System information
20 Kaspersky Internet Security 2009
TYPE
NAME
DESCRIPTION
P2P-
Worm
File exchange
worms
File exchange worms propagate through file-
exchange peer-to-peer networks, such as
Kazaa, Grokster, EDonkey, FastTrack or
Gnutella.
To use a file exchange network, the worm
copies itself into the file-exchange folder which
is usually located on the user's computer. The
file-exchange network displays information
about the file and the user can “find” the infected
file in the network, like any other file, download it
and open it.
More complex worms imitate the network
protocols of a specific file exchange network:
they provide positive responses to search
requests and offer copies of themselves for
downloading.
Worm
Other worms
Other network worms include:
Worms that distribute their copies via network
resources. Using the operating system's
functionality, they go through available
network folders, connect to computers in the
global network and attempt to open their
drives for full access. Unlike computer
network worms, the user has to open a file
containing a copy of the worm to activate it.
Worms that use other propagation methods
not listed here: for example, worms
propagating via mobile phones.
TROJANS
Subcategory: Trojans (Trojan_programs)
Severity level: high










