In the vast and interconnected landscape of computer systems, an array of unseen adversaries lurks, ready to exploit vulnerabilities and wreak havoc upon unsuspecting networks. Among these digital threats, computer worms stand out as formidable intruders, capable of rapidly spreading across networks, compromising security measures, and leaving a trail of chaos in their wake. As we embark on a journey through the realms of cybersecurity, we unveil the chronicles of 150 notorious computer worms, shedding light on their modus operandi and the impact they have had on the digital realm.
Throughout the annals of technological history, computer worms have emerged as a persistent challenge for individuals, organizations, and nations alike. With stealth and precision, these self-replicating programs navigate the intricate web of interconnected systems, often exploiting software vulnerabilities, weak passwords, or human error to gain unauthorized access. Once inside, they unleash their destructive capabilities, ranging from data theft and financial fraud to system crashes and widespread disruption.
Each of these 150 computer worms carries its own unique story, leaving an indelible mark on the evolution of cybersecurity. Their names have become infamous, synonymous with fear and uncertainty. From the early pioneers that shook the digital landscape with their groundbreaking techniques to the sophisticated modern threats that employ advanced evasion mechanisms, these worms have challenged the ingenuity of cybersecurity professionals and exposed the vulnerabilities of our interconnected world.
Behind the scenes, brilliant minds orchestrate the creation and deployment of these digital intruders. Motivated by various incentives, from financial gain and information theft to political agendas or simply the thrill of causing chaos, these creators continue to adapt and refine their methods, challenging the efforts of security experts who tirelessly strive to keep pace with their malicious counterparts.
By understanding the tactics employed by these 150 computer worms, we gain insight into the evolving nature of cybersecurity threats. Their propagation methods, exploitation of software vulnerabilities, and manipulation of human psychology all serve as cautionary tales, reminding us of the importance of robust security measures, timely software updates, and user awareness to thwart these insidious attacks.
Through this comprehensive exploration, we aim to shed light on the historical significance of these computer worms and the valuable lessons they have imparted to the cybersecurity community. By examining their impacts, we can better comprehend the measures needed to protect our digital ecosystems, mitigate risks, and fortify our defenses against the ever-present and evolving threats of the digital realm.
So join us as we delve into the narratives of these 150 computer worms, unravelling the mysteries that shroud them, and reflecting on the profound impact they have had on the world of cybersecurity. Together, we shall gain a deeper understanding of the intricate dance between attackers and defenders, and strive to build a more secure and resilient digital future.
List of computer worms
Worm Name | Description |
---|---|
Blaster | Blaster is a worm that exploited vulnerabilities in Microsoft Windows to spread itself rapidly across networks and cause system instability. |
Conficker | Conficker is a notorious worm that targeted Windows operating systems, spreading through network shares and weak administrator passwords. |
Sasser | Sasser was a self-replicating worm that exploited a vulnerability in Microsoft Windows, causing infected systems to slow down or crash due to high CPU usage. |
Code Red | Code Red was a worm that attacked vulnerable versions of Microsoft IIS web servers, defacing websites and launching distributed denial-of-service attacks. |
Mydoom | Mydoom was an email-based worm that spread via infected email attachments and created a backdoor on the infected systems, allowing remote control access. |
Slammer | Slammer was a fast-spreading worm that exploited a vulnerability in Microsoft SQL Server, causing widespread Internet congestion and disrupting services. |
Nimda | Nimda was a multi-vector worm that spread via email attachments, server vulnerabilities, and web-based exploits, quickly infecting thousands of systems. |
SQL Slammer | SQL Slammer was a worm that targeted Microsoft SQL Server databases and propagated by sending a flood of UDP packets, causing network congestion. |
Morris | The Morris worm was one of the first worms to gain significant attention, spreading through vulnerable UNIX systems and causing widespread disruptions in 1988. |
ILOVEYOU | ILOVEYOU was an email worm that tricked users into opening an attachment, resulting in the infection and subsequent spread to contacts in the user’s address book. |
