Generated by GPT-5-mini| ILOVEYOU (computer worm) | |
|---|---|
![]() | |
| Name | ILOVEYOU |
| Caption | Screenshot of early ILOVEYOU email subject line replication |
| Othernames | Love Bug, LoveLetter |
| Author | Reputed Filipino authors |
| Date | May 2000 |
| Type | Worm; Trojan horse |
| Platform | Microsoft Windows; Microsoft Outlook |
| Language | Visual Basic Scripting Edition |
| Isolation | 2000 |
| Origin | Philippines |
ILOVEYOU (computer worm)
ILOVEYOU was a 2000 malicious computer worm and Trojan horse that rapidly propagated via email and caused widespread disruption to corporate and government computer systems worldwide. Originating in the Philippines, the program exploited features of Microsoft Windows and Microsoft Outlook and used social engineering and scripting to overwrite files and exfiltrate credentials. Its rapid spread prompted responses from Microsoft engineers, national CERTs such as CERT/CC, and international law-enforcement agencies including Interpol and the FBI.
ILOVEYOU emerged amid increasing public awareness of computer security incidents after events such as the Melissa (computer virus) outbreak earlier in 1999 and the proliferation of email as a dominant communication medium. Created using Visual Basic Scripting Edition (VBScript) on Microsoft Windows 98 platforms, the worm disguised itself as a love letter attachment with the subject line "ILOVEYOU", mimicking legitimate messages and leveraging social norms around personal correspondence. The outbreak occurred during a period of rapid corporate internet adoption by firms like Enron, WorldCom, and IBM, and affected systems across industries including finance institutions such as Bank of America and HSBC, as well as government agencies like the United States Department of Defense.
The worm used a crafted Microsoft Outlook message with an attachment named "LOVE-LETTER-FOR-YOU.txt.vbs" that exploited default Windows file extension behaviors and Outlook's address book to self-mail to contacts. Its VBScript payload executed when the user opened the file, overwriting files with extensions like .vbs, .vbe, .js, and .jpeg, and copying itself to Internet Explorer cache locations and network shares. By automating Outlook's address-book APIs, it sent itself to hundreds of contacts per host, enabling exponential spread across corporate networks, universities such as Harvard University and Stanford University, and international organizations including the United Nations and European Commission.
The worm infected millions of machines within hours, causing estimated economic damages ranging from hundreds of millions to billions of US dollars due to lost productivity and recovery costs. Major technology firms including Microsoft, Symantec, and McAfee reported massive detection and remediation efforts; telecommunications providers and email services such as AOL and Yahoo! implemented filtering and blocking. Governments including United States, United Kingdom, Philippines, and Germany experienced outages; corporations such as Sony, British Airways, and BP reported significant disruptions. The incident intensified debate in legislatures like the United States Congress and regulatory bodies such as the Federal Communications Commission over cybersecurity preparedness and responsibilities.
Immediate responses included emergency patches and signature updates from vendors like Symantec and McAfee, advice from national computer emergency response teams such as CERT/CC and GovCERT, and mitigation guidance from Microsoft security teams. Network administrators at universities including Massachusetts Institute of Technology and corporations implemented email quarantines, server shutdowns, and password resets. Law-enforcement coordination involved agencies such as FBI, Interpol, and national police units; international cooperation highlighted challenges in digital forensics, evidence sharing, and cross-border legal frameworks like mutual legal assistance treaties involving states including the Philippines and United States.
Investigations traced the worm’s origin to the Philippines, prompting scrutiny from the National Bureau of Investigation (Philippines) and calls for computer-crime legislation modeled on statutes in countries such as the United States and United Kingdom. The principal suspects included computer programmers in Manila, but prosecutions were hampered by limited Philippine law at the time; subsequent legal reforms were influenced by the case. The affair accelerated adoption of computer-crime statutes in jurisdictions like United States federal law enforcement and spurred legislative efforts in countries including Australia and Canada to strengthen cybercrime penalties and investigative powers.
ILOVEYOU reshaped public and institutional approaches to cybersecurity, catalyzing investments by firms such as IBM and Cisco Systems in secure-email gateways, anti-malware research, and security awareness training modeled on campaigns similar to those from SANS Institute and OWASP. It underscored the dangers of default configuration assumptions in products from Microsoft and prompted user-interface changes and security patches in subsequent versions of Windows and Outlook. The incident influenced academic research at institutions like Stanford University and University of Cambridge in fields such as computer forensics and information security, inspired the growth of commercial antivirus vendors including Kaspersky Lab and Trend Micro, and became a case study in curricula from MIT and Carnegie Mellon University on human factors, social engineering, and the necessity of international legal frameworks for cybercrime response.
Category:Computer worms Category:2000 in computing