ILOVEYOU (computer Virus)
   HOME

TheInfoList



OR:

ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a
computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will ...
that infected over ten million
Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
personal computers on 4 May 2000 and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs".
Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
computers often hide the latter file extension (" VBS", a type of interpreted file) by default because it is an extension for a file type that Windows knows, leading unwitting users to think it was a normal text file. Opening the attachment activates the
Visual Basic Visual Basic is a name for a family of programming languages from Microsoft. It may refer to: * Visual Basic (.NET), the current version of Visual Basic launched in 2002 which runs on .NET * Visual Basic (classic), the original Visual Basic suppo ...
script. First, the worm inflicts damage on the local machine, overwriting random files (including Office files and image files; however, it hides
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg. It was designed to greatly reduce the amount ...
files instead of deleting them), then, it copies itself to all addresses in the
Windows Address Book ''Windows Address Book'' was a component of Microsoft Windows that lets users keep a single list of contacts that can be shared by multiple programs. It is most commonly used by Outlook Express. It was introduced with Internet Explorer 3 in 1996 a ...
used by
Microsoft Outlook Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites. Primarily popular as an email client for businesses, Outlook also includes functions such as Calendari ...
, allowing it to spread much faster than any other previous email worm. Onel de Guzman, a then-24-year-old computer science student at
AMA Computer College AMA University, also known as AMA Computer University (AMACU) or simply AMA, is a private, nonsectarian, for-profit university in Quezon City, Philippines. History AMA Institute of Computer Studies AMA University and its sister school AMA Comp ...
and resident of
Manila Manila, officially the City of Manila, is the Capital of the Philippines, capital and second-most populous city of the Philippines after Quezon City, with a population of 1,846,513 people in 2020. Located on the eastern shore of Manila Bay on ...
,
Philippines The Philippines, officially the Republic of the Philippines, is an Archipelagic state, archipelagic country in Southeast Asia. Located in the western Pacific Ocean, it consists of List of islands of the Philippines, 7,641 islands, with a tot ...
, created the
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
. Because there were no laws in the Philippines against making malware at the time of its creation, the
Philippine Congress The Congress of the Philippines () is the legislature of the national government of the Philippines. It is bicameral, composed of an upper body, the Senate, and a lower body, the House of Representatives, although colloquially, the term "Congre ...
enacted Republic Act No. 8792, otherwise known as the E-Commerce Law, in July 2000 to discourage future iterations of such activity. However, the
Constitution of the Philippines The Constitution of the Philippines (Filipino language, Filipino: ''Saligang Batas ng Pilipinas'' or ''Konstitusyon ng Pilipinas'') is the Constitution, supreme law of the Philippines. Its final draft was completed by the Philippine Constitution ...
prohibits ''ex post facto'' laws, and as such de Guzman could not be prosecuted.


Background

The ILOVEYOU worm was coded by Onel de Guzman, then a student at
AMA Computer College AMA University, also known as AMA Computer University (AMACU) or simply AMA, is a private, nonsectarian, for-profit university in Quezon City, Philippines. History AMA Institute of Computer Studies AMA University and its sister school AMA Comp ...
of the Philippines. At the time of its creation, de Guzman was poor and struggling to pay for the country's
dial-up internet access Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telepho ...
. De Guzman believed that internet access was a human right, and submitted an undergraduate
thesis A thesis (: theses), or dissertation (abbreviated diss.), is a document submitted in support of candidature for an academic degree or professional qualification presenting the author's research and findings.International Standard ISO 7144: D ...
to the college which proposed the development of a
trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * '' Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 18 ...
to steal internet login details. He claimed that this would allow users to be able to afford an internet connection, arguing that those affected by it would experience no loss. The proposal was rejected by the college, which remarked that his proposal was "illegal" and that "they did not produce burglars". This led de Guzman to claim that his professors were closed-minded, and he ultimately dropped out of the college and began development of the worm.


