Worm.

Short bio

Malwarebytes uses the detection name “Worm” to apply to a category of Trojans that are capable of propagating or replicating themselves from one system to another. To learn more about worms, read our related blog content.

Type and source of infection

After arriving and executing on a target system, worms can perform a number of malicious tasks, such as dropping other malware, copying themselves onto devices physically attached to the affected system, deleting files, and consuming bandwidth.
Worms can infect systems coming from connected systems or devices.

Protection

Malwarebytes protects users from worm infections by using real-time protection.

Remediation

Malwarebytes can detect and remove {detection name} without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that All Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

It is important to identify the source of the infection as it may be able to re-infect the cleaned system. And check all the systems and devices that were connected during the time of the infection.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language