List of 150 Computer Worms – Explained!

Frustrated woman in front of laptop

In the vast and interconnected landscape of computer systems, an array of unseen adversaries lurks, ready to exploit vulnerabilities and wreak havoc upon unsuspecting networks. Among these digital threats, computer worms stand out as formidable intruders, capable of rapidly spreading across networks, compromising security measures, and leaving a trail of chaos in their wake. As we embark on a journey through the realms of cybersecurity, we unveil the chronicles of 150 notorious computer worms, shedding light on their modus operandi and the impact they have had on the digital realm.

Throughout the annals of technological history, computer worms have emerged as a persistent challenge for individuals, organizations, and nations alike. With stealth and precision, these self-replicating programs navigate the intricate web of interconnected systems, often exploiting software vulnerabilities, weak passwords, or human error to gain unauthorized access. Once inside, they unleash their destructive capabilities, ranging from data theft and financial fraud to system crashes and widespread disruption.

Each of these 150 computer worms carries its own unique story, leaving an indelible mark on the evolution of cybersecurity. Their names have become infamous, synonymous with fear and uncertainty. From the early pioneers that shook the digital landscape with their groundbreaking techniques to the sophisticated modern threats that employ advanced evasion mechanisms, these worms have challenged the ingenuity of cybersecurity professionals and exposed the vulnerabilities of our interconnected world.

Behind the scenes, brilliant minds orchestrate the creation and deployment of these digital intruders. Motivated by various incentives, from financial gain and information theft to political agendas or simply the thrill of causing chaos, these creators continue to adapt and refine their methods, challenging the efforts of security experts who tirelessly strive to keep pace with their malicious counterparts.

By understanding the tactics employed by these 150 computer worms, we gain insight into the evolving nature of cybersecurity threats. Their propagation methods, exploitation of software vulnerabilities, and manipulation of human psychology all serve as cautionary tales, reminding us of the importance of robust security measures, timely software updates, and user awareness to thwart these insidious attacks.

Through this comprehensive exploration, we aim to shed light on the historical significance of these computer worms and the valuable lessons they have imparted to the cybersecurity community. By examining their impacts, we can better comprehend the measures needed to protect our digital ecosystems, mitigate risks, and fortify our defenses against the ever-present and evolving threats of the digital realm.

So join us as we delve into the narratives of these 150 computer worms, unravelling the mysteries that shroud them, and reflecting on the profound impact they have had on the world of cybersecurity. Together, we shall gain a deeper understanding of the intricate dance between attackers and defenders, and strive to build a more secure and resilient digital future.

