Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Computer worm

From Wikipedia, the free encyclopedia
(Redirected fromInternet worm)
Self-replicating malware program
This article is about coding of a worm. For the data storage device, seewrite once read many. For other uses, seeWorm (disambiguation).
Not to be confused withComputer virus.
Hex dump of theBlaster worm, showing a message left forMicrosoftCEOBill Gates by the worm's creator
Spread ofConficker worm

Acomputer worm is a standalonemalwarecomputer program that replicates itself in order to spread to other computers.[1] It often uses acomputer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue.[2] Computer worms userecursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages ofexponential growth, thus controlling and infecting more and more computers in a short time.[3] Worms almost always cause at least some harm to the network, even if only by consumingbandwidth, whereasviruses almost always corrupt or modify files on a targeted computer.

Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as theMorris worm andMydoom showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects.

History

[edit]

The first ever computer worm is generally accepted to be a self-replicating version ofCreeper created byRay Tomlinson and Bob Thomas atBBN in 1971 to replicate itself across theARPANET.[4][5] Tomlinson also devised the firstantivirus software, namedReaper, to delete the Creeper program.

The term "worm" was first used in this sense inJohn Brunner's 1975 novel,The Shockwave Rider. In the novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful people who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it. There's never been a worm with that tough a head or that long a tail!"[6] "Then the answer dawned on him, and he almost laughed. Fluckner had resorted to one of the oldest tricks in the store and turned loose in the continental net a self-perpetuating tapeworm, probably headed by a denunciation group "borrowed" from a major corporation, which would shunt itself from one nexus to another every time his credit-code was punched into a keyboard. It could take days to kill a worm like that, and sometimes weeks."[6]

Xerox PARC was studying the use of "worm" programs fordistributed computing in 1979.[7]

On November 2, 1988,Robert Tappan Morris, aCornell University computer science graduate student, unleashed what became known as theMorris worm, disrupting many computers then on the Internet, guessed at the time to be one tenth of all those connected.[8] During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the worm from each installation at between $200 and $53,000; this work prompted the formation of theCERT Coordination Center[9] and Phage mailing list.[10] Morris himself became the first person tried and convicted under the 1986Computer Fraud and Abuse Act.[11]

Conficker, a computer worm discovered in 2008 that primarily targetedMicrosoft Windows operating systems, is a worm that employs three different spreading strategies: local probing, neighborhood probing, and global probing.[12] This worm was considered a hybrid epidemic and affected millions of computers. The term "hybrid epidemic" is used because of the three separate methods it employed to spread, which was discovered through code analysis.[13]

Features

[edit]

Independence

Computer viruses generally require a host program.[14] The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by thehost program, but can run independently and actively carry out attacks.[15][16]

Exploit attacks

Because a worm is not limited by the host program, worms can take advantage of various operating system vulnerabilities to carry out active attacks. For example, the "Nimda" virusexploitsvulnerabilities to attack.

Complexity

Some worms are combined with web page scripts, and are hidden inHTML pages usingVBScript,ActiveX and other technologies. When a user accesses a webpage containing a virus, the virus automatically resides in memory and waits to be triggered. There are also some worms that are combined withbackdoor programs orTrojan horses, such as "Code Red".[17]

Contagiousness

Worms are more infectious than traditional viruses. They not only infect local computers, but also all servers and clients on the network based on the local computer. Worms can easily spread throughshared folders,e-mails,[18] malicious web pages, and servers with a large number of vulnerabilities in the network.[19]

Harm

[edit]

Any code designed to do more than spread the worm is typically referred to as the "payload". Typical malicious payloads might delete files on a host system (e.g., theExploreZip worm), encrypt files in aransomware attack, orexfiltrate data such as confidential documents or passwords.[20]

Some worms may install abackdoor. This allows the computer to be remotely controlled by the worm author as a "zombie". Networks of such machines are often referred to asbotnets and are very commonly used for a range of malicious purposes, including sendingspam or performingDoS attacks.[21][22][23]

Some special worms attack industrial systems in a targeted manner.Stuxnet was primarily transmitted through LANs and infected thumb-drives, as its targets were never connected to untrusted networks, like the internet. This virus can destroy the core production control computer software used by chemical, power generation and power transmission companies in various countries around the world - in Stuxnet's case, Iran, Indonesia and India were hardest hit - it was used to "issue orders" to other equipment in the factory, and to hide those commands from being detected. Stuxnet used multiple vulnerabilities and four different zero-day exploits (e.g.:[1]) inWindows systems and SiemensSIMATICWinCC systems to attack the embedded programmable logic controllers of industrial machines. Although these systems operate independently from the network, if the operator inserts a virus-infected drive into the system's USB interface, the virus will be able to gain control of the system without any other operational requirements or prompts.[24][25][26]

Countermeasures

[edit]

Worms spread by exploiting vulnerabilities in operating systems.Vendors with security problems supply regular security updates[27] (see "Patch Tuesday"), and if these are installed to a machine, then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, azero-day attack is possible.