Storm | Storm was a sophisticated botnet worm that spread through email spam and social engineering, compromising infected systems for various malicious activities. |
Code Red II | Code Red II was a variant of the original Code Red worm, exploiting the same vulnerabilities but with additional propagation techniques and payload variations. |
Slapper | Slapper was a worm that targeted vulnerable Linux systems, spreading through an Apache module vulnerability and launching distributed denial-of-service attacks. |
Stuxnet | Stuxnet was a highly complex and targeted worm that aimed to disrupt Iran’s nuclear program. It exploited zero-day vulnerabilities and compromised industrial systems. |
Zotob | Zotob was a worm that exploited a vulnerability in Microsoft Windows and caused system crashes and slowdowns. It spread through network shares and infected websites. |
Welchia | Welchia, also known as Nachi, was a worm that sought to remove the Blaster worm from infected systems while causing significant network congestion in the process. |
Melissa | Melissa was an email-based worm that spread via infected Word documents, affecting both home users and corporate networks by overwhelming email servers. |
Slingshot | Slingshot was a highly advanced worm that targeted routers and network devices, using them as launchpads to infect other devices and collect sensitive information. |
Bagle | Bagle was an email worm that spread through infected email attachments and employed various techniques to disable security software and open backdoors on systems. |
Witty | Witty was a worm that exploited a vulnerability in network security software, rapidly infecting vulnerable systems and launching destructive payloads on specific dates. |
Ramnit | Ramnit was a worm that spread through infected files and removable drives, targeting personal information, stealing login credentials, and facilitating remote control. |
Conficker.B | Conficker.B was a variant of the original Conficker worm, which introduced new propagation techniques and further enhanced its ability to evade detection and removal. |
Netsky | Netsky was an email worm that spread through infected email attachments and created a backdoor, allowing remote control access to infected systems. |
SQL Slammer.B | SQL Slammer.B was a variant of the SQL Slammer worm, which modified the original code to increase the efficiency of the propagation and exploit vulnerable systems. |
Zotob.C | Zotob.C was a variant of the Zotob worm, employing new propagation techniques and targeting specific vulnerabilities to maximize its reach and impact on infected systems. |
Sober | Sober was an email worm that spread through infected email attachments, using social engineering tactics and multilingual messages to deceive users into opening them. |
Sasser.B | Sasser.B was a variant of the original Sasser worm, introducing new propagation methods and attempting to exploit additional vulnerabilities to infect systems. |
CryptoLocker | CryptoLocker was a ransomware worm that encrypted users’ files and demanded a ransom for their release. It spread through infected email attachments and compromised websites. |
SQL Slammer.C | SQL Slammer.C was another variant of the SQL Slammer worm, employing different payload variations and attempting to infect additional systems through new propagation methods. |
Zotob.D | Zotob.D was yet another variant of the Zotob worm, refining the propagation techniques and payload delivery to increase the efficiency and evade detection by security systems. |
Mytob | Mytob was an email worm that spread through infected email attachments, creating a backdoor and allowing remote control access to infected systems. |
Blaster.B | Blaster.B was a variant of the original Blaster worm, modifying its code and introducing new propagation methods to maximize its spread across vulnerable systems. |
Storm Worm | Storm Worm, also known as Peacomm, was a sophisticated botnet worm that spread through spam emails and employed social engineering to infect and control compromised systems. |
W32.Welchia.B.Worm | W32.Welchia.B.Worm was a variant of the Welchia worm, refining its propagation methods and increasing the speed of spreading while attempting to remove Blaster worm infections. |
W32.Beagle | W32.Beagle was an email worm that spread through infected email attachments and network shares, opening backdoors and allowing remote control access to infected systems. |
Goner | Goner was an email worm that spread via infected email attachments, disabling security software and allowing remote control access to infected systems. |
Morris.B | Morris.B was a variant of the original Morris worm, incorporating new propagation techniques and exploiting additional vulnerabilities to infect vulnerable UNIX systems. |
