Morris Worm
   HOME

TheInfoList



OR:

The Morris worm or Internet worm of November 2, 1988, is one of the oldest
computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will ...
s distributed via the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
, and the first to gain significant mainstream media attention. It resulted in the first
felony A felony is traditionally considered a crime of high seriousness, whereas a misdemeanor is regarded as less serious. The term "felony" originated from English common law (from the French medieval word "''félonie''") to describe an offense that r ...
conviction in the US under the 1986 Computer Fraud and Abuse Act. It was written by
Robert Tappan Morris Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris worm in 1988, considered the first computer worm on the Internet. Morris was prosecuted for releasing th ...
, a graduate student at
Cornell University Cornell University is a Private university, private Ivy League research university based in Ithaca, New York, United States. The university was co-founded by American philanthropist Ezra Cornell and historian and educator Andrew Dickson W ...
, and launched on 8:30 p.m. November 2, 1988, from the
Massachusetts Institute of Technology The Massachusetts Institute of Technology (MIT) is a Private university, private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of moder ...
network.


Architecture

The worm's creator,
Robert Tappan Morris Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris worm in 1988, considered the first computer worm on the Internet. Morris was prosecuted for releasing th ...
, is the son of
cryptographer Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
Robert Morris, who worked at the NSA. A friend of Morris said that he created the worm simply to see if it could be done, and released it from the Massachusetts Institute of Technology (MIT) in the hope of suggesting that its creator studied there, instead of Cornell.
Clifford Stoll Clifford Paul "Cliff" Stoll (born June 4, 1950) is an American astronomer, author and teacher. He is best known for his investigation in 1986, while working as a system administrator at the Lawrence Berkeley National Laboratory, that led to th ...
, author of '' The Cuckoo's Egg'', wrote that "Rumors have it that orrisworked with a friend or two at Harvard's computing department (Harvard student Paul Graham sent him mail asking for 'Any news on the brilliant project')". The worm exploited several vulnerabilities of targeted systems, including: * A hole in the debug mode of the
Unix Unix (, ; trademarked as UNIX) is a family of multitasking, multi-user computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, a ...
sendmail program * A buffer overflow or overrun hole in the
finger A finger is a prominent digit (anatomy), digit on the forelimbs of most tetrapod vertebrate animals, especially those with prehensile extremities (i.e. hands) such as humans and other primates. Most tetrapods have five digits (dactyly, pentadact ...
network service * The transitive trust enabled by people setting up network
login In computer security, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system or program by identifying and authenticating themselves. Typically, user credential ...
s with no
password A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
requirements via remote execution (rexec) with
Remote Shell The remote shell (rsh) is a command-line computer program that can execute shell commands as another user, and on another computer across a computer network. The remote system to which ''rsh'' connects runs the ''rsh'' daemon (rshd). The dae ...
(rsh), termed rexec/rsh The worm exploited weak passwords. Morris's exploits became generally obsolete due to decommissioning rsh (normally disabled on untrusted networks), fixes to sendmail and finger, widespread network filtering, and improved awareness of weak passwords. Though Morris said that he did not intend for the worm to be actively destructive, instead seeking to merely highlight the weaknesses present in many networks of the time, a consequence of Morris's coding resulted in the worm being more damaging and spreadable than originally planned. It was initially programmed to check each computer to determine if the infection was already present, but Morris believed that some
system administrator An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as Server (computing), servers. The ...
s might counter this by instructing the computer to report a
false positive A false positive is an error in binary classification in which a test result incorrectly indicates the presence of a condition (such as a disease when the disease is not present), while a false negative is the opposite error, where the test resu ...
. Instead, he programmed the worm to copy itself 14% of the time, regardless of the status of infection on the computer. This resulted in a computer potentially being infected multiple times, with each additional infection slowing the machine down to unusability. This had the same effect as a fork bomb, and crashed the computer several times. The main body of the worm can infect only DEC VAX machines running 4
BSD The Berkeley Software Distribution (BSD), also known as Berkeley Unix or BSD Unix, is a discontinued Unix operating system developed and distributed by the Computer Systems Research Group (CSRG) at the University of California, Berkeley, beginni ...
, alongside
Sun-3 Sun-3 is a series of UNIX computer workstations and servers produced by Sun Microsystems, launched on September 9, 1985. The Sun-3 series are VMEbus-based systems similar to some of the earlier Sun-2 series, but using the Motorola 68020 mic ...
systems. A portable C "grappling hook" component of the worm was used to download the main body parts, and the grappling hook runs on other systems, loading them down and making them peripheral victims.


Replication rate

By instructing the worm to replicate itself regardless of a computer's reported infection status, Morris transformed the worm from a potentially harmless intellectual and computing exercise into a viral
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
. Morris's inclusion of the rate of copy within the worm was inspired by Michael Rabin's mantra of ''randomization''. The resulting level of replication proved excessive, with the worm spreading rapidly, infecting some computers several times. Rabin would eventually comment that Morris "should have tried it on a simulator first".