Users need to be wary of opening unexpected emails,[28][29] and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with theILOVEYOU worm, and with the increased growth and efficiency ofphishing attacks, it remains possible to trick the end-user into running malicious code.

Anti-virus andanti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of afirewall is also recommended.

Users can minimize the threat posed by worms by keeping their computers' operating system and other software up to date, avoiding opening unrecognized or unexpected emails and runningfirewall and antivirus software.[30]

Mitigation techniques include:

Infections can sometimes be detected by their behavior - typically scanning the Internet randomly, looking for vulnerable hosts to infect.[31][32] In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.[33]

Helpful worms

[edit]

Ahelpful worm oranti-worm is a worm designed to do something that its author feels is helpful, though not necessarily with the permission of the executing computer's owner. Beginning with the first research into worms atXerox PARC, there have been attempts to create useful worms. Those worms allowedJohn Shoch and Jon Hupp to test theEthernet principles on their network ofXerox Alto computers.[34] Similarly, theNachi family of worms tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system by exploiting those same vulnerabilities.[35] In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Regardless of their payload or their writers' intentions, security experts regard all worms asmalware. Another example of this approach isRoku OS patching a bug allowing for Roku OS to be rooted via an update to their screensaver channels, which the screensaver would attempt to connect to the telnet and patch the device.[36]

One study proposed the first computer worm that operates on the second layer of theOSI model (Data link Layer), utilizing topology information such asContent-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.[37]

Anti-worms have been used to combat the effects of theCode Red,[38]Blaster, andSanty worms.Welchia is an example of a helpful worm.[39] Utilizing the same deficiencies exploited by theBlaster worm, Welchia infected computers and automatically began downloadingMicrosoft security updates forWindows without the users' consent. Welchia automatically reboots the computers it infects after installing the updates. One of these updates was the patch that fixed the exploit.[39]

Other examples of helpful worms are "Den_Zuko", "Cheeze", "CodeGreen", and "Millenium".[39]

Art worms support artists in the performance of massive scale ephemeral artworks. It turns the infected computers into nodes that contribute to the artwork.[40]

See also

[edit]

