ILOVEYOU
   HOME

TheInfoList



OR:

ILOVEYOU, sometimes referred to as Love Bug or Love Letter for you, is a
computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It wil ...
that infected over ten million
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for se ...
personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs." At the time,
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for se ...
computers often hid the latter file extension (" VBS," a type of interpreted file) by default because it is an extension for a file type that Windows knows, leading unwitting users to think it was a normal text file. Opening the attachment activates the
Visual Basic Visual Basic is a name for a family of programming languages from Microsoft. It may refer to: * Visual Basic .NET (now simply referred to as "Visual Basic"), the current version of Visual Basic launched in 2002 which runs on .NET * Visual Basic ( ...
script. First, the worm inflicts damage on the local machine, overwriting random files (including Office files and image files; however, it hides
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
files instead of deleting them), then, it copies itself to all addresses in the
Windows Address Book ''Windows Address Book'' was a component of Microsoft Windows that lets users keep a single list of contacts that can be shared by multiple programs. It is most commonly used by Outlook Express. It was introduced with Internet Explorer 3 in 1996 a ...
used by
Microsoft Outlook Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office and Microsoft 365 software suites. Though primarily an email client, Outlook also includes such functions as Calen ...
, allowing it to spread much faster than any other previous email worm. Onel de Guzman, a then-24-year-old resident of
Manila Manila ( , ; fil, Maynila, ), officially the City of Manila ( fil, Lungsod ng Maynila, ), is the capital of the Philippines, and its second-most populous city. It is highly urbanized and, as of 2019, was the world's most densely populated ...
,
Philippines The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no), * bik, Republika kan Filipinas * ceb, Republika sa Pilipinas * cbk, República de Filipinas * hil, Republ ...
, created the malware. Because there were no laws in the Philippines against making malware at the time of its creation, the Philippine Congress enacted Republic Act No. 8792, otherwise known as the E-Commerce Law, in July 2000 to discourage future iterations of such activity. However, the
Constitution of the Philippines The Constitution of the Philippines ( Filipino: ''Saligang Batas ng Pilipinas'' or ''Konstitusyon ng Pilipinas'', Spanish: ''Constitución de la República de Filipinas'') is the constitution or the supreme law of the Republic of the Philippin ...
bans ''ex post facto'' laws, and as such de Guzman could not be prosecuted.


Creation

ILOVEYOU was created by Onel de Guzman aka Lto3, a college student in Manila, Philippines, who was 24 years old at the time. De Guzman, who was poor and struggling to pay for Internet access at the time, created the computer worm intending to steal other users' passwords, which he could use to log in to their Internet accounts without needing to pay for the service. He justified his actions on his belief that Internet access is a human right and that he was not actually stealing. The worm used the same principles that de Guzman had described in his undergraduate thesis at AMA Computer College. He stated that the worm was very easy to create, thanks to a bug in
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of operating systems. The first operating system in the 9x family, it is the successor to Windows 3.1x, and was released to manufacturi ...
that would run code in email attachments when the user clicked on them. Originally designing the worm to only work in Manila, he removed this geographic restriction out of
curiosity Curiosity (from Latin '' cūriōsitās'', from ''cūriōsus'' "careful, diligent, curious", akin to ''cura'' "care") is a quality related to inquisitive thinking such as exploration, investigation, and learning, evident by observation in human ...
, which allowed the worm to spread worldwide. De Guzman did not expect this worldwide spread.


Description

On the machine system level, ILOVEYOU relied on the scripting engine system setting (which runs scripting language files such as .vbs files) being enabled and took advantage of a feature in Windows that hid file extensions by default, which malware authors would use as an
exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: *Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploitat ...
. Windows would parse file names from right to left, stopping at the first period character, showing only those elements to the left of this. The attachment, which had two periods, could thus display the inner fake "TXT" file extension. True text files are considered to be innocuous as they are incapable of running arbitrary code. The worm used social engineering to entice users to open the attachment (out of actual desire to connect or simple curiosity) to ensure continued propagation. Systemic weaknesses in the design of Microsoft Outlook and
Microsoft Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for ...
were exploited to allow malicious code capable of gaining complete access to the operating system, secondary storage, and system and user data in, simply through unwitting users clicking on an icon.


Spread

Messages generated in the Philippines began to spread westwards through corporate email systems. Because the worm used mailing lists as its source of targets, the messages often appeared to come from acquaintances and were therefore often regarded as "safe" by their victims, providing further incentive to open them. Only a few users at each site had to access the attachment to generate millions more messages that crippled mail systems and overwrote millions of files on computers in each successive
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematic ...
.


