{"id":17039,"date":"2021-11-22T13:12:09","date_gmt":"2021-11-22T13:12:09","guid":{"rendered":"https:\/\/fastestvpn.com\/resources\/?p=17039"},"modified":"2025-05-26T15:37:56","modified_gmt":"2025-05-26T15:37:56","slug":"what-is-morris-worm","status":"publish","type":"post","link":"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/","title":{"rendered":"Morris Worm Explained &#8211; The First Computer Worm","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"<p>November marks the 33rd anniversary of the Morris Worm. It is a malicious computer program dubbed as the first &#8211; or at least one of the earliest &#8211; computer worm. Its history is an interesting one, and it paved the way for future malware. Let\u2019s look back at what is Morris Worm, its history, and why it\u2019s regarded as one of the <a href=\"https:\/\/fastestvpn.com\/resources\/most-destructive-malware\/\" target=\"_blank\" rel=\"noopener\">most destructive malware of all time<\/a>.<\/p>\n<h2>What is Robert Morris Worm?<\/h2>\n<p>In 1988, when computers were in infancy, a student named Robert Tappan Morris at Cornell University created what is widely believed to be the world\u2019s first computer worm.<\/p>\n<p>The internet then was not the vast, seemingly endless resource of information as we know it to be today. It was in an experimental phase and used to be known as ARPANET, which stands for Advanced Research Projects Agency Network. Only as little as 60,000 computers were connected to the internet back then. While the number is not low, it is certainly a fraction of the internet of today that consists of billions of devices.<\/p>\n<p>Malware is a term given to define malicious software. A computer worm is a type of malware that has self-replicating characteristics. It means that once the malware infects a device, it will proceed to replicate and spread itself to other computers connected to it. In contrast to a virus, a worm does not need to be triggered by the user and operates entirely independently.<\/p>\n <div class=\"fastest-hd-btn\">\n <a class=\"hd-conter-btn\" href=\"https:\/\/fastestvpn.com\/lifetime-special-deals?a_aid=634829be4d0b2\" title=\"Get FastestVPN\">Get FastestVPN <i class=\"fa fa-hand-o-right\" aria-hidden=\"true\"><\/i><\/a>\n <\/div>\n\n<h3>What Does the Morris Worm Do?<\/h3>\n<p>As a computer worm, it was programmed to replicate itself. But what Morris didn\u2019t see coming was a bug in the code that allowed the program to replicate itself much faster than he had predicted. And that\u2019s where the trouble began.<\/p>\n<p>On November 2, 1988, Morris used a computer at the Massachusetts Institute of Technology (MIT) to spread the malware to avoid detection. What he didn\u2019t see coming is the fast self-replicating nature that started to bog down computers around the world as the worm began spreading from computer to computer. According to an estimate, it had spread to and infected 6,000 computers.<\/p>\n<p>The program was not designed to attack computers because Morris was not aiming to destroy data or cause damage to computers. Morris intended to find out how big the internet was and make the worm travel and send a pingback to him. But it caused the network to get clogged.<\/p>\n<p>The weight of the worm\u2019s self-replicating nature brought down the processing capabilities of the computers. You have to remember that we are talking about computers in the 80s when processing power was hundreds of times slower than today\u2019s computers and the internet was in an experimental phase.<\/p>\n<p>It exploited a vulnerability in Unix\u2019s <i>sendmail <\/i>program, <i>finger <\/i>(buffer overflow), and <i>rsh\/rexec<\/i> to infect a system, make copies of itself, and spread to other computers. It also relied on weak passwords to guess and attempted to access servers to reach more computers. It\u2019s another reminder of why weak passwords are a huge security risk, and measures like <a href=\"https:\/\/fastestvpn.com\/resources\/two-factor-authentication\/\" target=\"_blank\" rel=\"noopener\">two-factor authentication<\/a> prove instrumental in deterring unauthorized login.<\/p>\n<p>Morris had programmed the worm in a way that if it found a computer already infected with the malware, one of them would terminate itself to prevent reinfection and multiple copies of itself. The mechanism didn\u2019t work as intended, and the losing worm made itself indestructible to prevent a fake worm from triggering the deletion response. It was one of the reasons why the worm overwhelmed systems.<\/p>\n<h3>What Happened to the Morris Worm?<\/h3>\n<p>After Morris realized that the worm was traveling faster than he had anticipated, he asked his friend to send an anonymous message on Usenet bulletin board system from Harvard to alert others about it and instructions on how to fight the Morris worm program. Unfortunately, the message did not reach others in time due to network clogging.<\/p>\n<p>Researchers at Berkeley and a team at Purdue began investigating the worm and how to stop it. After a day, they had an understanding of how the worm worked and shared their findings with others.<\/p>\n<p>The source code of the Morris Code sits on a floppy disk inside a glass case at Computer History Museum.<\/p>\n<p>Robert Morris was convicted under the Fraud and Abuse Act in the United States. He was fined $10,000, 400 hours of community service, and sentenced to serve three years of probation. Morris later joined MIT as faculty and went on to co-found a startup accelerator called YCombinator.<\/p>\n<h3>The Morris Worm Pushed Cybersecurity Efforts<\/h3>\n<p>Back in the 80s, there were few computers in the world and even fewer security threats. Cybersecurity wasn\u2019t really a concern. The internet was mostly used by researchers. The Morris Worm introduced the world to the catastrophe of a Distributed Denial of Service (DDoS) attack. It made researchers pay more attention to cybersecurity to prevent future attacks that have the potential to cause worldwide panic.<\/p>\n<p>You can say that Morris Worm was one of the turning points in the history of computers that paved the way for modern cybersecurity.<\/p>\n<p>It is also seen as an inspiration for future malware. Morris also intended to develop a botnet in the program, allowing the worm to communicate and receive new instructions from a command and control center (C&amp;C). We have explained how <a href=\"https:\/\/fastestvpn.com\/resources\/what-is-botnet\/\" target=\"_blank\" rel=\"noopener\">botnets<\/a> today can create a swarm of infected computers for malicious purposes such as <a href=\"https:\/\/fastestvpn.com\/resources\/what-is-cryptojacking\/\" target=\"_blank\" rel=\"noopener\">cryptojacking<\/a>.