This player has won the following TBT Scummy Awards:
* TBT Scummy Awards I - Best Overall Mafia Member (won)
* TBT Scummy Awards II - Best Overall Player (nominated)
* TBT Scummy Awards II - Best Mafia Player (nominated)
Attributes | Values |
---|
rdf:type
| |
rdfs:label
| |
rdfs:comment
| - This player has won the following TBT Scummy Awards:
* TBT Scummy Awards I - Best Overall Mafia Member (won)
* TBT Scummy Awards II - Best Overall Player (nominated)
* TBT Scummy Awards II - Best Mafia Player (nominated)
- ILOVEYOU is a worm that arrived in e-mail boxes on May 4, 2000. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system. The worm originated in Manila, Philippines. It had wide-spread distribution, and infected millions of computers. Two aspects of the virus made it effective:
- ILOVEYOU or LOVELETTER was a computer worm that successfully attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. The worm arrived in e-mail boxes on and after May 5, 2000, with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". The final 'vbs' extension was hidden by default, leading unsuspecting users to think it was a mere text file. Upon opening the attachment, the worm sent a copy of itself to everyone in the Windows Address Book and with the user's sender address. It also made a number of malicious changes to the user's system.
|
sameAs
| |
Length
| |
dcterms:subject
| |
coached
| |
usernames
| |
hosted
| |
dbkwik:malware/pro...iPageUsesTemplate
| |
dbkwik:computersec...iPageUsesTemplate
| |
dbkwik:tbtmafia/pr...iPageUsesTemplate
| |
Date
| |
Origin
| |
Platform
| |
Name
| |
Type
| |
dbkwik:itlaw/prope...iPageUsesTemplate
| |
Author
| |
Aliases
| - * Email-Worm.VBS.LoveLetter
* VBS/Generic@MM
* IRC.Worm.gen
* VBS/Lovelet-AY
* VBS/MassMail.gen*
* VBS_GENERIC.001
* MIRC/LoveLetter
* VBS/Loveletter
* VBS/Iloveyou
* VBS.Mailtest.A
* Worm.LoveLetter.AX
* VBS/Loveletter.AQ
* mIRC/LoveLetter.A
|
pl
| |
Title
| |
filetype
| |
Played
| |
playerID
| |
AKA
| - Email-Worm.Win32.LoveLetter
|
Cost
| |
Family
| |
Creator
| |
affectedplatforms
| |
abstract
| - ILOVEYOU is a worm that arrived in e-mail boxes on May 4, 2000. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system. The worm originated in Manila, Philippines. It had wide-spread distribution, and infected millions of computers. Two aspects of the virus made it effective:
* It relied on social engineering to entice users to open the attachment and ensure its continued propagation.
* It exploited the weakness of the email system design that an attached program could be run easily by simply opening the attachment; the underlying mechanism – VBScript – had not been exploited to such a degree previously to direct attention to its potential, thus the necessary layers of protection were not in place yet.
- ILOVEYOU or LOVELETTER was a computer worm that successfully attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. The worm arrived in e-mail boxes on and after May 5, 2000, with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". The final 'vbs' extension was hidden by default, leading unsuspecting users to think it was a mere text file. Upon opening the attachment, the worm sent a copy of itself to everyone in the Windows Address Book and with the user's sender address. It also made a number of malicious changes to the user's system. A hacker in the Philippines, Onel de Guzman, 22 yrs old, unleashed the virus. Four aspects of the worm made it effective:
* It relied on social engineering to entice users to open the attachment and ensure its continued propagation.
* It relied on a flawed Microsoft algorithm for hiding file extensions. Windows had begun hiding extensions by default; the algorithm parsed file names from right to left, stopping at the first 'period' ('dot'). In this way the exploit could insert the second file extension 'TXT' which to the user appeared to be the real extension; text files were presumed to be innocuous.
* It relied on the scripting engine being enabled. This was actually a system setting; the engine had not been known to have been ever used before this; Microsoft received scathing criticism for leaving such a powerful (and dangerous) tool enabled by default with no one the wiser for its existence.
* It exploited the weakness of the email system design that an attached program could be run easily by simply opening the attachment and gain complete access to the file system and the registry.
- This player has won the following TBT Scummy Awards:
* TBT Scummy Awards I - Best Overall Mafia Member (won)
* TBT Scummy Awards II - Best Overall Player (nominated)
* TBT Scummy Awards II - Best Mafia Player (nominated)
|
is Host
of | |