References

[edit]
  1. ^Barwise, Mike."What is an internet worm?". BBC. Archived fromthe original on 2015-03-24. Retrieved9 September 2010.
  2. ^Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2015-05-15)."Hybrid Epidemics—A Case Study on Computer Worm Conficker".PLOS ONE.10 (5): e0127478.arXiv:1406.6046.Bibcode:2015PLoSO..1027478Z.doi:10.1371/journal.pone.0127478.ISSN 1932-6203.PMC 4433115.PMID 25978309.
  3. ^Marion, Jean-Yves (2012-07-28)."From Turing machines to computer viruses".Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.370 (1971):3319–3339.Bibcode:2012RSPTA.370.3319M.doi:10.1098/rsta.2011.0332.ISSN 1364-503X.PMID 22711861.
  4. ^IEEE Annals of the History of Computing. Vol. 27–28. IEEE Computer Society. 2005. p. 74.[...]from one machine to another led to experimentation with theCreeper program, which became the world's first computer virus: a computation that used the network to recreate itself on another node, and spread from node to node. The source code of creeper remains unknown.
  5. ^From the first email to the first YouTube video: a definitive internet history. Tom Meltzer and Sarah Phillips.The Guardian. 23 October 2009
  6. ^abBrunner, John (1975).The Shockwave Rider. New York: Ballantine Books.ISBN 978-0-06-010559-4.
  7. ^J. Postel (17 May 1979).Internet Meeting Notes 8, 9, 10 & 11 May 1979. p. 5.doi:10.17487/RFC2555.RFC2555.
  8. ^"The Submarine".www.paulgraham.com.
  9. ^"Security of the Internet".CERT/CC.
  10. ^"Phage mailing list". securitydigest.org. Archived fromthe original on 2011-07-26. Retrieved2014-09-17.
  11. ^Dressler, J. (2007). "United States v. Morris".Cases and Materials on Criminal Law. St. Paul, MN: Thomson/West.ISBN 978-0-314-17719-3.
  12. ^Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2015-05-15)."Hybrid Epidemics—A Case Study on Computer Worm Conficker".PLOS ONE.10 (5): e0127478.arXiv:1406.6046.Bibcode:2015PLoSO..1027478Z.doi:10.1371/journal.pone.0127478.ISSN 1932-6203.PMC 4433115.PMID 25978309.
  13. ^Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2015-05-15). Sun, Gui-Quan (ed.)."Hybrid Epidemics—A Case Study on Computer Worm Conficker".PLOS ONE.10 (5): e0127478.arXiv:1406.6046.Bibcode:2015PLoSO..1027478Z.doi:10.1371/journal.pone.0127478.ISSN 1932-6203.PMC 4433115.PMID 25978309.
  14. ^"Worm vs. Virus: What's the Difference and Does It Matter?".Worm vs. Virus: What's the Difference and Does It Matter?. Retrieved2021-10-08.
  15. ^Yeo, Sang-Soo. (2012).Computer science and its applications : CSA 2012, Jeju, Korea, 22-25.11.2012. Springer. p. 515.ISBN 978-94-007-5699-1.OCLC 897634290.
  16. ^Yu, Wei; Zhang, Nan; Fu, Xinwen; Zhao, Wei (October 2010). "Self-Disciplinary Worms and Countermeasures: Modeling and Analysis".IEEE Transactions on Parallel and Distributed Systems.21 (10):1501–1514.doi:10.1109/tpds.2009.161.ISSN 1045-9219.S2CID 2242419.
  17. ^Brooks, David R. (2017), "Introducing HTML",Programming in HTML and PHP, Undergraduate Topics in Computer Science, Springer International Publishing, pp. 1–10,doi:10.1007/978-3-319-56973-4_1,ISBN 978-3-319-56972-7
  18. ^Deng, Yue; Pei, Yongzhen; Li, Changguo (2021-11-09)."Parameter estimation of a susceptible–infected–recovered–dead computer worm model".Simulation.98 (3):209–220.doi:10.1177/00375497211009576.ISSN 0037-5497.S2CID 243976629.
  19. ^Lawton, George (June 2009). "On the Trail of the Conficker Worm".Computer.42 (6):19–22.doi:10.1109/mc.2009.198.ISSN 0018-9162.S2CID 15572850.
  20. ^"What is a malicious payload?".www.cloudflare.com. Retrieved2025-01-02.
  21. ^Ray, Tiernan (February 18, 2004)."Business & Technology: E-mail viruses blamed as spam rises sharply".The Seattle Times. Archived fromthe original on August 26, 2012. RetrievedMay 18, 2007.
  22. ^McWilliams, Brian (October 9, 2003)."Cloaking Device Made for Spammers".Wired.
  23. ^"Hacker threats to bookies probed".BBC News. February 23, 2004.
  24. ^Bronk, Christopher; Tikk-Ringas, Eneken (May 2013). "The Cyber Attack on Saudi Aramco".Survival.55 (2):81–96.doi:10.1080/00396338.2013.784468.ISSN 0039-6338.S2CID 154754335.
  25. ^Lindsay, Jon R. (July 2013). "Stuxnet and the Limits of Cyber Warfare".Security Studies.22 (3):365–404.doi:10.1080/09636412.2013.816122.ISSN 0963-6412.S2CID 154019562.
  26. ^Wang, Guangwei; Pan, Hong; Fan, Mingyu (2014). "Dynamic Analysis of a Suspected Stuxnet Malicious Code".Proceedings of the 3rd International Conference on Computer Science and Service System. Vol. 109. Paris, France: Atlantis Press.doi:10.2991/csss-14.2014.86.ISBN 978-94-6252-012-7.
  27. ^"USN list". Ubuntu. Retrieved2012-06-10.
  28. ^"Threat Description Email-Worm". Archived fromthe original on 2018-01-16. Retrieved2018-12-25.
  29. ^"Email-Worm:VBS/LoveLetter Description | F-Secure Labs".www.f-secure.com.
  30. ^"Computer Worm Information and Removal Steps". Veracode. 2014-02-02. Retrieved2015-04-04.
  31. ^Sellke, S. H.; Shroff, N. B.; Bagchi, S. (2008). "Modeling and Automated Containment of Worms".IEEE Transactions on Dependable and Secure Computing.5 (2):71–86.doi:10.1109/tdsc.2007.70230.
  32. ^"A New Way to Protect Computer Networks from Internet Worms".Newswise. RetrievedJuly 5, 2011.
  33. ^Moskovitch, Robert; Elovici, Yuval; Rokach, Lior (2008). "Detection of unknown computer worms based on behavioral classification of the host".Computational Statistics & Data Analysis.52 (9):4544–4566.doi:10.1016/j.csda.2008.01.028.S2CID 1097834.
  34. ^Shoch, John; Hupp, Jon (Mar 1982)."The "Worm" Programs - Early Experience with a Distributed Computation".Communications of the ACM.25 (3):172–180.doi:10.1145/358453.358455.S2CID 1639205.
  35. ^"Virus alert about the Nachi worm". Microsoft.
  36. ^"Root My Roku".GitHub.
  37. ^Al-Salloum, Z. S.; Wolthusen, S. D. (2010). "A link-layer-based self-replicating vulnerability discovery agent".The IEEE symposium on Computers and Communications. p. 704.doi:10.1109/ISCC.2010.5546723.ISBN 978-1-4244-7754-8.S2CID 3260588.
  38. ^"vnunet.com 'Anti-worms' fight off Code Red threat". Sep 14, 2001. Archived fromthe original on 2001-09-14.
  39. ^abcThe Welchia Worm. December 18, 2003. p. 1. Retrieved9 June 2014.
  40. ^Aycock, John (2022-09-15)."Painting the Internet".Leonardo.42 (2):112–113 – via MUSE.

External links

[edit]
Malware topics
Infectious malware
Concealment
Malware for profit
By operating system
Protection
Countermeasures
Related security categories
vectorial version
vectorial version
Threats
Defenses


Authority control databases: NationalEdit this at Wikidata
Retrieved from "https://en.wikipedia.org/w/index.php?title=Computer_worm&oldid=1288560792"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp