WANK and the Dawn of Cyber Warfare

WANK and the Dawn of Cyber Warfare

By Ryan Williams


In the late 1980s, as the world edged closer to the digital revolution, a silent war was brewing in the uncharted realms of cyberspace. This is the story of how a seemingly innocuous message turned into a cyber onslaught that challenged some of the most advanced minds at NASA and the Department of Energy (DOE). It's a tale of hackers, worms, and the vulnerabilities that shook the foundations of early networked systems.


The Prelude: Father Christmas Worm

On December 22, 1988, deep within the corridors of NASA's Goddard Space Flight Center in Washington, D.C., system managers discovered a peculiar file named hi.com?on their network. This file was more than just a festive greeting—it was the Father Christmas Worm, a program written in Digital Command Language (DCL) that targeted the Space Physics Analysis Network (SPAN).

SPAN was NASA's operating network, connecting various teams and facilities across the country. Built on the infrastructure provided by the Digital Equipment Corporation (DEC), SPAN used DECnet protocols and VAX computers, which were powerful but lacked robust security measures.

The worm propagated by searching for random node numbers within the DECnet network. Once it located a valid node, it attempted to gain access using default or weak credentials—often the default username and password decnet/decnet. If successful, it copied itself to the target system, deleted the original file to cover its tracks, and waited until a specific time to execute its payload: sending a whimsical Christmas message to all users on the system.

While the Father Christmas Worm was relatively benign, serving more as a festive prank than a malicious attack, it exposed glaring security flaws within NASA's network. System administrators were urged to enforce stronger passwords and implement better security protocols. However, these warnings would soon prove insufficient.


Source: National Aeronautics and Space Administration

The WANK Worm Emerges

Less than a year later, on October 16, 1989, NASA employees preparing for a space shuttle launch were greeted with an unsettling message on their screens:

?

WANK

Your system has been officially WANKed.

You talk of times of peace for all and then prepare for war.

?

The WANK Worm—an acronym for Worms Against Nuclear Killers—was more than a nuisance. It was a sophisticated piece of malware that shared structural similarities with the Father Christmas Worm but carried a more ominous payload.

Using the same DECnet vulnerabilities, the WANK Worm exploited default accounts with weak credentials like system/system?and field/field. Once inside a system, it altered login scripts to display its manifesto and simulated file deletions, causing panic among users who believed their data was being erased in real-time.


The Chaos Unfolds

John McMahon, the systems manager for SPAN, and Kevin Oberman, a network manager at a DOE lab in San Francisco, spearheaded the investigation into the worm. Their tasks were made more challenging due to the lack of a comprehensive network map and outdated contact information for key personnel.

As the worm spread, it caused significant disruptions—not by destroying data but by exploiting human psychology. The simulated deletions led some users to take drastic measures, including reinitializing their systems and inadvertently causing actual data loss.

Complicating matters further, the Jet Propulsion Laboratory (JPL) decided to disconnect from SPAN to prevent infection. However, this move disrupted critical network pathways, isolating segments of NASA's network and hindering coordination efforts to combat the worm.



Earthquake San Fransisco
Photo credit Tom Van Dyke/San Jose Mercury News/MCT/Sipa USA

The Earthquake and the Anti-Worm

On October 17, 1989, as Oberman was finalizing an anti-worm program to combat WANK, the Loma Prieta earthquake struck the San Francisco Bay Area. Amidst the chaos, he managed to distribute his solution, which cleverly tricked the worm into self-destructing by mimicking its process identification.

However, the relief was short-lived. Five days later, a more resilient version of the WANK Worm surfaced. This iteration was immune to Oberman's fix and actively destroyed any decoy processes designed to thwart it. It also changed user passwords, locking administrators out of their own systems.

Assistance came from Bernard Perrot, a systems manager at the French National Institute of Nuclear and Particle Physics. Perrot developed WANK_SHOT, an anti-worm that exploited the worm's reliance on the writelist.dat?file—a directory of user accounts. By replacing this file with a decoy containing a hidden trap, Perrot's solution neutralized the worm's second version. Two weeks later, the WANK Worm was effectively eradicated.


