SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Resources / IT Security Technical Part2 /

Top 10 Worms of all time

A computer worm is defined as a program that has the ability to replicate itself across other machines with or without user intervention. In contrast to a virus, there's no need for a worm to attach itself to a program in order to work. Worms are capable of devastating entire information infrastructures by simply replicating itself and consuming loads and loads of resources or bandwidth. In any event, here's a look at the top ten worst worms in the last twenty years or so.

1.           Morris Worm

Released into the wild on November 2, 1988, the Morris Worm was originally made in order to gauge the size of the Internet. However, a coding flaw in the program has inadvertently turned it into an extremely damaging, resource-hogging program capable of bogging down a computer system by infecting it multiple times.

2.           ILOVEYOU

Also known as the Love Bug Worm and the VBS/Loveletter, the extremely harmful ILOVEYOU worm was able to spread like wildfire in 2000 because of its abilities to access the email addresses found in a user's Outlook contact list and send itself infinitely across the worldwide web while overwriting a victim's files.

3.           Nimda

Nimda ("admin" spelled backwards) was able to wreak havoc in autumn of 2001 by infecting an assortment of Microsoft computers via an email-based exploit. Because of the fact that it shares characteristics with all the major malware ever developed, Nimda was able to propagate itself in a rapid rate by modifying configurations to become more vulnerable and appending all Internet-related files with JavaScript.

4.           Code Red

This Mountain-Dew-named worm exploited a buffer overflow security hole in Microsoft IIS servers and used it to self-replicate into other machines suffering from the same vulnerability. Servers that have been contaminated by this contagion displayed a message alleging that the site was hacked by the Chinese. Within a month, the infected botnets would launch DOS attacks on various online domains, including the one owned by the White House.

5.           Melissa

A bait-and-switch, faux-porn-list worm that nearly shut down the entire worldwide web when it was released in 1999, Melissa's promise of providing free access to over eighty porno sites enabled it to spread across the mailboxes of affection-starved individuals and mass mail itself into thousands of recipients in a short period of time.

6.           MSBlast

This 2003 malware was able to continue the early 2000's tradition of worm-related chaos by exploiting a vulnerability that Microsoft announced in July of that year. It featured a message addressed to Bill Gates that said, "Stop making money and fix your software," and it was able to infect seven thousand computers within mere hours of its discovery.

7.           Sobig

This is yet another 2003 worm that was able to propagate itself through millions of computers by posing as a benign email with a rather sinister attachment. The *.pif or *.scr file attachment that contained the malware can insidiously infect any host within its vicinity so long as it's downloaded and run by the user.

8.           Storm Worm

This 2007 worm was named after the Kyrill weather storm in Europe. It's a rogue spam that compelled users to open it because it bore a headline alleging that two-hundred and thirty people have died while the Kyrill storm pummeled Europe. Its collection of contaminated machines became part of a large botnet responsible for gathering tons of private data and executing various DDOS attacks.

9.           Michelangelo

Even the year 1991 was not spared by the wrath of the computer worm. MS-DOS-based computers were hit by the Michelangelo worm that, as its name suggests, activated on the artist's birthday (March 6). Once it was triggered, this boot sector worm would change the master boot record of infected hosts or overwrite the hard disk.

10.      Jerusalem

Jerusalem, which is also known as BlackBox, is believed to be one of the first worms ever detected back in 1987 (it preceded the Morris Internet worm by about a year and is a variant of the Suriv virus). It's a devastating malware that deleted whatever programs or files that are executed every Friday the 13th. It is also capable of increasing the file size of all files running within DOS, which naturally led to slower processing of data and depleted resources.
It is strongly recommended using strong Intrusion Prevention Systems infront of your public servers to the internet.
Always make sure to run up to date Anti Virus on your Windows or Mac OS X.
Vulnerability Scanner - Vulnerability Management 

➤ Related pages
Anti-Denial-of-Service Tips & Tricks
Anti-Phishing Tips & Trick
Anti-Social-Engineering Tips & Tricks
Anti-Spam Tips & Tricks
Anti-Spyware Tips and Tricks
Anti-Virus Tips & Trick
Better Wi-Fi Range
Protect Against Client Wireless
Risks of Cyber Crime
SecPoint Free Security Scan
Security Mailinglist Rss Feeds
Top 10 Hacker Attacks
Top 10 Hackers
Top 10 IT Security Tips
Top 10 IT Security Tools
Top 10 Myths in IT Security
Top 10 Phishing Scams
Top 10 Secure Operating Systems
Top 10 Social Engineering Tactics
Top 10 Spam Attacks
Top 10 Spyware
Top 10 Viruses
Top 10 Ways to Protect
Top 10 Website Security Myths
Top 10 Worms
WiFi Security
Wifi Security Tips & Tricks

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef