About: ILoveYou   Sponge Permalink

An Entity of Type : dbkwik:resource/uazuHg3wEfJ5Uid5iYR3Jw==, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

This player has won the following TBT Scummy Awards: * TBT Scummy Awards I - Best Overall Mafia Member (won) * TBT Scummy Awards II - Best Overall Player (nominated) * TBT Scummy Awards II - Best Mafia Player (nominated)

AttributesValues
rdf:type
rdfs:label
  • ILoveYou
  • ILOVEYOU
rdfs:comment
  • This player has won the following TBT Scummy Awards: * TBT Scummy Awards I - Best Overall Mafia Member (won) * TBT Scummy Awards II - Best Overall Player (nominated) * TBT Scummy Awards II - Best Mafia Player (nominated)
  • ILOVEYOU is a worm that arrived in e-mail boxes on May 4, 2000. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system. The worm originated in Manila, Philippines. It had wide-spread distribution, and infected millions of computers. Two aspects of the virus made it effective:
  • ILOVEYOU or LOVELETTER was a computer worm that successfully attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. The worm arrived in e-mail boxes on and after May 5, 2000, with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". The final 'vbs' extension was hidden by default, leading unsuspecting users to think it was a mere text file. Upon opening the attachment, the worm sent a copy of itself to everyone in the Windows Address Book and with the user's sender address. It also made a number of malicious changes to the user's system.
sameAs
Length
  • 500000(xsd:integer)
dcterms:subject
coached
  • N/A
usernames
  • iLoveYou
hosted
  • 1(xsd:integer)
dbkwik:malware/pro...iPageUsesTemplate
dbkwik:computersec...iPageUsesTemplate
dbkwik:tbtmafia/pr...iPageUsesTemplate
Date
  • 2000-05-04(xsd:date)
Origin
  • Manila, Philippines
Platform
  • Microsoft Windows
Name
  • ILoveYou
Type
dbkwik:itlaw/prope...iPageUsesTemplate
Author
  • Onel de Guzman
Aliases
  • * Email-Worm.VBS.LoveLetter * VBS/Generic@MM * IRC.Worm.gen * VBS/Lovelet-AY * VBS/MassMail.gen* * VBS_GENERIC.001 * MIRC/LoveLetter * VBS/Loveletter * VBS/Iloveyou * VBS.Mailtest.A * Worm.LoveLetter.AX * VBS/Loveletter.AQ * mIRC/LoveLetter.A
pl
  • VBS
Title
  • iLoveYou
filetype
  • .vbs
Played
  • 10(xsd:integer)
playerID
  • 8166(xsd:integer)
AKA
  • Email-Worm.Win32.LoveLetter
Cost
  • 1.5E10
Family
  • VBS.LoveLetter
Creator
  • Onel A. De Guzman
affectedplatforms
  • Microsoft Windows
abstract
  • ILOVEYOU is a worm that arrived in e-mail boxes on May 4, 2000. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system. The worm originated in Manila, Philippines. It had wide-spread distribution, and infected millions of computers. Two aspects of the virus made it effective: * It relied on social engineering to entice users to open the attachment and ensure its continued propagation. * It exploited the weakness of the email system design that an attached program could be run easily by simply opening the attachment; the underlying mechanism – VBScript – had not been exploited to such a degree previously to direct attention to its potential, thus the necessary layers of protection were not in place yet.
  • ILOVEYOU or LOVELETTER was a computer worm that successfully attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. The worm arrived in e-mail boxes on and after May 5, 2000, with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". The final 'vbs' extension was hidden by default, leading unsuspecting users to think it was a mere text file. Upon opening the attachment, the worm sent a copy of itself to everyone in the Windows Address Book and with the user's sender address. It also made a number of malicious changes to the user's system. A hacker in the Philippines, Onel de Guzman, 22 yrs old, unleashed the virus. Four aspects of the worm made it effective: * It relied on social engineering to entice users to open the attachment and ensure its continued propagation. * It relied on a flawed Microsoft algorithm for hiding file extensions. Windows had begun hiding extensions by default; the algorithm parsed file names from right to left, stopping at the first 'period' ('dot'). In this way the exploit could insert the second file extension 'TXT' which to the user appeared to be the real extension; text files were presumed to be innocuous. * It relied on the scripting engine being enabled. This was actually a system setting; the engine had not been known to have been ever used before this; Microsoft received scathing criticism for leaving such a powerful (and dangerous) tool enabled by default with no one the wiser for its existence. * It exploited the weakness of the email system design that an attached program could be run easily by simply opening the attachment and gain complete access to the file system and the registry.
  • This player has won the following TBT Scummy Awards: * TBT Scummy Awards I - Best Overall Mafia Member (won) * TBT Scummy Awards II - Best Overall Player (nominated) * TBT Scummy Awards II - Best Mafia Player (nominated)
is Host of
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software