UNDERSTANDING MALWARE AND EVERYTHING ELSE ABOUT IT [PART 3]:WORM ||SIZ EDUCATION|| CLUB75

in Steem Infinity Zone2 years ago (edited)

10% to steem infinity zone


20220405_133815.jpgdesigned in canva

Today,we will be discussing WORM as another form of MALWARE.For a while now,we have being discussion about malwares and have also talked about VIRUS as a form of malware.
Moving on today,we shall be looking at everything related to computer worm as a form of malware.
You can visit the part 1 and part 2 of this lesson by clicking this links below for better understanding.

Understanding malware and everything else about it:PART 1

Understanding malware and everything else about it:PART 2

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

WHAT IS COMPUTER WORM

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220405-124031.pngimage from istock

Computer Worm in simple term is a type of malware(malicious software)that is designed to self-replicate.
It enters into a computer or system by exploiting the system or network vulnerability and replicating itself with the aim of spreading to other computer with Inadequate or tight security and defense measure in place.

The Computer worm has the ability to spread very fast and it does this independently as it does not necessarily require any action by the user in the network or the system to propagate and carry out it disastrous activities in the computer or system where it has instill itself.

It is very potent and effective in disrupting and causing damage to the system or computer it infects.it can also cause file and data in a system to get lost,deleted or even damage.

With it's ability to self replicate,the worm can infect many other vulnerable computers and still stay active on the infected Computer.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

HOW IT WORKS

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Worm are designed with a particular function and directive which is "To Infect a computer and stay active on it for a period of time and also spreading the infection to other vulnerable computers".

Once the computer worm loads and starts running on a system,it doesn't remain there alone,it makes sure to spread and self-replicate itself to other system with or without the user action,the method of spreading is self-reliance.

Let's butress this with an example.
I'm sure a very few number of us here would have possibly heard about the wannaCry ransomware worm.

This particular worm infiltrated the first version of Server message block(SMBv1) resource sharing protocol in windows using the network vulnerability as a loophole to gain access into the system.

As soon as this worm loads and start running on a new Infected computer,it automatically begin a search on the system with the purpose of finding vulnerable victim to Infect.

It does this by sending out signal in the network in form of request and any user or client who respond to the SMBv1 request will get Infected and from there it starts to disseminate and spread across various client in the network.

It also disguise as legitimate documents and files online or link in a network that is meant to be downloaded,once downloaded or clicked by a user the computer get Infected by the WORM.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

DIFFERENCE BETWEEN VIRUS & WORM

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220405-124256.pngimage from Istock

The only observable and obvious difference between the virus and worm malware is the fact that the unlike the virus,the worm is designed to self-replicate on it own without the user interference for it to spread or disseminate.

On the other hand,virus require and depends on users to help it propagate and spread.
The virus is also self-replicating but not independent.
It spreading operation is dependent on certain action and activities of user.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

TYPES OF COMPUTER WORM

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220405-125126.pngimage from Istock

The computer worm which is a subdivision of malware also comes in different types and variety.
In this part of the lesson,we will be looking at the types of computer worm that exist.

•EMAIL WORM

Just like the name implies,it is worm Targeted towards email account with the aim of infecting the system where the email account is functioning.
It works by creating and then sending malware message which contain malicious codes to be executed to all the addresses on a user's list and once this document in form of message is opened,the worm infect the new system.

A typical way the worm successfully carry out this task is the use of phishing and social engineering method which often time require and encourage the email account user to open certain documents on the email.

•FILE SHARING WORM

This worm typically operate by disguising itself as a document or media file.
One of the most common and potent example
of this kind of worm is the stuxnet.

It carry out it operation by spreading or disseminate through the use of Infected USB cable with the worm infection and mostly target Industrial environment such as sewage plant and power utility services.

•CRYPTO WORM

This kind of worm works by the operation of encrypting and decrypting of data in a system,network or victim's computer.
It is often utilise in ransome ware attack where the cybeecrimal demand ransom from the victim to release certain encrypted documents.

•INTERNET WORM

This kind of worm are designed to Target vulnerable website and then end up infecting it.
Once any user visit the website,it automatically infect the system or computer of such user and many other that eventually visit the website hence disseminating really fast .

