30 years ago, the world's first cyberattack set the stage for modern cybersecurity challenges
- Written by Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University
Back in November 1988, Robert Tappan Morris, son of the famous cryptographer Robert Morris Sr.[1], was a 20-something graduate student at Cornell who wanted to know how big[2] the internet was – that is, how many devices were connected to it. So he wrote a program that would travel from computer to computer[3] and ask each machine to send a signal back to a control server, which would keep count.
The program worked well – too well, in fact. Morris had known that if it traveled too fast there might be problems, but the limits he built in weren’t enough to keep the program from clogging up large sections of the internet[4], both copying itself to new machines and sending those pings back. When he realized what was happening, even his messages warning system administrators[5] about the problem couldn’t get through.
His program became the first of a particular type of cyber attack called “distributed denial of service[6],” in which large numbers of internet-connected devices, including computers, webcams[7] and other smart gadgets[8], are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked.
As the chair of the integrated Indiana University Cybersecurity Program[9], I can report that these kinds of attacks are increasingly frequent[10] today. In many ways, Morris’s program, known to history as the “Morris worm,” set the stage for the crucial, and potentially devastating, vulnerabilities in what I and others have called the coming “Internet of Everything[11].”
Unpacking the Morris worm
Worms and viruses are similar, but different in one key way: A virus needs an external command, from a user or a hacker, to run its program. A worm, by contrast, hits the ground running all on its own. For example, even if you never open your email program, a worm that gets onto your computer might email a copy of itself to everyone in your address book.
In an era when few people were concerned about malicious software and nobody had protective software installed, the Morris worm spread quickly. It took 72 hours for researchers at Purdue and Berkeley to halt the worm[12]. In that time, it infected tens of thousands of systems – about 10 percent of the computers then on the internet[13]. Cleaning up the infection cost hundreds or thousands of dollars[14] for each affected machine.
In the clamor of media attention about this first event of its kind, confusion was rampant. Some reporters even asked whether people could catch the computer infection[15]. Sadly, many journalists as a whole haven’t gotten much more knowledgeable on the topic[16] in the intervening decades.
Trevor Blackwell/Wikimedia, CC BY-SA[17][18]Morris wasn’t trying to destroy the internet, but the worm’s widespread effects resulted in him being prosecuted[19] under the then-new Computer Fraud and Abuse Act[20]. He was sentenced to three years of probation and a roughly US$10,000 fine. In the late 1990s, though, he became a dot-com millionaire[21] – and is now a professor at MIT[22].
Rising threats
The internet remains subject to much more frequent – and more crippling – DDoS attacks. With more than 20 billion[23] devices of all types, from refrigerators and cars to fitness trackers, connected to the internet, and millions more being connected weekly, the number of security flaws and vulnerabilities is exploding.
In October 2016, a DDoS attack using thousands of hijacked webcams[24] – often used for security or baby monitors – shut down access to a number of important internet services[25] along the eastern U.S. seaboard. That event was the culmination of a series of increasingly damaging attacks using a botnet, or a network of compromised devices, which was controlled by software called Mirai[26]. Today’s internet is much larger, but not much more secure, than the internet of 1988.
Some things have actually gotten worse. Figuring out who is behind particular attacks[27] is not as easy as waiting for that person to get worried and send out apology notes and warnings[28], as Morris did in 1988. In some cases – the ones big enough to merit full investigations – it’s possible to identify the culprits. A trio of college students was ultimately found to have created Mirai to gain advantages[29] when playing the “Minecraft” computer game.
Fighting DDoS attacks
But technological tools are not enough, and neither are laws and regulations about online activity – including the law under which Morris was charged[30]. The dozens of state and federal cybercrime statutes on the books have not yet seemed to reduce the overall number or severity[31] of attacks, in part because of the global nature[32] of the problem.