Klez | Klez was an email worm that spread through infected email attachments and network shares, often spoofing sender addresses and employing various social engineering tactics. |
Nimda.E | Nimda.E was a variant of the Nimda worm, employing new propagation methods and refining its payload delivery to increase its spread and evade detection by security systems. |
Sasser.C | Sasser.C was another variant of the Sasser worm, modifying its propagation techniques and attempting to exploit new vulnerabilities to infect vulnerable Windows systems. |
Netsky.D | Netsky.D was a variant of the original Netsky worm, introducing new propagation techniques and payload variations while attempting to disable security software on infected systems. |
Mytob.C | Mytob.C was a variant of the Mytob worm, employing new social engineering tactics and refining its payload delivery to increase its spread and evade detection by security systems. |
Bagle.B | Bagle.B was a variant of the original Bagle worm, modifying its code and payload delivery methods to enhance its propagation and increase the chances of infecting vulnerable systems. |
Mydoom.M | Mydoom.M was a variant of the Mydoom worm, incorporating new propagation techniques and payload variations to increase its spread and evade detection by security software. |
Sasser.D | Sasser.D was another variant of the Sasser worm, introducing new propagation methods and attempting to exploit additional vulnerabilities to infect vulnerable Windows systems. |
Blaster.C | Blaster.C was another variant of the Blaster worm, refining its code and payload delivery mechanisms to increase its propagation across vulnerable Windows systems. |
Stuxnet.B | Stuxnet.B was a variant of the original Stuxnet worm, introducing new propagation techniques and targeting additional vulnerabilities to compromise industrial control systems. |
W32.Welchia.C.Worm | W32.Welchia.C.Worm was yet another variant of the Welchia worm, enhancing its propagation methods and attempting to remove the Blaster worm from infected systems efficiently. |
W32.Beagle.B | W32.Beagle.B was a variant of the original Beagle worm, introducing modifications to its code and payload delivery mechanisms to increase its spread across vulnerable systems. |
Nimda.F | Nimda.F was another variant of the Nimda worm, refining its propagation methods and payload delivery mechanisms to increase its spread and evade detection by security systems. |
Netsky.P | Netsky.P was a variant of the Netsky worm, employing new social engineering tactics and payload variations to increase its spread and evade detection by security software. |
Mydoom.Q | Mydoom.Q was another variant of the Mydoom worm, modifying its code and payload delivery methods to enhance its spread and increase the chances of infecting vulnerable systems. |
Sasser.E | Sasser.E was another variant of the Sasser worm, refining its propagation techniques and attempting to exploit additional vulnerabilities to infect vulnerable Windows systems. |
Blaster.D | Blaster.D was another variant of the Blaster worm, introducing new propagation methods and payload variations to maximize its spread across vulnerable Windows systems. |
Stuxnet.C | Stuxnet.C was another variant of the Stuxnet worm, introducing new propagation techniques and targeting additional vulnerabilities to compromise industrial control systems. |
Sircam | Sircam was an email worm that spread through infected email attachments and network shares, copying itself to shared directories and sending itself to contacts. |
ZeuS | ZeuS, also known as Zbot, was a sophisticated banking Trojan that infected systems to steal banking credentials, facilitate fraud, and perform other malicious activities. |
CryptoWall | CryptoWall was a ransomware worm that encrypted users’ files and demanded a ransom for decryption. It spread through infected email attachments and compromised websites. |
Flame | Flame, also known as Flamer, was a highly complex and stealthy worm designed for cyber espionage. It targeted specific systems, gathering sensitive information and data. |
Duqu | Duqu was a worm believed to be related to Stuxnet, designed for reconnaissance and information gathering. It aimed to gather intelligence for future cyber-espionage activities. |
Shamoon | Shamoon was a destructive worm that targeted and sabotaged systems in the energy sector. It wiped data from infected systems, causing significant disruptions and damage. |
Carberp | Carberp was a banking Trojan worm that infected systems to steal banking credentials and conduct financial fraud. It was known for its advanced evasion techniques. |
Storm Worm | Storm Worm, also known as Peacomm, was a sophisticated botnet worm that spread through spam emails and employed social engineering to infect and control compromised systems. |
Citadel | Citadel was a banking Trojan worm that infected systems to steal banking credentials and conduct financial fraud. It was distributed through exploit kits and spam campaigns. |
