Like a worm that spreads over the Internet, an IM worm can crash a system or allow a malicious hacker to gain access to a user’s device. Unlike the traditional form of a worm, an IM worm does not have to scan the Internet looking for vulnerbale IP addresses as it spreads by taking names from user address books and identifying who is currently online and therefore vulnerable.