•INSTANT MESSAGING WORM

This type of worm is a bit similar to the email worm,the only difference is that the malicious message doesn't land on the email this time but comes into the computer directly in form of message or SMS.

The message usually contain a kind of link or an attachment to be open and once opened,the computer becomes Infected by the worm.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

HOW DOES COMPUTER WORM SPREAD

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220405-124804.pngimage from Istock

Although,some computer worms requires certain user action or activities to spread or disseminate such as opening and downloading files and also clicking link.
But most worms are self dependent as far as the spreading operation is concerned and do not require the interference of user.

However,all of these measures such as clicking, opening and downloading of files are necessary for the worm to become active and potent in the Infected system.

Before the use of network became popular and common,the computer worm were mainly disseminated or spread through Infected storage media such as floppy disk and the likes which infect the any user storage device that is connected to the system once it is inputed into the system.

But today the use of USB drive is the major vector that carries and host this malware,it it commonly spread today through Infected USB drives.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

SIGNS OF WORM INFECTION ON YOUR DEVICE

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Some sign that will be observed and notice when your computer is Infected by worm malware are:

•Frequent and unexpected screen freezing and hanging of device.

•Unusual slow performance of the system.

•Malfunctioning of the system or computer such as carrying out certain operation without the user interaction.

•Sudden appearance and disappearance of some unusual and unfamiliar files and icon on the computer.

•Loss of important files and documents.

•Email messages being sent from a user's account to the user's contact list without the user's knowledge.

•constant and consistent warming from the system or computer software and antivirus software operating on the device.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

HOW TO PREVENT, PROTECT & REMOVE COMPUTER FROM COMPUTER WORMS

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220405-125453.pngimage from Istock

There is something known as Cybersecurity hygiene.
It refers to certain measure and precaution put in place to secure and protect ones device from cyber attacks.

Here are some ways to protect and prevent ones device from worm attack.

•download and install software patches as well as operating system update on your computer.

•Making use of firewalls will reduce the chances of your computer being vulnerable to worm attacks.

•Making use of quality and trusted antivirus software or app to protect your computer from worm attack.

•Avoid click, download and opening file and documents from unnamed or unknown source either on the internet,email or direct SMS messages,they often come as attachment.

•Encrypting all the sensitive data and file saved on your computer,server or phone to make is extra secure and safe from attacks.

•Always keep the operating software and antivirus updated all the time to flush out malicious codes that might be hiding in the system or computer.


This is where I will be drawing the curtain on today's edition (part 3) of "UNDERSTANDING MALWARE AND EVERYTHING ELSE ABOUT IT"

See you in my next continuation post on SIZ EDUCATION here in @steem-infinity-zone .

I hope you learnt something new today😊
I'm glad you did.

Thanks for reading.
Special thanks:@siz-official
@faran-nabeel.

Sort:  
Your post has been successfully curated by our team via @nane15 at 70%. Thank you for your committed efforts, we invite you to do more and keep posting high quality posts for a chance to win valuable upvotes from our team of curators and probable selection for an additional upvote later this week in the Top Seven.

received_388032689541375-1.jpeg

Note: You must enter the tag #fintech among the first 4 tags for your post to be reviewed.

 2 years ago 

Thanks for the support 🙏

 2 years ago 

Report,

SteemexclusiveYes
Bit BotNo
Club75Yes
PlagiarismNo
10 % to siz-officialYes
 2 years ago 

My flash drive all time goes infect, 🙄 even Anti virus Installed on my both systems

 2 years ago 

Your flash drive probably get Infected all the time because of unsafe ejection, physical damage or maybe an underlying virus issues that is yet to be fixed.

You can solve this by formatting the flash drive or taking it to a professional for physical damage repair.

Also try making use of firewalls as well as strong and trusted anti-virus software such as Bitdefender antivirus plus and Norton 360 with lifelock.

I hope this answered your question.
Thanks for dropping by👍

Coin Marketplace

STEEM 0.16
TRX 0.15
JST 0.028
BTC 60216.66
ETH 2326.87
USDT 1.00
SBD 2.48