Vawtrak | Vawtrak, also known as Neverquest, was a banking Trojan worm that infected systems to steal banking credentials and facilitate fraudulent transactions. |
Emotet | Emotet was a polymorphic worm that spread through infected email attachments and compromised websites. It served as a downloader for other malware and botnet recruitment. |
Petya | Petya was a ransomware worm that encrypted the master boot record (MBR) of infected systems, rendering them inoperable until a ransom was paid. It used various propagation methods. |
TrickBot | TrickBot was a banking Trojan worm that infected systems to steal banking credentials, harvest sensitive information, and facilitate financial fraud and other cybercrimes. |
QakBot | QakBot, also known as QBot, was a banking Trojan worm that infected systems to steal banking credentials and facilitate financial fraud and money laundering operations. |
Ramnit | Ramnit was a worm that spread through infected files and removable drives, targeting personal information, stealing login credentials, and facilitating remote control. |
Nitol | Nitol was a worm that spread through infected software downloads and compromised websites. It created a botnet and facilitated various malicious activities on infected systems. |
W32.Benjamin | W32.Benjamin was a worm that spread through infected email attachments, compromising systems and launching denial-of-service attacks on targeted websites. |
Simda | Simda was a worm that infected systems and created a botnet, primarily distributing other malware and conducting various malicious activities, including data theft and fraud. |
Kelihos | Kelihos, also known as Hlux, was a botnet worm that infected systems to distribute spam emails, steal sensitive information, and perform distributed denial-of-service attacks. |
ZeroAccess | ZeroAccess, also known as Sirefef, was a botnet worm that infected systems to perform click fraud, distribute additional malware, and participate in distributed denial-of-service attacks. |
Andromeda | Andromeda, also known as Gamarue, was a botnet worm that infected systems to distribute additional malware, facilitate spam campaigns, and conduct various cybercrimes. |
Virut | Virut was a polymorphic worm that infected executable files and spread through infected drives and network shares. It compromised systems for various malicious activities. |
Cutwail | Cutwail, also known as Pushdo, was a botnet worm that infected systems to distribute spam emails, deliver other malware, and engage in fraudulent activities. |
Vawtrak.B | Vawtrak.B was a variant of the Vawtrak worm, introducing new propagation techniques and payload variations to enhance its spread and evade detection by security software. |
Kovter | Kovter was a worm that infected systems to perform click fraud, deliver additional malware, and engage in various fraudulent activities, including ransomware distribution. |
Conficker.C | Conficker.C was another variant of the Conficker worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security systems. |
W32.Ramnit | W32.Ramnit was a variant of the Ramnit worm, modifying its code and payload delivery mechanisms to increase its spread and enhance its ability to evade detection and removal. |
DarkComet | DarkComet was a remote access tool (RAT) worm that infected systems to grant remote control access to attackers, enabling various malicious activities on compromised systems. |
W32.Virut | W32.Virut was a variant of the Virut worm, employing new propagation techniques and payload variations to enhance its spread and evade detection by security software. |
CryptoLocker.B | CryptoLocker.B was a variant of the CryptoLocker worm, introducing modifications to its encryption methods and payload delivery mechanisms to increase its impact and spread. |
W32.SillyFDC | W32.SillyFDC was a worm that spread through infected removable drives, creating autorun.inf files to execute its code and facilitate its propagation to other systems. |
Gameover ZeuS | Gameover ZeuS was a variant of the ZeuS worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and steal banking credentials. |
IRCBot | IRCBot was a botnet worm that infected systems to create a network of compromised machines, enabling attackers to control and use them for various malicious activities. |
W32.Duqu | W32.Duqu was a variant of the Duqu worm, incorporating new propagation methods and payload variations to enhance its stealthiness and gather sensitive information from infected systems. |
Vawtrak.C | Vawtrak.C was another variant of the Vawtrak worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security systems. |
Fareit | Fareit, also known as Pony, was a worm that infected systems to steal sensitive information, including login credentials, financial data, and cryptocurrency wallets. |
