top of page

๐’๐‚๐ˆ๐„๐๐‚๐„ ๐“๐‡๐‘๐Ž๐–๐๐€๐‚๐Š | ๐—ง๐—ต๐—ฒ ๐—ถ๐—ป๐—ณ๐—ฎ๐—บ๐—ผ๐˜‚๐˜€ ๐—œ๐—Ÿ๐—ข๐—ฉ๐—˜๐—ฌ๐—ข๐—จ ๐˜ƒ๐—ถ๐—ฟ๐˜‚๐˜€: ๐—” ๐—น๐—ผ๐˜ƒ๐—ฒ ๐˜€๐˜๐—ผ๐—ฟ๐˜† ๐—ด๐—ผ๐—ป๐—ฒ ๐˜„๐—ฟ๐—ผ๐—ป๐—ด

  • Writer: theoraclejourn
    theoraclejourn
  • Mar 9
  • 3 min read

Report by Ellyza Jane Gutierrez | Graphics by Angel Chogyomon | Layout by Jayane Leslie Feliciano


'Tis the season of love, a perfect time to look back on the lawbreaking "LOVE" so dangerous and contagious it once took over the whole world.


It is the year 2000, you are on your computer. If it were as advanced you would have been scrolling through Facebook or watching YouTube videos, but the internet was basically in its infancy stage around this time, so let's just imagine you're on AOL, trying to shoot your shot with a crush when suddenly, your receive an e-mail with the subject line "ILOVEYOU." Giddy as can be, you opened the email without forethought, and in it, you see the message, "Kindly check the attached love letter from me!" followed by an attachment with the filename:


๐™ป๐™พ๐š…๐™ด-๐™ป๐™ด๐šƒ๐šƒ๐™ด๐š-๐™ต๐™พ๐š-๐šˆ๐™พ๐š„.๐šƒ๐š‡๐šƒ.๐šŸ๐š‹๐šœ


Daydreaming a romantic turn in your life, you clicked the file without forethought, and congrats!! You got the ILOVEYOU virus!!! As of the moment, a worm is crawling through your system and is on its way to wreak havoc on your personal computer. Before you even know it, your PC is already infected. Good luck saving your files, because if they are nowhere to be found, chances are the worm is sneakily hiding them from you or has deleted them already.


In the year 2000, a computer worm widely known as the ILOVEYOU virus had infected over ten million Windows personal computers from across the globe, causing damages worth billions of dollars. The worm, disguised as an unassuming love letter, works by making copies of itself and hiding them as system files that will run automatically as the computer restarts. It then downloads a malware to steal the victims' passwords, damages system files, then automatically sends itself to everyone in the victim's email contacts.


The mastermind behind the ILOVEYOU virusโ€”a Filipino guy named Onel de Guzman, who was then a computer science student at AMA Computer College. As absurd as it sounds, it all started as an undergraduate thesis. De Guzman proposed the development of a trojan to steal internet login details, claiming that this would allow users to have an internet connection. He believed that internet access was a human right, coming from the fact that he was poor and struggling to pay for it at the time. Expectedly, the proposal was rejected, considering it is outright illegal. De Guzman went with it anyway and started developing the worm after dropping out of college.


