A computer worm is a type of malicious software that self-replicates, infecting other computers while remaining active on infected systems.
Worms can often go unnoticed until their uncontrolled replication process consumes system resources, halting or slowing the infected computer. Along with computing resources, networks can become congested by traffic associated with worm propagation.
The term virus is often used as a generic, catch-all, reference to any type of malware, technically this is incorrect.
A virus, like its biological counterpart, does not reproduce or spread on its own. It is mutating program that injects malicious code into existing applications and uses their functionality or user action to spread.
In contrast, worms are self-replicating and require no human intervention to spread once started.
Computer worms often rely on actions of and exploitation of security vulnerabilities in networking protocols, a computer's operating system or backdoor to propage without the user's knowledge.
An early example is the Morris worm. The Morris worm was one of the first internet worms and was written to highlight security flaws rather than cause damage.
It spread by exploiting known vulnerabilities, like those that would now be listed on CVE, in Unix sendmail finger, rsh/rexec, as well as weak passwords. At its height, the Morris Worm was running on nearly 10 percent of all internet-enabled computers at the time.
However, the malicious code could infected a machine multiple times and each additional process would slow it down, eventually to the point of being unusable.
This mistake turned a potentially harmless intellectual exercise into a denial-of-service attack and caused its creator Robert Morris to be the first person convicted under the United States' 1986 Computer Fraud and Abuse Act.
A more recent example is the WannaCry ransomware cryptworm, which many suspect is the work of North Korean cybercriminals.
WannaCry targeted versions of Microsoft Windows operating systems that used Server Message Block (SMB v1), an outdated resource sharing protocol.
Once the target system was infected, the worm infection would install a computer program that encrypted the user's files and requested ransom. It would then look for new victims by sending SMBv1 requests, responders would be infected by the self-replicating malware.
Another common method are email worms. Email worms create and send outbound emails to all addresses in a user's contacts. The messages contain a malicious email attachment that infects the new system when the recipient opens it. This type of malware can be used in conjunction with social engineering, like phishing or spear phishing, to greatly increase the probability of successful infection.
Before widespread use of computer networks, worms spread through infected external hard drives, CDs, floppy diskettes and USBs.
Stuxnet, one of the most notorious computer worms, spread through infected USBs. Stuxnet targets supervisory control and data acquisition (SCADA) systems which are commonly used by power utilities, water supply services, sewerage plants and other industrial environments. It is believed Stuxnet was a targeted cyber attack designed to sabotage Iran's nuclear weapon production.
It depends on the type of computer worm and the desires of its creator. Some worms are used to spread other types of malware for cybercrime like corporate espionage and others are used to highlight particular security vulnerabilities but do no real damage (minus network congestion).
Many of the first computer worms were proofs of concept designed to do nothing more than infect computers and reproduce themselves in the background. Often the only way to identify an infection was when a worm made too many copies of itself and caused the system to slow.
But with time, worms are becoming a means to an end, often carrying a payload that aims to steal sensitive data or cause a data breach.
It's common to use the worm to gain initial access to a system and then use privilege escalation to gain further access to a system.
There are several types of computer worms:
Organizations with good cybersecurity, information security, data security and network security can protect themselves against computer worms.
Common prevention mechanisms include:
In the end, preventing computer worms is about information risk management and education. Many worms continue to spread because of old and unpatched computers which should have been updated years ago, don't rely on digital forensics and IP attribution to clean up successful cyber attacks. Computer security should be focused on prevention.
And one of the most overlooked parts of computer security is vendor risk management. Third-party vendors introduce new attack vectors.
With increased outsourcing and vendors with poor security standards comes increased worm infections, data leaks and data breaches. Even if your internal security is good, you can become infected with a computer worm via a secondary infection on an internal network that a third-party vendor has access to. This is known as third-party risk and fourth-party risk (the risk introduced by your vendor's vendors).
As much as possible, look for vendors with SOC 2 assurance and develop a third-party risk management framework and cybersecurity risk assessment process. If you're not sure where to start, see our vendor risk assessment template and learn to plan your vendor security questionnaire.
Consider investing in a tool to automate vendor risk management and monitor your internal security posture.
Detecting a computer worm can be difficult, but there are some common symptoms:
The April-June 2008 issue of IEEE Transactions on Dependable and Secure Computing described a new way to detect and combat internet worms. They suggest using software to monitor the number of scans a machine on a network sends out. When the machine starts to send out too many scans, it could be infected and administrators should be notified to take it offline and check for malware.
In extreme cases, removing a computer worm may involve reformatting. Configuration management can help to quickly recover infected systems and dramatically improve incident response.
If you can identify the particular worm that has infected the system, there may be specific instructions or tools designed to remove the infection.
During the removal process, disconnect from the Internet and remove any storage devices and scan them separately for the host file. Once the system has been disconnected, you can follow the instructions, run the tool or reformat the computer.
Remember that worms often spread by exploiting vulnerabilities, so make sure to update the system to reduce the risk of a secondary infection.