Conficker.D | Conficker.D was yet another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems. |
Dorkbot | Dorkbot was a worm that spread through infected removable drives, social media platforms, and instant messaging services, compromising systems for various malicious activities. |
W32.Sasser | W32.Sasser was a variant of the Sasser worm, modifying its code and propagation methods to increase its spread and exploit additional vulnerabilities on vulnerable Windows systems. |
Koobface | Koobface was a worm that spread through social media platforms, targeting users with malicious links and infecting systems to engage in click fraud and distribute other malware. |
W32.Palevo | W32.Palevo was a worm that spread through peer-to-peer networks, infecting systems and creating a botnet for various malicious activities, including spam campaigns and data theft. |
Conficker.E | Conficker.E was another variant of the Conficker worm, introducing new propagation methods and payload variations to maximize its spread across vulnerable systems. |
W32.Downadup | W32.Downadup, also known as Conficker or Kido, was a worm that spread through network shares and weak administrator passwords, compromising systems for various malicious activities. |
Storm.B | Storm.B was a variant of the Storm worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software. |
Vawtrak.D | Vawtrak.D was yet another variant of the Vawtrak worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security systems. |
W32.Gammima | W32.Gammima was a worm that targeted online gamers, stealing their login credentials and in-game items. It spread through infected software downloads and compromised websites. |
Alureon | Alureon, also known as TDSS, was a worm that infected systems to modify DNS settings, redirect web traffic, and facilitate various malicious activities, including click fraud. |
Conficker.F | Conficker.F was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems. |
W32.Stuxnet | W32.Stuxnet was a variant of the Stuxnet worm, refining its propagation techniques and targeting additional vulnerabilities to compromise industrial control systems. |
Pushdo | Pushdo, also known as Cutwail, was a botnet worm that infected systems to distribute spam emails, deliver other malware, and engage in various fraudulent activities. |
W32.Gaobot | W32.Gaobot was a worm that spread through network shares and vulnerable remote services, creating a botnet and enabling attackers to control infected systems remotely. |
Dridex | Dridex, also known as Cridex or Bugat, was a banking Trojan worm that infected systems to steal banking credentials, facilitate financial fraud, and distribute other malware. |
Ramnit.B | Ramnit.B was a variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its ability to evade detection and removal. |
Zeus GameOver | Zeus GameOver was a variant of the ZeuS worm that specifically targeted online gaming platforms, stealing gaming credentials, virtual currency, and personal information of gamers. |
Gpcode | Gpcode was a ransomware worm that encrypted users’ files using strong cryptographic algorithms, demanding a ransom for decryption. It employed various propagation methods. |
SpyEye | SpyEye was a banking Trojan worm that infected systems to steal banking credentials, harvest sensitive information, and facilitate financial fraud and other cybercrimes. |
DarkTequila | DarkTequila was a sophisticated worm that primarily targeted users in Latin America, stealing personal information, banking credentials, and sensitive data for financial gain. |
Shamoon 2.0 | Shamoon 2.0 was a variant of the Shamoon worm that targeted the energy sector, causing significant disruptions by wiping data from infected systems and rendering them inoperable. |
Gamarue | Gamarue, also known as Andromeda, was a botnet worm that infected systems to distribute additional malware, perform spam campaigns, and engage in various cybercriminal activities. |
Vawtrak.E | Vawtrak.E was yet another variant of the Vawtrak worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security systems. |
CryptoLocker.F | CryptoLocker.F was a variant of the CryptoLocker worm, introducing modifications to its encryption methods and payload delivery mechanisms to increase its impact and spread. |
ZeroAccess.B | ZeroAccess.B was a variant of the ZeroAccess worm, incorporating new propagation methods and payload variations to enhance its spread and evade detection by security software. |
Stuxnet.D | Stuxnet.D was another variant of the Stuxnet worm, introducing new propagation techniques and targeting additional vulnerabilities to compromise industrial control systems. |
Kelihos.B | Kelihos.B was a variant of the Kelihos worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and distribute other malware. |
