You are on page 1of 1

Get a Demo

Information Security › Creeper: The World’s First


Computer Virus

Creeper:
The
World’s
First
Comput
er Virus
Information Security

   

Published Author Reading


January 01, Tim time
2022 Matthews 4 mins

At Exabeam, as people who live


and breathe cybersecurity,
we’re naturally fascinated by its
history. This is the third in a
series of posts featuring
information about interesting
historical events in
cybersecurity. The first in the
series examines Operation
Aurora and the series of 2010
cyberattacks by the Chinese
Elderwood Group, which has
ties to the People’s Liberation
Army. The second post delves
into the origins of SSL and web
security. If you think we missed
an important fact (or didn’t get
something quite right), please
share your feedback with us on
Twitter.

What was the first computer virus?

The idea of a computer virus preceded


computer networks. German
mathematician and father of game
theory John von Neumann first
theorized the concept in the late 1940s.
He envisioned a computer virus as an
automatically self-replicating entity. But
it was another 30 years before someone
created one.

Jeepers Creepers – it’s a worm!

An experimental computer network,


ARPANET, was created in 1969 and was
the precursor to the internet. It was
designed to send communications from
computer to computer over long
distances, without the need for a
dedicated phone connection between
each computer. To achieve this required
a method of dividing and sending data
that is now known as packet switching.
It’s few early users were mostly
computer scientists. Imagine
theirsurprise when one day in 1971,
connected teletype computer screens
displayed the phrase: “I’m the creeper,
catch me if you can!”

Although they didn’t know it at the time,


they were the first computer virus
victims. But what did the mysterious
message mean, and who sent it?

It turns out it wasn’t a hacker who coded


the first computer virus, and it wasn’t
sent with malicious intent. Bold,
Beranek, and Newman* (now Raytheon
BBN Technologies) were pioneers in
packet switching networks like
ARPANET and the internet. One of its
researchers, Bob Thomas, had created
Creeper as an experimental computer
program.

Creeper was a worm — a type of


computer virus that replicates itself and
spreads to other systems. In this case,
its targets were Digital Equipment
Corporation (DEC) computers which
were linked to ARPANET.

But it wasn’t malware like we associate


with today’s computer viruses;
displaying its enigmatic message was all
Creeper did. It didn’t encrypt files,
demand a ransom, destroy data, steal
Social Security numbers, or render
centrifuges inoperable. It only displayed
its taunting challenge.

Its creator had simply wanted to create


an experimental, self-duplicating
program to illustrate that it was possible.
Doing so primarily out of scientific
curiosity, he had fun in naming it as well
— Creeper was a mysterious ghoulish
green bank robber on the popular ’70s
cartoon show, “Scooby-Doo.”

So, Creeper was the first computer


virus, but it certainly wasn’t the last  — as
we all know. Following Creeper, which
was isolated within the realm of
researchers, Elk Cloner was the first
personal computer virus to be detected
in the wild. Written in 1982 by a 15-year-
old high school student named Richard
Skrenta, it was a boot sector virus that
infected Apple II computers. It spread
by way of a then-state-of-the-art,
removable storage technology — the
floppy disk — to become the first major
computer virus outbreak. It was not
deliberately harmful, but it did damage
some disks and otherwise cause
annoyance by displaying the following
poem on infected computers every 50th
boot:

ELK CLONER:

THE PROGRAM WITH A


PERSONALITY

IT WILL GET ON ALL YOUR DISKS

IT WILL INFILTRATE YOUR CHIPS

YES, IT’S CLONER!

IT WILL STICK TO YOU LIKE GLUE

IT WILL MODIFY RAM TOO

SEND IN THE CLONER!

Today, we continue to deal with the


pesky and often highly destructive
effects of increasingly powerful
computer viruses.

Consider yourself a cybersecurity


history buff? Share your feedback with
us on Twitter.

* Internet trivia: on April 24, 1985,


BBN.com became the second registered
domain name.

Tags:

Similar Posts

INFORMATION SECURITY
9 InfoSec Resources You Might
Have Missed in July

INFORMATION SECURITY
The New CISO Podcast: Building
The Right Relationships

INFORMATION SECURITY
The CISO’s Response Plan After a
Breach

Recent Posts

INFORMATION SECURITY
9 InfoSec Resources You Might
Have Missed in July

INFORMATION SECURITY
The New CISO Podcast: Building
The Right Relationships

INFORMATION SECURITY
Exabeam News Wrap-up – Week
of July 25, 2022

Stay Informed

Subscribe today and we'll send our latest blog posts


right to your inbox, so you can stay ahead of the
cybercriminals and defend your organization.

Email address Submit

See a world-
class SIEM
solution in
action
Most reported breaches involved lost or
stolen credentials. How can you keep
pace?

Exabeam delivers SOC teams industry-


leading analytics, patented anomaly
detection, and Smart Timelines to help
teams pinpoint the actions that lead to
exploits.

Whether you need a SIEM replacement, a


legacy SIEM modernization with XDR,
Exabeam offers advanced, modular, and
cloud-delivered TDIR.

Get a demo today!

FIRST NAME LAST NAME

EMAIL ADDRESS PHONE NUMBER

JOB TITLE

COMPANY NAME

NUMBER OF EMPLOYEES

Select...

COUNTRY

Select...

By filling out this form and clicking the submit


button you are agreeing to receive email
communications from Exabeam regarding
cybersecurity events, webinars, research, and more.
Don’t worry, you will be able to unsubscribe at
anytime. View our Privacy Policy . If you have any
questions, please reach out to
privacy@exabeam.com .

SEND

Quicklinks

1.844.EXABEAM!
Products
info@exabeam.com!
Resources

1051 E. Hillsdale Blvd. 4th Floor Blog


Foster City, CA 94404
Partners

" # $ % Community

Support and Services

Documentation

Get a Demo

Security Explainers Company

SIEM Leadership

XDR Careers

PCI Compliance Exabeam for Good

Cloud Security Diversity and Inclusion

Event Logging Newsroom

Insider Threats Awards

MITRE ATT&CK Events


We use cookies on our website to give you the
most relevant experience byContact Us
remembering your
preferences and repeat visits. By clicking
“Accept”, you consent to the use of ALL the
cookies.
© 2022 Exabeam Terms and Conditions Privacy
Cookie settings ACCEPT
Policy Ethical Trading Policy

You might also like