

The worm then continues to propagate within a network through these clients. Once active on a newly infected computer, the WannaCry malware initiates a network search for new potential victims: systems that respond to SMBv1 requests made by the worm. Turn on the firewall on your computer to block harmful websites.For example, the WannaCry ransomware worm exploited a vulnerability in the first version of the Server Message Block (SMBv1) resource sharing protocol in Windows.Always make sure to keep the antivirus software and the Operating System (OS) update-to-date.If you were to copy new files to your computer, make sure to scan it with good Antivirus software.Do not open emails from suspicious email addresses.Avoid downloading files from unknown sources and dubious websites.Here are some of the measures that will help you avert computer worms:

To prevent worms from entering your computer, exercise good cybersecurity practices.

Unlike a virus which alters the files on the infected computer, a computer worm do not alter any of the files but reside in the active memory of the infected computer and replicate itself. Worms do not need host files or programs to propagate. Worms can exist as standalone software, but a computer virus needs a host file before it can spread inside a computer.

After infecting a computer, worms take advantage of file-transport or information-transport features on the infected computer, allowing it to spread unaided. It is common for computer worms to get noticed only when their uncontrolled replication eats up a lot of system resources, slowing or delaying other tasks in a computer.Ĭomputer worms often exploit vulnerabilities in the system or in the networking protocols to infect a computer. It exploited a vulnerability in the Windows Server Message Block (SMB) file-sharing protocol to spread within local networks.Ĭomputer worms usually propagate to other computers without any user interaction, i.e., in the background. Computer worms tend to quickly replicate themselves and wiggle their way into poorly protected computers.Įven today worms exist, the worm virus component of the dreaded Wanna Cry ransomware made it possible to wreak havoc on thousands of vulnerable computers across the globe. A computer worm is a type of malware which is intended for infecting vulnerable computers in a network.
