Bulgaria  China  Taiwan  Czech  UK  France  Germany  Indonesia  Italy  Japan  Malaysia  Poland  Portugal  Romania  Russia  Spain  Turkey  Vietnam


Worms primary trait is that they multiply. Install one and you'll soon have many.

The Worm is a Brute Force Offensive Program which has the special ability to replicate and install itself. Worms will attack connected nodes one at a time, but unlike Beam Cannons, they have a dynamic attack priority and will change their target immediately if an adjacent node with higher Attack Priority is reclaimed by the network.

A Worm has the following action priorities:

  1. It attacks an adjacent node with the highest Attack Priority.
  2. If all adjacent nodes are captured, it will install duplicates of itself in empty program slots of the residing node, until the node is full.
  3. If the residing node is full, it will install duplicates of itself in the empty program slots of adjacent nodes.

Duplication onto adjacent nodes appears to prioritize the number of empty program slots on adjacent nodes, followed by their attack priority (citation needed). For example: If one Worm has an empty Core and an empty Compiler as adjacent nodes, first it will install two copies of itself on the Core so both nodes have the same number of empty program slots. Next it will install a copy on the Core because it has a higher attack priority, and then it will install a copy on the Compiler because the Compiler has more empty program slots. It will continue to switch back and forth in this manner until both nodes are full. Note this example assumes the worms installed on the Core and Compiler are busy attacking a hostile node instead of duplicating.

The delay between each duplication takes 3 to 0.5 seconds, depending on level, and the timer is reset when an adjacent node is recaptured by the network.

Statistics Edit

  • Notes: While the Worms program is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
    More Info here: Max amount of B-coins at Core Level.
Program Stats
(per hit)
11263.0 secondsB5
21472.9 secondsB10
31682.8 secondsB20
41892.7 secondsB30
520102.5 secondsB40
62311.52.4 secondsB50
726132.3 secondsB60
830152.2 secondsB70
934172.0 secondsB80
103919.51.9 secondsB90
1144221.8 secondsB100
125125.51.7 secondsB110
1358291.5 secondsB120
1466331.4 secondsB130
157537.51.3 secondsB140
1686431.2 secondsB150
1798491.0 secondsB170
1811155.50.9 secondsB190
1912763.50.8 secondsB210
2014572.50.7 secondsB230
2116582.50.5 secondsB250
Research Stats
Evolver Level
1B2562502 Hours2
2B2,0484008 Hours3
3B4,09642510 Hours3
4B8,00045012 Hours4
5B16,00047518 Hours4
6B32,00050024 Hours5
7B48,00057530 Hours5
8B60,00065036 Hours6
9B80,00072542 Hours6
10B100,00080048 Hours7
11B120,00082554 Hours7
12B140,00085060 Hours8
13B160,00087566 Hours8
14B180,00090072 Hours9
15B200,00093080 Hours9
16B220,00096088 Hours10
17B260,0001,00096 Hours10
18B300,0001,125108 Hours11
19B340,0001,250120 Hours11
20B380.0001,500144 Hours12
21B420,0001,750168 Hours12
TotalsB3,070,40017,2151,286 Hours12

Patch Notes Edit

As of Patch v1.025, Worm's Duplication Time scales with their level. This was previously 3 seconds at every level.

Tips Edit

  • Typically, you only need one or two Worms per hack since they will multiply.
  • Using Worms to capture weaker and less important nodes can be useful to save programs.
  • Placing Worms at the back of the network will give them time to replicate while you focus on your main attack.
  • Remember to remove programs from nodes you have captured to give Worms space to move forward.
  • Worms work well with the Kraken.
  • Be careful around a Code Gate. Since Worms will always choose to attack when able, a Code Gate directly on a branching path will cause your Worms to stay there until the gate is removed.
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram Battering Ram  Ion cannon Beam Cannon  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shock Shocker  Shuriken Shuriken  Worms Worms 

Defensive Programs

Icewall ICE Wall  Protector Protector 

Stealth Programs

Access Access  Dataleach Data Leech  Portal Portal  Wraith Wraith 

A.I. Programs

Beetle A.I. Beetle  Hawk A.I. Hawk  Squid A.I. Squid 

Community content is available under CC-BY-SA unless otherwise noted.