{"id":10563,"date":"2022-01-14T17:37:17","date_gmt":"2022-01-14T16:37:17","guid":{"rendered":"https:\/\/www.defencetech.it\/?p=10563"},"modified":"2025-03-27T13:20:42","modified_gmt":"2025-03-27T12:20:42","slug":"1-hacker-attack-in-history","status":"publish","type":"post","link":"https:\/\/tinextadefence.it\/en\/1-hacker-attack-in-history\/","title":{"rendered":"1ST HACKER ATTACK IN HISTORY"},"content":{"rendered":"<p><strong>It happened on 2 November 1988<\/strong> - The 1st attack&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=hacker&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6887731365551345664\">#hacker<\/a>called the&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=vermedimorris&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6887731365551345664\">#vermediMorris<\/a>It came at the hands of an American student, Robert Tappan Morris, who was working on a programme capable of self-replicating and installing itself in computers connected to the Internet. This 'worm' exploited vulnerabilities in the Unix operating system sendMail and Finger.<br>The programme was able to access computers via a sendmail error, the programme used to manage e-mail, a finger error that allowed it to obtain information on users of other computers, and via a password detection programme.<br>To be fair, we must say that this malware was not launched intentionally and was not written with the aim of creating damage, but with the intention of assessing the size of the Internet. It did, however, cause considerable damage: some 6,000 machines were infected for a total economic loss of 100,000 to 10,000,000 dollars.<br>The programme was designed to self-delete when the computer was switched off, but at the time machines were rarely switched off, which led to an uncontrolled spread of the virus.<br>Thousands of computers connected to the network became unusable, to the point that, despite the fact that the presidential elections were only a few days away, many of the front pages of newspapers were dedicated to what had happened.<br>Morris realised that his worm was expanding more vertiginously than expected and asked a fellow student at Harvard for help; together they sent an anonymous message online, containing all the instructions for repairing the infected machines.&nbsp;<br>Among the great victims were the systems of NASA, Berkley, Stanford and other honourable institutions.&nbsp;<br>The US government, in response to the Morris worm created the CERT (Computer Emergency Response Team), a team of computer experts designed to prevent similar events from happening again. CERT has been on the alert on security issues ever since.<\/p>\n\n\n\n<p>\ud83d\udd17 The Morris worm demonstrated the flaws that can exist in security systems and the powerful consequences of cyber attacks.&nbsp;<br>Even today, the inadequacy of protection measures on networks can still be observed: companies and private individuals have not yet equipped themselves with suitable tools to counteract the&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cyberattack&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6887731365551345664\">#cyberattack<\/a>.&nbsp;<br>But playing defence is not enough, it is necessary to upgrade the&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=strategie&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6887731365551345664\">#strategies<\/a>&nbsp;of the&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=sicurezza&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6887731365551345664\">#security<\/a>&nbsp;of companies and organisations.<\/p>\n\n\n\n<p>\ud83d\udc49 Cyber security is one of the key assets, we need to invest in research and innovation to have an increasingly digital, connected and reliable business.<\/p>","protected":false},"excerpt":{"rendered":"<p>Accadde il 2 Novembre 1988 &#8211; &nbsp;Il 1\u00b0 attacco&nbsp;#hacker, denominato&nbsp;il&nbsp;#vermediMorris, avvenne per mano di uno studente statunitense, Robert Tappan Morris, il quale lavorava ad un programma in grado di auto-replicarsi ed installarsi nei computer connessi ad Internet. Questo &#8220;worm&#8221; sfruttava le vulnerabilit\u00e0 del sistema operativo&nbsp;Unix sendMail e Finger.Il programma poteva accedere ai computer tramite un [&hellip;]<\/p>","protected":false},"author":1,"featured_media":26257,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[110],"class_list":["post-10563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-senza-categoria","tag-articoli"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>1\u00b0 ATTACCO HACKER DELLA STORIA - Tinexta Defence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tinextadefence.it\/en\/1-hacker-attack-in-history\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"1\u00b0 ATTACCO HACKER DELLA STORIA - Tinexta Defence\" \/>\n<meta property=\"og:description\" content=\"Accadde il 2 Novembre 1988 &#8211; &nbsp;Il 1\u00b0 attacco&nbsp;#hacker, denominato&nbsp;il&nbsp;#vermediMorris, avvenne per mano di uno studente statunitense, Robert Tappan Morris, il quale lavorava ad un programma in grado di auto-replicarsi ed installarsi nei computer connessi ad Internet. Questo &#8220;worm&#8221; sfruttava le vulnerabilit\u00e0 del sistema operativo&nbsp;Unix sendMail e Finger.Il programma poteva accedere ai computer tramite un [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tinextadefence.it\/en\/1-hacker-attack-in-history\/\" \/>\n<meta property=\"og:site_name\" content=\"Tinexta Defence\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-14T16:37:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T12:20:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/15f49d24545fb9b69fc2507489e83868\"},\"headline\":\"1\u00b0 ATTACCO HACKER DELLA STORIA\",\"datePublished\":\"2022-01-14T16:37:17+00:00\",\"dateModified\":\"2025-03-27T12:20:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/\"},\"wordCount\":419,\"publisher\":{\"@id\":\"https:\/\/tinextadefence.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\",\"keywords\":[\"Articoli\"],\"articleSection\":[\"Senza categoria\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/\",\"url\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/\",\"name\":\"1\u00b0 ATTACCO HACKER DELLA STORIA - Tinexta Defence\",\"isPartOf\":{\"@id\":\"https:\/\/tinextadefence.