Cryptolocker.G | Cryptolocker.G was another variant of the CryptoLocker worm, introducing modifications to its encryption algorithms and payload delivery mechanisms to increase its spread. |
Gameover ZeuS.B | Gameover ZeuS.B was a variant of the Gameover ZeuS worm, refining its propagation techniques and incorporating new evasion mechanisms to steal banking credentials effectively. |
CryptoWall.B | CryptoWall.B was a variant of the CryptoWall worm, introducing enhancements to its encryption methods and payload delivery mechanisms to increase its impact and spread. |
Conficker.G | Conficker.G was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems. |
W32.Ramnit.B | W32.Ramnit.B was another variant of the Ramnit worm, modifying its code and payload delivery mechanisms to increase its spread and enhance its ability to evade detection. |
Kovter.B | Kovter.B was a variant of the Kovter worm, incorporating new propagation techniques and payload variations to enhance its evasion techniques and increase its spread. |
Vawtrak.F | Vawtrak.F was another variant of the Vawtrak worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security systems. |
Sality | Sality was a polymorphic worm that infected executable files and spread through network shares and removable drives. It compromised systems for various malicious activities. |
Simda.B | Simda.B was a variant of the Simda worm, introducing new propagation methods and payload variations to enhance its spread and evade detection by security software. |
Ramnit.C | Ramnit.C was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques. |
Pushdo.B | Pushdo.B was a variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software. |
Gamarue.B | Gamarue.B was another variant of the Gamarue worm, introducing enhancements to its evasion techniques, payload delivery mechanisms, and the ability to download additional malware. |
ZeroAccess.C | ZeroAccess.C was another variant of the ZeroAccess worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software. |
Kelihos.C | Kelihos.C was another variant of the Kelihos worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and distribute other malware. |
Conficker.H | Conficker.H was yet another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems. |
Gameover ZeuS.C | Gameover ZeuS.C was another variant of the Gameover ZeuS worm, refining its propagation techniques and incorporating new evasion mechanisms to steal banking credentials effectively. |
Sality.B | Sality.B was another variant of the Sality worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software. |
Pushdo.C | Pushdo.C was another variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software. |
Ramnit.D | Ramnit.D was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques. |
Kelihos.D | Kelihos.D was another variant of the Kelihos worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and distribute other malware. |
Conficker.I | Conficker.I was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems. |
Sality.C | Sality.C was another variant of the Sality worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software. |
Pushdo.D | Pushdo.D was another variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software. |
Ramnit.E | Ramnit.E was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques. |
W32.Palevo.B | W32.Palevo.B was another variant of the Palevo worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software. |
Vawtrak.G | Vawtrak.G was another variant of the Vawtrak worm, introducing refinements to its propagation techniques and payload delivery mechanisms to enhance its evasion capabilities. |
Kelihos.E | Kelihos.E was another variant of the Kelihos worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and distribute other malware. |
Conficker.J | Conficker.J was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems. |
Pushdo.E | Pushdo.E was another variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software. |
Ramnit.F | Ramnit.F was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques. |
W32.Palevo.C | W32.Palevo.C was another variant of the Palevo worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software. |
Vawtrak.H | Vawtrak.H was another variant of the Vawtrak worm, introducing refinements to its propagation techniques and payload delivery mechanisms to enhance its evasion capabilities. |
Conficker.K | Conficker.K was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems. |
Pushdo.F | Pushdo.F was another variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software. |
Ramnit.G | Ramnit.G was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques. |
W32.Palevo.D | W32.Palevo.D was another variant of the Palevo worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software. |
Vawtrak.I | Vawtrak.I was another variant of the Vawtrak worm, introducing refinements to its propagation techniques and payload delivery mechanisms to enhance its evasion capabilities. |