Jump to content

ILOVEYOU: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
m Reverted edits by 195.171.87.67 (talk) to last version by LuK3
Line 19: Line 19:
}}
}}
<!--The photo description is mistaken. It is not a hacked attempt by the creator.-->
<!--The photo description is mistaken. It is not a hacked attempt by the creator.-->
'''ILOVEYOU''', sometimes referred to as '''Love Letter''', was a [[computer worm]] that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.". The first file extension 'VBS' was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting image files, and sent a copy of itself to the first 50 addresses in the [[Windows Address Book]] used by Microsoft Outlook.


Four things led to the success of [[nl:ILOVEYOU]]
Four things led to the success of '''ILOVEYOU'''.

*It relied on the [[scripting engine]] system setting being enabled. The engine had not been known to have ever been used previously and Microsoft received scathing criticism for leaving such a powerful (and dangerous) tool enabled by default with no one aware of its existence.
*It took advantage of a Microsoft algorithm for hiding file extensions. Windows had begun hiding extensions by default; the algorithm parsed file names from right to left, stopping at the first 'period' ('dot'). The attachment (which had two file extensions) could thus display the inner file extension 'TXT' as the real extension; text files are considered to be innocuous as they are normally incapable of running executable code.
*It utilised [[social engineering (security)|social engineering]] to entice users to open the attachment (out of actual desire to connect or simple curiosity) to ensure continued propagation.
*It exploited systemic weaknesses in the design of Microsoft Outlook and Microsoft Windows which led to unused features easily running malicious code capable of achieving complete access to the operating system, secondary storage, and system and user data simply by unwitting users clicking on an icon.

==Spread==
Messages generated in the Philippines began to spread westwards through corporate email systems. Because the worm used mailing lists as its source of targets, the messages often appeared to come from acquaintances and were therefore often regarded as considered "safe" by their victims, providing further incentive to open them. Only a few users at each site had to access the attachment in order to generate millions more messages that crippled mail systems and overwrote millions of files on computers in each successive network.

==Impact==
The worm is believed to have originated near [[Manila]] in the [[Philippines]] on 5 May 2000 local time and to thereafter have spread westward across the world, moving first to Hong Kong, then to Europe, and finally the US as people reported to their offices that Friday morning.<ref>{{cite web
|url=http://www.zdnet.com/news/iloveyou-e-mail-worm-invades-pcs/107318
|title='ILOVEYOU' e-mail worm invades PCs
|date=4 May 2000
|archiveurl=http://replay.web.archive.org/20081227123742/http://news.zdnet.com/2100-9595_22-107318.html?legacy=zdnn News.Zdnet.com
|archivedate=2008-12-27
}}</ref> The outbreak was later estimated to have caused US $5.5 billion in damages worldwide.<ref>{{cite web | url = http://www.catalogs.com/info/travel-vacations/top-10-worst-computer-viruses.html | publisher = WHoWhatWhereWhenWhy.com | title = ILOVEYOU | accessdate = 2008-05-26}}</ref> Already ten days later 50 million infections had been reported.<ref>{{cite news|author=Gary Barker|work=The Age|date=14 May 2000|title=Microsoft May Have Been Target of Lovebug}}{{dead link|date=December 2011}}</ref> Most of the damage cited was the time and effort spent getting rid of the infection and recovering damaged files from backup. In order to protect themselves, [[The Pentagon]], [[CIA]], the British Parliament, and most large corporations were forced to completely shut down their mail systems.<ref>[http://news.zdnet.com/2100-9595_22-520435.html British parliament shut down their mail systems to prevent damage]{{dead link|date=December 2010}}</ref>

==Architecture of the Worm==
The '''ILOVEYOU''' script (the attachment) was written in [[Microsoft]] [[Visual Basic Scripting]] (VBS) which ran in [[Microsoft Outlook]] and was enabled by default. The script added [[Windows Registry]] data for automatic startup on system boot.

The worm then searched connected drives and replaced files with extensions JPG, JPEG, VBS, VBE, JS, JSE, CSS, WSH, SCT, DOC, HTA, MP2, and MP3 with copies of itself, whilst appending the additional file extension VBS.

The worm propagated itself by sending out copies of the payload to the first 50 entries in the [[Microsoft Outlook]] address book (Windows Address Book). It also downloaded the Barok trojan renamed for the occasion as "WIN-BUGSFIX.EXE".

