Morris worm
{{Use mdy dates|date=September 2022}}
{{Short description|1988 Internet worm}}
{{Infobox software
| name = Morris worm
| released =8:30 pm November 2, 1988
| genre = Computer worm
| author = Robert Tappan Morris
| platform = VAX, Sun-3 BBN C70 NOC, BBN C30IMP
| operating_system = 4BSD
}}
{{Internet history timeline}}
The Morris worm or Internet worm of November 2, 1988, is one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act.{{Cite book |last=Dressler |first=J. |title=Cases and Materials on Criminal Law |chapter=United States v. Morris |location=St. Paul, MN |publisher=Thomson/West |year=2007 |isbn=978-0-314-17719-3 }} It was written by Robert Tappan Morris, a graduate student at Cornell University, and launched on 8:30 p.m. November 2, 1988, from the Massachusetts Institute of Technology network.
Architecture
File:Morris Worm.jpg containing the source code for the Morris Worm, at the Computer History Museum]]
The worm's creator, Robert Tappan Morris, is the son of cryptographer Robert Morris, who worked at the NSA.{{Cite web|url=https://www.globalknowledge.com/blog/2018/11/01/the-morris-worm-turns-25/|title=The Morris Worm Turns 30|date=November 1, 2018|website=Global Knowledge Blog|access-date=January 29, 2019|archive-date=January 30, 2019|archive-url=https://web.archive.org/web/20190130053313/https://www.globalknowledge.com/blog/2018/11/01/the-morris-worm-turns-25/|url-status=live}} A friend of Morris said that he created the worm simply to see if it could be done,{{cite tweet|user=paulg|number=1323246618326507524|date=November 2, 2020|title=FWIW the Wikipedia article on the worm is mistaken|first=Paul | last=Graham|access-date=November 2, 2020}} and released it from the Massachusetts Institute of Technology (MIT) in the hope of suggesting that its creator studied there, instead of Cornell.{{Cite book|last=Kehoe|first=Brendan P.|title=Zen and the Art of the Internet: A Beginner's Guide to the Internet, First Edition|year=1992}}
Clifford Stoll, author of The Cuckoo's Egg, wrote that "Rumors have it that [Morris] worked with a friend or two at Harvard's computing department (Harvard student Paul Graham sent him mail asking for 'Any news on the brilliant project')".{{cite book |title=The Cuckoo's Egg |url=https://archive.org/details/cuckooseggtracki00stol |url-access=registration |publisher=Doubleday |author=Stoll, Clifford |year=1989 |isbn=978-0-307-81942-0 |author-link=Clifford Stoll |chapter=Epilogue}}
The worm exploited several vulnerabilities of targeted systems, including:
- A hole in the debug mode of the Unix sendmail program
- A buffer overflow or overrun hole in the finger network service
- The transitive trust enabled by people setting up network logins with no password requirements via remote execution (rexec) with Remote Shell (rsh), termed rexec/rsh
The worm exploited weak passwords.{{cite web |url=http://www.loundy.com/CASES/US_v_Morris2.html |title=US vs. Morris |publisher=Loundy.com |access-date=February 5, 2014 |archive-date=February 13, 1998 |archive-url=https://web.archive.org/web/19980213113238/http://www.loundy.com/CASES/US_v_Morris2.html |url-status=live }} Morris's exploits became generally obsolete due to decommissioning rsh (normally disabled on untrusted networks), fixes to sendmail and finger, widespread network filtering, and improved awareness of weak passwords.
Though Morris said that he did not intend for the worm to be actively destructive, instead seeking to merely highlight the weaknesses present in many networks of the time, a consequence of Morris's coding resulted in the worm being more damaging and spreadable than originally planned. It was initially programmed to check each computer to determine if the infection was already present, but Morris believed that some system administrators might counter this by instructing the computer to report a false positive. Instead, he programmed the worm to copy itself 14% of the time, regardless of the status of infection on the computer. This resulted in a computer potentially being infected multiple times, with each additional infection slowing the machine down to unusability. This had the same effect as a fork bomb, and crashed the computer several times.
The main body of the worm can infect only DEC VAX machines running 4BSD, alongside Sun-3 systems. A portable C "grappling hook" component of the worm was used to download the main body parts, and the grappling hook runs on other systems, loading them down and making them peripheral victims.{{cite web |url=http://homes.cerias.purdue.edu/~spaf/tech-reps/823.pdf |title=An analysis of the worm |first=Eugene |last=Spafford |author-link=Gene Spafford |publisher=Purdue University |format=PDF |date=December 8, 1988 |access-date=October 30, 2019 |archive-date=May 1, 2006 |archive-url=https://web.archive.org/web/20060501223032/http://homes.cerias.purdue.edu/~spaf/tech-reps/823.pdf |url-status=live }}
Replication rate
By instructing the worm to replicate itself regardless of a computer's reported infection status, Morris transformed the worm from a potentially harmless intellectual and computing exercise into a viral denial-of-service attack. Morris's inclusion of the rate of copy within the worm was inspired by Michael Rabin's mantra of randomization.{{cite web |url=http://morrisworm.larrymcelhiney.com/morris_appeal.txt |title=Court Appeal of Morris |access-date=February 5, 2014 |archive-date=May 13, 2010 |archive-url=https://web.archive.org/web/20100513050921/http://morrisworm.larrymcelhiney.com/morris_appeal.txt |url-status=live }}
The resulting level of replication proved excessive, with the worm spreading rapidly, infecting some computers several times. Rabin would eventually comment that Morris "should have tried it on a simulator first".{{cite book|last=Maynor|first=David|title=Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research|url=https://books.google.com/books?id=JWgNVFtbWJ4C&pg=PA218|year=2011|publisher=Elsevier|isbn=978-0-08-054925-5|page=218}}
Effects
During the Morris appeal process, the US court of appeals estimated the cost of removing the virus from each installation was in the range of $200–$53,000. Possibly based on these numbers, Stoll, a systems administrator known for discovering and subsequently tracking the hacker Markus Hess three years earlier, estimated for the US Government Accountability Office that the total economic impact was between $100,000 and $10,000,000. Stoll helped fight the worm, writing in 1989 that "I surveyed the network, and found that two thousand computers were infected within fifteen hours. These machines were dead in the water—useless until disinfected. And removing the virus often took two days." Stoll commented that the worm showed the danger of monoculture, because "If all the systems on the ARPANET ran Berkeley Unix, the virus would have disabled all fifty thousand of them."{{r|stoll1989}}
It is usually reported that around 6,000 major UNIX machines were infected by the Morris worm. Graham claimed, "I was there when this statistic was cooked up, and this was the recipe: someone guessed that there were about 60,000 computers attached to the Internet, and that the worm might have infected ten percent of them".{{cite web |url=http://www.paulgraham.com/submarine.html#f4n |title=The Submarine |publisher=Paulgraham.com |access-date=February 5, 2014 |archive-date=April 19, 2005 |archive-url=https://web.archive.org/web/20050419041258/http://www.paulgraham.com/submarine.html#f4n |url-status=live }} Stoll estimated that "only a couple thousand" computers were affected.
The Internet was partitioned for several days, as regional networks disconnected from the NSFNet backbone and from each other to prevent recontamination while cleaning their own networks.
The Morris worm prompted DARPA to fund the establishment of the CERT/CC at Carnegie Mellon University, giving experts a central point for coordinating responses to network emergencies.{{cite web |url=http://www.cert.org/encyc_article/tocencyc.html |title=Security of the Internet. CERT/CC |publisher=Cert.org |date=September 1, 1998 |access-date=February 5, 2014 |archive-date=April 15, 1998 |archive-url=https://web.archive.org/web/19980415061511/http://www.cert.org/encyc_article/tocencyc.html |url-status=live }} Gene Spafford also created the Phage mailing list to coordinate a response to the emergency.