Architecture

De Guzman wrote ILOVEYOU in
VBScript VBScript (Microsoft Visual Basic Scripting Edition) is a deprecated programming language for scripting on Microsoft Windows using Component Object Model (COM), based on classic Visual Basic and Active Scripting. It was popular with system admi ...
, and the
Windows Script Host The Microsoft Windows Script Host (WSH) (formerly named Windows Scripting Host) is an automation technology for Microsoft Windows operating systems that provides scripting abilities comparable to batch files, but with a wider range of supported fe ...
is utilized to run the code. ILOVEYOU was distributed through malicious
email attachment An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images. ...
s. The worm was found in emails with the subject "ILOVEYOU" and a message of "Kindly check the attached love letter from me!" The attachment LOVE-LETTER-FOR-YOU.TXT.vbs contained the worm. Upon opening the file, the worm copies itself into relevant directories so it will be run upon
reboot In computing, rebooting is the process by which a running computer system is restarted, either intentionally or unintentionally. Reboots can be either a cold reboot (alternatively known as a hard reboot) in which the power to the system is physi ...
of the computer. Two of the three copies masquerade as legitimate
Microsoft Windows library files The Microsoft Windows operating system and Microsoft Windows SDK support a collection of shared libraries that software can use to access the Windows API. This article provides an overview of the core libraries that are included with every mode ...
, named MSKernel32.vbs and Win32DLL.vbs. The other copy retains the original LOVE-LETTER-FOR-YOU.TXT.vbs name.Bishop, Matt. (2000). Analysis of the ILOVEYOU Worm. The worm attempts to download a
trojan horse In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
named WIN-BUGSFIX.exe. To achieve this, the victim's
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were u ...
homepage is set to a URL that downloads the trojan upon opening the browser. If the download is successful, the trojan is set to run upon reboot and the Internet Explorer homepage is set to a
blank page "Blank Page" is a song recorded by American singer-songwriter Christina Aguilera, taken from her seventh studio album, '' Lotus'' (2012). It was written by Aguilera, Chris Braide and Sia, with production done by Braide. Aguilera had worked wit ...
. The trojan fulfils Guzman's primary aim by stealing passwords. The worm sends its trademark email to all contacts in the victim's address book. To prevent multiple emails being sent to one person from each successive run of the worm, a registry key is generated for each address book entry once an email has been sent. The worm will only send an email if the registry key is not present. This also allows for emails to be sent to new contacts placed in the address book. ILOVEYOU also has the capability to spread via
Internet Relay Chat IRC (Internet Relay Chat) is a text-based chat system for instant messaging. IRC is designed for Many-to-many, group communication in discussion forums, called ''#Channels, channels'', but also allows one-on-one communication via instant mess ...
channels. The worm searches connected drives for files to modify. All VBScript files it finds (.vbs, .vbe) are overwritten with the worm's code. Files with extensions .jpg, .jpeg, .js, .jse, .css, .wsh, .sct, .doc and .hta are replaced with copies of the worm that have the same base file name but appended with the .vbs extension. Copies for
.mp2 MP2 (formally MPEG-1 Audio Layer II or MPEG-2 Audio Layer II, sometimes incorrectly called Musicam) is a lossy audio compression format. It is standardised as one of the three audio codecs of MPEG-1 alongside MPEG-1 Audio Layer I (MP1) and MPEG- ...
and .mp3 files are similarly produced, but the original files are hidden instead of removed.


Deceptive methods

The email format is considered to be one of the first examples of malware using social engineering, by encouraging victims to open the attached file under the pretext they had a lover who was attempting to contact them. This was exacerbated by the fact that emails appeared to come from close contacts as a result of the worm's use of its previous victim's contact lists. The worm's subsequent success has resulted in the use of social engineering in many modern-day malware attacks. The attachment exploited a feature of
Microsoft Outlook Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites. Primarily popular as an email client for businesses, Outlook also includes functions such as Calendari ...
where only one
file extension File or filing may refer to: Mechanical tools and processes * File (tool), a tool used to remove fine amounts of material from a workpiece. ** Filing (metalworking), a material removal process in manufacturing ** Nail file, a tool used to gen ...
would be displayed. As the file name was parsed from left to right, which would be stopped after the first period, to victims the attachment would appear to be an inconspicuous .txt file incapable of holding malware. The worm's real .vbs extension was hidden. De Guzman also claimed that a bug in
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft and the first of its Windows 9x family of operating systems, released to manufacturing on July 14, 1995, and generally to retail on August 24, 1995. Windows 95 merged ...
, where code in email attachments was automatically run upon being clicked, contributed to the worm's success.