==Developments==
{{Cleanup-rewrite|date=May 2010}}
On 5 May 2000 two young Filipino computer programmers named Reomel Ramores and Onel de Guzman became the target of a [[criminal investigation]] by the Philippines' [[National Bureau of Investigation (Philippines)|National Bureau of Investigation]] (NBI) agents.<ref name="autogenerated1">{{cite web
|url=http://www.acpf.org/WC8th/AgendaItem2/I2%20Pp%20Gana,Phillipine.html
|title=PROSECUTION OF CYBER CRIMES THROUGH APPROPRIATE CYBER LEGISLATION IN THE REPUBLIC OF THE PHILIPPINES
|archiveurl=http://web.archive.org/web/20080206114348/http://www.acpf.org/WC8th/AgendaItem2/I2%20Pp%20Gana,Phillipine.html
|archivedate=2008-02-06
}}</ref> The NBI received a complaint from Sky Internet, a local Internet service provider (ISP). The ISP claimed that they have received numerous calls from European computer users, complaining that [[malware]] in the form of an "ILOVEYOU" worm was sent to their computers through the said ISP.

After several days of surveillance and investigation spearheaded by Darwin Bawasanta, systems development manager of Sky Internet, the NBI was able to trace a frequently appearing telephone number which turned out to be that of Ramores' apartment in [[Manila]]. His residence was searched by the NBI and Ramores was consequently arrested and placed on inquest investigation before the [[Department of Justice (Philippines)|Department of Justice (DOJ)]]. Onel de Guzman was likewise arrested in absentia. At that point, the NBI were at a loss as to what [[felony]] or [[crime]] to charge them with.<ref name="autogenerated1"/> There were some agents who suggested they might be charged with violation of Republic Act 8484 or the Access Device Regulation Act, a law designed mainly to penalise [[credit card fraud]], the reason supposedly being that both used, if not stole, pre-paid Internet cards which enabled them to use several ISPs. Another school of thought within the NBI suggested Ramores and de Guzman could be charged with malicious mischief, a felony involving damage to property under the Philippines Revised Penal Code enacted in 1932. But the drawback with a charge of malicious mischief is that one of its elements, aside from damage to property, was intent to damage, and de Guzman and Igi Gando claimed during custodial investigation that de Guzman may have merely unwittingly released the worm.<ref name="landler2000">{{cite news| url=http://www.nytimes.com/2000/10/21/business/a-filipino-linked-to-love-bug-talks-about-his-license-to-hack.html | work=The New York Times | title=A Filipino Linked to 'Love Bug' Talks About His License to Hack | first=Mark | last=Landler | date=2000-10-21 | accessdate=2010-05-05}}</ref>

To show intent, the NBI investigated [[AMA Computer College]] where de Guzman dropped out at the very end of his final year.<ref name="autogenerated1"/> They found that de Guzman was not only quite familiar with computer viruses but had in fact proposed to use one. For his undergraduate thesis, de Guzman proposed the implementation of a trojan to steal Internet login passwords.<ref>{{cite web|url=http://www.computerbytesman.com/lovebug/thesis.htm |title=Computerbytesman.com |publisher=Computerbytesman.com |date= |accessdate=2010-12-05}}</ref> De Guzman proposed that users would finally be able to afford an Internet connection. The proposal was rejected by the College of Computer Studies board,<ref name="landler2000"/> prompting de Guzman to cancel his studies the day before graduation.

==Legislative aftermath==
Since there were no laws in the Philippines against writing malware at the time, both Ramores and de Guzman and Igi Gando were released with all charges dropped by state prosecutors.<ref>{{cite news| url=http://www.nytimes.com/2000/08/22/business/technology-philippines-to-drop-charges-on-e-mail-virus.html | work=The New York Times | title=Technology; Philippines to Drop Charges on E-Mail Virus | first=Wayne | last=Arnold | date=2000-08-22 | accessdate=2010-05-05}}</ref> To address this legislative deficiency,<ref name="autogenerated1"/> the Philippine Congress enacted Republic Act No. 8792,<ref>{{cite web|author=Joselito Guianan Chan, Managing Partner, Chan Robles &amp; Associates Law Firm |url=http://www.chanrobles.com/republicactno8792.htm |title=Chanrobles.com |publisher=Chanrobles.com |date=2001-08-01 |accessdate=2010-12-05}}</ref> otherwise known as the E-Commerce Law, in July 2000, just two months after the worm outbreak. In 2002, the ILOVEYOU virus obtained a world record for being the most virulent computer virus then.{{citation needed|date=November 2011}}

