Preview

It255 Iloveyou Virus

Good Essays
Open Document
Open Document
387 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It255 Iloveyou Virus
EYOUILOVEYOU, sometime referred to as Love Letter, was a computer worm that attacked tens of millions of windows personal computers on and after May 5th 2000. It started in Philippines, spreading as an email message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”. the latter file extension in this case is .vbs but by default it don’t show up in the windows files it will comes up as the normal text file to end user, .vbs is interpreted file that when they click the text file thinking it was love letter form one of their ex-boyfriend(s), they activate Visual Basic script which was the virus and once it activated it will send first 50 addresses in the Windows Address Book used by Microsoft Outlook. It damaged local machine, overwriting image files. Virus stared in Manila, Philippines on May 5th 2000, it moved to Hong Kong then Europe and then finally the US. As employees began their workday that Friday morning virus have already caused US $5.5 to 8.7 Billion in damages worldwide and estimated to cost US $15 billion to remove the worm within ten days. Over fifty million infection had been reported, it was reported that 10% of internet-connected computers in the world. Damaged cited was mostly the time and effort spent getting rid of the infection and recovering files form back up. To protect them, The Pentagon, CIA, The British Parliament and most large corporation decided to completely shut down their mail system. On 5 May 2000, two young Filipino computer programmers named Reomel Ramores and Onel de Guzman became targets of a criminal investigation by agents of the Philippines ' National Bureau of Investigation (NBI). Local Internet service provider Sky Internet had reported receiving numerous contacts from European computer users alleging that malware (in the form of the "ILOVEYOU" worm) had been sent via the ISP 's servers. After surveillance and investigation by Darwin Bawasanta of Sky Internet, the NBI traced a frequently


Cited: Rouse, Margaret. "ILOVEYOU Virus." What Is ? Search Security, Feb. 2006. Web. 02 Mar. 2013.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It210 Inchworm Code

    • 256 Words
    • 3 Pages

    * Design a program that models the worm’s behavior in the following scenario. Be sure to include the completed analysis section:…

    • 256 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Bradley, Tony, (2012). Introduction to Intrusion Detections Systems (IDS). Retrieved September 5, 2012 from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    This was causing disruption to the operations of major online retail businesses, data backup, and companies that provide communications, banks, and information services to the medical and pharmaceutical industries resulting in severe attacks of their corporate websites, internet access, data-storage, e-mail and disaster-recovery systems. The infected computers also targeted students at two college campuses in Pennsylvania and Massachusetts. Based on what I found in my research, an estimate of $504,000 in financial losses resulted from these…

    • 459 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It250

    • 272 Words
    • 2 Pages

    Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file?…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    Six Estonian nationals have been arrested and charged with running a sophisticated Internet fraud ring that infected millions of computers worldwide with a virus and enabled the thieves to manipulate the multi-billion-dollar Internet advertising industry. Users of infected machines were unaware that their computers had been compromised—or that the malicious software rendered their machines vulnerable to a host of other viruses.…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Mia Mccain Cook

    • 901 Words
    • 4 Pages

    Networking and Telecommunications Virus and Malware Eradication Administrative and Support Services Security Policies and Implementation Project Management and Ethics System Forensics and Investigation…

    • 901 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Enforcing rules through software that monitors and records IM conversations, and also through disciplinary action.…

    • 5657 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Malicious software called malware such as viruses, worms, Trojan horses, and spyware can all cause security breaches within an organization as well as towards its clients. “Internet security firm Symantec reported in 2011 that it had detected 286 million new and unique threats from malicious software in 2010, or about nine per second, up from 240 million in 2009.” A computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. Worms are independent computer programs that copy themselves from one computer to other computers over a network. Worms destroy data and programs as well as disrupt or even halt the operation of computer networks. The Trojan horse is not itself a virus because it does not replicate, but it is often a way for viruses or other malicious code to be introduced into a computer system. The Trojan horse appears to be nonthreatening but then does something other than expected. (K. Laudon, J. Laudon, 2013, p. 226-227) Security breaches can also occur from hackers or even from unsecured laptop computers and workstations, password hacked or revealed, improper storing of documents and files and unsecured disposal.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    4. What other viruses, Trojans, worms, or malicious software were identified and quarantined by AVG…

    • 293 Words
    • 2 Pages
    Satisfactory Essays

Related Topics