The first ever computer worm is generally accepted to be a self-replicating version of
Creeper created by
Ray Tomlinson and Bob Thomas at
BBN in 1971 to replicate itself across the
ARPANET. Tomlinson also devised the first
antivirus software, named
Reaper, to delete the Creeper program. The term "worm" was first used in this sense in
John Brunner's 1975 novel,
The Shockwave Rider. In the novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful people who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it. There's never been a worm with that tough a head or that long a tail!" "Then the answer dawned on him, and he almost laughed. Fluckner had resorted to one of the oldest tricks in the store and turned loose in the continental net a self-perpetuating tapeworm, probably headed by a denunciation group "borrowed" from a major corporation, which would shunt itself from one nexus to another every time his credit-code was punched into a keyboard. It could take days to kill a worm like that, and sometimes weeks." On November 2, 1988,
Robert Tappan Morris, a
Cornell University computer science graduate student, unleashed what became known as the
Morris worm, disrupting many computers then on the Internet, guessed at the time to be one tenth of all those connected. During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the worm from each installation at between $200 and $53,000; this work prompted the formation of the
CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986
Computer Fraud and Abuse Act.
Conficker, a computer worm discovered in 2008 that primarily targeted
Microsoft Windows operating systems, is a worm that employs three different spreading strategies: local probing, neighborhood probing, and global probing. This worm was considered a hybrid epidemic and affected millions of computers. The term "hybrid epidemic" is used because of the three separate methods it employed to spread, which was discovered through code analysis. ==Features==