Morris was tried and convicted of violating United States Code Title{{nbsp}}18 ({{USC|18|1030}}), the Computer Fraud and Abuse Act,{{cite court |litigants=United States v. Morris (1991) |vol=928 |reporter=F.2d |opinion=504 |pinpoint=505 |court=2d Cir. |date=1991 |url=https://scholar.google.com/scholar_case?case=551386241451639668 |archive-url=https://web.archive.org/web/20190801213124/https://scholar.google.com/scholar_case?case=551386241451639668 |url-status=live }} in United States v. Morris. After appeals, he was sentenced to three years' probation, 400 hours of community service, and a fine of {{US$|10050|1991|round=-3}} plus the costs of his supervision.[https://www.nytimes.com/1990/05/05/us/computer-intruder-is-put-on-probation-and-fined-10000.html "Computer Intruder is Put on Probation and Fined"] {{Webarchive|url=https://web.archive.org/web/20090214111830/http://query.nytimes.com/gst/fullpage.html?res=9C0CE1D71038F936A35756C0A966958260&scp=2&sq=robert+tappan+morris&st=nyt |date=February 14, 2009 }} by John Markoff, The New York Times. The total fine ran to $13,326, which included a $10,000 fine, $50 special assessment, and $3,276 cost of probation oversight.
The Morris worm has sometimes been referred to as the "Great Worm", due to the devastating effect it had on the Internet at that time, both in overall system downtime and in psychological impact on the perception of security and reliability of the Internet. The name was derived from the "Great Worms" of Tolkien: Scatha and Glaurung.{{cite web|url=http://www.catb.org/~esr/jargon/html/G/Great-Worm.html|title=Great Worm|publisher=catb.org|access-date=November 2, 2005|archive-date=July 2, 2003|archive-url=https://web.archive.org/web/20030702185617/http://www.catb.org/~esr/jargon/html/G/Great-Worm.html|url-status=live}}
In popular culture
- The 1995 film Hackers features a main character who releases a viral attack bearing several similarities to the Morris worm. The event takes place in 1988, infects over 1,000 computers, causes a massive economic disruption, and results in its propagator being fined and put on probation.
- In the visual novel Digital: A Love Story, the Morris worm is portrayed as a cover story for a large-scale attack on ARPANET and several bulletin board systems.
- In the epilogue of his book The Cuckoo's Egg, Stoll details his efforts battling the Morris worm.
- In Halt and Catch Fire, a virus that works in a similar way to the Morris worm is created to gauge the size of the network.
- In Date Time, an indie developed video game, the Morris worm is portrayed as a character in a dating sim.
- In Gori: Cuddly Carnage, a game developed by Angry Demon Studio, a floppy disk can be seen containing the Morris worm.
- In Merryweather Media's webcomic 'Internet Explorer', The Morris Worm is portrayed as a tragic antagonist, whose goal was to map out the size of the internet, but accidentally brought it to near-collapse.
See also
References
{{Reflist}}
External links
- [http://www.cs.cornell.edu/courses/cs1110/2009sp/assignments/a1/p706-eisenberg.pdf Cornell commission findings] (from the abstract: "sheds new light and dispels some myths")
- [http://ftp.cerias.purdue.edu/pub/doc/morris_worm/ Archive of worm material, including papers and code]
- {{IETF RFC|1135}} – "Helminthiasis of the Internet" – an analysis of the worm infestation
- [http://www.ee.ryerson.ca/~elf/hack/iworm.html A Report on the Internet Worm, by Bob Page, University of Lowell]
- [http://content.lib.utah.edu/cdm/singleitem/collection/uspace/id/709/rec/2 "A Tour of the Worm" by Donn Seeley, Department of Computer Science University of Utah] – This paper provides a chronology for the outbreak and presents a detailed description of the internals of the worm, based on a C version produced by decompiling.
- [https://www.mit.edu/people/eichin/virus/main.html "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988" by Mark W. Eichin and Jon A. Rochlis, Massachusetts Institute of Technology] We present the chronology of events as seen by our team at MIT...
- [http://foofus.com/amuse/public/Morris_Worm_Incident_Report_1.pdf NASA Incident Report] for the Morris Worm infection at the NAS Supercomputer
- [https://archive.org/details/Vexing_Virus_PBS_News_Hour_Segment_1988 "Vexing Virus"] – PBS NewsHour segment
{{Hacking in the 1980s}}