That time when an NSA bloke's son borked the ENTIRE INTERNET...
... 25 years ago. 2 words that still stop old sysadmins' hearts: Morris Worm
It's 25 years since the Morris Worm taught the world that computers were capable of contracting viruses.
The Morris Worm hit on 2 November 1988, spreading rapidly by exploiting vulnerabilities in sendmail, the email server software that was the most commonly used technology of its type at the time.
Many contemporary Unix servers were running versions of sendmail featuring buggy debugging code, a shortcoming the worm exploited to devastating effect. The worm also bundled other spreading tricks, including the the ability to guess passwords and a stack overflow vulnerability in Unix systems.
The worm only exploited known vulnerabilities in Unix sendmail, finger, and rsh/rexec, as well as weak passwords. It was meant only to gauge the size of the nascent internet, but mistakes in its spreading mechanisms had unintended consequences that turned it into a powerful server-crashing tool.
Computer systems were flooded with malicious traffic as the worm tried to spread itself further, with many systems either crashing or grinding to a halt. According to estimates, 6,000 of the 60,000 systems in the early (and much smaller) internet of the day got infected by the worm.
Although the worm had no malicious payload its promiscuous spread created chaos.
A PBS television news report about the worm, which created all manner of headaches for early sysadmins, set the scene for many reports to follow. The suspect was a "dark genius", it concluded.
"Life in the modern world has a new anxiety," said the news anchor. "Just as we've become totally dependent on our computers they're being stalked by saboteurs, saboteurs who create computer viruses."
The creator of the worm was eventually identified as Robert T Morris, a computer science graduate student in the first year of his doctorate at Cornell University.
Morris was prosecuted over his actions, found guilty of breaking US computer abuse laws (specifically, the recently passed Computer Fraud and Abuse Act), and sentenced to three years’ probation. He was also ordered to complete 400 hours of community service and fined just over $10,000.
"What Morris did was stupid and reckless – there is no doubt about that. But he wasn’t the first person to write a virus, and he was far from the last to create and spread destructive malware," notes veteran security researcher Graham Cluley in a blog post marking the Morris Worm anniversary.
Morris, now a professor at the Computer Science and Artificial Intelligence Laboratory at MIT, declined The Register's invitation to answer questions on the creation of the worm. Morris's late father, also named Robert, worked for the NSA.
"A lot of this story sounds eerily familiar, even 25 years later," notes anti-virus industry veteran Paul Ducklin in a post on the Sophos Naked Security blog. Ducklin's post reflecting on the Morris Worm event, and the lessons that can be learned from the incident - many of which continue to be relevant today - can be found here.
Shortly after the outbreak, security researcher Eugene Spafford wrote what remains the definitive analysis (PDF) of the bugs exploited by the Morris Worm.