<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Morris Worm Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/tag/morris-worm/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/tag/morris-worm/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Mon, 10 Mar 2025 17:01:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>Morris Worm Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/tag/morris-worm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What is the Morris Worm? How One Man Accidentally Destroyed the Internet 30 Years Ago</title>
		<link>https://goodshepherdmedia.net/what-is-the-morris-worm-how-one-man-accidentally-destroyed-the-internet-30-years-ago/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 17:00:34 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Morris Worm]]></category>
		<category><![CDATA[worm]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19530</guid>

					<description><![CDATA[This Is How One Man Accidentally Destroyed the Internet 30 Years Ago It all started with the Morris worm. Pixabay Back in November 1988, Robert Tappan Morris, son of the famous cryptographer Robert Morris Sr., was a 20-something graduate student at Cornell who wanted to know how big the internet was — that is, how many devices were [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="cCV">
<div class="sWr">
<div class="GqV JD9">
<div class="gsz Ak6">
<div class="R1N ROm wfd">
<h1 class="aVX cS4">This Is How One Man Accidentally Destroyed the Internet 30 Years Ago</h1>
</div>
<div class="r87 uRt">
<h2>It all started with the Morris worm.</h2>
</div>
<div class="rAY _9O">
<div></div>
</div>
</div>
<div class="daF">
<div class="pxF oL7 YOh"><picture><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=920&amp;h=560&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=920&amp;h=560&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=728&amp;h=512&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=728&amp;h=512&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" /><img decoding="async" class="N4z geM" src="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces&amp;dpr=2" alt="" /></picture></div>
</div>
<p><span class="Vms j29"><a href="https://pixabay.com/en/hacking-cyber-blackandwhite-crime-2903156/" target="_blank" rel="noopener noreferrer">Pixabay</a></span></p>
</div>
</div>
</div>
<div class="tn6">
<div class="AOL Afg" data-adroot="true">
<p>Back in November 1988, Robert Tappan Morris, son of the famous cryptographer <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">Robert Morris Sr.</a>, was a 20-something graduate student at Cornell who wanted to know <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">how big</a> the internet was — that is, how many devices were connected to it. So he wrote a program that would <a href="http://www.foo.be/docs-free/morris-worm/" target="_blank" rel="noopener noreferrer">travel from computer to computer</a> and ask each machine to send a signal back to a control server, which would keep count.</p>
<div class="adWrapper G8T zzk pCo hzA UdU">
<div id="ad-1" data-google-query-id="CIjamtf9_4sDFY8I7wId-ZQQEg">
<div id="google_ads_iframe_/49944529/inverse/posts_0__container__">The program worked well — too well, in fact. Morris had known that if it traveled too fast there might be problems, but the limits he built in weren’t enough to keep the program from <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">clogging up large sections of the internet</a>, both copying itself to new machines and sending those pings back. When he realized what was happening, even his <a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/morris-worm.html" target="_blank" rel="noopener noreferrer">messages warning system administrators</a> about the problem couldn’t get through.</div>
</div>
</div>
<div class="sWr iGR">
<div class="yFJ">
<div class="jjV">
<div class="_Qy wmr">
<div id="jwplayer-video-1" class="jwplayer jw-reset jw-state-paused jw-stretch-uniform jw-flag-aspect-mode jw-breakpoint-5 jw-floating-dismissible jw-flag-ads jw-flag-ads-googleima jw-flag-user-inactive" tabindex="0" role="application" aria-label="Video Player - This Quantum Device Will Protect You From Cyberattacks to Make &quot;True&quot; Random Numbers">
<div class="jw-wrapper jw-reset">
<div class="jw-controls jw-reset">
<div class="jw-controlbar jw-reset">
<div class="jw-reset jw-button-container">
<div class="jw-reset jw-spacer">His program became the first of a particular type of <a href="https://www.inverse.com/article/48293-5g-future-cybersecurity-risks">cyberattack</a> called “<a href="https://theconversation.com/attackers-can-make-it-impossible-to-dial-911-67980" target="_blank" rel="noopener noreferrer">distributed denial of service</a>,” in which large numbers of internet-connected devices, including computers, <a href="https://techcrunch.com/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled/" target="_blank" rel="noopener noreferrer">webcams</a>, and <a href="https://theconversation.com/police-around-the-world-learn-to-fight-global-scale-cybercrime-75804" target="_blank" rel="noopener noreferrer">other smart gadgets</a>, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked.</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU stickyScrollableRailAd">
<div id="ad-2" data-google-query-id="CMC61df9_4sDFWBZCAQdjKAwLA">
