Questions tagged [worm]
Use this tag in relation to any kind of computer program that can replicate itself on its own, without user intervention, Like the old Morris worm. Lately, SMB vulnerabilities are the most common method.
23 questions
0 votes
0 answers
116 views
Possible to supply IKEA Tradfri with Malware? (How to detect / remove)
Maybe I'm overly cautious here, but I bought a 2nd hand IKEA Tradfri lightbulb. The package was opened so whoever owned it before had access to the bulb itself. My question is: Am I too cautious ...
1 vote
1 answer
201 views
How to tell if BlackByte NT ransomware is on my computer?
The company I work at sadly fell victim to BlackByte NT ransomware this week. It ransomed many of the Windows machines on our factory floor. I have used my personal laptop (Windows 10 Home, version ...
0 votes
1 answer
115 views
Reaper distributed patch dissemination design
Academic literature describes a method for distributing benevolent patches "in which every newly patched node forwards the patches to some or all of its neighbors according to a well-designed ...
0 votes
0 answers
165 views
Is it possible to have infected Computer A infect Computer B whilst being only connected by an Ethernet cable? [duplicate]
Is it possible to have infected Computer A infect Computer B whilst being only connected by an Ethernet cable? My current research into worms is that they always seem to require an additional vector ...
2 votes
2 answers
3k views
Is there malware that can run without user interaction after a download from the internet?
Is there malware that can run from a simple download from the internet autonomously without user interaction/initiation? I know there are worms that can do that, but I assumed they needed to be opened ...
1 vote
0 answers
162 views
How does the "ClaimLetter#.zip" attack work?
I wonder if this is the right place to ask about the specific functioning of viruses / worms. We all receive fishy mails all the time. And generally I never click on anything, especially not ...
0 votes
1 answer
244 views
Is Blaster worm still dangerous on Windows 10?
I was able to successfully compile the blaster worm source code. I have its executable file now but I'm not sure if it is safe to run this file on my Windows 10 computer or not. What might happen if I ...
0 votes
1 answer
341 views
The practicality that a home network / router gets compromised
I know that it's theoretically possible that a router can be hacked, and malware can be spread throughout a network merely by being connected to it. However, I'm wondering what exactly the chances of ...
0 votes
1 answer
449 views
Do viruses spread by infecting other files on an infected machine?
Suppose malware lands and executes on a computer. Could this malware attempt to spread further by writing itself to data files (images, pdfs, docs) and hoping that the owner would transfer or upload ...
0 votes
1 answer
145 views
Could a virus force a phone to download an app and spread it?
I'm writing a sci-fi story that includes a malicious app that spreads globally. The developer publishes an app without knowing it's infected, and it spreads because it forces phones to download it. ...
2 votes
0 answers
198 views
Are there any wormable vulnerabilities for legacy Windows operating systems that are left unfixed?
I want to know the status of remote, code executing vulnerabilities of old Windows operating systems that are left unfixed, if they exist at all. Exploits like EternalBlue or BlueKeep wreaked havoc on ...
4 votes
0 answers
224 views
How did Stuxnet prevent the user from seeing the malicious files on a USB stick?
From what I can tell there were two main TMP files present on the infected USB stick. The smaller of the two would run first and hook various functions related to viewing files so as to hide the LNK ...
0 votes
1 answer
616 views
How do I protect the WiFi-network I'm on from worms?
5 days ago, I downloaded a file from the internet and I'm currently worried about it being malware. I don't store any important information on the computer I downloaded it with, but I'm afraid of the ...
19 votes
3 answers
6k views
How Can I Process Untrusted Data Sources Securely? [closed]
Here is the conundrum: At my current company, we process physical discs from numerous third party sources and extract the data from them to ingest to our own system. While we can generally trust the ...
-5 votes
1 answer
516 views
Is there some hidden worm attached with whatsapp messages that state forward this messgae to 20 people? [closed]
NOTE: I am New contributor, if the question needs some improvement please tell in comment before down voting! Usually I see messages on whatsapp and sometime on some other forums stating that forward ...