Effects

During the Morris appeal process, the US court of appeals estimated the cost of removing the virus from each installation was in the range of $200–$53,000. Possibly based on these numbers, Stoll, a
systems administrator An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as Server (computing), servers. The ...
known for discovering and subsequently tracking the hacker Markus Hess three years earlier, estimated for the US
Government Accountability Office The United States Government Accountability Office (GAO) is an independent, nonpartisan government agency within the legislative branch that provides auditing, evaluative, and investigative services for the United States Congress. It is the s ...
that the total economic impact was between $100,000 and $10,000,000. Stoll helped fight the worm, writing in 1989 that "I surveyed the network, and found that two thousand computers were infected within fifteen hours. These machines were dead in the water—useless until disinfected. And removing the virus often took two days." Stoll commented that the worm showed the danger of
monoculture In agriculture, monoculture is the practice of growing one crop species in a field at a time. Monocultures increase ease and efficiency in planting, managing, and harvesting crops short-term, often with the help of machinery. However, monocultur ...
, because "If all the systems on the
ARPANET The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite. Both technologies became the tec ...
ran Berkeley Unix, the virus would have disabled all fifty thousand of them." It is usually reported that around 6,000 major UNIX machines were infected by the Morris worm. Graham claimed, "I was there when this statistic was cooked up, and this was the recipe: someone guessed that there were about 60,000 computers attached to the Internet, and that the worm might have infected ten percent of them". Stoll estimated that "only a couple thousand" computers were affected. The Internet was partitioned for several days, as regional networks disconnected from the
NSFNet The National Science Foundation Network (NSFNET) was a program of coordinated, evolving projects sponsored by the National Science Foundation (NSF) from 1985 to 1995 to promote advanced research and education networking in the United States. The ...
backbone and from each other to prevent recontamination while cleaning their own networks. The Morris worm prompted
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
to fund the establishment of the CERT/CC at
Carnegie Mellon University Carnegie Mellon University (CMU) is a private research university in Pittsburgh, Pennsylvania, United States. The institution was established in 1900 by Andrew Carnegie as the Carnegie Technical Schools. In 1912, it became the Carnegie Institu ...
, giving experts a central point for coordinating responses to network emergencies. Gene Spafford also created the Phage mailing list to coordinate a response to the emergency. Morris was tried and convicted of violating
United States Code The United States Code (formally The Code of Laws of the United States of America) is the official Codification (law), codification of the general and permanent Law of the United States#Federal law, federal statutes of the United States. It ...
Title18 (), the Computer Fraud and Abuse Act, in '' United States v. Morris''. After appeals, he was sentenced to three years' probation, 400 hours of community service, and a fine of plus the costs of his supervision. The total fine ran to $13,326, which included a $10,000 fine, $50 special assessment, and $3,276 cost of probation oversight. The Morris worm has sometimes been referred to as the "Great Worm", named after the devastating " Great Worms" of Tolkien. The Morris worm had a devastating effect on the Internet at that time, both in overall system downtime and in psychological impact on the perception of security and reliability of the Internet.


In popular culture

* The 1995 film '' Hackers'' features a main character who releases a viral attack bearing several similarities to the Morris worm. The event takes place in 1988, infects over 1,000 computers, causes a massive economic disruption, and results in its propagator being fined and put on probation. * In the visual novel '' Digital: A Love Story'', the Morris worm is portrayed as a cover story for a large-scale attack on ARPANET and several
bulletin board system A bulletin board system (BBS), also called a computer bulletin board service (CBBS), is a computer server running list of BBS software, software that allows users to connect to the system using a terminal program. Once logged in, the user perfor ...
s. * In the epilogue of his book '' The Cuckoo's Egg'', Stoll details his efforts battling the Morris worm. * In '' Halt and Catch Fire'', a virus that works in a similar way to the Morris worm is created to gauge the size of the network. * In ''Date Time'', an indie developed video game, the Morris worm is portrayed as a character in a dating sim. * In '' Gori: Cuddly Carnage'', a game developed by Angry Demon Studio, a floppy disk can be seen containing the Morris worm. * In Merryweather Media's webcomic 'Internet Explorer', The Morris Worm is portrayed as a tragic antagonist, whose goal was to map out the size of the internet, but accidentally brought it to near-collapse.


See also

* Buffer overflow * Timeline of computer viruses and worms


References


External links


Cornell commission findings
(from the abstract: "sheds new light and dispels some myths")
Archive of worm material, including papers and code
* – "Helminthiasis of the Internet" – an analysis of the worm infestation

* ttp://content.lib.utah.edu/cdm/singleitem/collection/uspace/id/709/rec/2 "A Tour of the Worm" by Donn Seeley, Department of Computer Science University of Utah– This paper provides a chronology for the outbreak and presents a detailed description of the internals of the worm, based on a C version produced by decompiling.
"With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988" by Mark W. Eichin and Jon A. Rochlis, Massachusetts Institute of Technology
''We present the chronology of events as seen by our team at MIT...''
NASA Incident Report
for the Morris Worm infection at the NAS Supercomputer
"Vexing Virus"
– ''
PBS NewsHour ''PBS News Hour'', previously stylized as ''PBS NewsHour'', is the news division of PBS and an American daily evening news broadcasting#television, television news program broadcast on over 350 PBS Network affiliate#Member stations, member stat ...
'' segment {{Hacking in the 1980s 1988 in computing Computer worms Hacking in the 1980s November 1988