<div id="google_ads_iframe_/49944529/inverse/posts_1__container__">As the chair of the integrated <a href="https://cybersecurityprograms.indiana.edu/" target="_blank" rel="noopener noreferrer">Indiana University Cybersecurity Program</a>, I can report that these kinds of attacks are <a href="http://bwcio.businessworld.in/article/Verisign-releases-DDOS-Trends-Report-of-Q2-2018/05-10-2018-161517/" target="_blank" rel="noopener noreferrer">increasingly frequent</a> today. In many ways, Morris’s program, known to history as the “Morris worm,” set the stage for the crucial, and potentially devastating, vulnerabilities in what I and others have called the coming “<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3208018" target="_blank" rel="noopener noreferrer">Internet of Everything</a>.”</div>
</div>
</div>
<h2>Unpacking the Morris Worm</h2>
<p>Worms and <a href="https://www.inverse.com/article/44826-pig-virus-human-hosts-human-cells-study-shows">viruses</a> are similar but different in one key way: A virus needs an external command, from a user or a hacker, to run its program. A worm, by contrast, hits the ground running all on its own. For example, even if you never open your email program, a worm that gets onto your computer might email a copy of itself to everyone in your address book.</p>
<p>In an era when few people were concerned about malicious software and nobody had protective software installed, the Morris worm spread quickly. It took 72 hours for researchers at Purdue and Berkeley to <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">halt the worm</a>. In that time, it infected tens of thousands of systems — about <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">10 percent of the computers then on the internet</a>. Cleaning up the infection cost <a href="https://en.wikipedia.org/wiki/Morris_worm#cite_note-6" target="_blank" rel="noopener noreferrer">hundreds or thousands of dollars</a> for each affected machine.</p>
<p>In the clamor of media attention about this first event of its kind, confusion was rampant. Some reporters even asked whether <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">people could catch the computer infection</a>. Sadly, many journalists as a whole <a href="https://medium.com/@davelee/reporting-on-cyberattacks-the-medias-urgent-problem-d6c450a3383a" target="_blank" rel="noopener noreferrer">haven’t gotten much more knowledgeable on the topic</a> in the intervening decades.</p>
<div class="sWr iGR">
<div class="gDT">
<figure class="Qf5 CMk">
<div class="pxF CgC mvL s-817845468"><picture><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=825&amp;h=835&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=825&amp;h=835&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=688&amp;h=697&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=688&amp;h=697&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" /><img decoding="async" class="N4z B9M" src="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces&amp;dpr=2" alt="Robert Tappan Morris, in 2008." /></picture></div><figcaption class="rv9 tm3">
<div>
<p>Robert Tappan Morris, in 2008.</p>
</div>
<p><cite class="Afu _Nh"><a href="https://commons.wikimedia.org/wiki/File:Robert_Tappan_Morris.jpg" target="_blank" rel="noopener noreferrer">Trevor Blackwell/Wikimedia, CC BY-SA</a></cite></p>
</figcaption></figure>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU stickyScrollableRailAd">
<div id="ad-3" data-google-query-id="COiN19j9_4sDFYQ4RAgdtKYB9A">
<div id="google_ads_iframe_/49944529/inverse/posts_2__container__">Morris wasn’t trying to destroy the internet, but the worm’s widespread effects resulted in him being <a href="https://www.wired.com/2011/07/0726first-computer-fraud-indictment/" target="_blank" rel="noopener noreferrer">prosecuted</a> under the then-new <a href="https://theconversation.com/malwaretechs-arrest-sheds-light-on-the-complex-culture-of-the-hacking-world-82136" target="_blank" rel="noopener noreferrer">Computer Fraud and Abuse Act</a>. He was sentenced to three years of probation and a roughly $10,000 fine. In the late 1990s, though, he became a <a href="https://www.cnet.com/news/yahoo-buys-viaweb-for-49-million/" target="_blank" rel="noopener noreferrer">dot-com millionaire</a> — and is now a <a href="https://pdos.csail.mit.edu/%257Ertm/" target="_blank" rel="noopener noreferrer">professor at MIT</a>.</div>
</div>
</div>
<h2>Rising Threats</h2>
<p>The internet remains subject to much more frequent — and more crippling — DDoS attacks. With more than <a href="https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/" target="_blank" rel="noopener noreferrer">20 billion</a> devices of all types, from refrigerators and cars to fitness trackers, connected to the internet, and millions more being connected weekly, the number of security flaws and vulnerabilities is exploding.</p>
<p>In October 2016, a DDoS attack using <a href="https://techcrunch.com/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled/" target="_blank" rel="noopener noreferrer">thousands of hijacked webcams</a> — often used for security or baby monitors — <a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet" target="_blank" rel="noopener noreferrer">shut down access to a number of important internet services</a> along the eastern US seaboard. That event was the culmination of a series of increasingly damaging attacks using a botnet, or a network of compromised devices, which was controlled by <a href="https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/" target="_blank" rel="noopener noreferrer">software called Mirai</a>. Today’s internet is much larger, but not much more secure, than the internet of 1988.</p>
