List of computer worms
Encyclopedia
Name Alias(es) Type Subtype Isolation Date Isolation Origin Author Notes
Badtrans
Badtrans (computer worm)
BadTrans is a malicious Microsoft Windows computer worm distributed by e-mail. Because of a known vulnerability in older versions of Internet Explorer, some e-mail programs, such as Microsoft's Outlook Express and Microsoft Outlook programs, may install and execute the worm as soon as the e-mail...

Mass mailer November 24, 2001 Installed a keylogger; distributed logged information
Bagle
Bagle (computer worm)
Bagle is a mass-mailing computer worm affecting all versions of Microsoft Windows. The first strain, Bagle.A, did not propagate widely. A second variant, Bagle.B, is considerably more virulent....

Beagle, Mitglieder, Lodeight January 18, 2004 Mass mailer
Blaster
Blaster (computer worm)
The Blaster Worm was a computer worm that spread on computers running the Microsoft operating systems: Windows XP and Windows 2000, during August 2003....

Lovesan August 11, 2003 Gruel.exe Makes all exe's unusable so the computer probably can't reboot Hopkins, Minnesota
Hopkins, Minnesota
As of the census of 2000, there were 17,145 people, 8,224 households, and 3,741 families residing in the city. The population density was 4,205.9 people per square mile . There were 8,390 housing units at an average density of 2,058.2 pe square mile...

Jeffrey Lee Parson Targeted toward Bill Gates
Bill Gates
William Henry "Bill" Gates III is an American business magnate, investor, philanthropist, and author. Gates is the former CEO and current chairman of Microsoft, the software company he founded with Paul Allen...

; contained message "billy gates why do you make this possible ? Stop making money and fix your software!!"
Brontok
Brontok (computer worm)
Brontok is a computer virus. Variants include:* Brontok.D* Brontok.F* Brontok.G* Brontok.H* Brontok.I* Brontok.K* Brontok.Q- Other names :...

W32/Rontokbro.gen@MM, W32.Rontokbro@mm, BackDoor.Generic.1138, W32/Korbo-B, Worm/Brontok.a, Win32.Brontok.A@mm, Worm.Mytob.GH, W32/Brontok.C.worm, and Win32/Brontok.E, W32.Rontokbro.D@mm. October 3, 2005 Indonesia
Indonesia
Indonesia , officially the Republic of Indonesia , is a country in Southeast Asia and Oceania. Indonesia is an archipelago comprising approximately 13,000 islands. It has 33 provinces with over 238 million people, and is the world's fourth most populous country. Indonesia is a republic, with an...

Spread through an Indonesian e-mail headed with "stop the collapse in this country"; destroys firewalls
BuluBebek W32/VBWorm.QXE October 10, 2008
Code Red
Code Red (computer worm)
The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server.The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh...

ndjupi Server Jamming Worm July 13, 2001 Defaced websites with "Hacked by Chinese!"
Daprosy Worm
Daprosy Worm
Daprosy worm is a malicious computer program that spreads via local area network connections, spammed e-mails and USB mass storage devices. Infection comes from a single read1st.exe file where several dozen clones are created at once bearing the names of compromised folders...

Worm.Win32.VB.arz, W32.Autorun.worm.h, W32/Autorun-AMS, Worm:Win32/Autorun.UD Trojan worm Mass mailer July 15, 2009 Replaces folders with .EXE's, key logger, slow mass mailer
Code Red II
Code Red II (computer worm)
Code Red II is a computer worm similar to the Code Red worm. Released two weeks after Code Red on August 4, 2001, although similar in behavior to the original, analysis showed it to be a new worm instead of a variant...

August 4, 2001 Exploited Microsoft Internet Information Server security holes.
Dabber
Dabber (computer worm)
Dabber is a computer worm that spreads through a vulnerability found in the Sasser worm. It appeared in 2004.-External links:*...

W32/Dabber-C, W32/Dabber.A May 14, 2004
Doomjuice
Doomjuice (computer worm)
Doomjuice is a variant of the Mydoom computer worm, in two variants known as Doomjuice.A or Doomjuice.B. It infects Microsoft Windows utilizing the ports left open by the Mydoom.A and Mydoom.B worms...

