Creeper

aka Creeper Virus / CREEPER

Creeper message displayed on TENEX terminal: I'M THE CREEPER: CATCH ME IF YOU CAN
discovered
1971
origin
BBN Technologies, Cambridge, MA
reported by
Bob Thomas, Bolt, Beranek and Newman
family
Creeper
size
62 bytes
platform
TENEX (DEC PDP-10)
vector
ARPANET self-replicating program
payload
prank, informational
trigger
automatic replication across network

Payload

Displayed 'I'M THE CREEPER: CATCH ME IF YOU CAN' on infected terminals. Moved between DEC PDP-10 computers connected to ARPANET. Generally considered the first computer virus ever created.

Genesis

There is always a question of origins. Which came first? In the mythology of computer viruses, origin stories matter because they establish the logic of what came after. Creeper occupies that unique historical position: it was almost certainly the first computer virus ever written, and yet the discovery of this fact was almost accidental.

In 1971, the ARPANET was a network of fewer than 20 connected computers, mostly clustered at university computer science departments and research institutions. The machines were large, expensive, and managed by small teams of programmers and systems administrators who knew each other personally. The network was designed for research, run by people who understood networks theoretically but had minimal practical experience with them. Security, in the modern sense, barely existed.

Bob Thomas, a programmer working at Bolt, Beranek and Newman (BBN Technologies), the firm responsible for much of ARPANET's core infrastructure, created what is now considered the first computer virus. He did not set out to create a virus. He was experimenting with self-replicating programs as a research exercise, exploring what a program might do if it could move between connected machines and reproduce itself.

The result was Creeper: a small program, only 62 bytes, written for TENEX operating systems running on DEC PDP-10 computers. The program would copy itself to other connected machines on ARPANET, moving from one computer to another through the network's basic file-sharing utilities. When executed on a new machine, it would display the message "I'M THE CREEPER: CATCH ME IF YOU CAN" on the terminal screen and then continue to replicate to other machines.

That's it. That is the entire payload. A message. An announcement of presence. A taunt.

The historical significance of Creeper lies precisely in this simplicity. It was not designed to corrupt files or steal data or manipulate the system's core functionality. It was designed to do one thing: exist on networks and announce its existence. The message is the payload. The replication is the statement.

What followed was perhaps even more significant: the creation of Reaper. A fellow programmer at BBN, Ray Tomlinson, wrote Reaper specifically to hunt down and eliminate Creeper infections. Reaper traveled the network looking for Creeper processes and deleted them. This makes Reaper the first antivirus program ever written, created as a direct response to the first computer virus.

The entire dynamic of virus and antivirus, of attack and defense, was thus established in its basic form within the same community of researchers, at almost the same moment. It was a small ecosystem, closed and aware of itself. Everyone involved in ARPANET programming knew what was happening. Thomas and Tomlinson were colleagues. The experiment could be observed, understood, and controlled.

Creeper was not a threat in any meaningful sense. It caused no damage. It corrupted nothing. It did not steal data. The announcement "CATCH ME IF YOU CAN" was less a threat and more a statement of artistic intent. This is an exploration of possibility. Here is something that can move through networks. Here is something that can replicate. What comes next?

The significance of Creeper is archeological. It is the moment when programmers first understood that networked computers could be made to replicate and spread code without human intervention. It is the moment when the theoretical possibility of self-replicating software became practical reality. And it is the moment when programmers simultaneously understood that such replication could be hunted and stopped.

In one sense, Creeper is absurdly distant from the malware landscape of subsequent decades. The machines were different. The network was different. The threat model was entirely different. Creeper could not have spread beyond the closed ARPANET system. It had no mechanisms for persistence beyond immediate execution. It carried no payload beyond an announcement.

Yet the fundamental mechanics are identical to every virus that followed. Replication. Propagation through network vectors. Execution on remote systems. Payload announcement. The names change, the technologies change, the threat levels escalate. But Creeper established the basic pattern.

There is also something almost poignant about Creeper in retrospect. It emerged from a community of researchers exploring the limits of what networked computing could do. The creation and elimination of Creeper happened with full transparency, documented and understood by the people involved. It was controlled experimentation, not sabotage.

That era of openness, of researchers conducting experiments within a small trusted network, would not last long. By the 1980s, computer viruses had moved into the underground. By the 1990s, they had become weapons. But at the beginning, in 1971 at BBN Technologies, the first computer virus was simply a question posed by one programmer to another: here is something that can replicate through your network. Can you catch it? Can you stop it?

The answer came quickly. But the question has never quite been answered completely.

Related specimens

Sources

last updated: 2026-04-14 :: curated by the_curator