The Larger Context: NASA's Struggles

The WANK Worm incident occurred during a tumultuous period for NASA. The Challenger disaster in 1986 had already tarnished the agency's reputation, highlighting managerial failures and lapses in safety protocols. The upcoming launch of the Galileo?spacecraft, which carried plutonium-based power sources, faced public outcry and legal challenges from anti-nuclear activists.

The WANK Worm's anti-nuclear message seemed to align with the sentiments of these activist groups, suggesting a politically motivated attack. The worm's ability to infiltrate critical systems on the eve of a significant launch underscored the vulnerabilities inherent in NASA's network infrastructure.


Tracing the Culprits: The Realm and Australian Hackers

Investigations into the WANK Worm pointed toward Australia, primarily due to linguistic clues and cultural references embedded in the worm's code. The term "wank" is British slang, more commonly used in Commonwealth countries, and the worm's internal processes included names like OILZ, a reference to the Australian band Midnight Oil.

This led authorities to focus on a group of Australian hackers known as The Realm, which included notorious figures like Phoenix?(Nahshon Even-Chaim) and Electron?(Richard Jones). Operating from Melbourne, these hackers had already made names for themselves by breaching numerous high-profile systems, including universities, corporations, and government agencies.

Their activities were characterized not by financial gain but by the pursuit of intellectual challenge and, at times, ideological statements. The WANK Worm's anti-nuclear stance and its method of operation bore the hallmarks of The Realm's modus operandi.

Operation Dabble: The Hunt for the Hackers

In response to the escalating cyber intrusions, the Australian Federal Police (AFP) launched Operation Dabble?in 1988. This operation was groundbreaking—it was Australia's first major investigation into computer hacking and cybercrime. At the time, Australian law did not adequately address crimes committed via computers. Recognizing this gap, the government swiftly enacted the necessary legislation in June 1989, marking a significant milestone in Australian legal history. The new laws provided law enforcement with the authority to investigate and prosecute cybercrimes, setting a precedent for future cases.

Using a combination of traditional detective work and innovative surveillance techniques, the AFP identified key members of The Realm, including Phoenix?and Electron. Undercover agents infiltrated hacker circles, and informants provided critical information that helped build a case against the suspects.

One of the significant challenges faced by the AFP was the technical limitations of the time. Capturing digital evidence required novel solutions, as existing technology was insufficient for intercepting data transmissions at the speeds necessary. The AFP collaborated with technical experts to develop new methods for data interception and analysis, effectively pioneering techniques that would become standard in cybercrime investigations.

In January 1990, armed with warrants, the AFP began tapping the phone lines of Even-Chaim and Jones. Over the next two months, they collected substantial evidence, including recorded conversations where the hackers openly discussed their activities, boasted about infiltrating high-profile systems like NASA, and expressed disdain for law enforcement's inability to catch them.



IN the realm of hackers
In The Realm Of The Hackers: An Australian documentary that explored the lives of the hackers involved with The Realm

The Trials: An Australian First

The arrests in March 1990 marked the culmination of Australia's first significant cybercrime investigation under the new legislation. The subsequent trials were closely watched, not only because of the high-profile nature of the offenses but also because they would set legal precedents for how cybercrime was prosecuted in Australia.

Nahshon Even-Chaim faced 48 charges related to unauthorized access, property damage, and theft of data. Richard Jones faced 15 similar charges. The court proceedings delved into uncharted legal territory, addressing questions about the nature of digital evidence, the definition of property in the context of data, and the appropriate sentencing for crimes that were, at the time, poorly understood by the general public.

During the trial, prosecutors presented extensive evidence collected through wiretaps and data interception, demonstrating the hackers' extensive unauthorized access to computer systems across the globe. The defense argued that the accused were merely curious youths with no malicious intent, highlighting the lack of financial gain from their activities.

