{"id":14191,"date":"2018-11-03T01:06:16","date_gmt":"2018-11-03T01:06:16","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=14191"},"modified":"2018-11-04T01:08:15","modified_gmt":"2018-11-04T01:08:15","slug":"30-years-ago-the-worlds-first-cyberattack-set-the-stage-for-modern-cybersecurity-challenges","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/30-years-ago-the-worlds-first-cyberattack-set-the-stage-for-modern-cybersecurity-challenges\/","title":{"rendered":"30 years ago, the world&#8217;s first cyberattack set the stage for modern cybersecurity challenges"},"content":{"rendered":"<p><span><a href=\"https:\/\/theconversation.com\/profiles\/scott-shackelford-335009\">Scott Shackelford<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/indiana-university-1368\">Indiana University<\/a><\/em><\/span><\/p>\n<p>Back in November 1988, Robert Tappan Morris, son of the famous cryptographer <a href=\"https:\/\/www.welivesecurity.com\/2013\/11\/06\/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary\/\">Robert Morris Sr.<\/a>, was a 20-something graduate student at Cornell who wanted to know <a href=\"https:\/\/www.welivesecurity.com\/2013\/11\/06\/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary\/\">how big<\/a> the internet was \u2013 that is, how many devices were connected to it. So he wrote a program that would <a href=\"http:\/\/www.foo.be\/docs-free\/morris-worm\/\">travel from computer to computer<\/a> and ask each machine to send a signal back to a control server, which would keep count.<\/p>\n<p>The program worked well \u2013 too well, in fact. Morris had known that if it traveled too fast there might be problems, but the limits he built in weren\u2019t enough to keep the program from <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/11\/01\/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees\/\">clogging up large sections of the internet<\/a>, both copying itself to new machines and sending those pings back. When he realized what was happening, even his <a href=\"http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/morris-worm.html\">messages warning system administrators<\/a> about the problem couldn\u2019t get through.<\/p>\n<p>His program became the first of a particular type of cyber attack called \u201c<a href=\"https:\/\/theconversation.com\/attackers-can-make-it-impossible-to-dial-911-67980\">distributed denial of service<\/a>,\u201d in which large numbers of internet-connected devices, including computers, <a href=\"https:\/\/techcrunch.com\/2016\/10\/24\/webcams-involved-in-dyn-ddos-attack-recalled\/\">webcams<\/a> and <a href=\"https:\/\/theconversation.com\/police-around-the-world-learn-to-fight-global-scale-cybercrime-75804\">other smart gadgets<\/a>, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked. <\/p>\n<p>As the chair of the integrated <a href=\"https:\/\/cybersecurityprograms.indiana.edu\/\">Indiana University Cybersecurity Program<\/a>, I can report that these kinds of attacks are <a href=\"http:\/\/bwcio.businessworld.in\/article\/Verisign-releases-DDOS-Trends-Report-of-Q2-2018\/05-10-2018-161517\/\">increasingly frequent<\/a> today. In many ways, Morris\u2019s program, known to history as the \u201cMorris worm,\u201d set the stage for the crucial, and potentially devastating, vulnerabilities in what I and others have called the coming \u201c<a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3208018\">Internet of Everything<\/a>.\u201d<\/p>\n<h2>Unpacking the Morris worm<\/h2>\n<p>Worms and viruses are similar, but different in one key way: A virus needs an external command, from a user or a hacker, to run its program. A worm, by contrast, hits the ground running all on its own. For example, even if you never open your email program, a worm that gets onto your computer might email a copy of itself to everyone in your address book. <\/p>\n<p>In an era when few people were concerned about malicious software and nobody had protective software installed, the Morris worm spread quickly. It took 72 hours for researchers at Purdue and Berkeley to <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/11\/01\/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees\/\">halt the worm<\/a>. In that time, it infected tens of thousands of systems \u2013 about <a href=\"https:\/\/www.welivesecurity.com\/2013\/11\/06\/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary\/\">10 percent of the computers then on the internet<\/a>. Cleaning up the infection cost <a href=\"https:\/\/en.wikipedia.org\/wiki\/Morris_worm#cite_note-6\">hundreds or thousands of dollars<\/a> for each affected machine. <\/p>\n<p>In the clamor of media attention about this first event of its kind, confusion was rampant. Some reporters even asked whether <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/11\/01\/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees\/\">people could catch the computer infection<\/a>. Sadly, many journalists as a whole <a href=\"https:\/\/medium.com\/@davelee\/reporting-on-cyberattacks-the-medias-urgent-problem-d6c450a3383a\">haven\u2019t gotten much more knowledgeable on the topic<\/a> in the intervening decades.