Morris worm

Last updated

Morris worm
Original author(s) Robert Tappan Morris
Initial release8:30 pm November 2, 1988
Operating system 4BSD
Platform VAX, Sun-3 BBN C70 NOC, BBN C30IMP
Type Computer worm
Internet history timeline

Early research and development:

Merging the networks and creating the Internet:

Commercialization, privatization, broader access leads to the modern Internet:

Contents

Examples of Internet services:

The Morris worm or Internet worm of November 2, 1988, is one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act. [1] It was written by a graduate student at Cornell University, Robert Tappan Morris, and launched on 8:30 p.m. November 2, 1988, from the Massachusetts Institute of Technology network.

Architecture

Floppy disk containing the source code for the Morris Worm, at the Computer History Museum Morris Worm.jpg
Floppy disk containing the source code for the Morris Worm, at the Computer History Museum

The worm's creator, Robert Tappan Morris, is the son of cryptographer Robert Morris, who worked at the NSA. [2] A friend of Morris said that he created the worm simply to see if it could be done, [3] and released it from the Massachusetts Institute of Technology (MIT) in the hope of suggesting that its creator studied there, instead of Cornell. [4] Clifford Stoll, author of The Cuckoo’s Egg , wrote that "Rumors have it that [Morris] worked with a friend or two at Harvard's computing department (Harvard student Paul Graham sent him mail asking for 'Any news on the brilliant project')". [5]

The worm exploited several vulnerabilities of targeted systems, including:

The worm exploited weak passwords. [6] Morris's exploits became generally obsolete due to decommissioning rsh (normally disabled on untrusted networks), fixes to sendmail and finger, widespread network filtering, and improved awareness of weak passwords.

Though Morris said that he did not intend for the worm to be actively destructive, instead seeking to merely highlight the weaknesses present in many networks of the time, a consequence of Morris's coding resulted in the worm being more damaging and spreadable than originally planned. It was initially programmed to check each computer to determine if the infection was already present, but Morris believed that some system administrators might counter this by instructing the computer to report a false positive. Instead, he programmed the worm to copy itself 14% of the time, regardless of the status of infection on the computer. This resulted in a computer potentially being infected multiple times, with each additional infection slowing the machine down to unusability. This had the same effect as a fork bomb, and crashed the computer several times.

The main body of the worm can infect only DEC VAX machines running 4BSD, alongside Sun-3 systems. A portable C "grappling hook" component of the worm was used to download the main body parts, and the grappling hook runs on other systems, loading them down and making them peripheral victims. [7]

Replication rate

Morris' coding instructing the worm to replicate itself regardless of a computer's reported infection status transformed the worm from a potentially harmless intellectual and computing exercise into a viral denial-of-service attack. Morris's inclusion of the rate of copy within the worm was inspired by Michael Rabin's mantra of randomization. [8]

The resulting level of replication proved excessive, with the worm spreading rapidly, infecting some computers several times. Rabin would eventually comment that Morris "should have tried it on a simulator first". [9]

Effects

During the Morris appeal process, the US court of appeals estimated the cost of removing the virus from each installation was in the range of $200–$53,000. Possibly based on these numbers, Stoll estimated for the US Government Accountability Office that the total economic impact was between $100,000 and $10,000,000. Stoll, a systems administrator known for discovering and subsequently tracking the hacker Markus Hess three years earlier, helped fight the worm, writing in 1989 that "I surveyed the network, and found that two thousand computers were infected within fifteen hours. These machines were dead in the water—useless until disinfected. And removing the virus often took two days." Stoll commented that the worm showed the danger of monoculture, because "If all the systems on the ARPANET ran Berkeley Unix, the virus would have disabled all fifty thousand of them." [5]

It is usually reported that around 6,000 major UNIX machines were infected by the Morris worm. Graham claimed, "I was there when this statistic was cooked up, and this was the recipe: someone guessed that there were about 60,000 computers attached to the Internet, and that the worm might have infected ten percent of them". [10] Stoll estimated that "only a couple thousand" computers were affected. [5]

The Internet was partitioned for several days, as regional networks disconnected from the NSFNet backbone and from each other to prevent recontamination while cleaning their own networks.

The Morris worm prompted DARPA to fund the establishment of the CERT/CC at Carnegie Mellon University, giving experts a central point for coordinating responses to network emergencies. [11] Gene Spafford also created the Phage mailing list to coordinate a response to the emergency.

Morris was tried and convicted of violating United States Code Title 18 (18 U.S.C.   § 1030), the Computer Fraud and Abuse Act, [12] in United States v. Morris . After appeals, he was sentenced to three years' probation, 400 hours of community service, and a fine of US$10,050(equivalent to $22,000 in 2023) plus the costs of his supervision. [13] The total fine ran to $13,326, which included a $10,000 fine, $50 special assessment, and $3,276 cost of probation oversight.

The Morris worm has sometimes been referred to as the "Great Worm," due to the devastating effect it had on the Internet at that time, both in overall system downtime and in psychological impact on the perception of security and reliability of the Internet. The name was derived from the "Great Worms" of Tolkien: Scatha and Glaurung. [14]

See also

Related Research Articles

<span class="mw-page-title-main">Computer worm</span> Self-replicating malware program

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

<span class="mw-page-title-main">Sendmail</span> Open-source mail transfer agent

Sendmail is a general purpose internetwork email routing facility that supports many kinds of mail-transfer and delivery methods, including the Simple Mail Transfer Protocol (SMTP) used for email transport over the Internet.