List of computer worms

Worm Name Description
Blaster Blaster is a worm that exploited vulnerabilities in Microsoft Windows to spread itself rapidly across networks and cause system instability.
Conficker Conficker is a notorious worm that targeted Windows operating systems, spreading through network shares and weak administrator passwords.
Sasser Sasser was a self-replicating worm that exploited a vulnerability in Microsoft Windows, causing infected systems to slow down or crash due to high CPU usage.
Code Red Code Red was a worm that attacked vulnerable versions of Microsoft IIS web servers, defacing websites and launching distributed denial-of-service attacks.
Mydoom Mydoom was an email-based worm that spread via infected email attachments and created a backdoor on the infected systems, allowing remote control access.
Slammer Slammer was a fast-spreading worm that exploited a vulnerability in Microsoft SQL Server, causing widespread Internet congestion and disrupting services.
Nimda Nimda was a multi-vector worm that spread via email attachments, server vulnerabilities, and web-based exploits, quickly infecting thousands of systems.
SQL Slammer SQL Slammer was a worm that targeted Microsoft SQL Server databases and propagated by sending a flood of UDP packets, causing network congestion.
Morris The Morris worm was one of the first worms to gain significant attention, spreading through vulnerable UNIX systems and causing widespread disruptions in 1988.
ILOVEYOU ILOVEYOU was an email worm that tricked users into opening an attachment, resulting in the infection and subsequent spread to contacts in the user’s address book.
Storm Storm was a sophisticated botnet worm that spread through email spam and social engineering, compromising infected systems for various malicious activities.
Code Red II Code Red II was a variant of the original Code Red worm, exploiting the same vulnerabilities but with additional propagation techniques and payload variations.
Slapper Slapper was a worm that targeted vulnerable Linux systems, spreading through an Apache module vulnerability and launching distributed denial-of-service attacks.
Stuxnet Stuxnet was a highly complex and targeted worm that aimed to disrupt Iran’s nuclear program. It exploited zero-day vulnerabilities and compromised industrial systems.
Zotob Zotob was a worm that exploited a vulnerability in Microsoft Windows and caused system crashes and slowdowns. It spread through network shares and infected websites.
Welchia Welchia, also known as Nachi, was a worm that sought to remove the Blaster worm from infected systems while causing significant network congestion in the process.
Melissa Melissa was an email-based worm that spread via infected Word documents, affecting both home users and corporate networks by overwhelming email servers.
Slingshot Slingshot was a highly advanced worm that targeted routers and network devices, using them as launchpads to infect other devices and collect sensitive information.
Bagle Bagle was an email worm that spread through infected email attachments and employed various techniques to disable security software and open backdoors on systems.
Witty Witty was a worm that exploited a vulnerability in network security software, rapidly infecting vulnerable systems and launching destructive payloads on specific dates.
Ramnit Ramnit was a worm that spread through infected files and removable drives, targeting personal information, stealing login credentials, and facilitating remote control.
Conficker.B Conficker.B was a variant of the original Conficker worm, which introduced new propagation techniques and further enhanced its ability to evade detection and removal.
Netsky Netsky was an email worm that spread through infected email attachments and created a backdoor, allowing remote control access to infected systems.
SQL Slammer.B SQL Slammer.B was a variant of the SQL Slammer worm, which modified the original code to increase the efficiency of the propagation and exploit vulnerable systems.
Zotob.C Zotob.C was a variant of the Zotob worm, employing new propagation techniques and targeting specific vulnerabilities to maximize its reach and impact on infected systems.
Sober Sober was an email worm that spread through infected email attachments, using social engineering tactics and multilingual messages to deceive users into opening them.
Sasser.B Sasser.B was a variant of the original Sasser worm, introducing new propagation methods and attempting to exploit additional vulnerabilities to infect systems.
CryptoLocker CryptoLocker was a ransomware worm that encrypted users’ files and demanded a ransom for their release. It spread through infected email attachments and compromised websites.
SQL Slammer.C SQL Slammer.C was another variant of the SQL Slammer worm, employing different payload variations and attempting to infect additional systems through new propagation methods.
Zotob.D Zotob.D was yet another variant of the Zotob worm, refining the propagation techniques and payload delivery to increase the efficiency and evade detection by security systems.
Mytob Mytob was an email worm that spread through infected email attachments, creating a backdoor and allowing remote control access to infected systems.
Blaster.B Blaster.B was a variant of the original Blaster worm, modifying its code and introducing new propagation methods to maximize its spread across vulnerable systems.
Storm Worm Storm Worm, also known as Peacomm, was a sophisticated botnet worm that spread through spam emails and employed social engineering to infect and control compromised systems.
W32.Welchia.B.Worm W32.Welchia.B.Worm was a variant of the Welchia worm, refining its propagation methods and increasing the speed of spreading while attempting to remove Blaster worm infections.
W32.Beagle W32.Beagle was an email worm that spread through infected email attachments and network shares, opening backdoors and allowing remote control access to infected systems.
Goner Goner was an email worm that spread via infected email attachments, disabling security software and allowing remote control access to infected systems.
Morris.B Morris.B was a variant of the original Morris worm, incorporating new propagation techniques and exploiting additional vulnerabilities to infect vulnerable UNIX systems.
Klez Klez was an email worm that spread through infected email attachments and network shares, often spoofing sender addresses and employing various social engineering tactics.
Nimda.E Nimda.E was a variant of the Nimda worm, employing new propagation methods and refining its payload delivery to increase its spread and evade detection by security systems.
Sasser.C Sasser.C was another variant of the Sasser worm, modifying its propagation techniques and attempting to exploit new vulnerabilities to infect vulnerable Windows systems.
Netsky.D Netsky.D was a variant of the original Netsky worm, introducing new propagation techniques and payload variations while attempting to disable security software on infected systems.
Mytob.C Mytob.C was a variant of the Mytob worm, employing new social engineering tactics and refining its payload delivery to increase its spread and evade detection by security systems.
Bagle.B Bagle.B was a variant of the original Bagle worm, modifying its code and payload delivery methods to enhance its propagation and increase the chances of infecting vulnerable systems.
Mydoom.M Mydoom.M was a variant of the Mydoom worm, incorporating new propagation techniques and payload variations to increase its spread and evade detection by security software.
Sasser.D Sasser.D was another variant of the Sasser worm, introducing new propagation methods and attempting to exploit additional vulnerabilities to infect vulnerable Windows systems.
Blaster.C Blaster.C was another variant of the Blaster worm, refining its code and payload delivery mechanisms to increase its propagation across vulnerable Windows systems.
Stuxnet.B Stuxnet.B was a variant of the original Stuxnet worm, introducing new propagation techniques and targeting additional vulnerabilities to compromise industrial control systems.
W32.Welchia.C.Worm W32.Welchia.C.Worm was yet another variant of the Welchia worm, enhancing its propagation methods and attempting to remove the Blaster worm from infected systems efficiently.
W32.Beagle.B W32.Beagle.B was a variant of the original Beagle worm, introducing modifications to its code and payload delivery mechanisms to increase its spread across vulnerable systems.
Nimda.F Nimda.F was another variant of the Nimda worm, refining its propagation methods and payload delivery mechanisms to increase its spread and evade detection by security systems.
Netsky.P Netsky.P was a variant of the Netsky worm, employing new social engineering tactics and payload variations to increase its spread and evade detection by security software.
Mydoom.Q Mydoom.Q was another variant of the Mydoom worm, modifying its code and payload delivery methods to enhance its spread and increase the chances of infecting vulnerable systems.
Sasser.E Sasser.E was another variant of the Sasser worm, refining its propagation techniques and attempting to exploit additional vulnerabilities to infect vulnerable Windows systems.
Blaster.D Blaster.D was another variant of the Blaster worm, introducing new propagation methods and payload variations to maximize its spread across vulnerable Windows systems.
Stuxnet.C Stuxnet.C was another variant of the Stuxnet worm, introducing new propagation techniques and targeting additional vulnerabilities to compromise industrial control systems.
Sircam Sircam was an email worm that spread through infected email attachments and network shares, copying itself to shared directories and sending itself to contacts.
ZeuS ZeuS, also known as Zbot, was a sophisticated banking Trojan that infected systems to steal banking credentials, facilitate fraud, and perform other malicious activities.
CryptoWall CryptoWall was a ransomware worm that encrypted users’ files and demanded a ransom for decryption. It spread through infected email attachments and compromised websites.
Flame Flame, also known as Flamer, was a highly complex and stealthy worm designed for cyber espionage. It targeted specific systems, gathering sensitive information and data.
Duqu Duqu was a worm believed to be related to Stuxnet, designed for reconnaissance and information gathering. It aimed to gather intelligence for future cyber-espionage activities.
Shamoon Shamoon was a destructive worm that targeted and sabotaged systems in the energy sector. It wiped data from infected systems, causing significant disruptions and damage.
Carberp Carberp was a banking Trojan worm that infected systems to steal banking credentials and conduct financial fraud. It was known for its advanced evasion techniques.
Storm Worm Storm Worm, also known as Peacomm, was a sophisticated botnet worm that spread through spam emails and employed social engineering to infect and control compromised systems.
Citadel Citadel was a banking Trojan worm that infected systems to steal banking credentials and conduct financial fraud. It was distributed through exploit kits and spam campaigns.
Vawtrak Vawtrak, also known as Neverquest, was a banking Trojan worm that infected systems to steal banking credentials and facilitate fraudulent transactions.
Emotet Emotet was a polymorphic worm that spread through infected email attachments and compromised websites. It served as a downloader for other malware and botnet recruitment.
Petya Petya was a ransomware worm that encrypted the master boot record (MBR) of infected systems, rendering them inoperable until a ransom was paid. It used various propagation methods.
TrickBot TrickBot was a banking Trojan worm that infected systems to steal banking credentials, harvest sensitive information, and facilitate financial fraud and other cybercrimes.
QakBot QakBot, also known as QBot, was a banking Trojan worm that infected systems to steal banking credentials and facilitate financial fraud and money laundering operations.
Ramnit Ramnit was a worm that spread through infected files and removable drives, targeting personal information, stealing login credentials, and facilitating remote control.
Nitol Nitol was a worm that spread through infected software downloads and compromised websites. It created a botnet and facilitated various malicious activities on infected systems.
W32.Benjamin W32.Benjamin was a worm that spread through infected email attachments, compromising systems and launching denial-of-service attacks on targeted websites.
Simda Simda was a worm that infected systems and created a botnet, primarily distributing other malware and conducting various malicious activities, including data theft and fraud.
Kelihos Kelihos, also known as Hlux, was a botnet worm that infected systems to distribute spam emails, steal sensitive information, and perform distributed denial-of-service attacks.
ZeroAccess ZeroAccess, also known as Sirefef, was a botnet worm that infected systems to perform click fraud, distribute additional malware, and participate in distributed denial-of-service attacks.
Andromeda Andromeda, also known as Gamarue, was a botnet worm that infected systems to distribute additional malware, facilitate spam campaigns, and conduct various cybercrimes.
Virut Virut was a polymorphic worm that infected executable files and spread through infected drives and network shares. It compromised systems for various malicious activities.
Cutwail Cutwail, also known as Pushdo, was a botnet worm that infected systems to distribute spam emails, deliver other malware, and engage in fraudulent activities.
Vawtrak.B Vawtrak.B was a variant of the Vawtrak worm, introducing new propagation techniques and payload variations to enhance its spread and evade detection by security software.
Kovter Kovter was a worm that infected systems to perform click fraud, deliver additional malware, and engage in various fraudulent activities, including ransomware distribution.
Conficker.C Conficker.C was another variant of the Conficker worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security systems.
W32.Ramnit W32.Ramnit was a variant of the Ramnit worm, modifying its code and payload delivery mechanisms to increase its spread and enhance its ability to evade detection and removal.
DarkComet DarkComet was a remote access tool (RAT) worm that infected systems to grant remote control access to attackers, enabling various malicious activities on compromised systems.
W32.Virut W32.Virut was a variant of the Virut worm, employing new propagation techniques and payload variations to enhance its spread and evade detection by security software.
CryptoLocker.B CryptoLocker.B was a variant of the CryptoLocker worm, introducing modifications to its encryption methods and payload delivery mechanisms to increase its impact and spread.
W32.SillyFDC W32.SillyFDC was a worm that spread through infected removable drives, creating autorun.inf files to execute its code and facilitate its propagation to other systems.
Gameover ZeuS Gameover ZeuS was a variant of the ZeuS worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and steal banking credentials.
IRCBot IRCBot was a botnet worm that infected systems to create a network of compromised machines, enabling attackers to control and use them for various malicious activities.
W32.Duqu W32.Duqu was a variant of the Duqu worm, incorporating new propagation methods and payload variations to enhance its stealthiness and gather sensitive information from infected systems.
Vawtrak.C Vawtrak.C was another variant of the Vawtrak worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security systems.
