What is a worm attack?
A computer worm is a sort of malware that spreads duplicates of itself from one PC to another A worm can repeat itself with no human interaction, and it doesn't have to append itself to a software program to cause damage (NortonLifeLock employee,2019).
How does a worm attack work?
What are the types of computer worms?
There is no all-inclusive grouping of PC worms, however, they can be organized into types depending on how they are appropriated between PCs. The five common sorts are as the following:
1- Internet Worms: As they do with PC networks, PC worms likewise target popular sites with inadequate security. At the point when they figure out how to infect the webpage, webworms can reproduce themselves onto any PC being utilized to get to the site being referred to. From that point, webworms are distributed to other associated PCs through the web and local area network connections (Moes, 2014).
2-Email Worms: Email worms are frequently circulated by means of email attachments. They ordinarily have double extensions (for instance, .mp4.exe or .avi.exe) so the recipient would believe that they are media files and not malicious PC programs. At the point when the victims click on the attachment, duplicates of a similar infected file will consequently be sent to addresses from their contacts list (Moes, 2014).
3- Instant Messaging Worms: Instant messaging worms are actually similar to email worms, the only difference being their method of distribution. Once again, they are masked as attachments or clickable links to websites. They are regularly accompanied by short messages like "Haha" or "You need to see this!" to fool the victim into believing that their companion is sending them an entertaining video to take a look at (Moes, 2014).
4- File-Sharing Worms: Although illegal file-sharing and peer-to-peer file moves are still used by many individuals all throughout the planet. Doing as such, they are accidentally presenting their PCs to the threat of file-sharing worms. Like email and instant messaging worms, these programs are veiled as media files with double expansions. When the victim opens the downloaded file to view it or listen to it, they will download the worm to their computer (Moes, 2014).
5- IRC Worms: Web Relay Chat (IRC) is an informing application that is mostly outdated nowadays but was all the rage at the turn of the century. Same as with today’s instant messaging platforms, computer worms were distributed via messages containing links and attachments. The latter was less effective due to an extra layer of protection that prompted users to accept incoming files before any transfer could take place (Moes, 2014).
How to avoid Worm Attack?
Reference:
MOES, T (2019) What is a Computer Worm? [Online] SOFTWARELAB. Available from: What is a Computer Worm? The Top 5 Examples You Need to Know (softwarelab.org) [Accessed 06/06/21].
CIMPANU, C (2016) PhotoMiner Worm Spreads via Vulnerable FTP Servers, Mines for Crypto-Currency [Online] SOFTPEDIA. Available from: PhotoMiner Worm Spreads via Vulnerable FTP Servers, Mines for Crypto-Currency (softpedia.com) [Accessed 06/06/21].
BRIGHTHUB (2010) Computer Worms: How to Avoid Them? [Online] BRIGHTHUB. Available from: Computer Worms: How to Avoid Them? - Bright Hub [Accessed 06/06/21].
KNOPP, T (2017) Worm cyber attack symbol with laptop and red worm, isolated on blue background [Online] DREAMSTIME. Available from: Worm Cyber Attack Symbol With Laptop And Red Worm, Isolated On Blue Background Stock Illustration - Illustration of icon, presentation: 161890485 (dreamstime.com) [Accessed 06/06/21].



















