What did the Slammer worm do?
SQL Slammer is a 2003 computer worm that caused a denial of service on some Internet hosts and dramatically slowed general Internet traffic. It spread rapidly, infecting most of its 75,000 victims within ten minutes.
How did the Slammer worm infect computer systems?
Slammer installs itself on computers running a faulty version of a Microsoft database package called SQL Server 2000. In an effort locate other hosts to infect, the worm bombards computers chosen at random with small packets of information.
Who created the Slammer virus?
Follow us on Twitter
| Slammer | |
|---|---|
| Creator | |
| Date Discovered | 2003.01.25 |
| Place of Origin | |
| Source Language |
When was the Slammer worm detected?
25th of January 2003
Worm:W32/Slammer was first detected on the Internet on 25th of January 2003 at 05:30 GMT. After that it was detected in most countries around the world.
What type of virus is slammer?
SQL slammer worm
The SQL slammer worm is a computer virus (technically, a computer worm) that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic, starting at 05:30 UTC on January 25, 2003. It spread rapidly, infecting most of its 75,000 victims within 10 minutes.
Why the SQL Slammer worm could infected machines more quickly than the Code Red worm?
Slammer’s spread was considerably faster for several reasons, said the report. First, it was small. At just 376 bytes in size, the worm and required headers fit inside a 404-byte UDP (Universal Datagram Protocol) packet. Because of its random nature, the worm would hit all vulnerable machines given enough time.
How much damage did the SQL Slammer do?
During its lifetime in 2003, the SQL worm caused about 1 billion U.S Dollars in damage.
What did Storm Worm do?
The Storm worm is a Trojan horse that opens a backdoor in the computer which then allows it to be remotely controlled, while also installing a rootkit that hides the malicious program. The compromised computer becomes a zombie in a botnet.