Variants

The fact that the worm was written in VBScript allowed users to modify it. A user could easily change the worm to replace essential files and destroy the system, allowing more than 25 variations of ILOVEYOU to spread across the Internet, each doing different kinds of damage. Most of the variations had to do with what file extensions were affected by the worm. Others modified the email subject to target a specific audience, like the variant "" ("postcard") in Italian or "BabyPic" for adults. Some others only changed the credits to the author, which were initially included in the standard version of the virus, removing them entirely or referencing false authors. Others overwrote "
EXE Exe or EXE may refer to: * .exe, a file extension * exe., abbreviation for Executive (disambiguation)#Role, title, or function, executive Places * River Exe, in England * Exe Estuary, in England * Exe Island, in Exeter, England Transportation a ...
" and "
COM Com or COM may refer to: Computing * COM (hardware interface), a serial port interface on IBM PC-compatible computers * COM file, or .com file, short for "command", a file extension for an executable file in MS-DOS * .com, an Internet top-level ...
" files, and the user's computer would then be unbootable upon restarting. Some mail messages sent by ILOVEYOU include: * VIRUS ALERT!! * Important! Read Carefully!!


Spread

Originally designing the worm to only work in
Manila Manila, officially the City of Manila, is the Capital of the Philippines, capital and second-most populous city of the Philippines after Quezon City, with a population of 1,846,513 people in 2020. Located on the eastern shore of Manila Bay on ...
, De Guzman removed this geographic restriction out of curiosity, which allowed the worm to spread worldwide. De Guzman did not expect this worldwide spread. The worm originated in the
Pandacan Pandacan is a district in Manila, Philippines, which is known in recent history as the former site of the Pandacan oil depot, Pandacan Oil Depot which supplied the majority of oil exports in the country. Etymology Pandacan is a corrupted term ...
neighborhood of Manila in the Philippines on 4 May 2000, thereafter moving westward through corporate email systems as employees began their workday that Friday morning moving first to
Hong Kong Hong Kong)., Legally Hong Kong, China in international treaties and organizations. is a special administrative region of China. With 7.5 million residents in a territory, Hong Kong is the fourth most densely populated region in the wor ...
, then to
Europe Europe is a continent located entirely in the Northern Hemisphere and mostly in the Eastern Hemisphere. It is bordered by the Arctic Ocean to the north, the Atlantic Ocean to the west, the Mediterranean Sea to the south, and Asia to the east ...
, and finally the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
. Because the worm used mailing lists as its source of targets, the messages often appeared to come from acquaintances and were therefore often regarded as "safe" by their victims, providing further incentive to open them. Only a few users at each site had to access the attachment to generate millions more messages that crippled mail systems and overwrote millions of files on computers in each successive
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
.


Impact

The outbreak was estimated to have caused US$5.5–8.7 billion in damages worldwide, and estimated to cost US$10–15 billion to remove the worm. Within ten days, over fifty million infections had been reported, and it is estimated that 10% of Internet-connected computers in the world had been affected. Damage cited was mostly the time and effort spent getting rid of the infection and recovering files from backups. At the time, it was one of the world's most destructive computer related disasters ever.


Europe

In the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
, the worm reached the email servers of the
House of Commons The House of Commons is the name for the elected lower house of the Bicameralism, bicameral parliaments of the United Kingdom and Canada. In both of these countries, the Commons holds much more legislative power than the nominally upper house of ...
on 4 May. The servers were shut down for two hours in response. The worm affected the banking system of
Belgium Belgium, officially the Kingdom of Belgium, is a country in Northwestern Europe. Situated in a coastal lowland region known as the Low Countries, it is bordered by the Netherlands to the north, Germany to the east, Luxembourg to the southeas ...
.


