{"id":5363,"date":"2018-10-16T19:04:02","date_gmt":"2018-10-16T13:34:02","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=5363"},"modified":"2021-02-24T14:35:51","modified_gmt":"2021-02-24T09:05:51","slug":"morris-worm","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/","title":{"rendered":"What is the Morris Worm?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-435 aligncenter\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster-Copy.jpg\" alt=\"Morris Worm\" width=\"665\" height=\"537\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster-Copy.jpg 665w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster-Copy-300x242.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster-Copy-211x171.jpg 211w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/p>\n<p>The Morris worm was released on November 2nd, 1988 by Robert Tappan Morris. It was the first of computer worms to be distributed on the internet that would not work as planned.<\/p>\n<p><strong>Origins<\/strong><\/p>\n<p>As mentioned above, the <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\">worm virus<\/a> was introduced to the world in 1988. It was developed by Morris, a Cornell grad student to understand how quickly a worm could spread. The findings revealed the point that the worm spread much faster than Morris originally expected. The results showed that the worm had ended up infecting systems \u2013 say around at least 10 percent of the internet. The impact proved major damages and widespread outages. Morris worm is also recognized as the internet worm or the great worm.<\/p>\n<p><strong>Morris Worm Architecture <\/strong><\/p>\n<p>Initially, Robert Tappan Morris designed the worm to gauge the size of the Internet and it wasn&#8217;t intended to cause any damage to the systems. The worm was introduced into the wild from MIT to highlight the point that its author studied there, however, Morris went onto become a tenured professor at MIT in 2006.<\/p>\n<p>The Morris Worm worked by exploiting known vulnerabilities in Unix Sendmail, finger, and rsh\/rexec, as well as weak passwords. Apparently, an unintended outgrowth of the code, caused it to be more damaging. Thereby, a machine could be poisoned numerous times and every extra process would decrease the machine performance speed, finally to the end state of being unusable.<\/p>\n<p>On the other hand, this is similar to the fork bomb effect\u2014crashing the machine several times. The DEC VAX machines running 4BSD, and Sun-3 systems were infected by the main body of the worm. A portable C &#8220;grappling hook&#8221; component was applied to download the main body parts, and the grappling hook could run on other systems, loading them down and making them peripheral victims.<\/p>\n<p><strong>The Morris Worm Big Blunder<\/strong><\/p>\n<p>The significant error that modified the worm from a possibly simple rational exercise into a destructive denial of service attack was in the spreading mechanism. The worm would have ascertained whether to attack a new machine by examining whether there was previously a copy running. However, administrators could just run a process that would answer &#8220;yes&#8221; when asked whether there was previously a copy, and the worm would stay away. The protection against Morris worm was encouraged by Michael Rabin&#8217;s mantra &#8220;Randomization&#8221;.<\/p>\n<p>In order to support this probability, Morris conducted the worm to copy itself, even if the answer is &#8220;yes&#8221;, 1 out of 7 times. This level of duplication demonstrated to be unreasonable, and the worm simply spread quickly, affecting some machines multiple times. Rabin said that Morris &#8220;should have tried it on a simulator first&#8221;.<\/p>\n<p><strong>Morris Worm Aftermath<\/strong><\/p>\n<p>It was reported that around 6,000 major UNIX machines were infected by the Morris worm. Clifford Stoll, who helped fight the worm, wrote in 1989, &#8220;I surveyed the network, and found that two thousand computers were infected within fifteen hours. These machines were dead in the water\u2014useless until disinfected. And removing the virus often took two days.&#8221; The cost of the damage was estimated at $100,000\u201310,000,000 by the U.S. Government Accountability Office.<\/p>\n<p><strong>How to get rid of such viruses?<\/strong><\/p>\n<p>Virus attacks have become very common these days, it is advisable to have an <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\" rel=\"noopener\">antivirus software<\/a> installed on your computer to stay safe from virus attacks. When your computer is infected, it requires a <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\" target=\"_blank\" rel=\"noopener\">best virus removal<\/a> to get back to the normal state. Thereby, it is important to have a <a href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" rel=\"noopener\" target=\"_blank\">virus protection<\/a> in place to ward off such issues. Install the <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener\">Comodo antivirus<\/a> software and stay rest assured. For more details visit our official page.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/coronavirus-push-lokibot-trojan-malware-unsuspecting-users\/\">Hackers Misuse Coronavirus<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\" target=\"blank\">Best Virus Removal<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/wikipedia-taken-offline-massive-ddos-attack\/\" target=\"blank\" rel=\"noopener\">Wikipedia DDOS Attack<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"blank\" rel=\"noopener\">antivirus for android<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"_blank\" rel=\"noopener\">Best Antivirus<\/a><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/free-itsm-software.php\" rel=\"noopener\" target=\"_blank\">Free ITSM Software<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Morris worm was released on November 2nd, 1988 by Robert Tappan Morris. It was the first of computer worms to be distributed on the internet that would not work as planned. Origins As mentioned above, the worm virus was introduced to the world in 1988. It was developed by Morris, a Cornell grad student [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":437,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[164,243,90,97],"class_list":["post-5363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-computer-worm","tag-morris-worm","tag-virus-protection","tag-virus-removal"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is the Morris Worm? | How do they Infect PC and Devices?<\/title>\n<meta name=\"description\" content=\"Morris Worm is an internet worm that was designed to exploit the vulnerabilities in a system which later turned out to be a destructive attack over them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is the Morris Worm? | How do they Infect PC and Devices?\" \/>\n<meta property=\"og:description\" content=\"Morris Worm is an internet worm that was designed to exploit the vulnerabilities in a system which later turned out to be a destructive attack over them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-16T13:34:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T09:05:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/\",\"name\":\"What is the Morris Worm? | How do they Infect PC and Devices?\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg\",\"datePublished\":\"2018-10-16T13:34:02+00:00\",\"dateModified\":\"2021-02-24T09:05:51+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Morris Worm is an internet worm that was designed to exploit the vulnerabilities in a system which later turned out to be a destructive attack over them.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg\",\"width\":350,\"height\":282,\"caption\":\"Computer Worm\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is the Morris Worm?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is the Morris Worm? | How do they Infect PC and Devices?","description":"Morris Worm is an internet worm that was designed to exploit the vulnerabilities in a system which later turned out to be a destructive attack over them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/","og_locale":"en_US","og_type":"article","og_title":"What is the Morris Worm? | How do they Infect PC and Devices?","og_description":"Morris Worm is an internet worm that was designed to exploit the vulnerabilities in a system which later turned out to be a destructive attack over them.","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-10-16T13:34:02+00:00","article_modified_time":"2021-02-24T09:05:51+00:00","og_image":[{"width":350,"height":282,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/","name":"What is the Morris Worm? | How do they Infect PC and Devices?","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg","datePublished":"2018-10-16T13:34:02+00:00","dateModified":"2021-02-24T09:05:51+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Morris Worm is an internet worm that was designed to exploit the vulnerabilities in a system which later turned out to be a destructive attack over them.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg","width":350,"height":282,"caption":"Computer Worm"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/morris-worm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is the Morris Worm?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=5363"}],"version-history":[{"count":20,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5363\/revisions"}],"predecessor-version":[{"id":15903,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5363\/revisions\/15903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/437"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=5363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=5363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=5363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}