It has been 20 years since cybercrims woke up to social engineering with an intriguing little email titled 'ILOVEYOU'

Hahaha, we were pretty gullible

Twenty years have passed since cybercrooks demonstrated the role exploiting human psychology could play in spreading malware. Remember "ILOVEYOU"?

Back in 2000, Windows XP had yet to be a thing (and it would take until 2004 for Microsoft to plug its more gaping security holes with Service Pack 2) and the computing world was a generally more innocent place.

Windows and Office apps would cheerfully conceal the extensions of known file types and not warn that something might happen upon opening an attachment in an email. Visual BASIC scripting reigned supreme in the Microsoft world.

It was therefore sadly inevitable that somebody would do something naughty. Enter "ILOVEYOU".

The worm was a gloriously simple thing. An email was sent to a user with the subject ILOVEYOU (or similar) and some text exhorting the victim to open the attachment in order to see those words of affection. The attachment was a Visual BASIC script file, although the .vbs extension was not visible because, heck, it was a known file type.

The simple script would use the victim's address book (thanks to Windows of the era being marginally less secure than a tissue-paper teabag) to email itself onwards while also inflicting varying levels of damage to their computer, depending on the variant. Some would do little more than cause embarrassment while others would rename files to the point where a PC could be left unbootable.

Being Visual BASIC Script, it was simple for evil-doers to modify the malware to do all manner of unmentionable things.

While not the first worm to cause a headache for computer users (the Melissa macro virus of the previous year did naughty things with a malware-laden Word document), it was the first to truly demonstrate the potential role of social engineering online.

The worm itself originated in the Philippines on 4 May 2000 before spreading through email systems over the next 24 hours and eventually infecting a substantial portion of the world's internet-connected computers. Purging systems and restoring backups proved an expensive headache for administrators still recovering from the Y2K hangover.

Unlike the creator of the Melissa virus, the makers of ILOVEYOU were eventually released by the Philippines authorities without charge. Laws were subsequently tightened in the country.

While the worm did not result in wealth being showered over its creators (one, Onel de Guzman, could recently be found working in a mobile phone repair shop in Manila), it did change the cybercrime landscape: for perpetrators, for those charged with fending off miscreants and for those tasked with educating users on what not to open.

The social engineering aspect of the attack persists, with ever more sophisticated phishing scams encouraging users to click things they really shouldn't and stick credentials in places they will come to regret.

Jens Monrad, head of Mandiant Threat Intelligence in EMEA for FireEye, told The Register: "The year 2000 brought changes to the malware writing and cybercrime ecosystem, with releases of malware that could be used to carry out disruption attacks against government websites and use infected computers in online ad schemes."

However, it would be a few years after the arrival of ILOVEYOU that the likes of "ZeuS" (in 2007) and "Gozi" turned up with designs on monetising outbreaks and stealing banking information rather than simply "generating noise", as Monrad put it.

In recent times criminals have been exploiting public worries about COVID-19 via social engineering. SonicWall recently reported the discovery of a phishing email that included a Word file entitled "COVID-19".


IHATEYOU Virus sweeps through BOFH Land


Targeting Chrome (and Chromium), this variant will attempt to siphon a user's banking details.

SonicWall's 2020 Threat Report noted a 52 per cent year-on-year increase in these types of attacks and the company's VP for EMEA, Terry Greer-King, noted: "Cyber-criminals do their utmost to take advantage of trying times by tricking users into opening dangerous files, through what they consider to be trusted sources."

"Today," Monrad said, "malware plays a vital role in the cyber-criminal ecosystem, and while ILOVEYOU was not designed to make the creators any money, the social engineering method of trying to lure users into clicking on a link or opening an attachment is probably ILOVEYOU's most significant legacy." ®

Similar topics

Narrower topics

Other stories you might like

  • HelloXD ransomware bulked up with better encryption, nastier payload
    Russian-based group doubles the extortion by exfiltrating the corporate data before encrypting it.

    Windows and Linux systems are coming under attack by new variants of the HelloXD ransomware that includes stronger encryption, improved obfuscation and an additional payload that enables threat groups to modify compromised systems, exfiltrate files and execute commands.

    The new capabilities make the ransomware, first detected in November 2021 - and the developer behind it even more dangerous - according to researchers with Palo Alto Networks' Unit 42 threat intelligence group. Unit 42 said the HelloXD ransomware family is in its initial stages but it's working to track down the author.

    "While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k," the researchers wrote in a blog post.

    Continue reading
  • Symbiote Linux malware spotted – and infections are 'very hard to detect'
    Performing live forensics on hijacked machine may not turn anything up, warn researchers

    Intezer security researcher Joakim Kennedy and the BlackBerry Threat Research and Intelligence Team have analyzed an unusual piece of Linux malware they say is unlike most seen before - it isn't a standalone executable file.

    Dubbed Symbiote, the badware instead hijacks the environment variable (LD_PRELOAD) the dynamic linker uses to load a shared object library and soon infects every single running process.

    The Intezer/BlackBerry team discovered Symbiote in November 2021, and said it appeared to have been written to target financial institutions in Latin America. Analysis of the Symbiote malware and its behavior suggest it may have been developed in Brazil. 

    Continue reading
  • Now Windows Follina zero-day exploited to infect PCs with Qbot
    Data-stealing malware also paired with Black Basta ransomware gang

    Miscreants are reportedly exploiting the recently disclosed critical Windows Follina zero-day flaw to infect PCs with Qbot, thus aggressively expanding their reach.

    The bot's operators are also working with the Black Basta gang to spread ransomware in yet another partnership in the underground world of cyber-crime, it is claimed.

    This combination of Follina exploitation and its use to extort organizations makes the malware an even larger threat for enterprises. Qbot started off as a software nasty that raided people's online bank accounts, and evolved to snoop on user keystrokes and steal sensitive information from machines. It can also deliver other malware payloads, such as backdoors and ransomware, onto infected Windows systems, and forms a remote-controllable botnet.

    Continue reading
  • Chinese-sponsored gang Gallium upgrades to sneaky PingPull RAT
    Broadens targets from telecoms to finance and government orgs

    The Gallium group, believed to be a Chinese state-sponsored team, is going on the warpath with an upgraded remote access trojan (RAT) that threat hunters say is difficult to detect.

    The deployment of this "PingPull" RAT comes as the gang is broadening the types of organizations in its sights from telecommunications companies to financial services firms and government entities across Asia, Southeast Asia, Europe and Africa, according to researchers with Palo Alto Networks' Unit 42 threat intelligence group.

    The backdoor, once in a compromised system, comes in three variants, each of which can communicate with the command-and-control (C2) system in one of three protocols: ICMP, HTTPS and raw TCP. All three PingPull variants have the same functionality, but each creates a custom string of code that it sends to the C2 server, which will use the unique string to identify the compromised system.

    Continue reading

Biting the hand that feeds IT © 1998–2022