<\/p>\n<h3>Conclusion<\/h3>\n<p>Hopefully, the story of the Morris worm has inspired you to take cybersecurity seriously. An antivirus is an absolute must in today\u2019s world, where threats are lurking at every corner. Antivirus programs combat malware using traditional and unique detection methods, and they are updated frequently with new malware definitions.<\/p>\n<p>Like how an antivirus protects you against malware, VPN delivers security for web traffic. It hides your web activity and data through encryption. It also spoofs your IP address to make you anonymous on the web.<br \/>\n <div class=\"fastest-hd-cta\">\n <h3>Take Control of Your Privacy Today! \n <span>Unblock websites, access streaming platforms, and bypass ISP monitoring.<\/span>\n <\/h3>\n <a class=\"hd-conter-btn\" href=\"https:\/\/fastestvpn.com\/lifetime-special-deals?a_aid=634829be4d0b2\" title=\"Get FastestVPN\">Get FastestVPN <i class=\"fa fa-hand-o-right\" aria-hidden=\"true\"><\/i><\/a>\n <\/div>\n <\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"<p>November marks the 33rd anniversary of the Morris Worm. It is a malicious computer program dubbed as the first &#8211; or at least one of the earliest &#8211; computer worm. Its history is an interesting one, and it paved the way for future malware. Let\u2019s look back at what is Morris Worm, its history, and [&hellip;]<\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":1,"featured_media":17067,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"acf":[],"yoast_head":"\n<title>What is Morris Worm?<\/title>\n<meta name=\"description\" content=\"Morris Worm was one of the earliest malware. Let\u2019s look back at what is Morris Worm, its history, and how it brought down computing in the world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Morris Worm?\" \/>\n<meta property=\"og:description\" content=\"Morris Worm was one of the earliest malware. Let\u2019s look back at what is Morris Worm, its history, and how it brought down computing in the world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/\" \/>\n<meta property=\"og:site_name\" content=\"Fastest Resources Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-22T13:12:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-26T15:37:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/11\/What-is-the-Morris-Worm-f.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is Morris Worm?\" \/>\n<meta name=\"twitter:description\" content=\"Morris Worm was one of the earliest malware. Let\u2019s look back at what is Morris Worm, its history, and how it brought down computing in the world.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/11\/What-is-the-Morris-Worm-f.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/\",\"url\":\"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/\",\"name\":\"What is Morris Worm?\",\"isPartOf\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/#website\"},\"datePublished\":\"2021-11-22T13:12:09+00:00\",\"dateModified\":\"2025-05-26T15:37:56+00:00\",\"author\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9\"},\"description\":\"Morris Worm was one of the earliest malware. Let\u2019s look back at what is Morris Worm, its history, and how it brought down computing in the world.\",\"breadcrumb\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fastestvpn.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Morris Worm Explained &#8211; The First Computer Worm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#website\",\"url\":\"https:\/\/fastestvpn.com\/resources\/\",\"name\":\"Fastest Resources Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fastestvpn.com\/resources\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n","yoast_head_json":{"title":"What is Morris Worm?","description":"Morris Worm was one of the earliest malware. Let\u2019s look back at what is Morris Worm, its history, and how it brought down computing in the world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/","og_locale":"en_US","og_type":"article","og_title":"What is Morris Worm?","og_description":"Morris Worm was one of the earliest malware. Let\u2019s look back at what is Morris Worm, its history, and how it brought down computing in the world.","og_url":"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/","og_site_name":"Fastest Resources Blog","article_published_time":"2021-11-22T13:12:09+00:00","article_modified_time":"2025-05-26T15:37:56+00:00","og_image":[{"width":1920,"height":800,"url":"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/11\/What-is-the-Morris-Worm-f.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"What is Morris Worm?","twitter_description":"Morris Worm was one of the earliest malware. Let\u2019s look back at what is Morris Worm, its history, and how it brought down computing in the world.","twitter_image":"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/11\/What-is-the-Morris-Worm-f.png","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/","url":"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/","name":"What is Morris Worm?","isPartOf":{"@id":"https:\/\/fastestvpn.com\/resources\/#website"},"datePublished":"2021-11-22T13:12:09+00:00","dateModified":"2025-05-26T15:37:56+00:00","author":{"@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9"},"description":"Morris Worm was one of the earliest malware. Let\u2019s look back at what is Morris Worm, its history, and how it brought down computing in the world.","breadcrumb":{"@id":"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fastestvpn.com\/resources\/what-is-morris-worm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fastestvpn.com\/resources\/"},{"@type":"ListItem","position":2,"name":"Morris Worm Explained &#8211; The First Computer Worm"}]},{"@type":"WebSite","@id":"https:\/\/fastestvpn.com\/resources\/#website","url":"https:\/\/fastestvpn.com\/resources\/","name":"Fastest Resources Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fastestvpn.com\/resources\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g","caption":"admin"}}]}},"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/17039"}],"collection":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/comments?post=17039"}],"version-history":[{"count":1,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/17039\/revisions"}],"predecessor-version":[{"id":40088,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/17039\/revisions\/40088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/media\/17067"}],"wp:attachment":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/media?parent=17039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/categories?post=17039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/tags?post=17039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}