<span class="mw-page-title-main">Timeline of computer viruses and worms</span> Computer malware timeline

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

Robert H. Morris Sr. was an American cryptographer and computer scientist.

<span class="mw-page-title-main">Robert Tappan Morris</span> American computer scientist; creator of Morris Worm; associate professor at MIT

Robert Tappan Morris is an American computer scientist and entrepreneur. He is best known for creating the Morris worm in 1988, considered the first computer worm on the Internet.

Unix security refers to the means of securing a Unix or Unix-like operating system.

<span class="mw-page-title-main">Blaster (computer worm)</span> 2003 Windows computer worm

Blaster was a computer worm that spread on computers running operating systems Windows XP and Windows 2000 during August 2003.

<i>The Cuckoos Egg</i> (book) 1989 nonfiction book by Clifford Stoll

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at the Lawrence Berkeley National Laboratory (LBNL).

<span class="mw-page-title-main">Gene Spafford</span> American computer scientist

Eugene Howard Spafford, known as Spaf, is an American professor of computer science at Purdue University and a computer security expert.

The Computer Oracle and Password System (COPS) was the first vulnerability scanner for Unix operating systems to achieve widespread use. It was created by Dan Farmer while he was a student at Purdue University. Gene Spafford helped Farmer start the project in 1989.

The Nimda virus is a malicious file-infecting computer worm.

The WANK Worm and the OILZ Worm were computer worms that attacked DEC VMS computers in 1989 over the DECnet. They were written in DIGITAL Command Language.

In computer security, the Zardoz list, more formally known as the Security-Digest list, was a famous semi-private full disclosure mailing list run by Neil Gorsuch from 1989 through 1991. It identified weaknesses in systems and gave directions on where to find them. Zardoz is most notable for its status as a perennial target for computer hackers, who sought archives of the list for information on undisclosed software vulnerabilities.

In computer science, a monoculture is a community of computers that all run identical software. All the computer systems in the community thus have the same vulnerabilities, and, like agricultural monocultures, are subject to catastrophic failure in the event of a successful attack.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

<span class="mw-page-title-main">Conficker</span> Computer worm

Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually difficult to counter because of its combined use of many advanced malware techniques. The Conficker worm infected millions of computers including government, business and home computers in over 190 countries, making it the largest known computer worm infection since the 2003 SQL Slammer worm.

<i>United States v. Morris</i> (1991) American legal case

United States v. Morris was an appeal of the conviction of Robert Tappan Morris for creating and releasing the Morris worm, one of the first Internet-based worms. This case resulted in the first conviction under the Computer Fraud and Abuse Act. In the process, the dispute clarified much of the language used in the law, which had been heavily revised in a number of updates passed in the years after its initial drafting. Also clarified was the concept of "unauthorized access," which is central in the United States' computer security laws. The decision was the first by a U.S. court to refer to "the Internet", which it described simply as "a national computer network."

Dorkbot is a family of malware worms that spreads through instant messaging, USB drives, websites or social media channels like Facebook. It originated in 2015 and infected systems were variously used to send spam, participate in DDoS attacks, or harvest users' credentials.

References

  1. Dressler, J. (2007). "United States v. Morris". Cases and Materials on Criminal Law. St. Paul, MN: Thomson/West. ISBN   978-0-314-17719-3.
  2. "The Morris Worm Turns 30". Global Knowledge Blog. November 1, 2018. Archived from the original on January 30, 2019. Retrieved January 29, 2019.
  3. Graham, Paul [@paulg] (November 2, 2020). "FWIW the Wikipedia article on the worm is mistaken" (Tweet). Retrieved November 2, 2020 via Twitter.
  4. Kehoe, Brendan P. (1992). Zen and the Art of the Internet: A Beginner's Guide to the Internet, First Edition.
  5. 1 2 3 Stoll, Clifford (1989). "Epilogue". The Cuckoo's Egg . Doubleday. ISBN   978-0-307-81942-0.
  6. "US vs. Morris". Loundy.com. Archived from the original on February 13, 1998. Retrieved February 5, 2014.
  7. Spafford, Eugene (December 8, 1988). "An analysis of the worm" (PDF). Purdue University. Archived (PDF) from the original on May 1, 2006. Retrieved October 30, 2019.
  8. "Court Appeal of Morris". Archived from the original on May 13, 2010. Retrieved February 5, 2014.
  9. Maynor, David (2011). Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier. p. 218. ISBN   978-0-08-054925-5.
  10. "The Submarine". Paulgraham.com. Archived from the original on April 19, 2005. Retrieved February 5, 2014.
  11. "Security of the Internet. CERT/CC". Cert.org. September 1, 1998. Archived from the original on April 15, 1998. Retrieved February 5, 2014.
  12. United States v. Morris (1991) , 928F.2d504 , 505(2d Cir.1991), archived from the original.
  13. "Computer Intruder is Put on Probation and Fined" Archived February 14, 2009, at the Wayback Machine by John Markoff, The New York Times.
  14. "Great Worm". catb.org. Archived from the original on July 2, 2003. Retrieved November 2, 2005.