About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 42. Chapters: Email worms, Exploit-based worms, Morris worm, Computer worm, SQL Slammer, Klez, Badtrans, Sircam, Code Red, Stuxnet, Conficker, Mydoom, ILOVEYOU, Happy99, Zotob, WANK, Koobface, Blaster, List of computer worms, Sasser, Sober, CTX, XSS worm, RavMonE.exe, Agobot, Bagle, Leap, Daprosy Worm, Brontok, Sobig, Anti-worm, Stration, Nimda, Psyb0t, Witty, Code Red II, Blackworm, Here you have, Welchia, Samy, Mumu, Spybot worm, Voyager, Mylife, Netsky, Warhol worm, Backdoor.Win32.IRCBot, Looksky, Kama Sutra, Sadmind, Santy, Hybris, ExploreZip, Badbunny, Devnull, Nurech.b, Nyxem Worm, NewLove, Bad Sectors 1.2, Pikachu virus, Ramen worm, Kak worm, W32.Gammima.AG, Mikeyy, Ares.exe, Toxbot, Helpful worm, Upering, W32/Storm.worm, Gaobot.ee, Doomjuice, Bolgimo, Father Christmas, Yamanner, Alcra, L10n worm, Mimail, Redesi, Gokar, Navidad virus, Dabber. Excerpt: Stuxnet is a computer worm discovered in July 2010. It targets Siemens industrial software and equipment running on Microsoft Windows. While it is not the first time that crackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit. The worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target only Siemens Supervisory Control And Data Acquisition (SCADA) systems that are configured to control and monitor specific industrial processes. Stuxnet infects PLCs by subverting the Step-7 software application that is used to reprogram these devices. Different variants of Stuxnet targeted five Iranian organizations, with the probable target widely suspected to be uranium enrichment infrastructure in Iran; Symantec noted in August 2010 that 60% of the infected computers worldwide were in Iran. S...