COMPUTER WARM
COMPUTER WARM
A computer worm is a standalone malware computer program that replicates itself in order to
spread to other computers. Often, it uses a computer network to spread itself, relying on security
failures on the target computer to access it. Worms almost always cause at
least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always
corrupt or modify files on a targeted computer.
Many worms that have been created are designed only to
spread, and do not attempt to change the systems they pass through. However, as
the Morris worm and Mydoom showed, even these
"payload-free" worms can cause major disruption by increasing network
traffic and other unintended effects.
Harm
Any code designed to do
more than spread the worm is typically referred to as the "payload".
Typical malicious payloads might delete files on a host system (e.g., the ExploreZip worm),
encrypt files in a ransomware attack,
or exfiltrate data such as confidential documents or
passwords.
Probably the most common payload for worms is to install a backdoor.
This allows the computer to be remotely controlled by the worm author as a "zombie". Networks of such machines are
often referred to as botnets and are very commonly used for a range
of malicious purposes, including sending spam or
performing DoS attacks
Worms spread by
exploiting vulnerabilities in operating systems. Vendors with security problems
supply regular security updates (see
"Patch Tuesday"), and if these are
installed to a machine then the majority of worms are unable to spread to it.
If a vulnerability is disclosed before the security patch released by the
vendor, a zero-day attack is possible.
Users need to be wary of
opening unexpected email, and
should not run attached files or programs, or visit web sites that are linked
to such emails. However, as with the ILOVEYOU worm,
and with the increased growth and efficiency of phishing attacks,
it remains possible to trick the end-user into running malicious code.
Anti-virus and anti-spyware software
are helpful, but must be kept up-to-date with new pattern files at least every
few days. The use of a firewall is also recommended.
In the April–June 2008
issue of IEEE Transactions
on Dependable and Secure Computing, computer scientists described a new and
potentially effective way to combat internet worms. The researchers discovered
how to contain worms that scanned the Internet randomly, looking for vulnerable
hosts to infect. They found that the key was to use software to monitor the
number of scans that machines on a network send out. When a machine started to
send out too many scans, it was a sign that it has been infected, which allowed
administrators to take it off line and check it for malware. In
addition, machine learning techniques can be used to detect new worms, by
analyzing the behavior of the suspected computer.
Users can minimize the
threat posed by worms by keeping their computers' operating system and other
software up to date, avoiding opening unrecognized or unexpected emails and
running firewall and antivirus software.
Mitigation techniques
include:
·
ACLs in routers and switches
·
Packet-filters
·
TCP Wrapper/ACL enabled
network service daemons
·
Nullroute
Worms with good intent
Beginning with the very
first research into worms at Xerox PARC,
there have been attempts to create useful worms. Those worms allowed testing by John Shoch and Jon Hupp of the Ethernet principles on their network of Xerox Alto computers. The Nachi family of worms tried to download and
install patches from Microsoft's website to fix vulnerabilities in the host
system—by exploiting those same vulnerabilities. In practice, although this may have
made these systems more secure, it generated considerable network traffic,
rebooted the machine in the course of patching it, and did its work without the
consent of the computer's owner or user. Regardless of their payload or their
writers' intentions, most security experts regard all worms as malware.
·
Several worms, like XSS worms,
have been written to research how worms spread. For example, the effects of
changes in social activity or user behavior. One study proposed what seems to
be the first computer worm that operates on the second layer of the OSI model
(Data link Layer), it utilizes topology information such as Content-addressable
memory (CAM) tables and Spanning Tree information stored in switches to
propagate and probe for vulnerable nodes until the enterprise network is
covered.
No comments