Preview

I loveyouvirus

Good Essays
Open Document
Open Document
828 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
I loveyouvirus
The ILOVEYOU Virus Essay

The ILOVEYOU Virus Essay

The term malicious code is the term used to describe code in any script or software that is intended to cause undesired effects. This can include security breaches, denial of service or damage to a system. Malicious code can also describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, and backdoors. The focus of this project is to describe the effects of a specific type of malicious code that came out in May of 2000 called the “ILOVEYOU” virus.

According to Symantec Security the “ILOVEYOU” virus was discovered May 5th, 2000.1 At its peak the virus spread to an estimated 10% of internet-connected computers reaching over 50 million infected users2. The damage was estimated to have caused between $5.5-8.7 billion in damages nationwide3.

The”ILOVEYOU” virus is an example of a type of malicious code that also relies partly on social engineering. This is any type of attack that relies on gaining the trust of the victim in order to take advantage of a system they have access to. The way the virus utilized trust to spread is it was titled innocuously “LOVE-LETTER-FOR-YOU.TXT” using a false “.txt” extension and hiding the secondary true extension .vbs. A .vbs file is a Visual Basic Script file that contains a program that is ran when the file is clicked, in this case a malicious one.

The deceptive name lead users to believe it was a harmless affection from someone in their address book instead of the payload it contained. When the virus ran it would replace all of the user’s JPG, JPEG, VBS, VBE, JS, JSE, CSS, WSH, SCT, DOC, HTA, MP2, and MP3 files with the virus, keeping their name and appending the .vbs extension in a hidden fashion as before. The virus would then add itself to the victim’s system startup and email itself to everyone in the user’s address book as well as friends in internet relay chat (IRC) clients.

In addition



References: 1 VBS.LoveLetterVirus.Var. (2000, May 5). Endpoint, Cloud, Mobile & Virtual Security Solutions. Retrieved May 25, 2014, from http://www.symantec.com/security_response/writeup.jsp?docid=2000-121815-2258-99 2 ILOVEYOU virus. (2000, May 5). The Free Dictionary. Retrieved May 25, 2014, from http://encyclopedia.thefreedictionary.com/iloveyou 3 Garza, G. (2005, June 20). Top 10 worst computer viruses. Top 10 Worst Computer Viruses. Retrieved May 26, 2014, from http://www.catalogs.com/info/travel-vacations/top-10-worst-computer-viruses.html 4 Auza, J. (2008, July 8). 12 Most Devastating PC Viruses and Worms of All Time | TechSource. 12 Most Devastating PC Viruses and Worms of All Time | TechSource. Retrieved May 25, 2014, from http://www.junauza.com/2008/07/12-most-devastating-pc-viruses-and.html 5 ILOVEYOU virus. (2000, May 5). The Free Dictionary. Retrieved May 25, 2014, from http://encyclopedia.thefreedictionary.com/iloveyou Critical Infrastructure Protection: 'ILOVEYOU ' Computer Virus Highlights Need for Improved Alert and Coordination Capabilities: T-AIMD-00-181. ITT-Tech Virtual library

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Weinberger, S. (2012, March 20). Top Ten Most-Destructive Computer Viruses. Retrieved February 20, 2013, from http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    * User education in awareness, safe computing practices, indicators of malicious code, and response actions.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Attacks by famous malicious code such as the Melissa or Lovebug viruses highlight the threat of “hackers”, outsiders with intent to harm…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Better Essays

    1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    who put the virus into the network and investigate whether or not there was any…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Onel De Guzman’s “I LOVE YOU” Virus, also referred to as “Love Letter”, was a…

    • 366 Words
    • 1 Page
    Good Essays
  • Good Essays

    Computer Crimes

    • 1328 Words
    • 6 Pages

    A computer crime would be defined as criminal activity where a computer or network is the source or place of a crime. Computer crimes have become more common in today’s society. In the old days people would rob banks to get a pay out, nowadays people are committing crimes through computers. Besides the obvious difference, computer crimes have a much larger pay out than the old fashioned bank robbery. Someone who may rob a bank could walk away (that’s if they get away) with a couple hundred thousand, someone who commits a crime through the network will walk away (they usually get away) with millions. Personally I believe the reason for increasing computer crimes is because so many are unaware of them.…

    • 1328 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Computer Virus

    • 3132 Words
    • 13 Pages

    One of the nice things about the recent escalation in computer crime is that the media doesn't make such a big fuss over viruses any more. Sure, they (viruses and the media both) can be a pain. However, with all those antivirus…

    • 3132 Words
    • 13 Pages
    Better Essays

Related Topics