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\",\"datePublished\":\"2022-01-14T16:37:17+00:00\",\"dateModified\":\"2025-03-27T12:20:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#primaryimage\",\"url\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\",\"contentUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\",\"width\":1200,\"height\":640,\"caption\":\"Immagine in evidenza astratta per gli articoli di Tinexta Defence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tinextadefence.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"1\u00b0 ATTACCO HACKER DELLA STORIA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tinextadefence.it\/#website\",\"url\":\"https:\/\/tinextadefence.it\/\",\"name\":\"Tinexta Defence\",\"description\":\"think next, protect now\",\"publisher\":{\"@id\":\"https:\/\/tinextadefence.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tinextadefence.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tinextadefence.it\/#organization\",\"name\":\"Tinexta Defence\",\"url\":\"https:\/\/tinextadefence.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png\",\"contentUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png\",\"width\":2000,\"height\":990,\"caption\":\"Tinexta Defence\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/15f49d24545fb9b69fc2507489e83868\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/97a76724ca02c92fa080280e12cb6ea0871120f65f9002c8dee8aa4c81d655b3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/97a76724ca02c92fa080280e12cb6ea0871120f65f9002c8dee8aa4c81d655b3?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/tinextadefence.it\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"1ST HACKER ATTACK IN HISTORY - Tinexta Defence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tinextadefence.it\/en\/1-hacker-attack-in-history\/","og_locale":"en_GB","og_type":"article","og_title":"1\u00b0 ATTACCO HACKER DELLA STORIA - Tinexta Defence","og_description":"Accadde il 2 Novembre 1988 &#8211; &nbsp;Il 1\u00b0 attacco&nbsp;#hacker, denominato&nbsp;il&nbsp;#vermediMorris, avvenne per mano di uno studente statunitense, Robert Tappan Morris, il quale lavorava ad un programma in grado di auto-replicarsi ed installarsi nei computer connessi ad Internet. Questo &#8220;worm&#8221; sfruttava le vulnerabilit\u00e0 del sistema operativo&nbsp;Unix sendMail e Finger.Il programma poteva accedere ai computer tramite un [&hellip;]","og_url":"https:\/\/tinextadefence.it\/en\/1-hacker-attack-in-history\/","og_site_name":"Tinexta Defence","article_published_time":"2022-01-14T16:37:17+00:00","article_modified_time":"2025-03-27T12:20:42+00:00","og_image":[{"width":1200,"height":640,"url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#article","isPartOf":{"@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/"},"author":{"name":"admin","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/15f49d24545fb9b69fc2507489e83868"},"headline":"1\u00b0 ATTACCO HACKER DELLA STORIA","datePublished":"2022-01-14T16:37:17+00:00","dateModified":"2025-03-27T12:20:42+00:00","mainEntityOfPage":{"@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/"},"wordCount":419,"publisher":{"@id":"https:\/\/tinextadefence.it\/#organization"},"image":{"@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#primaryimage"},"thumbnailUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","keywords":["Articoli"],"articleSection":["Senza categoria"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/","url":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/","name":"1ST HACKER ATTACK IN HISTORY - Tinexta Defence","isPartOf":{"@id":"https:\/\/tinextadefence.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#primaryimage"},"image":{"@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#primaryimage"},"thumbnailUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","datePublished":"2022-01-14T16:37:17+00:00","dateModified":"2025-03-27T12:20:42+00:00","breadcrumb":{"@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#primaryimage","url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","contentUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","width":1200,"height":640,"caption":"Immagine in evidenza astratta per gli articoli di Tinexta Defence"},{"@type":"BreadcrumbList","@id":"https:\/\/tinextadefence.it\/1-attacco-hacker-della-storia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tinextadefence.it\/"},{"@type":"ListItem","position":2,"name":"1\u00b0 ATTACCO HACKER DELLA STORIA"}]},{"@type":"WebSite","@id":"https:\/\/tinextadefence.it\/#website","url":"https:\/\/tinextadefence.it\/","name":"Tinexta Defence","description":"think next, protect now","publisher":{"@id":"https:\/\/tinextadefence.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tinextadefence.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/tinextadefence.it\/#organization","name":"Tinexta Defence","url":"https:\/\/tinextadefence.it\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/","url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png","contentUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png","width":2000,"height":990,"caption":"Tinexta Defence"},"image":{"@id":"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/15f49d24545fb9b69fc2507489e83868","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/97a76724ca02c92fa080280e12cb6ea0871120f65f9002c8dee8aa4c81d655b3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/97a76724ca02c92fa080280e12cb6ea0871120f65f9002c8dee8aa4c81d655b3?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/tinextadefence.it"]}]}},"_links":{"self":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts\/10563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/comments?post=10563"}],"version-history":[{"count":0,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts\/10563\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/media\/26257"}],"wp:attachment":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/media?parent=10563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/categories?post=10563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/tags?post=10563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}