==See also==
*[[Code Red (computer worm)|Code Red worm]]
*[[Nimda]] worm
*[[Timeline of notable computer viruses and worms]]

==References==
{{Reflist|2}}

==External links==
*[http://rixstep.com/1/20040504,00.shtml The Love Bug - A Retrospect]
*[http://handle.dtic.mil/100.2/ADA415104 ILOVEYOU Virus Lessons Learned Report, Army Forces Command]
*[http://radsoft.net/news/roundups/luv/ Radsoft: The ILOVEYOU Roundup]
*[http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=9024 Description page]
*"[http://www.theregister.co.uk/2005/05/11/love_bug_author/ No 'sorry' from Love Bug author]" at [[The Register]]
*[http://www.cert.org/advisories/CA-2000-04.html CERT Advisory CA-2000-04 Love Letter Worm]
*[http://www.cinemablend.com/previews/Subject-I-Love-You-aka-I-Luv-U-Virus-4289.html Subject "I Love You"]

[[Category:Email worms]]
[[Category:Windows viruses]]
[[Category:Communications in the Philippines]]
[[Category:Philippine law]]
[[Category:Article Feedback 5]]

[[ar:أى لاف يو]]
[[cs:I Love You]]
[[de:Loveletter]]
[[es:ILoveYou]]
[[fr:I love you (ver informatique)]]
[[ko:러브바이러스]]
[[hr:ILOVEYOU]]
[[it:ILOVEYOU]]
[[lt:ILOVEYOU]]
[[ms:ILOVEYOU]]
[[nl:ILOVEYOU]]
[[ja:LOVELETTER]]
[[ja:LOVELETTER]]
[[pl:ILOVEYOU]]
[[pl:ILOVEYOU]]

Revision as of 08:46, 14 May 2012

Love Letter
TypeComputer worm
Technical details
PlatformMicrosoft Windows
Written inVBScript

ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.". The first file extension 'VBS' was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting image files, and sent a copy of itself to the first 50 addresses in the Windows Address Book used by Microsoft Outlook.

Four things led to the success of ILOVEYOU.

  • It relied on the scripting engine system setting being enabled. The engine had not been known to have ever been used previously and Microsoft received scathing criticism for leaving such a powerful (and dangerous) tool enabled by default with no one aware of its existence.
  • It took advantage of a Microsoft algorithm for hiding file extensions. Windows had begun hiding extensions by default; the algorithm parsed file names from right to left, stopping at the first 'period' ('dot'). The attachment (which had two file extensions) could thus display the inner file extension 'TXT' as the real extension; text files are considered to be innocuous as they are normally incapable of running executable code.
  • It utilised social engineering to entice users to open the attachment (out of actual desire to connect or simple curiosity) to ensure continued propagation.
  • It exploited systemic weaknesses in the design of Microsoft Outlook and Microsoft Windows which led to unused features easily running malicious code capable of achieving complete access to the operating system, secondary storage, and system and user data simply by unwitting users clicking on an icon.

Spread

Messages generated in the Philippines began to spread westwards through corporate email systems. Because the worm used mailing lists as its source of targets, the messages often appeared to come from acquaintances and were therefore often regarded as considered "safe" by their victims, providing further incentive to open them. Only a few users at each site had to access the attachment in order to generate millions more messages that crippled mail systems and overwrote millions of files on computers in each successive network.

Impact

The worm is believed to have originated near Manila in the Philippines on 5 May 2000 local time and to thereafter have spread westward across the world, moving first to Hong Kong, then to Europe, and finally the US as people reported to their offices that Friday morning.[1] The outbreak was later estimated to have caused US $5.5 billion in damages worldwide.[2] Already ten days later 50 million infections had been reported.[3] Most of the damage cited was the time and effort spent getting rid of the infection and recovering damaged files from backup. In order to protect themselves, The Pentagon, CIA, the British Parliament, and most large corporations were forced to completely shut down their mail systems.[4]

Architecture of the Worm

The ILOVEYOU script (the attachment) was written in Microsoft Visual Basic Scripting (VBS) which ran in Microsoft Outlook and was enabled by default. The script added Windows Registry data for automatic startup on system boot.

