{"id":566,"date":"2023-02-28T16:31:32","date_gmt":"2023-02-28T16:31:32","guid":{"rendered":"https:\/\/reversea.me\/?p=566"},"modified":"2023-03-29T13:04:49","modified_gmt":"2023-03-29T13:04:49","slug":"a-brief-history-of-malware-part-1","status":"publish","type":"post","link":"https:\/\/reversea.me\/index.php\/a-brief-history-of-malware-part-1\/","title":{"rendered":"A Brief History of Malware (Part 1)"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p><strong>TL;DR<\/strong>: This is the first part of a series of monthly blog posts that we are going to dedicate to explaining the evolution of malware over the years. In this post, we will describe the early infancy of malware, counting the self-replicating predatory programs that appeared in the 1970s.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>Almost 50 years have passed since the first software developed with &#8220;malicious&#8221; intentions, the <code>Creeper<\/code> program, came to light. [<em>Note that we have intentionally put the term malicious in double quotes, as this program was not actively causing data corruption, because its purpose was to send a certain string to the teletype.<\/em>] Initially developed as a proof of concept by Bob Thomas at BBN in 1971, this program is generally accepted as the first <em>computer worm<\/em> as it was capable of copying itself and moving between DEC PDP-10 mainframes running TENEX OS [1].<\/p>\n\n\n\n<p>Since then, the nefarious &#8212; and really malicious &#8212; purposes of malicious software (<em>malware<\/em>) have spread, giving rise to different types of malware depending on their main behavior, such as ransomware, bankers, or simply viruses, to name a few. The purposes have shifted, from the interest in gaining kudos from the community to simply causing harm and to earning income. In addition, we have gone from counting annual malware in the tens to thousands and millions.<\/p>\n\n\n\n<p>But, <em>how has this evolution been during these years?<\/em> In these blog posts, we review the history of malware, describing the evolution of malware from <em>proof of concept<\/em> to <em>cybercrime<\/em>. Join us on this exciting trip into malware history!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Infancy of Malware: Self-Replicating Programs. The 70s<\/h2>\n\n\n\n<p>The first reference in the literature to a program with predatory self-replicating behavior was given by John von Neumann in various talks during 1948 and 1949, where he presented various parts of his theory of self-reproducing automata [2]. This idea was further developed in 1959, when Bell Computer Labs created CoreWar, a computer game based on this von Neumann theory. In this game, the programs fight each other with the aim of occupying all the memory, thus eliminating the other opponents.<\/p>\n\n\n\n<p>This concept of self-replicating programs continued to be of interest to the hacker (we take the second definition of <em>hacker<\/em> as in [3]:  &#8220;<em>a person who uses or writes computer programs with enthusiasm and skill<\/em>&#8221;) community through the 1970s. In 1971, Bob Thomas Morris at BBN Technologies developed <code>Creeper<\/code>, a DEC PDP-10 assembly program that moved between TENEX systems over the ARPANET [4, 5]. This proof-of-concept program is considered as the first computer <em>worm<\/em>. A worm is a type of malware that spreads itself often using computer networks to other computers. In any event, <code>Creeper<\/code> is not considered malware since it did not cause damage to data or systems (it simply typed the message &#8220;<em>I&#8217;M THE CREEPER : CATCH ME IF YOU CAN!<\/em>&#8221; on the Model 33 ASR teletype; see Figure 1 below). Shortly after, Ray Tomlinson (also working at BBN Technologies) created a self-replicating program dubbed <code>Reaper<\/code>, which is considered to be the first anti-virus software, dedicated to move through the ARPANET removing copies of <code>Creeper<\/code>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"380\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2023\/03\/image.png\" alt=\"\" class=\"wp-image-573\" srcset=\"https:\/\/reversea.me\/wp-content\/uploads\/2023\/03\/image.png 640w, https:\/\/reversea.me\/wp-content\/uploads\/2023\/03\/image-300x178.