The buffer overflow has long been a feature of the computer security landscape. The Morris Worm 30 Years Since First Major Attack on the Internet At around 8:30 p.m. on November 2, 1988, a maliciously clever program was unleashed on the Internet from a … comment. Morris Worm: The Morris worm was a worm designed by Robert Tappan Morris that was released on November 2nd, 1988. The Morris worm carried no malicious payload. "It was largely a North American network," Spafford says. The Morris Worm, as it's called now, wasn't meant to cause any harm. It made me think of a different worm, from a more innocent time.
 Through a coding error, the worm spread much faster and more publicly than was likely intended. The world has never been the same since. The Morris worm carried no malicious payload. share. Morris made a command that forced the worm to install itself on a computer every one out of seven times, even if the computer claimed it already had the program.  "The Morris worm was really the first malware of its kind,” says Dr. William Butler, chair of cyber and information security at Capitol Technology University.
The worm was designed to be undetectable, but a design flaw led it to create far more copies…
best. And while some of these worms, like the Morris worm, were created to raise awareness about software vulnerabilities, they still had the unintended effect of slowing down computers. Clifford Stoll, who helped fight the worm, wrote in 1989, “I surveyed the network, and found that two thousand computers were infected within fifteen hours. Engineering.
Morris's worm rocked the young Internet, which had fewer than 100,000 computers on it at the time.
The worm was designed to check to ensure that a potential target was not already running the worm before infecting it. The name derives from the "Great Worms" of Tolkien: Scatha and Glaurung. Worms Are Easy to Avoid Use the interactive timeline to find out about some of the major - and most audacious - cyber attacks since the first worm got loose in 1988. With each installation, the infected computers would become further debilitated until they finally crashed. Morris Worm At around 8:30 p.m. on November 2, 1988, a maliciously clever program was unleashed on the Internet from a computer at the Massachusetts Institute of Technology (MIT). save hide report. Computer worms often rely on actions of and exploitation of security vulnerabilities in networking protocols, a computer's operating system or backdoor to propage without the user's knowledge.
Origins: The “Storm Worm” (so named because the spam e-mail messages that carried it commonly bore the subject line “230 dead as storm batters … It’s November 2nd 1988, almost exactly 25 years before badBIOS became a hashtag.
An early example is the Morris worm.