-6252-012-7.
- "USN list". Ubuntu. Retrieved 2012-06-10.
- "Threat Description Email-Worm". Archived from the original on 2018-01-16. Retrieved 2018-12-25.
- "Email-Worm:VBS/LoveLetter Description | F-Secure Labs". www.f-secure.com.
- "Computer Worm Information and Removal Steps". Veracode. 2014-02-02. Retrieved 2015-04-04.
- Sellke, S. H.; Shroff, N. B.; Bagchi, S. (2008). "Modeling and Automated Containment of Worms". IEEE Transactions on Dependable and Secure Computing. 5 (2): 71–86. doi:10.1109/tdsc.2007.70230.
- "A New Way to Protect Computer Networks from Internet Worms". Newswise. Retrieved July 5, 2011.
- Moskovitch, Robert; Elovici, Yuval; Rokach, Lior (2008). "Detection of unknown computer worms based on behavioral classification of the host". Computational Statistics & Data Analysis. 52 (9): 4544–4566. doi:10.1016/j.csda.2008.01.028. S2CID 1097834.
- Shoch, John; Hupp, Jon (Mar 1982). "The "Worm" Programs - Early Experience with a Distributed Computation". Communications of the ACM. 25 (3): 172–180. doi:10.1145/358453.358455. S2CID 1639205.
- "Virus alert about the Nachi worm". Microsoft.
- "Root My Roku". GitHub.
- Al-Salloum, Z. S.; Wolthusen, S. D. (2010). "A link-layer-based self-replicating vulnerability discovery agent". The IEEE symposium on Computers and Communications. p. 704. doi:10.1109/ISCC.2010.5546723. ISBN 978-1-4244-7754-8. S2CID 3260588.
- "vnunet.com 'Anti-worms' fight off Code Red threat". Sep 14, 2001. Archived from the original on 2001-09-14.
- ^ The Welchia Worm. December 18, 2003. p. 1. Retrieved 9 June 2014.
- Aycock, John (2022-09-15). "Painting the Internet". Leonardo. 42 (2): 112–113 – via MUSE.
External links
- Malware Guide (archived link) – Guide for understanding, removing and preventing worm infections on Vernalex.com.
- "The 'Worm' Programs – Early Experience with a Distributed Computation", John Shoch and Jon Hupp, Communications of the ACM, Volume 25 Issue 3 (March 1982), pp. 172–180.
- "The Case for Using Layered Defenses to Stop Worms", Unclassified report from the U.S. National Security Agency (NSA), 18 June 2004.
- Worm Evolution (archived link), paper by Jago Maniscalchi on Digital Threat, 31 May 2009.
Malware topics | |
---|---|
Infectious malware | |
Concealment | |
Malware for profit | |
By operating system | |
Protection | |
Countermeasures |