A worm can also exploit existing, legitimate transactions. For example,
consider a worm able to watch and modify network communications, especially
one located on a network server machine. The worm can wait for legitimate
transfers of executable files - file transfers, network filesystem use - and either
substitute itself in place of the requested executable file, or insert itself into the
requested file in a virus-like fashion.^^^