Skip to the content.

đź”— Link to the Room

📚 Study Notes

The Creeper Program

Early Malware Concepts

The Creeper Program (1971)

Later Changes

ARPANET

 

image

 


❓Who re-designed the Creeper VirusRay Tomlinson

❓How is data transferred through a network?Packet Switching

❓Who created the first concept of a virus?John von Neumann

❓What text did the Creeper program print to the screen?I'm the Creeper, catch me if you can!

❓What does ARPANET stand for?Advabced Research Projects Agency Network

❓Which team created the network control program?Network Working Group

❓What is the first virus commonly known as?Creeper

REAPER


❓Who created Reaper?Ray Tomlinson

❓What type of malware may Reaper be known as?Nematode

❓What was the first ever anti-virus program known as?Reaper

❓What was Bob Thomas' main project to develop?A resource-sharing capability.

❓Research: What does API stand for?Application Programming Interface

WABBIT


❓What is a modern day fork bomb also known as?Denial of service attack

❓Was Rabbit one of the first malicious programs?(Y/N)Y

❓What did the name "Wabbit" derive from?Looney Tunes Cartoons

ANIMAL


❓When was PERVADE added to ANIMAL?1975

❓Did John think this was a good idea?(Y/N)Y

❓What computers did the program spread across?UNIVACs

❓What type of malware is ANIMAL also known as?A Trojan

❓Who built the wooden horse?The Greeks

Elk Cloner

Boot Sector Viruses

Background:

 

Comparision with Modern Malware Concepts:

 

Method Elk Cloner Modern Malware Concepts Analysis
Propagation spread through floppy disks usb, e-mail, network shares, exploit kits malware needs a delivery and spread mechanism; How does it propagate?
Persistence infected boot sector so it loaded when the system started registry run keys, scheduled task, services, startup folders, bootkits/UEFI implants execute before or every time the system starts; persistence technique
memory residency loaded into memory and infected new disks inserted live in memory, inject into processes, hook system calls, spread from a running session Does this sample stay memory-resident?
Indicator of Compromise wrote a signature byte to mark infected disks mutex names, registry keys, unique file markers, config artifacts, C2 domains look for IOCs (Indicators of Compromise) to detect and track infections
masquerading hidden inside a game cracked software, fake installers, office docs, browser extensions, mobile apps masquerading or social engineering delivery
intent vs impact was meant as a joke, but still caused real system damage Malware classification depends on behavior and impact, not creator intent. Incident response, threat classification, legal definitions

 


❓Which US Military regiment caught the virus?US Navy

❓How many lines long is the Elk Cloner poem?7

❓When was Elk Cloner written?1982

❓Is a boot sector virus more or less common in modern technology?less

❓How long did it take Richard to write the program?2 Weeks

❓Which Operating System was affected?Apple II

 

The Morris Internet Worm


❓What commands were a very big way that allowed Morris to access the computers?Berkley r-commands

❓Who was one the first person prosecuted for the computer misuse act?Robert Tappan Morris

❓What type of attack is a "Fork Bomb"?Denial of Service

❓When was this worm released?1988

❓How many computers did it infect within 15 hours?2000

❓What does rsh mean?remote shell

❓Under which act was Morris arrested for?1986 Computer Fraund and Abuse act

Cascade


❓What was the name of this virus?Cascade

❓What file extensions would this virus infect?.COM

❓How many variants of there virus were possibly found?40

❓What operating system would the virus run on?DOS

❓Which Operating System/Frame Work would Cascade try to avoid?IBM

❓How many bytes would be added onto your file if it got infected?1704

Early Malware History Cheat Sheet

Name Year Creator Type / Key Feature Spread / Infection Impact / Notes
Creeper 1971 Bob Thomas First self-replicating program ARPANET, moved between computers Displayed message “I’m the creeper, catch me if you can!”; harmless, deleted old copies
Reaper 1971 Ray Tomlinson First antivirus Followed Creeper, deleted it Tracked which computers it visited; prevented damage
Wabbit (Rabbit) 1974 Unknown First harmful self-replicating malware Only infected local machine Infinite loop creating processes → crash (early fork bomb)
ANIMAL (Trojan) 1975 John Walker Trojan (masqueraded as game) Copied itself via RSEXEC to system libraries Not malicious; spread when tapes exchanged; showed hidden subroutine behavior
Elk Cloner 1982 Richard Skrenta Boot sector virus Spread via Apple II floppy disks Displayed poem; overwrote reserved tracks → malware; first “in the wild” virus
Morris Worm 1988 Robert Tappan Morris Worm Exploited Sendmail, rsh/rexec, weak passwords Infected ~6,000 computers (~10% of internet); first felony under CFAA; caused denial of service
Cascade 1980s Unknown DOS virus, first with encryption Infected .COM files Text falls on screen, emits sound; stealthy; many variants; tried to avoid IBM but bug spread it there