. https://antivirus.comodo.com/blog/computer-safety/worm-virus/
blog article
A worm virus is a type of malware that clones itself throughout a network without any user interference. The modus operandi of Trojan horse is like virus in causing damage to the system. It exploits the vulnerability found in outdated security software to successfully steal confidential data, corrupt applications, files and other programs. It also creates a backdoor to gain remote access to the infected system. A worm uses large amount of computer memory. Therefore, the servers, networks and devices that are infected by worms gets overloaded and stop to respond. Unlike other viruses, worms operate all by themselves and don’t require any host computer. The infection is transmitted through data transport features, email attachments, file-sharing networks, etc. Once worms get downloaded, they exploit the security weakness found in any of the outdated software on the device. In certain cases, worms use an attractive phishing element as a bait to trick users and run the malware code. How Worm Virus Work and Infect your Computers? Worms are passed on to the targeted system through software vulnerabilities. Hackers send phishing emails or instant messages with malicious attachments. When the user opens the attachment or the link, it instantly downloads the malware (worm) into the system or gets directed to malicious website. By this way the worm finds its way to enter into the system without the user’s knowledge. READ MORE