![remove a worm virus from my computer remove a worm virus from my computer](https://cdn2.macpaw.com/images%2Fcontent%2Fhow-to-new%2FHow+to+find+worm+malware+and+remove+it+G+1200x670.jpg)
![remove a worm virus from my computer remove a worm virus from my computer](https://dynaimage.cdn.cnn.com/cnn/c_fill,g_auto,w_1200,h_675,ar_16:9/https%3A%2F%2Fcdn.cnn.com%2Fcnnnext%2Fdam%2Fassets%2F200427095300-iloveyou-virus-tease.jpg)
Other antivirus companies upgraded their threat ratings for Sobig, as well. As of Tuesday, F-Secure gave the worm a Level 2 ranking, indicating "large infections" and putting it in a category with well-known predecessors such as the Klez worm. In recent days, however, it has spread more rapidly. The worm first came to the attention of antivirus companies last Thursday and began spreading slowly, Hypponen said. Yahoo wasn't immediately available to comment on the Sobig worm. GeoCities has been notified about the page by F-Secure as well as the CERT Coordination Center in Pittsburgh, according to Hypponen.
#REMOVE A WORM VIRUS FROM MY COMPUTER DOWNLOAD#
The GeoCities Web page used by Sobig was modified recently to instruct the worm to download a Trojan program known as Backdoor.Delf that gives the virus writer and others control of infected machines, according to Mikko Hypponen, manager of antivirus research at F-Secure. Sobig also searches for any shared folders on networks that the infected machine may have access to and places a copy of itself in any network folder it can access.Īlthough the new worm doesn't appear to steal sensitive information from the computers it infects, F-Secure said antivirus companies warned that the worm connects to a Web site hosted by Yahoo Inc.'s GeoCities, from which it tries to download and execute other files. Those addresses are used to send out more copies of itself. Once it has infected a machine, the worm searches for e-mail addresses in a variety of text files on the computer's hard drive. When opened, the worm places a copy of itself into the Windows folder on the infected machine, creates a process to run the worm program and modifies the Windows registry so that the worm program will be launched whenever Windows is started.