What is the name of the agency formed as a result of the morris worms spread?

Morris, the first computer worm

What is a computer worm?

A computer worm is a type of malicious software, edited in such a way that it propagates and executes itself at the same time. The worm attacks reproduce and spread without the help of a cybercriminal since one of its main functions is to duplicate itself autonomously.

A very dangerous type of malware, it infiltrates devices by exploiting security holes undetected by administrators to discreetly damage or destroy the device.

Originally, the first worms created were not intended to cause any damage but simply to have fun to point out computer flaws or to show off their skills.

Unfortunately, over the years, hackers have come to realize the potential of this malware and how dangerous it is. The Morris worm was the first computer worm to spread worldwide and cause damage.

The "Morris" worm

On November 2, 1988, Robert Tappan Morris was 23 years old when he decided to test his worm and put his malware into action. As a student at Cornell University, he did not launch his virus from his school but from a computer at MIT, a world-renowned technology institute.

The Morris worm begins to spread from device to device, eventually affecting thousands of machines worldwide. It is quickly considered the first large-scale computer infection. Other worms had been created before, but they were of minimal importance compared to the one written by Robert Tappan Morris.

The Morris worm, originally designed to be harmless, works as follows. The worm duplicates itself from one device to another by exploiting common security holes in the operating systems installed on the devices. Initially designed to study the scope of the Internet and the connections between devices, the operation took a completely different turn when coding errors were detected.

Indeed, several code errors in the program made the worm dangerous causing various damages accidentally. Failures, connection problems... were detected on about 6000 machines. A relatively important ratio since at the time there were only 60 000 machines connected to the Internet worldwide. These were not personal computers but devices of companies, universities, or government agencies. Today, the number of devices connected to the Internet is estimated at 20 billion (computers, smartphones, watches, household appliances, game consoles...).

Moreover, the device could be infected several times by the virus, and each additional process affected the machine by slowing it down or making it unusable. The overload of activity on the affected devices caused system crashes, which was an unforeseen consequence by its publisher.

The beginning of a new era?

A high-profile case

In addition to being the first computer worm, it forever marks the digital age and cyber-attacks.

Highlighting the damage that can be done in the computer world, Robert Tappan Morris is the first cybercriminal to be convicted under the Computer Fraud and Abuse Act of 1986. This law prohibits all intrusive behavior in a device without prior authorization.

Initially fined between $10 million and $100 million, Robert Tappan Morris was given three years' probation and a $10,000 fine.

The trial was covered by the media and was followed worldwide, highlighting a danger that was still unknown at the time: malware.

Sudden awareness

The case occurred in 1988 when the possibility of vulnerabilities in one's computer was still unknown.  Few companies and individuals knew the dangers of the Internet and the importance of protecting their data.

Thanks to the media coverage of this case, companies and universities have understood that investing in data protection and learning about the dangers of malware is essential.

Today, computer worms are still being published and attacking large companies. However, their degree of danger has evolved. The ILOVEYOU worm is an example. Spread in the 2000s throughout the world, it caused damage estimated at several billion dollars.

Five Things to Know about History’s First Malware

In 1988, the use of computers, let alone the programming of them, had not yet taken foothold in the US. It wouldn’t be until a few years later that word processing applications and other familiar interfaces became familiar. Still attached to academia and government, the 60,000 or so computers connected to the internet — rather, its precursor the ARPANET — were a sort of experimental and intellectual playground for those developing the technology and learning it. 

On November 2nd of that year, however, the very way people conceived of networks and the internet changed forever. The atmosphere of a brainy, optimistic fellowship gave way to the notion that the internet was as much hazardous territory as it was fertile ground for learning and doing. That day, the tens of thousands of computers were rapidly, and seemingly simultaneously, exposed to a self-replicating computer program we now call a worm. 

The Morris worm, named for its creator, Cornell University student Robert Tappan Morris, rapidly infected the limited (by today’s standards) computers connected to the internet. An estimated 6,000 machines, depleted of their resources as the worm depleted computing resources, shut down and were rendered inoperable. Today this is the opposite of what it was then: plausible, fathomable, even expected. For those who were affected by the worm, it was a bewildering and frightening experience. 

What is the name of the agency formed as a result of the morris worms spread?
Photo credit: Federal Bureau of Investigations (FBI)

Here’s what you need to know about the Morris worm, history’s first malware.

1. The Morris worm attack was one of the most significant events in the history of computer science.

Many developments in the history of computer science caused their early influencers, and society as a whole, to rethink the role they would play. Charles Babbage’s difference engine (1820s) showed that mathematics and other simple calculations were destined to be automated. The Digital Revolution (late 1950s-1970s) moved us away from analog and mechanical computing towards the next era of power, performance and efficiency. The Morris worm, on the other hand, was the first instance of a networked computer or group of computers’ helplessness. With the Morris worm, “vulnerability”, as we now term this sort of jeopardy, quickly occupied the mindset of all who were associated with computing: scientists, developers, students, and government officials. November 2, 1988 is the day computer science lost its innocence. Today no serious player in any aspect of computing — hardware to software, consumer to enterprise — thinks of computers and networks as safe, or regards digital “information security” as optional.

2. The Morris worm was intended to be an intellectual exercise, or a pen-test, but it went awry.

Robert Morris, like his late 1980s contemporaries, was as interested to learn the potential of computers as he was in their substance. A programming student at Cornell, he developed his self-replicating program to test the boundaries of the network — a sort of penetration testing. While opinions may still vary on his motives, one fact still stands: he concealed his activities by hacking into the Massachusetts Institute of Technology (MIT) network to launch his worm, attempting to cover his tracks. A friend of his, accounts say, tipped off The New York Times giving them Morris’s initials. He paid a price for his actions. In 1989, the first to be indicted under the US Computer Fraud and Abuse Act (CFAA), he was sentenced to a fine of $10,050 plus costs of his supervision, three years of probation, and 400 hours of community service. Complicating matters, Robert Morris was the son of a respected Bell Labs and US National Security Agency (NSA). The story did not end there. The younger Morris went on to become a renowned academic, tech founder and venture capitalist. He is currently a tenured professor of computer science and artificial intelligence at MIT’s Electrical Engineering & Computer Science department. 

3. The Morris worm functioned as a denial-of-service (DoS) attack.

The Morris worm spread by exploiting vulnerabilities in UNIX sendmail (using a backdoor), finger (through buffer overflow), and rsh/rexec (to explore whether it could operate). The worm also worked by guessing weak passwords, as it contained 900 passwords and could use names of account holders to brute force possible passwords. Reinfection and compounded repetition were a prime aspect. The end result was occupying the machine’s resources until it shut down, much in the way a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack swarms a network with a series of worthless requests until service is halted. Before infecting a new machine, the worm verified if it had already been infected. If it was, the worm would re-infect it 1 in 7 times. This was to accelerate its spread but also to prevent a user from mimicking a worm process to feign infection. In all, 6,000 or so computers were infected. Experts recall that many days of chaotic internet chatboard discussion ensued, and that it took two days to fully remove the Morris worm from each machine. The US Government Accountability Office (GAO) estimated Morris worm damage to be in the very broad range of $100,000–$10,000,000. 

4. An identical Morris worm attack is no longer viable.

Experts say that at the time of the Morris worm, most people who operated computers were using DEC VAX ones running UNIX. A distinct “monoculture” persisted that would seem alien to today’s diverse landscape of various operating systems, OEMs, devices, software standards, communication protocols, and so forth. Attitudes since then have shifted towards a “security first” attitude, particularly in the enterprise setting. From this alone comes an entirely new sphere of security products, practices, laws, norms, planning, response, detection and other things that simply did not exist during the worm attack — they emerged from it. Closer to the user and each machine, a vulnerability the Morris worm attacked was weak passwords. Identity and access management (IAM), a whole field in itself, today ensures that password usage and curation — and their elimination! — are front and center. Today computing and the internet in 1988 are no longer the cooperative milieu or playground they were — it’s a serious atmosphere comprised of many focused, vigilant security practitioners. 

What is the name of the agency formed as a result of the morris worms spread?
VAXstation, or Virtual Address EXtension workstation, by Digital Equipment Corporation (DEC).. Photo credit: Wikipedia

5. The Morris worm ushered in trust as we know it, and today ‘Zero Trust’ dominates.

Three decades after the Morris worm’s significant event in the field’s history, the #1 lesson it taught is that the person(s) administering a network must verify those seeking access. Not only did the Morris worm cause the community of 60,000 users of the then-internet’s machines to lose innocence. It destroyed their collective assumption their own good intentions should be extended to others — and as a result, themselves. Suspicion, the lack of trust that permeates computing — on the unofficial scale of less on the consumer side, more on the enterprise, and high for the “mission-critical” — is now the norm. Today, the idea of Zero Trust is compounding that attitude, born circa 1988. The road toward verifying users and all kinds of access is trending in one direction: less (or no) trust. 

The Morris worm has been called the "Great Worm". This is a nod to Tolkein’s Long-worms (or dragons), Scatha and Glaurung, the comparison being that the Morris worm had great destructive power. Certainly the worm caused devastation in its day, and for its day, and gave birth to fear. 

That’s five things you now know about the Morris worm. To learn more, watch the Computerphile video featuring Dr. Julian Onions, noted programmer and astrophysicist from the UK.

What program did the Morris worm exploit?

The worm only targeted computers running a specific version of the Unix operating system, but it spread widely because it featured multiple vectors of attack. For example, it exploited a backdoor in the Internet's electronic mail system and a bug in the “finger” program that identified network users.

What was the impact of the Morris worm?

The Morris worm, named for its creator, Cornell University student Robert Tappan Morris, rapidly infected the limited (by today's standards) computers connected to the internet. An estimated 6,000 machines, depleted of their resources as the worm depleted computing resources, shut down and were rendered inoperable.

How did Morris worm spread?

The worm spread by exploiting vulnerabilities in UNIX send mail, finger, and rsh/rexec as well as by guessing weak passwords. Before spreading to a new machine, the Morris Worm checked if the machine had already been infected and was running a Morris Worm process.

Why was the Morris worm significant to computer security?

A hacker launched the Morris worm in 1988, and many people consider it one of the very first public attacks on computer systems. Morris worm code poses no threat today. Modern, well-defended computers are immune to the vulnerabilities the hacker exploited. But even so, the worm inspired generations of hackers.