Want to make creations as awesome as this one?

Transcript

One of the world's most devastating computer viruses.

CUPID'S OUTBREAK

ILOVEYOU

i. intro

You just arrived at your average 2000's workplace. The date is May 5th, 2000. It's about 10:31 AM. You open your computer to Microsoft Outlook and see an email from your attractive co-worker, with an attachment called "LOVE-LETTER-FOR-YOU.txt" Your heart races as you click open the email and rush to the attachment to.. nothing. You sigh and continue your day. At the end of the day, you clock out and head home. The next day, you log onto your computer to discover that your files are all gone. You've sent the same message to all of your coworkers; you fell victim to a virus. The Lovebug.

A SCENARIO..

II: LIT. REVIEW

The infamous ILOVEYOU/Lovebug virus was behind a geolock on May 4th, 2000. It's creator was a college student who believed that the internet had become too costly for the average person, and originally created the worm to silently steal computer login information like emails and passwords; a type of program called a trojan. This was early work; before it would spread to the globe.

CUPID'S OUTBREAK

II: LIT. REVIEW

ILOVEYOU was one of the earliest widespread pieces of malware, relying on a bug in the Windows 95 software that would allow code to be run directly on a computer from simply clicking on an email attachment. An attachment that could be disguised as anything, even a simple .txt file shrouded in a message of love and peace. The creator decides to write a college thesis about it.

YOUR OFFICE ISN'T SAFE!

HIPO: See Appendices REASONS FOR STUDY:The researcher decided to develop this program because the researcher believes that it will be helpful to a lot of people specially Internet users to get Windows passwords such as Internet Accounts to spend more time on Internet without paying.IMPORTANCE OF THE STUDY The importance of the study is to help other people most especially Windows users. We all know that when we connect to the Internet we spend more time for surfing and reading email only, so when we are spending time we spend a lots of money to pay the accounts for only using a couple of hours. So this program is the main solution, use it to steal and retrieve Internet accounts of the victim's computer.METHODOLOGY TO BE USED:

The Thesis; ILOVEYOU's Spawn

II: LIT. REVIEW

II: LIT. REVIEW

The student decides to make it the topic of their senior thesis. The student states he can create a computer program capable of multiplying itself and stealing a mass amount of internet emails and passwords in a matter of hours. Not because they want to destroy anything, the student just wants to prove that they can do it. The thesis is declined, with the phrases "this is ILLEGAL" and "we do not produce BURGLARS." written along the paper.

THE SENIOR THESIS

How did the lack of cybersecurity knowledge at the time help the virus spread across the globe?

How did the virus spread so efficiently, despite being so simple?

INQUIRY QUESTIONS

II: LIT. REVIEW

The program itself was simple. It utilized a bug in the Windows 95 coding that would allow code to be directly ran on a computer simply by clicking on an email attachment. The virus would then search for connected drives and overwrite several different filetypes, such as .jpeg, .vbs, .vbe, .js, .mp2, .mp3 and more with copies of the virus. The virus was a simple .vbs script, named "LOVELETTER.txt.vbs"

..BUT, HOW DID IT WORK?

II: LIT. REVIEW

Keep in mind that cybersecurity was not very widespread at this time, and computers were seen as a more nerdy thing in popular media. If you recieved an email, you clicked on it. That, and the virus was shrouded in the one thing that everybody wants: Love.The virus' creator used admittedly simple social engineering to spread the virus worldwide, and due to lack of cybersecurity knowledge at the time; it worked. Well.

PEOPLE FELL FOR THAT?

III: Methodology

For my methodology, I chose to make an artistic representation in the form of an interactive representation on the very scenario I used to (hopefully) rope you into this presentation. I carefully picked out some screenshots of the interface that computers affected by the ILOVEYOU virus used at the time and made this. I went with an artistic approach because I didn't know how to jam an entire short story into a slideshow.

MY METHODOLOGY

III: Methodology

The ILOVEYOU virus taught us a lot of valuable things about cybersecurity, like how easily and quickly malware can spread through something as simple as an email. The simple social engineering (Say that five times fast.) of what everybody wants being a simple lie to steal your information became notorious online. The internet wasn't a safe place to look at silly cat photos and send emails for work; it was a mine field of viruses and infections if not used correctly.

HOW DOES IT AFFECT US?

He felt that getting online was almost akin to a human right, a thought almost ahead of it's time.

"It wasn't a virus. It was a trojan. I didn't expect it to get to the US and Europe. I was shocked." De Guzman stated.

III: Methodology

After months of hunting across the globe, authorities were finally able to track down one man accountable for the virus' creation. One man, in a small village in Manila; Onel De Guzman; the man behind Cupid's Outbreak.

WHODUNIT?

III: Methodology

Onel De Guzman did commit what is today considered a crime, yes. But because there were no laws in the Philippines against making malware at the time of its creation, the Philippine Congress enacted Republic Act No. 8792, AKA the E-Commerce Law, in July 2000 to discourage future iterations of such activity. However, the Constitution of the Philippines prohibits ex post facto laws, and as such de Guzman could not be prosecuted.He was off the hook, just barely.

..THAT WAS A CRIME, RIGHT?

IV: CONCLUSION

The ILOVEYOU virus ended up causing over 7.8 billion USD in damaged and corrupted files, and another 6 billion for cleanup of said files. Multiple companies including Ford, AT&T, Microsoft, and even government organizations like the Denmark Parliment, CIA and US Army all had to shut down their Email servers due to the virus' lightning quick spread.

CONCLUSION

IV: CONCLUSION

I think I answered both of my inquiry questions pretty well. The virus spread via hijacking the infected user's Outlook contact book and sending copies of itself to the recipients, using the infected user as a hub to duplicate itself by destroying multiple types of files. The lack of cybersecurity and desperation for love in this era also helped it spread by social engineering. It all leads me to ask; Would you not have clicked on a love letter from your coworker?

CONCLUSION II

SOURCES

  • https://www.techtarget.com/searchsecurity/definition/ILOVEYOU-virus
  • https://www.scmagazine.com/perspective/how-the-iloveyou-worm-exposed-human-beings-as-the-achilles-heel-of-cybersecurity
  • https://usa.kaspersky.com/blog/cybersecurity-history-iloveyou/26869/
  • https://www.youtube.com/watch?v=soZyb6lMx4c
  • https://www.wired.com/story/the-20-year-hunt-for-the-man-behind-the-love-bug-virus/
  • https://www.wired.com/2010/05/0504i-love-you-virus/

THANK YOU!