The worm then searched connected drives and replaced files with extensions JPG, JPEG, VBS, VBE, JS, JSE, CSS, WSH, SCT, DOC, HTA, MP2, and MP3 with copies of itself, whilst appending the additional file extension VBS.

The worm propagated itself by sending out copies of the payload to the first 50 entries in the Microsoft Outlook address book (Windows Address Book). It also downloaded the Barok trojan renamed for the occasion as "WIN-BUGSFIX.EXE".

Developments

On 5 May 2000 two young Filipino computer programmers named Reomel Ramores and Onel de Guzman became the target of a criminal investigation by the Philippines' National Bureau of Investigation (NBI) agents.[5] The NBI received a complaint from Sky Internet, a local Internet service provider (ISP). The ISP claimed that they have received numerous calls from European computer users, complaining that malware in the form of an "ILOVEYOU" worm was sent to their computers through the said ISP.

After several days of surveillance and investigation spearheaded by Darwin Bawasanta, systems development manager of Sky Internet, the NBI was able to trace a frequently appearing telephone number which turned out to be that of Ramores' apartment in Manila. His residence was searched by the NBI and Ramores was consequently arrested and placed on inquest investigation before the Department of Justice (DOJ). Onel de Guzman was likewise arrested in absentia. At that point, the NBI were at a loss as to what felony or crime to charge them with.[5] There were some agents who suggested they might be charged with violation of Republic Act 8484 or the Access Device Regulation Act, a law designed mainly to penalise credit card fraud, the reason supposedly being that both used, if not stole, pre-paid Internet cards which enabled them to use several ISPs. Another school of thought within the NBI suggested Ramores and de Guzman could be charged with malicious mischief, a felony involving damage to property under the Philippines Revised Penal Code enacted in 1932. But the drawback with a charge of malicious mischief is that one of its elements, aside from damage to property, was intent to damage, and de Guzman and Igi Gando claimed during custodial investigation that de Guzman may have merely unwittingly released the worm.[6]

To show intent, the NBI investigated AMA Computer College where de Guzman dropped out at the very end of his final year.[5] They found that de Guzman was not only quite familiar with computer viruses but had in fact proposed to use one. For his undergraduate thesis, de Guzman proposed the implementation of a trojan to steal Internet login passwords.[7] De Guzman proposed that users would finally be able to afford an Internet connection. The proposal was rejected by the College of Computer Studies board,[6] prompting de Guzman to cancel his studies the day before graduation.

Legislative aftermath

Since there were no laws in the Philippines against writing malware at the time, both Ramores and de Guzman and Igi Gando were released with all charges dropped by state prosecutors.[8] To address this legislative deficiency,[5] the Philippine Congress enacted Republic Act No. 8792,[9] otherwise known as the E-Commerce Law, in July 2000, just two months after the worm outbreak. In 2002, the ILOVEYOU virus obtained a world record for being the most virulent computer virus then.[citation needed]

See also

References

  1. ^ News.Zdnet.com "'ILOVEYOU' e-mail worm invades PCs". 4 May 2000. Archived from the original on 2008-12-27. {{cite web}}: Check |archiveurl= value (help)
  2. ^ "ILOVEYOU". WHoWhatWhereWhenWhy.com. Retrieved 2008-05-26.
  3. ^ Gary Barker (14 May 2000). "Microsoft May Have Been Target of Lovebug". The Age.[dead link]
  4. ^ British parliament shut down their mail systems to prevent damage[dead link]
  5. ^ a b c d "PROSECUTION OF CYBER CRIMES THROUGH APPROPRIATE CYBER LEGISLATION IN THE REPUBLIC OF THE PHILIPPINES". Archived from the original on 2008-02-06.
  6. ^ a b Landler, Mark (2000-10-21). "A Filipino Linked to 'Love Bug' Talks About His License to Hack". The New York Times. Retrieved 2010-05-05.
  7. ^ "Computerbytesman.com". Computerbytesman.com. Retrieved 2010-12-05.
  8. ^ Arnold, Wayne (2000-08-22). "Technology; Philippines to Drop Charges on E-Mail Virus". The New York Times. Retrieved 2010-05-05.
  9. ^ Joselito Guianan Chan, Managing Partner, Chan Robles & Associates Law Firm (2001-08-01). "Chanrobles.com". Chanrobles.com. Retrieved 2010-12-05.{{cite web}}: CS1 maint: multiple names: authors list (link)