<p>Some things have actually gotten worse. Figuring out <a href="https://doi.org/10.1080/01402390.2014.977382" target="_blank" rel="noopener noreferrer">who is behind particular attacks</a> is not as easy as waiting for that person to get worried and <a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/morris-worm.html" target="_blank" rel="noopener noreferrer">send out apology notes and warnings</a>, as Morris did in 1988. In some cases — the ones big enough to merit full investigations — it’s possible to identify the culprits. A trio of college students was ultimately found to have <a href="https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/" target="_blank" rel="noopener noreferrer">created Mirai to gain advantages</a> when playing the <em>Minecraft</em> computer game.</p>
<h2>Fighting DDoS Attacks</h2>
<p>But technological tools are not enough, and neither are laws and regulations about online activity — including the <a href="https://ssrn.com/abstract=2573787" target="_blank" rel="noopener noreferrer">law under which Morris was charged</a>. The dozens of state and federal cybercrime statutes on the books have <a href="https://phys.org/news/2018-02-cyberattacks-costly-worse.html" target="_blank" rel="noopener noreferrer">not yet seemed to reduce the overall number or severity</a> of attacks, in part because of the <a href="https://www.csoonline.com/article/3153707/security/top-cybersecurity-facts-figures-and-statistics.html" target="_blank" rel="noopener noreferrer">global nature</a> of the problem.</p>
<div class="adWrapper G8T zzk pCo hzA UdU">
<div id="ad-4" data-google-query-id="CKq1rOL9_4sDFUzl_QUdBhsrdQ">
<div id="google_ads_iframe_/49944529/inverse/posts_3__container__">There are some efforts underway in Congress to <a href="https://www.fifthdomain.com/congress/policy/2018/10/12/support-for-hack-back-grows-after-trumps-pledge-to-get-aggressive-in-cyberspace/" target="_blank" rel="noopener noreferrer">allow attack victims in some cases to engage in active defense measures</a> — a <a href="https://www.lawfareblog.com/tagged/hacking-back" target="_blank" rel="noopener noreferrer">notion</a> that comes with a number of downsides, including the risk of escalation — and to <a href="https://www.reuters.com/article/us-usa-cyber-congress-idUSKBN1AH474" target="_blank" rel="noopener noreferrer">require better security</a> for internet-connected devices. But passage is far from assured.</div>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU">
<div id="ad-5" data-google-query-id="CLfExuL9_4sDFa78_QUdu4cnBg">
<div id="google_ads_iframe_/49944529/inverse/posts_4__container__">There is cause for hope, though. In the wake of the Morris worm, Carnegie Mellon University established the world’s first <a href="https://www.sei.cmu.edu/about/divisions/cert/index.cfm#history" target="_blank" rel="noopener noreferrer">Cyber Emergency Response Team</a>, which has been replicated <a href="https://www.us-cert.gov/" target="_blank" rel="noopener noreferrer">in the federal government</a> and <a href="http://www.internationalcybercenter.org/certicc/certworld" target="_blank" rel="noopener noreferrer">around the world</a>. Some policymakers are talking about establishing a <a href="https://www.securityweek.com/does-us-need-national-cybersecurity-safety-board" target="_blank" rel="noopener noreferrer">national cybersecurity safety board</a>, to <a href="https://theconversation.com/what-cybersecurity-investigators-can-learn-from-airplane-crashes-91177" target="_blank" rel="noopener noreferrer">investigate digital weaknesses and issue recommendations</a>, much as the National Transportation Safety Board does with <a href="https://www.inverse.com/article/49548-element-one-hydrogen-fuel-plane-2025">airplane</a> disasters.</div>
</div>
</div>
<p>More organizations are also taking preventative action, adopting best practices in cybersecurity as they build their systems, rather than waiting for a problem to happen and trying to clean up afterward. If more organizations considered cybersecurity as an important element of <a href="https://theconversation.com/notpetya-ransomware-attack-shows-corporate-social-responsibility-should-include-cybersecurity-79810" target="_blank" rel="noopener noreferrer">corporate social responsibility</a>, they — and their staff, customers, and business partners — would be safer.</p>
<p>In <a href="https://www.penguinrandomhouse.com/books/28148/3001-the-final-odyssey-by-arthur-c-clarke/9780345423498/" target="_blank" rel="noopener noreferrer"><em>3001: The Final Odyssey</em></a>, science fiction author Arthur C. Clarke envisioned a future where humanity sealed the worst of its weapons in a vault on the moon — which included room for the most malignant computer viruses ever created. Before the next iteration of the Morris worm or Mirai does untold damage to the modern information society, it is up to everyone — governments, companies, and individuals alike — to set up rules and programs that support widespread cybersecurity, without waiting another 30 years. <a href="https://www.inverse.com/article/50422-worlds-first-cyberattack-happened-30-years-ago-robert-tappan-morris" target="_blank" rel="noopener">source</a></p>
<div class="sWr iGR">
<div class="gDT">
<figure class="Qf5 CMk">
<div class="pxF CgC mvL s1359406774"><picture><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" /></picture></div>
</figure>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