Fareit Fareit, also known as Pony, was a worm that infected systems to steal sensitive information, including login credentials, financial data, and cryptocurrency wallets.
Conficker.D Conficker.D was yet another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems.
Dorkbot Dorkbot was a worm that spread through infected removable drives, social media platforms, and instant messaging services, compromising systems for various malicious activities.
W32.Sasser W32.Sasser was a variant of the Sasser worm, modifying its code and propagation methods to increase its spread and exploit additional vulnerabilities on vulnerable Windows systems.
Koobface Koobface was a worm that spread through social media platforms, targeting users with malicious links and infecting systems to engage in click fraud and distribute other malware.
W32.Palevo W32.Palevo was a worm that spread through peer-to-peer networks, infecting systems and creating a botnet for various malicious activities, including spam campaigns and data theft.
Conficker.E Conficker.E was another variant of the Conficker worm, introducing new propagation methods and payload variations to maximize its spread across vulnerable systems.
W32.Downadup W32.Downadup, also known as Conficker or Kido, was a worm that spread through network shares and weak administrator passwords, compromising systems for various malicious activities.
Storm.B Storm.B was a variant of the Storm worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software.
Vawtrak.D Vawtrak.D was yet another variant of the Vawtrak worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security systems.
W32.Gammima W32.Gammima was a worm that targeted online gamers, stealing their login credentials and in-game items. It spread through infected software downloads and compromised websites.
Alureon Alureon, also known as TDSS, was a worm that infected systems to modify DNS settings, redirect web traffic, and facilitate various malicious activities, including click fraud.
Conficker.F Conficker.F was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems.
W32.Stuxnet W32.Stuxnet was a variant of the Stuxnet worm, refining its propagation techniques and targeting additional vulnerabilities to compromise industrial control systems.
Pushdo Pushdo, also known as Cutwail, was a botnet worm that infected systems to distribute spam emails, deliver other malware, and engage in various fraudulent activities.
W32.Gaobot W32.Gaobot was a worm that spread through network shares and vulnerable remote services, creating a botnet and enabling attackers to control infected systems remotely.
Dridex Dridex, also known as Cridex or Bugat, was a banking Trojan worm that infected systems to steal banking credentials, facilitate financial fraud, and distribute other malware.
Ramnit.B Ramnit.B was a variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its ability to evade detection and removal.
Zeus GameOver Zeus GameOver was a variant of the ZeuS worm that specifically targeted online gaming platforms, stealing gaming credentials, virtual currency, and personal information of gamers.
Gpcode Gpcode was a ransomware worm that encrypted users’ files using strong cryptographic algorithms, demanding a ransom for decryption. It employed various propagation methods.
SpyEye SpyEye was a banking Trojan worm that infected systems to steal banking credentials, harvest sensitive information, and facilitate financial fraud and other cybercrimes.
DarkTequila DarkTequila was a sophisticated worm that primarily targeted users in Latin America, stealing personal information, banking credentials, and sensitive data for financial gain.
Shamoon 2.0 Shamoon 2.0 was a variant of the Shamoon worm that targeted the energy sector, causing significant disruptions by wiping data from infected systems and rendering them inoperable.
Gamarue Gamarue, also known as Andromeda, was a botnet worm that infected systems to distribute additional malware, perform spam campaigns, and engage in various cybercriminal activities.
Vawtrak.E Vawtrak.E was yet another variant of the Vawtrak worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security systems.
CryptoLocker.F CryptoLocker.F was a variant of the CryptoLocker worm, introducing modifications to its encryption methods and payload delivery mechanisms to increase its impact and spread.
ZeroAccess.B ZeroAccess.B was a variant of the ZeroAccess worm, incorporating new propagation methods and payload variations to enhance its spread and evade detection by security software.
Stuxnet.D Stuxnet.D was another variant of the Stuxnet worm, introducing new propagation techniques and targeting additional vulnerabilities to compromise industrial control systems.
Kelihos.B Kelihos.B was a variant of the Kelihos worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and distribute other malware.
Cryptolocker.G Cryptolocker.G was another variant of the CryptoLocker worm, introducing modifications to its encryption algorithms and payload delivery mechanisms to increase its spread.
Gameover ZeuS.B Gameover ZeuS.B was a variant of the Gameover ZeuS worm, refining its propagation techniques and incorporating new evasion mechanisms to steal banking credentials effectively.