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption class=\"wp-element-caption\">Figure 1: The <code>Creeper<\/code> program (source: [4])<\/figcaption><\/figure><\/div>\n\n\n<p>In 1974, another self-replicating program targeting IBM System\/360 mainframes dubbed <code>Wabbit<\/code> was developed. Although the true origin of this term is unknown, it is presumed that it comes from the mythical phrases of the animated character Elmer Fudd. Unlike <code>Creeper<\/code>, <code>Wabbit<\/code> is considered a program with malicious intent, as it replicates itself on the infected system (simply continuously forking the process) until the system crashed due to resource exhaustion, causing thus a denial of service (DoS) in the system. This type of DoS attack is also known as a <em>fork bomb<\/em> (see Figure 2).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"185\" src=\"https:\/\/reversea.me\/wp-content\/uploads\/2023\/03\/image-1.png\" alt=\"\" class=\"wp-image-575\"\/><figcaption class=\"wp-element-caption\">Figure 2: The concept behind fork bomb (source: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fork_bomb\">Wikipedia<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<p>In the same year, John Walker developed <code>ANIMAL<\/code>, a computer game for the UNIVAC 1108 computers running the Exec-8 operating system. In essence, the game tried to guess which animal the user is thinking of with a set of questions. The game became very popular and other UNIVAC users began to ask the author to send them a copy of the game, which was not so easy as the program had to be recorded on magnetic tape and sent by mail. To make things easier, in 1975 Walker created <code>PERVADE<\/code>, a subroutine code added to <code>ANIMAL<\/code> that allowed it to replicate itself in the system. Because of this, <code>ANIMAL<\/code> (with the <code>PERVADE<\/code> routine) is considered to be the first computer <em>Trojan horse<\/em>. This term is used to define any malware that misleads users about its true intent. Like <code>Creeper<\/code>, this software is not considered to have malicious intent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Peter Szor. Fighting Computer Virus Attacks. In 13th USENIX Security Symposium (USENIX Security 04), San Diego, CA, August 2004. USENIX Association.<\/li>\n\n\n\n<li>John von Neumann. Theory of Self-Reproducing Automata. Technical report, University of Illinois Press, 1966.<\/li>\n\n\n\n<li>Oxford University Press. Definition of hacker noun from the Oxford Advanced Learner\u2019s Dictionary. [Online; <a href=\"https:\/\/www.oxfordlearnersdictionaries.com\/definition\/english\/hacker\">https:\/\/www.oxfordlearnersdictionaries.com\/definition\/english\/hacker<\/a>], 2023.<\/li>\n\n\n\n<li>Core War: Creeper &amp; Reaper. [Online; <a href=\"https:\/\/corewar.co.uk\/creeper.htm\">https:\/\/corewar.co.uk\/creeper.htm<\/a>]. <\/li>\n\n\n\n<li>David Ferbrache. Historical Perspectives, pages 5\u201330. Springer London, London, 1992.<\/li>\n\n\n\n<li>John Walker. PERVADE Source Code. [Online; <a href=\"https:\/\/www.fourmilab.ch\/documents\/univac\/pervade.html\">https:\/\/www.fourmilab.ch\/documents\/univac\/pervade.html<\/a>], August 1996. <\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em>And that&#8217;s all, folks! In this blog post we have summarized the early infancy of malware in the 1970s, when primarily self-replicating programs populated the malware ecosystem.<a href=\"https:\/\/reversea.me\/index.php\/a-brief-history-of-malware-part-2\/\" data-type=\"URL\" data-id=\"https:\/\/reversea.me\/?p=587\"> In the next blog post, we will recap the malware&#8217;s <em>childhood<\/em> back in the 1980s, when a lot of proof-of-concept started appearing<\/a>. See you in the next blog post!<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>TL;DR: This is the first part of a series of monthly blog posts that we are going to dedicate to explaining the evolution of malware over the years. In this post, we will describe the early infancy of malware, counting the self-replicating predatory programs that appeared in the 1970s. Introduction Almost 50 years have passed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-566","post","type-post","status-publish","format-standard","hentry","category-malware","no-featured-image"],"_links":{"self":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/posts\/566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":8,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"predecessor-version":[{"id":596,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/posts\/566\/revisions\/596"}],"wp:attachment":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}