<\/p>\n<figure class=\"align-right zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/242356\/original\/file-20181025-71023-4hxdho.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img alt=\"\" src=\"https:\/\/images.theconversation.com\/files\/242356\/original\/file-20181025-71023-4hxdho.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\"><\/a><figcaption>\n              <span class=\"caption\">Robert Tappan Morris, in 2008.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Robert_Tappan_Morris.jpg\">Trevor Blackwell\/Wikimedia<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>Morris wasn\u2019t trying to destroy the internet, but the worm\u2019s widespread effects resulted in him being <a href=\"https:\/\/www.wired.com\/2011\/07\/0726first-computer-fraud-indictment\/\">prosecuted<\/a> under the then-new <a href=\"https:\/\/theconversation.com\/malwaretechs-arrest-sheds-light-on-the-complex-culture-of-the-hacking-world-82136\">Computer Fraud and Abuse Act<\/a>. He was sentenced to three years of probation and a roughly US$10,000 fine. In the late 1990s, though, he became a <a href=\"https:\/\/www.cnet.com\/news\/yahoo-buys-viaweb-for-49-million\/\">dot-com millionaire<\/a> \u2013 and is now a <a href=\"https:\/\/pdos.csail.mit.edu\/%7Ertm\/\">professor at MIT<\/a>.<\/p>\n<h2>Rising threats<\/h2>\n<p>The internet remains subject to much more frequent \u2013 and more crippling \u2013 DDoS attacks. With more than <a href=\"https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\">20 billion<\/a> devices of all types, from refrigerators and cars to fitness trackers, connected to the internet, and millions more being connected weekly, the number of security flaws and vulnerabilities is exploding. <\/p>\n<p>In October 2016, a DDoS attack using <a href=\"https:\/\/techcrunch.com\/2016\/10\/24\/webcams-involved-in-dyn-ddos-attack-recalled\/\">thousands of hijacked webcams<\/a> \u2013 often used for security or baby monitors \u2013 <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet\">shut down access to a number of important internet services<\/a> along the eastern U.S. seaboard. That event was the culmination of a series of increasingly damaging attacks using a botnet, or a network of compromised devices, which was controlled by <a href=\"https:\/\/blog.cloudflare.com\/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis\/\">software called Mirai<\/a>. Today\u2019s internet is much larger, but not much more secure, than the internet of 1988.<\/p>\n<p>Some things have actually gotten worse. Figuring out <a href=\"https:\/\/doi.org\/10.1080\/01402390.2014.977382\">who is behind particular attacks<\/a> is not as easy as waiting for that person to get worried and <a href=\"http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/morris-worm.html\">send out apology notes and warnings<\/a>, as Morris did in 1988. In some cases \u2013 the ones big enough to merit full investigations \u2013 it\u2019s possible to identify the culprits. A trio of college students was ultimately found to have <a href=\"https:\/\/www.wired.com\/story\/mirai-botnet-minecraft-scam-brought-down-the-internet\/\">created Mirai to gain advantages<\/a> when playing the \u201cMinecraft\u201d computer game.<\/p>\n<h2>Fighting DDoS attacks<\/h2>\n<p>But technological tools are not enough, and neither are laws and regulations about online activity \u2013 including the <a href=\"https:\/\/ssrn.com\/abstract=2573787\">law under which Morris was charged<\/a>. The dozens of state and federal cybercrime statutes on the books have <a href=\"https:\/\/phys.org\/news\/2018-02-cyberattacks-costly-worse.html\">not yet seemed to reduce the overall number or severity<\/a> of attacks, in part because of the <a href=\"https:\/\/www.csoonline.com\/article\/3153707\/security\/top-cybersecurity-facts-figures-and-statistics.html\">global nature<\/a> of the problem.<\/p>\n<p>There are some efforts underway in Congress to <a href=\"https:\/\/www.fifthdomain.com\/congress\/policy\/2018\/10\/12\/support-for-hack-back-grows-after-trumps-pledge-to-get-aggressive-in-cyberspace\/\">allow attack victims in some cases to engage in active defense measures<\/a> \u2013 a <a href=\"https:\/\/www.lawfareblog.com\/tagged\/hacking-back\">notion<\/a> that comes with a number of downsides, including the risk of escalation \u2013 and to <a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-congress-idUSKBN1AH474\">require better security<\/a> for internet-connected devices. But passage is far from assured.