There are some efforts underway in Congress to allow attack victims in some cases to engage in active defense measures[33] – a notion[34] that comes with a number of downsides, including the risk of escalation – and to require better security[35] for internet-connected devices. But passage is far from assured.
NTSB via AP[36]There is cause for hope, though. In the wake of the Morris worm, Carnegie Mellon University established the world’s first Cyber Emergency Response Team[37], which has been replicated in the federal government[38] and around the world[39]. Some policymakers are talking about establishing a national cybersecurity safety board[40], to investigate digital weaknesses and issue recommendations[41], much as the National Transportation Safety Board does with airplane disasters.
More organizations are also taking preventative action, adopting best practices in cybersecurity as they build their systems, rather than waiting for a problem to happen and trying to clean up afterward. If more organizations considered cybersecurity as an important element of corporate social responsibility[42], they – and their staff, customers and business partners – would be safer.
In “3001: The Final Odyssey[43],” science fiction author Arthur C. Clarke envisioned a future where humanity sealed the worst of its weapons in a vault on the moon – which included room for the most malignant computer viruses ever created. Before the next iteration of the Morris worm or Mirai does untold damage to the modern information society, it is up to everyone – governments, companies and individuals alike – to set up rules and programs that support widespread cybersecurity, without waiting another 30 years.
References
- ^ Robert Morris Sr. (www.welivesecurity.com)
- ^ how big (www.welivesecurity.com)
- ^ travel from computer to computer (www.foo.be)
- ^ clogging up large sections of the internet (www.washingtonpost.com)
- ^ messages warning system administrators (groups.csail.mit.edu)
- ^ distributed denial of service (theconversation.com)
- ^ webcams (techcrunch.com)
- ^ other smart gadgets (theconversation.com)
- ^ Indiana University Cybersecurity Program (cybersecurityprograms.indiana.edu)
- ^ increasingly frequent (bwcio.businessworld.in)
- ^ Internet of Everything (papers.ssrn.com)
- ^ halt the worm (www.washingtonpost.com)
- ^ 10 percent of the computers then on the internet (www.welivesecurity.com)
- ^ hundreds or thousands of dollars (en.wikipedia.org)
- ^ people could catch the computer infection (www.washingtonpost.com)
- ^ haven’t gotten much more knowledgeable on the topic (medium.com)
- ^ Trevor Blackwell/Wikimedia (commons.wikimedia.org)
- ^ CC BY-SA (creativecommons.org)
- ^ prosecuted (www.wired.com)
- ^ Computer Fraud and Abuse Act (theconversation.com)
- ^ dot-com millionaire (www.cnet.com)
- ^ professor at MIT (pdos.csail.mit.edu)
- ^ 20 billion (www.statista.com)
- ^ thousands of hijacked webcams (techcrunch.com)
- ^ shut down access to a number of important internet services (www.theguardian.com)
- ^ software called Mirai (blog.cloudflare.com)
- ^ who is behind particular attacks (doi.org)
- ^ send out apology notes and warnings (groups.csail.mit.edu)
- ^ created Mirai to gain advantages (www.wired.com)
- ^ law under which Morris was charged (ssrn.com)
- ^ not yet seemed to reduce the overall number or severity (phys.org)
- ^ global nature (www.csoonline.com)
- ^ allow attack victims in some cases to engage in active defense measures (www.fifthdomain.com)
- ^ notion (www.lawfareblog.com)
- ^ require better security (www.reuters.com)
- ^ NTSB via AP (www.apimages.com)
- ^ Cyber Emergency Response Team (www.sei.cmu.edu)
- ^ in the federal government (www.us-cert.gov)
- ^ around the world (www.internationalcybercenter.org)
- ^ national cybersecurity safety board (www.securityweek.com)
- ^ investigate digital weaknesses and issue recommendations (theconversation.com)
- ^ corporate social responsibility (theconversation.com)
- ^ 3001: The Final Odyssey (www.penguinrandomhouse.com)
Authors: Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University