Preview

I loveyouvirus

Good Essays
Open Document
Open Document
828 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
I loveyouvirus
The ILOVEYOU Virus Essay

The ILOVEYOU Virus Essay

The term malicious code is the term used to describe code in any script or software that is intended to cause undesired effects. This can include security breaches, denial of service or damage to a system. Malicious code can also describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, and backdoors. The focus of this project is to describe the effects of a specific type of malicious code that came out in May of 2000 called the “ILOVEYOU” virus.

According to Symantec Security the “ILOVEYOU” virus was discovered May 5th, 2000.1 At its peak the virus spread to an estimated 10% of internet-connected computers reaching over 50 million infected users2. The damage was estimated to have caused between $5.5-8.7 billion in damages nationwide3.

The”ILOVEYOU” virus is an example of a type of malicious code that also relies partly on social engineering. This is any type of attack that relies on gaining the trust of the victim in order to take advantage of a system they have access to. The way the virus utilized trust to spread is it was titled innocuously “LOVE-LETTER-FOR-YOU.TXT” using a false “.txt” extension and hiding the secondary true extension .vbs. A .vbs file is a Visual Basic Script file that contains a program that is ran when the file is clicked, in this case a malicious one.

The deceptive name lead users to believe it was a harmless affection from someone in their address book instead of the payload it contained. When the virus ran it would replace all of the user’s JPG, JPEG, VBS, VBE, JS, JSE, CSS, WSH, SCT, DOC, HTA, MP2, and MP3 files with the virus, keeping their name and appending the .vbs extension in a hidden fashion as before. The virus would then add itself to the victim’s system startup and email itself to everyone in the user’s address book as well as friends in internet relay chat (IRC) clients.

In addition



References: 1 VBS.LoveLetterVirus.Var. (2000, May 5). Endpoint, Cloud, Mobile & Virtual Security Solutions. Retrieved May 25, 2014, from http://www.symantec.com/security_response/writeup.jsp?docid=2000-121815-2258-99 2 ILOVEYOU virus. (2000, May 5). The Free Dictionary. Retrieved May 25, 2014, from http://encyclopedia.thefreedictionary.com/iloveyou 3 Garza, G. (2005, June 20). Top 10 worst computer viruses. Top 10 Worst Computer Viruses. Retrieved May 26, 2014, from http://www.catalogs.com/info/travel-vacations/top-10-worst-computer-viruses.html 4 Auza, J. (2008, July 8). 12 Most Devastating PC Viruses and Worms of All Time | TechSource. 12 Most Devastating PC Viruses and Worms of All Time | TechSource. Retrieved May 25, 2014, from http://www.junauza.com/2008/07/12-most-devastating-pc-viruses-and.html 5 ILOVEYOU virus. (2000, May 5). The Free Dictionary. Retrieved May 25, 2014, from http://encyclopedia.thefreedictionary.com/iloveyou Critical Infrastructure Protection: 'ILOVEYOU ' Computer Virus Highlights Need for Improved Alert and Coordination Capabilities: T-AIMD-00-181. ITT-Tech Virtual library

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Weinberger, S. (2012, March 20). Top Ten Most-Destructive Computer Viruses. Retrieved February 20, 2013, from http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    * User education in awareness, safe computing practices, indicators of malicious code, and response actions.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Attacks by famous malicious code such as the Melissa or Lovebug viruses highlight the threat of “hackers”, outsiders with intent to harm…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    who put the virus into the network and investigate whether or not there was any…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Onel De Guzman’s “I LOVE YOU” Virus, also referred to as “Love Letter”, was a…

    • 366 Words
    • 1 Page
    Good Essays
  • Better Essays

    Computer Virus

    • 3132 Words
    • 13 Pages

    One of the nice things about the recent escalation in computer crime is that the media doesn't make such a big fuss over viruses any more. Sure, they (viruses and the media both) can be a pain. However, with all those antivirus…

    • 3132 Words
    • 13 Pages
    Better Essays
  • Better Essays

    Cyber threats

    • 1844 Words
    • 8 Pages

    WORMS Worms, viruses, and Trojan horses are three forms of malware, or malicious software, which attack computer systems. The latest Symantec Internet Security Threat Report identified over 1.6 million instances of “malicious code” (worms and viruses) in 2008, a 165% increase over 2007. A worm is a program that copies itself repeatedly into a computer’s memory or onto a disk drive. Sometimes it will copy itself so often it will cause a computer to crash. Among some famous worms are Code Red, Nimda, Klez, Sasser, Bagle, Blaster, Sobig, and Melissa. The 2002 worm Klez, dubbed the most common worm ever, spread its damage through Microsoft products by being inside email attachments or part of email messages themselves, so that merely opening an infected message could infect a computer running Outlook or Outlook Express. The Sasser worm was estimated to account for 26% of all virus infections in the first half of 2004. Incredibly, one person, Sven Jaschan, 18, who admitted programming the Sasser and other worms and who was arrested in Germany in May 2004, was responsible for 70% of the virus infections in the early part of that year.…

    • 1844 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Computer Crimes

    • 1328 Words
    • 6 Pages

    A computer crime would be defined as criminal activity where a computer or network is the source or place of a crime. Computer crimes have become more common in today’s society. In the old days people would rob banks to get a pay out, nowadays people are committing crimes through computers. Besides the obvious difference, computer crimes have a much larger pay out than the old fashioned bank robbery. Someone who may rob a bank could walk away (that’s if they get away) with a couple hundred thousand, someone who commits a crime through the network will walk away (they usually get away) with millions. Personally I believe the reason for increasing computer crimes is because so many are unaware of them.…

    • 1328 Words
    • 6 Pages
    Good Essays

Related Topics