Feeds

Traumatised email servers mark Love Bug anniversary

Six years ago today

5 things you didn’t know about cloud backup

Thursday 4 May marks the sixth anniversary of the spread of the infamous Love Bug (AKA ILOVEYOU) worm, a mass mailer that infected numerous Windows computers worldwide. Even those not infected directly found their email inboxes filed with junk, an experience that was to be repeated several times over subsequent years.

The Love Bug worm tricked users into thinking they'd received a message from a secret admirer. But if the attachment was opened on a Windows PC, the worm would leave it infected while forwarding copies of itself to email addresses harvested from compromised PCs. The suspected author of the worm, Filipino student Onel de Guzman, was arrested but escaped prosecution because of a lack of relevant laws. Laws designed to combat computer misuse in the Philippines were only introduced in June 2000 and weren't backdated, allowing de Guzman to avoid trial.

The worm used VBScripts to spread, popularising a technique that was then comparatively rare. Security experts attributed its success in spreading to its use of a love bait as an enticement, which proved to be a powerful psychological draw to bored office workers and consumers. The worm was first spotted on 3 May 2000, but its spread didn't begin in earnest until the following day, 4 May 2000.

Much has changed in the malware landscape over the intervening six years, according to UK-based net security firm Sophos. The Love Bug, and the less prolific but still virulent Melissa worm that preceded it, heralded the hay-day of mass-mailing worms that relied on social engineering to spread such attacks are now rare. Targeted Trojan and spyware attacks now represent a far greater security challenge.

In 2001, 21 per cent of all threats discovered by Sophos were Trojan horses. By April 2006 this figure had shot up to 86 per cent as hackers used Trojan horses to download malicious code, spy on users, steal information, or seize control of infected PCs. The Love Bug was conceived as a means of stealing internet connection passwords in order to give its creators cheap access to the net, making it something of a forerunner to today's menaces.

The Love Bug popularised the use of social engineering tricks to spread email worms by tricking users into double-clicking on malicious attachments. For example, the Anna Kournikova worm posed as pictures of the Russian tennis pin-up. Other malware strains offered infected files supposedly connected to Britney Spears, Paris Hilton and Jennifer Lopez.

Sophos experts say financially-motivated hackers now prefer to use Trojan horses rather than mass-mailing worms because there's a greater pay off in avoiding the public attention a major outbreak brings. Publicity about a viral epidemic tends to make users more wary, while creating a motive for police to apply more resources towards identifying culprits, an outcome cyberciminals are keen to avoid. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.