CryptoWall.B CryptoWall.B was a variant of the CryptoWall worm, introducing enhancements to its encryption methods and payload delivery mechanisms to increase its impact and spread.
Conficker.G Conficker.G was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems.
W32.Ramnit.B W32.Ramnit.B was another variant of the Ramnit worm, modifying its code and payload delivery mechanisms to increase its spread and enhance its ability to evade detection.
Kovter.B Kovter.B was a variant of the Kovter worm, incorporating new propagation techniques and payload variations to enhance its evasion techniques and increase its spread.
Vawtrak.F Vawtrak.F was another variant of the Vawtrak worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security systems.
Sality Sality was a polymorphic worm that infected executable files and spread through network shares and removable drives. It compromised systems for various malicious activities.
Simda.B Simda.B was a variant of the Simda worm, introducing new propagation methods and payload variations to enhance its spread and evade detection by security software.
Ramnit.C Ramnit.C was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques.
Pushdo.B Pushdo.B was a variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software.
Gamarue.B Gamarue.B was another variant of the Gamarue worm, introducing enhancements to its evasion techniques, payload delivery mechanisms, and the ability to download additional malware.
ZeroAccess.C ZeroAccess.C was another variant of the ZeroAccess worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software.
Kelihos.C Kelihos.C was another variant of the Kelihos worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and distribute other malware.
Conficker.H Conficker.H was yet another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems.
Gameover ZeuS.C Gameover ZeuS.C was another variant of the Gameover ZeuS worm, refining its propagation techniques and incorporating new evasion mechanisms to steal banking credentials effectively.
Sality.B Sality.B was another variant of the Sality worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software.
Pushdo.C Pushdo.C was another variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software.
Ramnit.D Ramnit.D was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques.
Kelihos.D Kelihos.D was another variant of the Kelihos worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and distribute other malware.
Conficker.I Conficker.I was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems.
Sality.C Sality.C was another variant of the Sality worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software.
Pushdo.D Pushdo.D was another variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software.
Ramnit.E Ramnit.E was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques.
W32.Palevo.B W32.Palevo.B was another variant of the Palevo worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software.
Vawtrak.G Vawtrak.G was another variant of the Vawtrak worm, introducing refinements to its propagation techniques and payload delivery mechanisms to enhance its evasion capabilities.
Kelihos.E Kelihos.E was another variant of the Kelihos worm, incorporating modifications to enhance its evasion techniques, propagate through exploit kits, and distribute other malware.
Conficker.J Conficker.J was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems.
Pushdo.E Pushdo.E was another variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software.
Ramnit.F Ramnit.F was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques.
W32.Palevo.C W32.Palevo.C was another variant of the Palevo worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software.
Vawtrak.H Vawtrak.H was another variant of the Vawtrak worm, introducing refinements to its propagation techniques and payload delivery mechanisms to enhance its evasion capabilities.
Conficker.K Conficker.K was another variant of the Conficker worm, introducing new propagation techniques and payload variations to maximize its spread across vulnerable systems.
Pushdo.F Pushdo.F was another variant of the Pushdo worm, incorporating new propagation techniques and payload variations to enhance its spread and evade detection by security software.
Ramnit.G Ramnit.G was yet another variant of the Ramnit worm, introducing modifications to its code and payload delivery mechanisms to increase its spread and enhance its evasion techniques.
W32.Palevo.D W32.Palevo.D was another variant of the Palevo worm, refining its propagation techniques and payload delivery mechanisms to increase its spread and evade detection by security software.
Vawtrak.I Vawtrak.I was another variant of the Vawtrak worm, introducing refinements to its propagation techniques and payload delivery mechanisms to enhance its evasion capabilities.
By Ephatech

Related Posts

  • How to clean your MacBook fan

  • List of 110+ Computer Vision Models – Explained!

  • List of Input and Output devices of Computers – Explained!

  • List of 155 Computer Operating Systems – Explained!

  • List of 250 Computer Problems and Solutions – Explained!

  • List of 120+ Computer Registers – Explained!