Feb 11, 2004 Attacked computers that had previously been infected by the Mydoom worm.
ExploreZip
ExploreZip
ExploreZip, also known as I-Worm.ZippedFiles, is a destructive computer worm which attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999.Worm.ExploreZip is a worm that contains a malicious payload. The worm utilizes Microsoft Outlook, Outlook Express, or...

I-Worm.ZippedFiles June 6, 1999 Spread through zipped documents in a spam e-mail.
Father Christmas
Father Christmas (computer worm)
The Father Christmas worm was a computer worm that used the DECnet to attack VAX/VMS systems. It was released in December 1988.The aim of this worm was to send a Christmas greeting from "Father Christmas" from the affected system.-External links:*...

HI.COM December 1988
Hybris
Hybris (computer worm)
Hybris, also known as Snow White, Vecna.22528, and Full Moon, is a computer worm believed to be written by Brazilian virus writer Vecna, member of the computer virus writing group 29A. It first appeared in September 2000 and became more common in January 2001....

Snow White, Full Moon, Vecna.22528 December 11, 2000 Brazil
Brazil
Brazil , officially the Federative Republic of Brazil , is the largest country in South America. It is the world's fifth largest country, both by geographical area and by population with over 192 million people...

Vecna Spread through an e-mail from "haha@sexyfun.net"
ILOVEYOU Loveletter, LoveBug May 4, 2000 Manila, Philippines
Kaja
KAJA
KAJA may refer to:* KAJA , a radio station licensed to San Antonio, Texas, United States* K68DJ, a television station licensed to Corpus Christi, Texas, United States, unofficially known as KAJA...

Parasite
Kak worm
Kak worm
KAK is 1999 a JavaScript worm that uses a bug in Outlook Express to spread itself.On the first day of every month, at 5:00 pm, the worm uses shutdown.exe to initiate a shutdown and show a popup with text "Kagou-anti-Kro$oft says not today!". A minimized window often appears on startup with the...

October 22, 1999 Restarted the computer after 5pm, on the first day of each month, and displayed the message: "Driver Memory Error - Kagou-Anti-Kro$oft says not today !"
Klez
Klez (computer worm)
Klez is a computer worm that propagates via e-mail. It first appeared in October 2001. A number of variants of the worm exist.Klez infects Microsoft Windows systems, exploiting a vulnerability in Internet Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook Express to render...

October 2001
Koobface
Koobface
Koobface is a computer worm that targets users of the social networking websites Facebook , MySpace, hi5, Bebo, Friendster and Twitter. Koobface is designed to infect Microsoft Windows and Mac OS X, but also works on Linux...

December 2008 Targeted MySpace and Facebook users with a heading of "Happy Holidays"
Mabutu July 27, 2004
Melissa
Melissa (computer worm)
The Melissa virus, also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo", is a mass-mailing macro virus. As it is not a standalone program, it is not a worm.-History:...

Simpsons, Kwyjibo, Kwejeebo March 26, 1999 Not originally intended as harmful, but crashed servers by flooding them with e-mail
Morris
Morris (computer worm)
The Morris worm or Internet worm of November 2, 1988 was one of the first computer worms distributed via the Internet. It is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the US under the 1986...

November 2, 1988 Robert Tappan Morris
Robert Tappan Morris
Robert Tappan Morris, , is an American computer scientist, best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet - and subsequently becoming the first person convicted under the Computer Fraud and Abuse Act.He went on to co-found the online store...

The first computer worm, written to gauge the size of the Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

. It unintentionally slowed and crashed computers.
Mydoom W32.MyDoom@mm, Novarg, Mimail.R, Shimgapi January 26, 2004 Fastest-spreading e-mail
E-mail
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...

 worm known; used to attack SCO Group
SCO Group
TSG Group, Inc. is a software company formerly called The SCO Group, Caldera Systems, and Caldera International. After acquiring the Santa Cruz Operation's Server Software and Services divisions, as well as UnixWare and OpenServer technologies, the company changed its focus to UNIX...