United States

The worm affected most federal
government agencies A government agency or state agency, sometimes an appointed commission, is a permanent or semi-permanent organization in the machinery of government (bureaucracy) that is responsible for the oversight and administration of specific functions, ...
and caused disruption to multiple, including the
Department of Justice A justice ministry, ministry of justice, or department of justice, is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
, the
Department of Labor A ministry of labour (''British English, UK''), or labor (''American English, US''), also known as a department of labour, or labor, is a government department responsible for setting labour standards, labour dispute mechanisms, employment, workfor ...
and the
Social Security Administration The United States Social Security Administration (SSA) is an Independent agencies of the United States government, independent agency of the Federal government of the United States, U.S. federal government that administers Social Security (United ...
. Operations of the
Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
were significantly obstructed, with the
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
additionally affected and the
United States Army The United States Army (USA) is the primary Land warfare, land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of th ...
having 2258 infected
workstations A workstation is a special computer designed for technical or scientific applications. Intended primarily to be used by a single user, they are commonly connected to a local area network and run multi-user operating systems. The term ''workstat ...
which cost approximately US$79,200 to recover. The
Veterans Health Administration The Veterans Health Administration (VHA) is the component of the United States Department of Veterans Affairs (VA) led by the Under Secretary of Veterans Affairs for Health that implements the healthcare program of the VA through a Nationali ...
received 7,000,000 ILOVEYOU emails during the outbreak, requiring 240 man-hours of work to resolve the problems created. Files at the
National Aeronautics and Space Administration The National Aeronautics and Space Administration (NASA ) is an independent agency of the US federal government responsible for the United States's civil space program, aeronautics research and space research. Established in 1958, it su ...
were damaged, and in some cases unrecoverable from
backup In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "wikt:back ...
s.


Cultural impact

The events inspired the song "E-mail" on the
Pet Shop Boys Pet Shop Boys are an English synth-pop duo formed in London in 1981. Consisting of vocalist Neil Tennant and keyboardist Chris Lowe, they have sold more than 100 million records worldwide and were listed as the most successful duo in UK music h ...
' UK top-ten album of 2002, ''
Release Release may refer to: * Art release, the public distribution of an artistic production, such as a film, album, or song * Legal release, a legal instrument * News release, a communication directed at the news media * Release (ISUP), a code to i ...
'', the lyrics of which play thematically on the human desires which enabled the mass destruction of this computer infection. "I love you ev.eng exhibited in July 2006 is a revamped and expanded version of an exhibition shown in June 2002 in the Museum for Applied Art in Frankfurt, in February 2003 at
transmediale Transmediale, stylised as transmediale, is an annual festival for art and digital culture in Berlin, usually held over three to five days at the end of January and the beginning of February. transmediale takes the form of a conference (sometime ...
in Berlin, in August 2004 at the Watson Institute of the Brown University USA and in October 2004 at the Museum for Communication Copenhagen, Denmark. In 2009, Kiat Kiat Projects curated an email exhibition entitled "How to Prevent Hair Loss" inspired by ILOVEYOU. The worm inspired the 2011 movie Subject: I Love You starring Jericho Rosales and Briana Evigan. In 2019,
The Persistence of Chaos ''The Persistence of Chaos'' is a work of art consisting of a laptop that contains six computer viruses, worms, and pieces of malware that have caused major damage. The artwork was created in 2019 by artist Guo O Dong and the collective MSCHF, an ...
, a laptop infected with six viruses including ILOVEYOU was sold at auction by Chinese artist Guo O Dong. In November 2024, The Museum of Malware Art in Helsinki, Finland included a sculpture about ILOVEYOU.


