System information

20 Kaspersky Internet Security 2009
TYPE
DESCRIPTION
P2P-
Worm
File exchange worms propagate through file-
exchange peer-to-peer networks, such as
Kazaa, Grokster, EDonkey, FastTrack or
Gnutella.
In order to sneak into a file exchange network,
the worm copies itself into the file-exchange
folder usually located on the user's computer.
The file-exchange network displays information
about this fact and the user can "find" the
infected file in the network, like any other file,
downloaded it and open it.
More complex worms imitate network protocols
of a specific file exchange network: they provide
positive responses to search requests and offer
their copies for downloading.
Worm
Other network worms include:
Worms that distribute their copies via network
resources. Using the operating system's
functionality, they go through available
network folders, connect to computers in the
global network and attempt to open their
drives for full access. Unlike computer
network worms, the user has to open a file
containing a copy of the worm to activate it.
Worms that do not use any method of
propagation described in this table (for
example, worms propagating via mobile
phones).
TROJANS
Subcategory: Trojans (Trojan_programs)
Severity level: high