Impact

The worm originated in the
Pandacan Pandacan is a district in Manila, Philippines which is known in recent history for its former Pandacan oil depot which supplies the majority of oil exports in the country. Profile In 2000, Pandacan had a total population of close to 82,194. T ...
neighborhood of
Manila Manila ( , ; fil, Maynila, ), officially the City of Manila ( fil, Lungsod ng Maynila, ), is the capital of the Philippines, and its second-most populous city. It is highly urbanized and, as of 2019, was the world's most densely populated ...
in the Philippines on 4 May 2000, thereafter following daybreak westward across the world as employees began their workday that Friday morning, moving first to Hong Kong, then to Europe, and finally the United States. The outbreak was later estimated to have caused US$5.5–8.7 billion in damages worldwide, and estimated to cost US$10–15 billion to remove the worm. Within ten days, over fifty million infections had been reported, and it is estimated that 10% of Internet-connected computers in the world had been affected. Damage cited was mostly the time and effort spent getting rid of the infection and recovering files from backups. To protect themselves,
The Pentagon The Pentagon is the headquarters building of the United States Department of Defense. It was constructed on an accelerated schedule during World War II. As a symbol of the U.S. military, the phrase ''The Pentagon'' is often used as a metony ...
,
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
, the
British Parliament The Parliament of the United Kingdom is the supreme legislative body of the United Kingdom, the Crown Dependencies and the British Overseas Territories. It meets at the Palace of Westminster, London. It alone possesses legislative suprem ...
and most large corporations decided to completely shut down their mail systems. At the time, it was one of the world's most destructive computer related disasters ever. The events inspired the song "E-mail" on the
Pet Shop Boys The Pet Shop Boys are an English synth-pop duo formed in London in 1981. Consisting of primary vocalist Neil Tennant and keyboardist Chris Lowe, they have sold more than 50 million records worldwide, and were listed as the most successful duo ...
' UK top-ten album of 2002, ''
Release Release may refer to: * Art release, the public distribution of an artistic production, such as a film, album, or song * Legal release, a legal instrument * News release, a communication directed at the news media * Release (ISUP), a code to iden ...
'', the lyrics of which play thematically on the human desires which enabled the mass destruction of this computer infection.


Architecture

De Guzman wrote the ILOVEYOU script (the attachment) in Microsoft Visual Basic Scripting (VBS), which ran in
Microsoft Outlook Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office and Microsoft 365 software suites. Though primarily an email client, Outlook also includes such functions as Calen ...
and was enabled by default. The script adds
Windows Registry The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry. The kernel, device drivers, services, Security Accounts Manager, and ...
data for automatic startup on system boot. The worm searches connected drives and replaces files with extensions
JPG JPEG ( ) is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography. The degree of compression can be adjusted, allowing a selectable tradeoff between storage size and image ...
,
JPEG JPEG ( ) is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography. The degree of compression can be adjusted, allowing a selectable tradeoff between storage size and imag ...
, VBS, VBE, JS, JSE,
CSS Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language such as HTML or XML (including XML dialects such as SVG, MathML or XHTML). CSS is a cornerstone technolo ...
, WSH, SCT, DOC, HTA, MP2, and
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
with copies of itself, while appending the additional file extension VBS. However, MP3s and other sound-related files would be hidden rather than overwritten. The worm propagates itself by sending one copy of the payload to each entry in the
Microsoft Outlook Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office and Microsoft 365 software suites. Though primarily an email client, Outlook also includes such functions as Calen ...
address book (Windows Address Book). It also downloads the Barok
trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * ''Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 189 ...
renamed for the occasion as "WIN-BUGSFIX.EXE." The fact that the worm was written in VBS allowed users to modify it. A user could easily change the worm to replace essential files and destroy the system, allowing more than 25 variations of ILOVEYOU to spread across the Internet, each doing different kinds of damage. Most of the variations had to do with what file extensions were affected by the worm. Others modified the email subject to target a specific audience, like the variant "Cartolina" in Italian or "BabyPic" for adults. Some others only changed the credits to the author, which were initially included in the standard version of the virus, removing them entirely or referencing false authors. Still, others overwrote "
EXE Exe or EXE may refer to: * .exe, a file extension * exe., abbreviation for executive Places * River Exe, in England * Exe Estuary, in England * Exe Island, in Exeter, England Transportation and vehicles * Exe (locomotive), a British locomotiv ...
" and "
COM Com or COM may refer to: Computing * COM (hardware interface), a serial port interface on IBM PC-compatible computers * COM file, or .com file, short for "command", a file extension for an executable file in MS-DOS * .com, an Internet top-level d ...
" files. The user's computer would then be unbootable upon restarting. Some mail messages sent by ILOVEYOU include: * VIRUS ALERT!! * Important! Read Carefully!!


Investigation

On 5 May 2000, two young Filipino programmers named Reonel Ramones and Onel De Guzman became targets of a
criminal investigation Criminal investigation is an applied science that involves the study of facts that are then used to inform criminal trials. A complete criminal investigation can include searching, interviews, interrogations, evidence collection and preservat ...
by agents of the Philippines' National Bureau of Investigation (NBI). Local
Internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise priva ...
Sky Internet had reported receiving numerous contacts from European computer users alleging that malware (in the form of the "ILOVEYOU" worm) had been sent via the ISP's servers. De Guzman attempted to hide the evidence by removing his computer from his apartment, but he accidentally left some disks behind that contained the worm, as well as information that implicated Michael Buen as a possible co-conspirator. After surveillance and investigation by Darwin Bawasanta of Sky Internet, the NBI traced a frequently appearing telephone number to Ramones' apartment in
Manila Manila ( , ; fil, Maynila, ), officially the City of Manila ( fil, Lungsod ng Maynila, ), is the capital of the Philippines, and its second-most populous city. It is highly urbanized and, as of 2019, was the world's most densely populated ...
. His residence was searched and Ramones was arrested and placed under investigation by the Department of Justice (DOJ). Onel De Guzman was also charged ''
in absentia is Latin for absence. , a legal term, is Latin for "in the absence" or "while absent". may also refer to: * Award in absentia * Declared death in absentia, or simply, death in absentia, legally declared death without a body * Election in ab ...
''. At that point, the NBI were unsure what felony or crime would apply. It was suggested they be charged with violating Republic Act 8484 (the Access Device Regulation Act), a law designed mainly to penalise
credit card fraud Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The ...
, since both used pre-paid (if not stolen) Internet cards to purchase access to ISPs. Another idea was that they be charged with malicious
mischief Mischief or malicious mischief is the name for a criminal offenses that is defined differently in different legal jurisdictions. While the wrongful acts will often involve what is popularly described as vandalism, there can be a legal different ...
, a felony (under the Philippines Revised Penal Code of 1932) involving damage to property. The drawback here was that one of its elements, aside from damage to property, was intent to damage, and De Guzman had claimed during custodial investigations that he might have unwittingly released the worm. At a press conference organised by his lawyer on 11 May, he said "It is possible" when asked whether he might have done so. To show intent, the NBI investigated AMA Computer College, where De Guzman had dropped out at the very end of his final year. They found that, for his undergraduate thesis, he had proposed the implementation of a
trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * ''Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 189 ...
to steal Internet login passwords. This, he claimed, would allow users to finally be able to afford an Internet connection. The proposal was rejected by the college of
Computer Studies Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to practical disciplines (including t ...
board, leading De Guzman to claim that his professors were closed-minded.


Aftermath

Since there were no laws in the Philippines against writing malware at the time, both Ramones and de Guzman were released with all charges dropped by state prosecutors. To address this legislative deficiency, the Philippine Congress enacted Republic Act No. 8792, otherwise known as the E-Commerce Law, in July 2000, months after the worm outbreak. In 2012, the
Smithsonian Institution The Smithsonian Institution ( ), or simply the Smithsonian, is a group of museums and education and research centers, the largest such complex in the world, created by the U.S. government "for the increase and diffusion of knowledge". Found ...
named ILOVEYOU one of the top ten most virulent computer viruses in history. De Guzman did not want public attention. His last known public appearance was at the 2000 press conference, where he obscured his face and allowed his lawyer to answer most questions; his whereabouts remained unknown for 20 years afterward. In May 2020, investigative journalist Geoff White revealed that while researching his cybercrime book ''Crime Dot Com'', he had found Onel de Guzman working at a mobile phone repair stall in Manila. De Guzman admitted to creating and releasing the virus. He claimed he had initially developed it to steal Internet access passwords, since he could not afford to pay for access. He also stated that he created it alone, clearing the two others who had been accused of co-writing the worm.


See also

*
Christmas Tree EXEC Christmas Tree EXEC was the first widely disruptive computer worm, which paralyzed several international computer networks in December 1987. The virus ran on the IBM VM/CMS operating system. Written by a student at the Clausthal University of ...
*
Code Red worm Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server. It was the first large scale, mixed threat attack to successfully target enterprise networks. The Code Red worm was ...
*
Computer virus A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a comput ...
*
Nimda The Nimda virus is a malicious file-infecting computer worm. It quickly spread, surpassing the economic damage caused by previous outbreaks such as Code Red. The first released advisory about this thread (worm) was released on September 18, 2001 ...
(computer worm) * Timeline of notable computer viruses and worms


References


External links


The Love Bug - A RetrospectILOVEYOU Virus Lessons Learned Report, Army Forces CommandRadsoft: The ILOVEYOU Roundup

No 'sorry' from Love Bug author
at
The Register ''The Register'' is a British technology news website co-founded in 1994 by Mike Magee, John Lettice and Ross Alderson. The online newspaper's masthead sublogo is "''Biting the hand that feeds IT''." Their primary focus is information tec ...

CERT Advisory CA-2000-04 Love Letter Worm
{{Hacking in the 2000s Computer worms Email worms Communications in the Philippines 2000 in the Philippines Hacking in the 2000s 2000 introductions