.
Mylife
Mylife (computer worm)
MyLife, discovered by MessageLabs in 2002, is a computer worm that spreads itself by sending email to the addresses found in Microsoft Outlook's contacts list. Written in Visual Basic, it displays an image of a girl holding a flower while it attempts to delete files with certain filename...

W32.MyLife.C@mm April 2, 2002 http://www.snopes.com/computer/virus/mylife.htm
Navidad
Navidad virus
W32.Navidad is a mass-mailing worm program or virus designed to spread through email clients such as Microsoft Outlook.It replies to all emails with an attachment using the original subject line.-Source:*...

Netsky
Netsky (computer worm)
Netsky is a prolific family of computer worms. The first variant appeared on Monday, February 16, 2004. The "B" variant was the first family member to find its way into mass distribution. It appeared on Wednesday, February 18, 2004...

February 18, 2004 Germany
Germany
Germany , officially the Federal Republic of Germany , is a federal parliamentary republic in Europe. The country consists of 16 states while the capital and largest city is Berlin. Germany covers an area of 357,021 km2 and has a largely temperate seasonal climate...

Sven Jaschan
Sven Jaschan
Sven Jaschan is the self-confessed author of the NetSky worms, and Sasser computer worms.- History :Jaschan lived in the village of Waffensen, Germany and attended a computer science school in nearby Rotenburg....

Nimda
Nimda (computer worm)
Nimda is a computer worm, and is also a file infector. It quickly spreads, eclipsing the economic damage caused by past outbreaks such as Code Red. Multiple propagation vectors allowed Nimda to become the Internet’s most widespread virus/worm within 22 minutes.The worm was released on September...

September 2001 Originally suspected to be connected to Al Qaeda because of release date; uses multiple infection vectors
Sadmind
Sadmind (computer worm)
The Sadmind worm was a self-propagating piece of malware.It exploited vulnerabilities in both Sun Microsystems' Solaris and Microsoft's Internet Information Services , for which a patch had been made available seven months earlier...

May 8, 2001
Sasser
Sasser (computer worm)
Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable network port...

Big One April 30, 2004 Sven Jaschan
Sven Jaschan
Sven Jaschan is the self-confessed author of the NetSky worms, and Sasser computer worms.- History :Jaschan lived in the village of Waffensen, Germany and attended a computer science school in nearby Rotenburg....

Sircam
Sircam (computer worm)
Sircam is a computer worm that propagates by e-mail from Microsoft Windows systems. It begins with one of the following lines of text and has an attachment consisting of the worm's executable with some file from the infected computer appended....

Spread through e-mail with text like "I send you this file in order to have your advice."
Sober
Sober (computer worm)
The Sober worm is a family of computer worms that was discovered on October 24, 2003. Like many worms, Sober sends itself as an e-mail attachment....

CME-681, WORM_SOBER.AG October 24, 2003 Germany
Germany
Germany , officially the Federal Republic of Germany , is a federal parliamentary republic in Europe. The country consists of 16 states while the capital and largest city is Berlin. Germany covers an area of 357,021 km2 and has a largely temperate seasonal climate...

, possibly from National Democratic Party of Germany
National Democratic Party of Germany
The National Democratic Party of Germany – The People's Union , is a far right German nationalist party. It was founded in 1964 a successor to the German Reich Party . Party statements self-identify as Germany's "only significant patriotic force"...

Was disguised as e-mail from United States government.
Sobig
Sobig (computer worm)
The Sobig Worm was a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003.Although there were indications that tests of the worm were carried out as early as August 2002, Sobig.A was first found in the wild in January 2003. Sobig.B was released on...

SQL Slammer DDOS.SQLP1434.A, the Sapphire Worm, SQL_HEL, W32/SQLSlammer Caused global Internet slowdown
Stuxnet
Stuxnet
Stuxnet is a computer worm discovered in June 2010. It initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment...