โ€“ โ€“ โ€“ โ€“ โ€“ โ€“ โ€“ โ€“

๐˜๐˜ถ๐˜ฏ ๐˜ง๐˜ข๐˜ค๐˜ต, ๐˜ข๐˜ญ๐˜ต๐˜ฉ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ช๐˜ต ๐˜ธ๐˜ข๐˜ด ๐˜ฅ๐˜ถ๐˜ฃ๐˜ฃ๐˜ฆ๐˜ฅ ๐˜ข๐˜ด ๐˜ต๐˜ฉ๐˜ฆ "๐˜๐˜“๐˜–๐˜๐˜Œ๐˜ ๐˜–๐˜œ ๐˜ท๐˜ช๐˜ณ๐˜ถ๐˜ด," ๐˜ช๐˜ต ๐˜ช๐˜ด ๐˜ฏ๐˜ฐ๐˜ต ๐˜ข ๐˜ท๐˜ช๐˜ณ๐˜ถ๐˜ด ๐˜ฃ๐˜ถ๐˜ต ๐˜ณ๐˜ข๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜ข ๐˜ธ๐˜ฐ๐˜ณ๐˜ฎ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ธ๐˜ฐ ๐˜ฅ๐˜ช๐˜ง๐˜ง๐˜ฆ๐˜ณ ๐˜ด๐˜ช๐˜จ๐˜ฏ๐˜ช๐˜ง๐˜ช๐˜ค๐˜ข๐˜ฏ๐˜ต๐˜ญ๐˜บ. ๐˜ˆ ๐˜ธ๐˜ฐ๐˜ณ๐˜ฎ ๐˜ช๐˜ด ๐˜ข ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ-๐˜ข๐˜ญ๐˜ฐ๐˜ฏ๐˜ฆ ๐˜ด๐˜ฐ๐˜ง๐˜ต๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ด๐˜ฆ๐˜ญ๐˜ง-๐˜ณ๐˜ฆ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ฆ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ด๐˜ฑ๐˜ณ๐˜ฆ๐˜ข๐˜ฅ๐˜ด ๐˜ต๐˜ฐ ๐˜ฐ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฑ๐˜ถ๐˜ต๐˜ฆ๐˜ณ๐˜ด ๐˜ต๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ฆ-๐˜ฎ๐˜ข๐˜ช๐˜ญ ๐˜ฐ๐˜ณ ๐˜š๐˜”๐˜š ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฉ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด, ๐˜ฉ๐˜ข๐˜ณ๐˜ฅ ๐˜ฅ๐˜ณ๐˜ช๐˜ท๐˜ฆ๐˜ด, ๐˜ค๐˜ญ๐˜ฐ๐˜ถ๐˜ฅ ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ฆ๐˜ณ๐˜ด, ๐˜ฐ๐˜ณ ๐˜ถ๐˜ฏ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ฏ๐˜ฆ๐˜ต๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ด. ๐˜๐˜ต ๐˜ช๐˜ด ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ช๐˜ฅ๐˜ฆ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ฎ๐˜ฐ๐˜ณ๐˜ฆ ๐˜ฅ๐˜ข๐˜ฏ๐˜จ๐˜ฆ๐˜ณ๐˜ฐ๐˜ถ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ฏ ๐˜ข ๐˜ท๐˜ช๐˜ณ๐˜ถ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜ช๐˜ต ๐˜ฅ๐˜ฐ๐˜ฆ๐˜ด๐˜ฏ'๐˜ต ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฃ๐˜ฆ ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ท๐˜ข๐˜ต๐˜ฆ๐˜ฅ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ค๐˜ข๐˜ฏ ๐˜ช๐˜ฏ๐˜ง๐˜ฆ๐˜ค๐˜ต ๐˜ฎ๐˜ถ๐˜ญ๐˜ต๐˜ช๐˜ฑ๐˜ญ๐˜ฆ ๐˜ฅ๐˜ฆ๐˜ท๐˜ช๐˜ค๐˜ฆ๐˜ด ๐˜ฐ๐˜ฏ ๐˜ข ๐˜ฏ๐˜ฆ๐˜ต๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ ๐˜ณ๐˜ข๐˜ฑ๐˜ช๐˜ฅ๐˜ญ๐˜บ. ๐˜–๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ณ๐˜ข๐˜ณ๐˜บ, ๐˜ข ๐˜ท๐˜ช๐˜ณ๐˜ถ๐˜ด ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ๐˜ด ๐˜ข ๐˜ฉ๐˜ฐ๐˜ด๐˜ต, ๐˜ด๐˜ถ๐˜ค๐˜ฉ ๐˜ข๐˜ด ๐˜ฆ๐˜น๐˜ช๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ฑ๐˜ณ๐˜ฐ๐˜จ๐˜ณ๐˜ข๐˜ฎ๐˜ด ๐˜ฐ๐˜ณ ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ข๐˜ญ๐˜ด๐˜ฐ ๐˜ณ๐˜ฆ๐˜ฒ๐˜ถ๐˜ช๐˜ณ๐˜ฆ๐˜ด ๐˜ถ๐˜ด๐˜ฆ๐˜ณ ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ต๐˜ฐ ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ท๐˜ข๐˜ต๐˜ฆ ๐˜ช๐˜ต.

โ€“ โ€“ โ€“ โ€“ โ€“ โ€“ โ€“ โ€“


Inadvertently, the spread of the ILOVEYOU virus prompted major enterprises who were infected to be more cautious and wary of malicious attacks like this that attempt to corrupt their computer network. Today, a lot of programs have already been developed to protect devices against such malwares. However, cybersecurity measures should remain crucial even for us, everyday users, as the internet has increasingly become a breeding ground for the likes of the___EYOU virus.


ย 
ย 
ย 

Comments


bottom of page