Investigation

On 5 May 2000, de Guzman and another young Filipino programmer named Reonel Ramones became targets of a
criminal investigation Criminal investigation is an applied science that involves the study of facts that are then used to inform criminal trials. A complete criminal investigation can include Search and seizure, searching, interviews, interrogations, Evidence (law), ...
by agents of the Philippines' National Bureau of Investigation (NBI). Local
Internet service provider An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, no ...
Sky Internet had reported receiving numerous contacts from European computer users alleging that malware (in the form of the "ILOVEYOU" worm) had been sent via the ISP's servers. De Guzman attempted to hide the evidence by removing his computer from his apartment, but he accidentally left some disks behind that contained the worm, as well as information that implicated a possible co-conspirator. After surveillance and investigation by Darwin Bawasanta of Sky Internet, the NBI traced a frequently appearing telephone number to Ramones' apartment in Manila. His residence was searched and Ramones was arrested and placed under investigation by the
Department of Justice A justice ministry, ministry of justice, or department of justice, is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
(DOJ). De Guzman was also charged ''
in absentia ''In Absentia'' is the seventh studio album by British progressive rock band Porcupine Tree, first released on 24 September 2002. The album marked several changes for the band, with it being the first with new drummer Gavin Harrison and the f ...
''. At that point, the NBI was unsure of what felony or crime would apply. It was suggested they be charged with violating Republic Act 8484 (the Access Device Regulation Act), a law designed mainly to penalize
credit card fraud Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The P ...
, since both used pre-paid (if not stolen) Internet cards to purchase access to ISPs. Another idea was that they could be charged with malicious
mischief Mischief (or malicious mischief) is the name for a class of criminal offenses that are defined differently in different legal jurisdictions. While the wrongful acts will often involve what is popularly described as vandalism, there can be a lega ...
, a felony (under the Philippines Revised Penal Code of 1932) involving damage to property. The drawback here was that one of its elements, aside from damage to property, was intent to damage, and de Guzman had claimed during custodial investigations that he might have unwittingly released the worm. At a press conference organized by his lawyer on 11 May, he said "It is possible" when asked whether he might have done so. To show intent, the NBI investigated
AMA Computer College AMA University, also known as AMA Computer University (AMACU) or simply AMA, is a private, nonsectarian, for-profit university in Quezon City, Philippines. History AMA Institute of Computer Studies AMA University and its sister school AMA Comp ...
, where de Guzman had dropped out at the very end of his final year.


Aftermath

Since there were no laws in the Philippines against writing malware at the time, both Ramones and de Guzman were released, with all charges dropped by state prosecutors. To address this legislative deficiency, the Philippine Congress enacted Republic Act No. 8792, otherwise known as the E-Commerce Law, in July 2000, months after the worm outbreak. In 2012, the
Smithsonian Institution The Smithsonian Institution ( ), or simply the Smithsonian, is a group of museums, Education center, education and Research institute, research centers, created by the Federal government of the United States, U.S. government "for the increase a ...
named ILOVEYOU one of the top ten most virulent computer viruses in history. De Guzman did not want public attention. His last known public appearance was at the 2000 press conference, where he obscured his face and allowed his lawyer to answer most questions; his whereabouts remained unknown for 20 years afterward. In May 2020, investigative journalist Geoff White revealed that while researching his cybercrime book ''Crime Dot Com'', he had found de Guzman working at a mobile phone repair stall in Manila. De Guzman admitted to creating and releasing the virus. He claimed he had initially developed it to steal internet access passwords, since he could not afford to pay for access. He also stated that he created it alone, clearing the two others who had been accused of co-writing the worm.


See also

*
Christmas Tree EXEC Christmas Tree EXEC was the first widely disruptive computer worm, which paralyzed several international computer networks in December 1987. The virus ran on the IBM VM/CMS operating system. Written by a student at the Clausthal University of ...
* Code Red worm *
Computer virus A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and Code injection, inserting its own Computer language, code into those programs. If this replication succeeds, the affected areas ...
* NewLove *
Nimda The Nimda virus is a malicious file-infecting computer worm. The first released advisory about this threat (worm) was released on September 18, 2001. Nimda affected both user workstations ( clients) running Windows 95, 98, NT, 2000, or XP an ...
*
Timeline of notable computer viruses and worms This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events. 1960s * John von Neumann's article on the "Theory of ...
*
The Persistence of Chaos ''The Persistence of Chaos'' is a work of art consisting of a laptop that contains six computer viruses, worms, and pieces of malware that have caused major damage. The artwork was created in 2019 by artist Guo O Dong and the collective MSCHF, an ...
(artwork)


References


External links


The Love Bug - A RetrospectILOVEYOU Virus Lessons Learned Report, Army Forces Command
(archive)
Radsoft: The ILOVEYOU Roundup

No 'sorry' from Love Bug author
at ''
The Register ''The Register'' (often also called El Reg) is a British Technology journalism, technology news website co-founded in 1994 by Mike Magee (journalist), Mike Magee and John Lettice. The online newspaper's Nameplate_(publishing), masthead Logo, s ...
''
CERT Advisory CA-2000-04 Love Letter Worm
(archive) {{Hacking in the 2000s Computer worms Email worms Communications in the Philippines 2000 in the Philippines Hacking in the 2000s 2000 introductions Controversies in the Philippines