Win32/Stuxnet June 2010 First malware to attack SCADA
SCADA
SCADA generally refers to industrial control systems : computer systems that monitor and control industrial, infrastructure, or facility-based processes, as described below:...

 systems.
Swen
Swen
Swen is a mass mailing computer worm written in C++. It sends an email which contains the installer for the virus, disguised as a Microsoft Windows update, although it also works on P2P filesharing networks, IRC and newsgroups' websites. It was first analyzed on September 18, 2003, however, it...

Supernova Worm Supova, Hello Kitty July 10, 2002 Posed as files relating to video games Quake and Grand Theft Auto
Grand Theft Auto (series)
Grand Theft Auto is a multi-award-winning British video game series created in the United Kingdom by Dave Jones, then later by brothers Dan Houser and Sam Houser, and game designer Zachary Clarke. It is primarily developed by Edinburgh based Rockstar North and published by Rockstar Games...

; attacked Christian websites
Upering
Upering (computer worm)
Upering is a mass-mailing worm. It was isolated in Tacoma, Washington, in the United States, from several submissions from America Online members. As of late 2005, it is listed on the WildList, and has been since 2003.-References:*...

Annoyer.B, Sany July 22, 2003
W32/Bolgimo.worm
W32/Bolgimo.worm (computer worm)
Bolgimo is a Win32 computer worm, a self-replicating computer program similar to a computer virus, which attempts to exploit unpatched Windows computers on a network....

W32/Fus.worm
W32/IRCbot.worm
Backdoor.Win32.IRCBot
Backdoor.Win32.IRCBot is a backdoor computer worm that is spread through MSN Messenger and Windows Live Messenger...

W32/Checkout, W32.Mubla, W32/IRCBot-WB, and Backdoor.Win32.IRCBot.aaq Trojan Worm Backdoor June 1, 2007 It provides a backdoor server and allows a remote intruder to gain access and control over the computer via an IRC channel.
WANK
WANK (computer worm)
The WANK Worm was a computer worm that attacked DEC VMS computers in 1989 over the DECnet. It was written in DIGITAL Command Language.-Origin:...

OILZ October 1989 Spread a pacifist, anti-nuclear political message
Welchia
Welchia (computer worm)
The Welchia worm, also known as the "Nachia worm," is a computer worm that exploits a vulnerability in the Microsoft Remote procedure call service similar to the Blaster worm. However unlike Blaster, it tries to download and install security patches from Microsoft, so it is classified as a helpful...

Nachia A helpful worm
Helpful worm
A helpful worm is variant on a computer worm which delivers its payload by doing "helpful" actions instead of malicious actions. Welchia was a major example of a helpful worm - utilizing the same exploit that caused the Blaster worm...

 meant to install security patches.
Witty
Witty (computer worm)
The Witty worm is a computer worm that attacks the firewall and other computer security products written by a particular company, Internet Security Systems now IBM Internet Security Systems. It was the first worm to take advantage of vulnerabilities in the very pieces of software designed to...

March 19, 2004 Appeared very rapidly after announcement of Internet Security Systems
Internet Security Systems
IBM Internet Security Systems is a security software provider which was founded in 1994 as Internet Security Systems, and is often known simply as ISS or ISSX...

 vulnerability
Zotob
Zotob (computer worm)
"The Zotob worm and several variations of it, known as Rbot.cbq, SDBot.bzh and Zotob.d, infected computers at companies such as ABC, CNN, The Associated Press, The New York Times, and Caterpillar Inc." — Business Week, August 16, 2005....

Farid Essebar
Farid Essebar
Farid Essebar is a Moroccan black hat hacker. He is also a Russian citizen. He was one of the two people behind the spread of the Zotob computer worm that targeted Windows 2000 operating systems in 2005...

 and Atilla Ekici

See also

  • Timeline of notable computer viruses and worms
    Timeline of notable computer viruses and worms
    This is a timeline of noteworthy computer viruses, worms and Trojan horses.- 1966 :* The work of John von Neumann on the "Theory of self-reproducing automata" is published...

  • Malware
    Malware
    Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

  • Computer worm
    Computer worm
    A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach...

  • List of computer viruses
  • List of trojan horses
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK