Thursday, April 4, 2013

ILOVEYOU


Windows Burned!!!!







ILOVEYOU
LoveLetterVBS screenshot website 06-17-09.png
Common name Love Letter
Type Computer worm
Operating system(s) affected Microsoft Windows
Written in VBScript



ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension (in this case, 'VBS' - a type of interpreted file) was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting image files, and sent a copy of itself to the first 50 addresses in the Windows Address Book used by Microsoft Outlook.

Contents

  • 1 Success
  • 2 Spread
  • 3 Impact
  • 4 Architecture
  • 5 Developments
  • 6 Legislative aftermath
  • 7 See also

  Success

Four things led to the success of ILOVEYOU.
  • It relied on the scripting engine system setting being enabled. The engine had not been known to have ever been used previously and Microsoft received scathing criticism for leaving such a powerful (and dangerous) tool enabled by default with no one aware of its existence.
  • It took advantage of a Microsoft algorithm for hiding file extensions. Windows had begun hiding extensions by default; the algorithm parsed file names from right to left, stopping at the first 'period' ('dot'). The attachment (which had two file extensions) could thus display the inner file extension 'TXT' as the real extension; text files are considered to be innocuous as they are normally incapable of running executable code.
  • It used social engineering to entice users to open the attachment (out of actual desire to connect or simple curiosity) to ensure continued propagation.
  • It exploited systemic weaknesses in the design of Microsoft Outlook and Microsoft Windows which led to unused features easily running malicious code capable of achieving complete access to the operating system, secondary storage, and system and user data simply by unwitting users clicking on an icon.

Spread

Messages generated in the Philippines began to spread westwards through corporate email systems. Because the worm used mailing lists as its source of targets, the messages often appeared to come from acquaintances and were therefore often regarded as "safe" by their victims, providing further incentive to open them. Only a few users at each site had to access the attachment to generate millions more messages that crippled mail systems and overwrote millions of files on computers in each successive network.

Impact

The worm originated near Manila in the Philippines on May 5, 2000, thereafter following daybreak westward across the world, moving first to Hong Kong, then to Europe, and finally the US, as employees began their workday that Friday morning. The outbreak was later estimated to have caused US $5.5-8.7 billion in damages worldwide, and estimated to cost US $15 billion to remove the worm. Within ten days, over fifty million infections had been reported, and it is estimated that 10% of internet-connected computers in the world had been affected. Damage cited was mostly the time and effort spent getting rid of the infection and recovering files from backups. To protect themselves, The Pentagon, CIA, the British Parliament and most large corporations decided to completely shut down their mail systems. . This virus affected over 45 million computers and was one of the world's most dangerous computer related disasters.

Architecture

The ILOVEYOU script (the attachment) was written in Microsoft Visual Basic Scripting (VBS) which ran in Microsoft Outlook and was enabled by default. The script added Windows Registry data for automatic startup on system boot.
The worm then searched connected drives and replaced files with extensions JPG, JPEG, VBS, VBE, JS, JSE, CSS, WSH, SCT, DOC, HTA, MP2, and MP3 with copies of itself, while appending the additional file extension VBS. However, the MP3 and sound related files are hidden and not overwritten.
The worm propagated itself by sending out copies of the payload to the first 50 entries in the Microsoft Outlook address book (Windows Address Book). It also downloaded the Barok trojan renamed for the occasion as "WIN-BUGSFIX.EXE".
The fact that the virus was written in VBS provided users a way to modify the virus. A user could easily modify the virus to replace important files in the system, and destroy it. This allowed many variations of ILOVEYOU to spread across the internet, each one doing different kinds of damage.
Some mail messages sent by ILOVEYOU:
  • VIRUS ALERT!!
  • Important! Read Carefully!!

  Developments

On 5 May 2000, two young Filipino computer programmers named Kenny Roger and Onel de Guzman became targets of a criminal investigation by agents of the Philippines' National Bureau of Investigation (NBI). Local Internet service provider Sky Internet had reported receiving numerous contacts from European computer users alleging that malware (in the form of the "ILOVEYOU" worm) had been sent via the ISP's servers.
After surveillance and investigation by Darwin Bawasanta of Sky Internet, the NBI traced a frequently appearing telephone number to Ramores' apartment in Manila. His residence was searched and Ramores was arrested and placed on inquest investigation before the Department of Justice (DOJ). Onel de Guzman was likewise arrested in absentia.
At that point, the NBI were unsure what felony or crime would apply. It was suggested they be charged with violating Republic Act 8484 (the Access Device Regulation Act), a law designed mainly to penalise credit card fraud, since both used pre-paid (if not stolen) Internet cards to purchase access to ISPs. Another idea was that they be charged with malicious mischief, a felony (under the Philippines Revised Penal Code of 1932) involving damage to property. The drawback here was that one of its elements, aside from damage to property, was intent to damage, and de Guzman had claimed during custodial investigations that he may have unwittingly released the worm.
To show intent, the NBI investigated AMA Computer College, where de Guzman had dropped out at the very end of his final year. They found that, for his undergraduate thesis, de Guzman had proposed the implementation of a trojan to steal Internet login passwords. This way, he proposed, users would finally be able to afford an Internet connection. The proposal was rejected by the College of Computer Studies board, prompting de Guzman to cancel his studies the day before graduation.

Legislative aftermath

Since there were no laws in the Philippines against writing malware at the time, both Ramores and de Guzman were released with all charges dropped by state prosecutors. To address this legislative deficiency, the Philippine Congress enacted Republic Act No. 8792, otherwise known as the E-Commerce Law, in July 2000, just two months after the worm outbreak. In 2002, the ILOVEYOU virus obtained a world record for being the most virulent computer virus then.

See also




No comments:

Post a Comment