How Does a Worm Virus Work?

So, how does a worm virus work? Depending on the type of worm virus, a computer worm can work in several different ways. In addition, depending on the type of virus, it can do anywhere from minimal and annoying to irreversible and devastating damage to your system. In order to understand worm viruses and how they work, it is important to understand the history of worm viruses, the types, and how to get rid of them.

History of Worm Viruses


ATTENTION: GET PARASITE HELP NOW! At All About Worms we get a lot of questions about skin parasites, blood parasites, and intestinal parasites in humans. Because we can't diagnose you, we have put together this list of doctors and labs who understand and specialize in dealing with parasites in humans! That resource is HERE

Over the past 20 years, hackers, computer highjackers, and angry computer freaks have had a field day releasing worm viruses out into the computer world. These hijackers and computer freaks are far worse than your average face-to-face purse snatcher. Because they are virtually invisible, these types of criminals are the toughest kinds of criminals to catch. You can’t cross-reference snapshots with police records, nor can you rely on pedestrians or a well meaning passerby that happened to catch a glimpse of the purse-snatchers mug. Hackers and tech-savvy thieves that hide behind code and computers are a special lot. Not only are they savvy, but they are sneaky and elusive, so much that, in the end, the only thing you can do to avoid becoming a victim is to become savvy yourself. More on this later.

While computer hackers and thieves can be slippery and sometimes tough to profile, anti-virus software companies do try their best to fight this unusual cyber element. Anti-virus creators have responded by attempting to develop anti-virus software that stays one step ahead of the hackers and hijackers. Unfortunately, the more sophisticated technology becomes, the more sophisticated the hacker becomes. And he doesn’t have to have a degree in software engineering and he doesn’t always come from a pool of disgruntled techies. In fact, one of the most recent and most destructive worm viruses, the Blaster Worm, was traced back to Hopkins, Minnesota — the home of an 18-year-old kid named Jeffrey Lee Parson.

The Blaster worm spread on computers running Windows XP and Windows 2000. Created back in 2003, this computer worm was also called Lovsan, Lovesan, and MSBlaster. The first version of the Blaster worm was found on August 11, 2003. Many variants of this worm appeared. On August 13, 2009 the then 18-year-old Jeffrey Lee Parson released the Blaster B worm from his home in Hopkins, Minnesota. News about the Blaster Worm spread just as fast as the worm itself, so this helped curb the spread as well as filtering ISPs. On August 19, 2003, federal agents, based on suspicion that he had released a malicious software program, searched Parson’s home. Parson was arrested on August 29, 2003. Nearly a year later, on August 11, 2004, Parson pled guilty. He was sentenced on January 28, 2005 to 18 months in prison.

No Paywall Here!
All About Worms is and always has been a free resource. We don't hide our articles behind a paywall, or make you give us your email address, or restrict the number of articles you can read in a month if you don't give us money. That said, it does cost us money to pay our research authors, and to run and maintain the site, so if something you read here was helpful or useful, won't you consider donating something to help keep All About Worms free?
Click for amount options
Other Amount:

The first Internet worm virus in history was released around 1988. Called the “Morris Worm,” once released, this computer worm spread within a matter of hours infecting thousands of vulnerable machines across the country. Many worm viruses came into existence following the Morris worm, but not one caused as much damage as the original. The next major virus to surface showed up around 1996. The Word macro virus was accidentally included on two Microsoft CDs, but this was not the only means of travel for this virus. It had the ability to multiply rapidly through document exchanges. This worm virus hid inside various types of Word documents. Once a document was sent to an individual’s computer or to a group and that document is opened, the receiver’s computer would immediately catch the virus. The virus would pass from computer to computer through the receiver’s sent documents.

Three years after the Word macro virus faded, the Melissa worm appeared. This was a new type of worm that used email as its method of travel. Today, email worms are very common, thanks to Melissa.

Other well-known worm viruses, following Melissa include Code Red and Code Red 2 which infected entire corporate networks; Nimda, which attacked bugs in Internet Explorer and Outlook, Parson’s Blaster Worm; the Nuwar OL Worm (email worm); the Valentin E worm (email worm), the Storm Worm, the Facebook Worm, and more.

About Worm Viruses

Worms are actually sub-class of viruses. A computer virus is not unlike a biological virus. It is a self-replicating computer program that spreads by inserting copies of itself into other executable code or documents. The insertion of a computer virus into the program is called an “infection.” The infected file or executable code that is not part of a file is called a “host.” Viruses are one of the several different types of malicious software or “malware.”

Worms can spread from computer to computer, travel across networks, and copy your address book in order to send itself to all of your contacts. Worms can freeze or disable entire servers. Some of the most sophisticated worms can actually tunnel into your computer and give users remote access to your system. While viruses and worms can spread, much like an infection, there is one malicious software program that does not self-replicate. However, it can be just as harmful to your computer as a virus or worm. It’s called a “Trojan Horse.”

A Trojan Horse, or just “Trojan,” will present itself as a helpful program, but once you install it on your computer, it will wreak havoc on your system almost immediately. A Trojan Horse may appear in the form of a file or software program that has been sent from a legitimate source. The Trojan Horse will install and a number of things can happen. Some Trojans will simply rearrange your desktop or add annoying icons to your desktop and others will delete entire files. Some of the more advanced Trojans can open the door to predators looking to steal your identity. These types of Trojans can give users unlimited access to your system.

How to Prevent and Get Rid of Worm Viruses

Never, ever click on links in an email message, even if you think they are from a reliable source. To avoid unleashing a worm virus, copy and paste the link into your address bar. Better yet, don’t bother opening the link at all.

·Never open email attachments from unknown senders. Even if you are a little skeptical, don’t open the attachment, period.
·Pay attention to the sites you visit online. Some websites are specifically designed to deliver malware
·Don’t cut corners. Install a firewall application on your computer. You might have a bit of trouble while surfing, but it’s well worth it. A firewall will prevent intruders from loading malware on your computer.
·Bite the bullet. Purchase security software that can detect any known and even evolving strains of malicious software.

Just a few effective malicious software and worm virus removal tools include: Norton AntiVirus and McAfee Antivirus. Please keep in mind that these software programs are not free. While you free malicious software removal tools are available, they might not be as effective as the tools with a price tag. If top notch security, it’s best to install Norton, McAfee or comparable antivirus software.

To “Free” or not to “Free”

To get rid of malicious software programs like the Blaster worm, there are a number of free malicious software removal tools available. You can download them directly from the web. Before you download any malicious software removal tool, you must make sure that the download is from a trusted source. If you are running Windows, stick with Microsoft software downloads. Microsoft offers its “Windows Malicious Software Removal Tool” free of charge for its Windows operating system. The great thing about this free worm removal tool is that it updates once a month and reports if malicious software is found.

From Microsoft:

The Microsoft Windows Malicious Software Removal Tool checks Windows XP, Windows 2000, and Windows Server 2003 computers for and helps remove infections by specific, prevalent malicious software including Blaster Worm, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder. Version 1.30 adds Win32/Allaple to the list of malicious software this tool detects.

You can download directly from the Microsoft website or Cnet.com.

Author: The Top Worm

Leave a Reply

Your email address will not be published. Required fields are marked *