In a landmark decision, the court handed down its verdicts in 1993. Even-Chaim was convicted and sentenced to 12 months in prison, along with 500 hours of community service. Jones received a lighter sentence of six months in prison and 300 hours of community service. These sentences were considered lenient by some, given the scope of their activities, but the judge took into account their young age and the novelty of the crimes.

The trials were a watershed moment in Australian legal history. They were the first successful prosecutions under the newly enacted computer crime legislation, setting important legal precedents. The cases underscored the need for robust cybersecurity measures and the importance of updating legal frameworks to keep pace with technological advancements.


The Legacy of the Trials

The successful prosecution of Phoenix and Electron had far-reaching implications. It signalled to the international community that cybercrime would not be tolerated and that law enforcement agencies were capable of adapting to new technological challenges. The methods developed during Operation Dabble became a blueprint for future cybercrime investigations, both in Australia and abroad.

Moreover, the trials highlighted the psychological and social factors contributing to hacking. Both Even-Chaim and Jones were young, intelligent individuals who became deeply engrossed in the world of hacking, partly as an escape from personal struggles. Their cases prompted discussions about the ethical responsibilities of technologists and the importance of providing positive outlets for talent in computing.

The Australian government's proactive approach in legislating and enforcing cybercrime laws ahead of many other nations positioned the country as a leader in cybersecurity policy. The events also spurred organizations to reevaluate their security practices, leading to improvements that would help protect against future threats.


The Legacy of the WANK Worm

While definitive proof linking The Realm to the WANK Worm was never publicly disclosed, the incident marked a pivotal moment in cybersecurity history. The WANK Worm was one of the first pieces of malware to carry a political message, demonstrating that code could be used as a form of protest or activism.

Moreover, the attacks exposed systemic vulnerabilities in networked systems, particularly those relying on default configurations and lacking proper segmentation. The ease with which the worm spread highlighted the necessity for robust security practices—a lesson that resonates in today's increasingly connected world.



NASA Lewis Research Center
NASA Lewis Research Center

Technical Analysis: How the Worms Exploited DECnet

Both the Father Christmas and WANK Worms exploited inherent weaknesses in DECnet Phase IV networks. Key vulnerabilities included:

  • Default Credentials: Many systems retained default usernames and passwords (decnet/decnet, system/system), providing easy access for unauthorized users.
  • Remote Task Loading: DECnet allowed for remote execution of tasks, which the worms leveraged to propagate themselves without needing physical access.
  • Lack of Network Segmentation: The networks were flat, meaning a breach in one area could rapidly spread to others, exacerbating the impact.

The worms used random node scanning to discover other systems within the network. Upon gaining access, they would attempt to:

  1. Check for Existing Infection: To prevent multiple instances on the same system, the worm would look for specific process names (NETW_, OILZ).
  2. Copy and Execute Payload: If the system was uninfected, the worm would copy itself over and execute, modifying login scripts and displaying messages.
  3. Cover Tracks: The original files were deleted after execution to minimize detection.


Mitigation Strategies Implemented

In the wake of these attacks, several critical security measures were adopted:

  • Password Policies: Enforcing the change of default credentials and promoting the use of strong, unique passwords.
  • Network Segmentation: Dividing the network into isolated segments to contain breaches and prevent widespread propagation.
  • Security Auditing Tools: Development and deployment of software to monitor network activity, detect anomalies, and respond swiftly to threats.
  • User Education: Training personnel on cybersecurity best practices to reduce the risk of social engineering and human error.


Conclusion: The Dawn of Cybersecurity Awareness

The WANK Worm incident was more than a disruptive event; it was a seminal moment that heralded the complexities of a new digital era. It exposed the fragile underpinnings of early networked systems and highlighted the profound implications of cybersecurity—or the lack thereof—in a world becoming increasingly dependent on interconnected technologies.

This event underscored that cybersecurity is not solely a technical challenge confined to firewalls and encryption algorithms; it is intrinsically a human issue. The vulnerabilities exploited by the WANK Worm were as much about system misconfigurations and default passwords as they were about human oversight, complacency, and a lack of awareness. Even organizations staffed with some of the brightest minds—rocket scientists and nuclear physicists—were not immune to basic security lapses.

