|Type||Multiple vector worm|
|Place of Origin||Makati, Phillipines|
|Source Language||Visual Basic|
|Reported Costs||$8.75 Billion|
The Loveletter worm, memorable for its "LOVE-LETTER-FOR-YOU" attachment and "ILOVEYOU" subject line, was one of the early worms to gain a great deal of media attention. It was also one of the first to reportedly reach a multi-billion dollar damage toll.
The virus arrives in an email with the subject line of "ILOVEYOU" with an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs" that people were encouraged to open. The message body is "kindly check the attached LOVELETTER coming from me. The sender line will be the address it was sent from. The user must download and execute the worm by clicking on it.
The worm may also come from an infected computer on the same IRC channel using mIRC. The worm will be in an infected HTML document named LOVE-LETTER-FOR-YOU.TXT.HTM downloaded into the IRC downbloads folder. The user must access the .htm file to activate the worm.
Internet Explorer security settings do not allow scripts to access disk files and will display a warning when they try to. To work around this, the worm displays a message telling the user to give ActiveX control to the .htm file. If the user clocks on "Yes", the worm will infect the system. If the user clicks on "No", the worm reloads the message in an infinite loop until the user clicks on "Yes" to allow it to infect the system.
When the worm is executed, it copies itself as the files LOVE-LETTER-FOR-YOU.TXT.VBS and MSKERNEL32.VBS in the Windows_system_folder and WIN32DLL.VBS in the Windows directory. It creates its own key named MSKernel32 under the Local machine registry key that causes programs to run and adds the value MSKERNEL32.VBS to it. It also create a new Local Machine RunServices key named Win32DLL and adds WIN32DLL.VBS as a value to it, so it will run when the system boots, before the user even logs on.
The worm sets the Internet Explorer start page to one of four randomly chosen webpages so that it downloads the file WIN-BUGSFIX.EXE, a trojan. It then adds a registry key for it in the same manner that it registered its own files, so it will run at startup. After the WIN-BUGSFIX.EXE program has been run, it copies itself to the Windows system folder as WinFAT32.EXE, and replaces the WIN-BUGSFIX.EXE registry key with one for itself. This file obtains the system's logins, passwords, machine name, IP address, RAS information and some other information about the computer and sends it to email@example.com.
Loveletter searches for files to modify, mostly by replacing those files with a copy of itself. If the file has a .vbs or .vbe extension, it will simply overwrite the files. If they have the extensions js, jse, css, wsh, sct, or hta, it will overwrite the file as well as the extension, changing it to .vbs, but retaining the original name (program.js becomes program.vbs). For .jpg or .jpeg files, it overwrites them, retains the original file name and extension, but adds .vbs to the extension (picture.jpg becomes picture.jpg.vbs). Mp3 and mp2 files are not overwritten, but rather hidden.
Loveletter opens the Outlook email program, and scans for email addresses in the Address book. It sends the email with an attached copy of itself
The worm scans for the files mirc32.exe, mlink32.exe, mirc.ini, script.ini and mirc.hlp. If it finds one or more of these files, it will generate a new script.ini and place it in the directory where the files are found. The script contains instructions to send the file LOVE-LETTER-FOR-YOU.TXT.HTM to all users on the same IRC channel as well as a comment:
;mIRC Script" ; Please dont edit this script... mIRC will corrupt, if mIRC will ; corrupt... WINDOWS will affect and will not run correctly. thanks" ; ;Khaled Mardam-Bey ;http://www.mirc.com
There were several variants of this worm shortly following the original. Loveletter being a script worm, variants were relatively easy to create as the source code was the worm itself. Most are unremarkable, usually with a few changes to the text, if even that.
The B variant was modified in Lithuania, and the subject field of the sent e-mail messages is "Susitikim shi vakara kavos puodukui...", which is Lithuanian and means "Let's meet this evening for a cup of coffee..."
Loveletter.CN carries a copy of a CIH variant. It attempts to entice the user with a naked picture of Jennifer Lopez on a beach. It overwrites files with the extensions VBS, VBE, JS, JSE, WSH, HTA, JPG, JPEG, MP2, MP3, SCT and CSS. Files with extensions of CSS, HTA, JS, JSE, SCT, and WSH get changed to a VBS. VBS gets added as a second extension to JPG, JPEG, MP2 and MP3 files.
This particular malware caused widespread e-mail outages. More than 45 million computers around the globe have supposedly been infected by various strains of the worm. The types of industries affected include stock brokerages, food companies, media, auto and technology giants, as well as government agencies, universities and medical institutions worldwide. The Ford Motor Company shut off its email system after being hit hard by the worm (General Motors was not directly affected by the worm, as they do not use Outlook at that company).
A partial list of others affected by the virus confirmed by CNET News.com were Silicon Graphics, the Department of Defense (including the Pentagon itself), Daimler-Chrysler, The Motion Picture Association of America, the Federal Reserve and Cox Cable. The worm was responsible for a denial-of-service attack on the official White House website. One web start-up reported losing 40 gigabytes of JPEG images. Estimates of the worm's damage are in between $8.75 billion and ten billion.
This worm program was written by Onel A. de Guzman, a student of AMA Computer University in Makati, Philippines. The author of the worm has conceded that he may have released the malware by "accident". The worm was first discovered in Hong Kong.
Carnegie Mellon University Software Engineering Institute, CERT® Advisory CA-2000-04 Love Letter Worm
Kaspersky Labs, I-Worm.LoveLetter
Sharon Gaudin, Internetnews.com "Virus Damage Worst on Record for August". 2003.09.02
Paul A. Greenberg. E-Commerce Times, "'Love' Virus Damage Could Top $1B" 2000.05.05
Marcia Savage. ChannelWeb, Damage From Love Letter Virus Could Top $10 Billion. 2000.05.05
Katrin Tocheva. F-Secure Loveletter.CN 2001.05.31