<\/p>\n<figure class=\"align-center zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/242367\/original\/file-20181025-71017-1e9wpf3.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img alt=\"\" src=\"https:\/\/images.theconversation.com\/files\/242367\/original\/file-20181025-71017-1e9wpf3.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\"><\/a><figcaption>\n              <span class=\"caption\">Aircraft problems get thoroughly investigated, resulting in public reports and recommendations for industry to improve performance and safety.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"http:\/\/www.apimages.com\/metadata\/Index\/Southwest-Airlines-Emergency-Landing\/9c2c8497d425421cb8ab2cb7a6fdd52f\/6\/0\">NTSB via AP<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>There is cause for hope, though. In the wake of the Morris worm, Carnegie Mellon University established the world\u2019s first <a href=\"https:\/\/www.sei.cmu.edu\/about\/divisions\/cert\/index.cfm#history\">Cyber Emergency Response Team<\/a>, which has been replicated <a href=\"https:\/\/www.us-cert.gov\/\">in the federal government<\/a> and <a href=\"http:\/\/www.internationalcybercenter.org\/certicc\/certworld\">around the world<\/a>. Some policymakers are talking about establishing a <a href=\"https:\/\/www.securityweek.com\/does-us-need-national-cybersecurity-safety-board\">national cybersecurity safety board<\/a>, to <a href=\"https:\/\/theconversation.com\/what-cybersecurity-investigators-can-learn-from-airplane-crashes-91177\">investigate digital weaknesses and issue recommendations<\/a>, much as the National Transportation Safety Board does with airplane disasters.<\/p>\n<p>More organizations are also taking preventative action, adopting best practices in cybersecurity as they build their systems, rather than waiting for a problem to happen and trying to clean up afterward. If more organizations considered cybersecurity as an important element of <a href=\"https:\/\/theconversation.com\/notpetya-ransomware-attack-shows-corporate-social-responsibility-should-include-cybersecurity-79810\">corporate social responsibility<\/a>, they \u2013 and their staff, customers and business partners \u2013 would be safer.<\/p>\n<p>In \u201c<a href=\"https:\/\/www.penguinrandomhouse.com\/books\/28148\/3001-the-final-odyssey-by-arthur-c-clarke\/9780345423498\/\">3001: The Final Odyssey<\/a>,\u201d science fiction author Arthur C. Clarke envisioned a future where humanity sealed the worst of its weapons in a vault on the moon \u2013 which included room for the most malignant computer viruses ever created. Before the next iteration of the Morris worm or Mirai does untold damage to the modern information society, it is up to everyone \u2013 governments, companies and individuals alike \u2013 to set up rules and programs that support widespread cybersecurity, without waiting another 30 years.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/105449\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: http:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/scott-shackelford-335009\">Scott Shackelford<\/a>, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, <em><a href=\"http:\/\/theconversation.com\/institutions\/indiana-university-1368\">Indiana University<\/a><\/em><\/span><\/p>\n<p>This article is republished from <a href=\"http:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/30-years-ago-the-worlds-first-cyberattack-set-the-stage-for-modern-cybersecurity-challenges-105449\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scott Shackelford, Indiana University Back in November 1988, Robert Tappan Morris, son of the famous cryptographer Robert Morris Sr., was a 20-something graduate student at Cornell who wanted to know how big the internet was \u2013 that is, how many devices were connected to it. So he wrote a program that would travel from computer [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":14187,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410],"tags":[4082,5361,612,5390,613,5389,5391],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/14191"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=14191"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/14191\/revisions"}],"predecessor-version":[{"id":14192,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/14191\/revisions\/14192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/14187"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=14191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=14191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=14191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}