By embedding an anti-nuclear message within its code, the worm demonstrated that software could be wielded as a tool for political expression and protest, one of the earliest instances of hacktivism. This was a precursor to the modern landscape of cyber activism, where groups leverage digital means to advance social and political agendas on a global scale.

The trials of Phoenix and Electron were groundbreaking—not just for Australia but for the international community. They were Australia's first significant prosecutions under newly minted cybercrime laws, setting legal precedents and providing a framework for how nations could address the burgeoning threat of cyber offenses. The successful investigation and prosecution showcased the necessity of updating legal systems to keep pace with technological advancements and the importance of international cooperation in combating cyber threats.

For organisations worldwide, the incident was a stark reminder of the critical importance of robust cybersecurity measures. It led to increased investment in security infrastructure, the development of more secure network protocols, and a greater emphasis on user education and awareness. The vulnerabilities that allowed the WANK Worm to propagate so effectively—weak passwords, lack of network segmentation, and insufficient monitoring—became focal points for security improvements.

As we reflect on the WANK Worm incident today, its lessons remain profoundly relevant. Cyber threats have evolved dramatically, becoming more sophisticated, targeted, and damaging. The rise of ransomware, state-sponsored cyber espionage, and advanced persistent threats illustrate that the challenges identified in the late 1980s have not only persisted but have intensified.

The foundational lessons are clear:

  • Vigilance is Crucial: Organizations must maintain constant vigilance, regularly updating and patching systems, monitoring for unusual activity, and staying informed about emerging threats.
  • Human Factors Matter: Employee training and awareness are vital. Users are often the first line of defense, and their actions can either mitigate or exacerbate security risks.
  • Legal Frameworks Need Evolution: Laws and regulations must adapt to address the changing landscape of cyber threats, providing law enforcement with the tools necessary to respond effectively.
  • International Cooperation is Essential: Cyber threats do not respect national borders. Collaborative efforts between nations, sharing intelligence and resources, are necessary to combat global cybercrime effectively.
  • Ethical Considerations: As technology becomes more integrated into daily life, ethical considerations around privacy, surveillance, and the use of technology for activism become increasingly important.

The WANK Worm incident serves as both a historical milestone and a cautionary tale. It reminds us that technology, while empowering, also presents risks that must be managed proactively. The balance between innovation and security is delicate, requiring thoughtful strategies that encompass technical solutions, human factors, and policy considerations. By studying incidents like the WANK Worm, cybersecurity professionals, policymakers, and organizations can better anticipate challenges, develop more effective defences, and foster a culture that prioritizes security.

Embracing new technologies like artificial intelligence, the Internet of Things (IoT), and quantum computing, the lessons from the late 1980s remind us that the fundamentals of cybersecurity remain unchanged. Protecting our digital infrastructure requires a commitment to continuous improvement, adaptability, and a recognition that security is a collective responsibility.

The WANK Worm was not just an attack on NASA's network; it was a wake-up call to the world. It highlighted the interconnectedness of our systems and the potential for individuals or small groups to impact global operations significantly. In honouring the lessons learned, we pay homage to the early challenges faced and reaffirm our commitment to securing the digital frontier for future generations.



About the Author

d8rh8r?is a Security Consultant and writer with a passion for uncovering the hidden stories of the digital underworld. With a focus on historical cyber incidents, they aim to shed light on the evolution of cyber threats and the importance of robust security practices.

References:

Malicious Life Podcast:

https://www.cybereason.com/blog/malicious-life-podcast-the-wank-worm-part-2

https://www6.austlii.edu.au/au/journals/AUFPPlatypus/1994/48.pdf

https://medium.com/@mmelikidou/the-wank-worm-or-how-hacktivism-came-to-be-ba89e981822d

https://www.muckrock.com/news/archives/2019/may/14/nasa-wank-worm/

?

要查看或添加评论,请登录

Ryan Williams的更多文章

社区洞察

其他会员也浏览了