Feeds

Melissa virus author jailed for 20 months

Long time coming

  • alert
  • submit to reddit

The essential guide to IT transformation

The author of the infamous Melissa virus was sentenced today to 20 months in Federal prison for causing millions of dollars of damage through its release into the wild in March 1999.

David L Smith, 33, pleaded guilty to creating the virus in December 1999 - the delay in his sentencing has created consternation in the security community.

Free on bail since then, Smith learned his fate today when Judge Joseph A. Greenaway sent him to prison and imposed a $5,000 fine.

Both sides in the case agreed that damage from Melissa, one of the first email borne viruses that exploited flaws in Microsoft's Outlook client exceeded $80 million, largely by jamming up corporate email systems.

Jack Clark, product marketing manager of the McAfee division of Network Associates, described the sentence as "about right" and expressed hopes that it would act as a deterrent to other would-be virus creators.

"This sends a clear message to other virus creators, who over the last few years, thought they might get way with it," said Clark, who hoped other authorities would look at the US ruling.

Smith released the Melissa virus by deliberately posting an infected document to an alt.sex.usenet newsgroup from a stolen AOL account. The virus, believed to be named after a stripper Smith knew in Florida, forwards itself to the first 50 addresses in all of your accessible Outlook address books.

Companies such as Microsoft, Intel, Lockheed Martin, and Lucent Technologies were forced to shut down their email gateways because of the large amount of email generated by the virus. It also caused the closure of e-mail systems of government agencies in both the US and UK. ®

Related Stories

Justice mysteriously delayed for 'Melissa' author
Melissa programmer freed on bail
Melissa virus threatens to bring email to a halt
AV vendors sell 'blunt razor blades'
Malware by numbers: online virus creation tool spotted
MS security memo a mere gesture
Anna Kournikova virus author stands trial
24 year-old Brit charged with virus writing

5 things you didn’t know about cloud backup

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.