The ‘Love Bug’ or the so-called 'Iloveyou virus'
johannesgetu60
26 views
14 slides
May 28, 2024
Slide 1 of 14
1
2
3
4
5
6
7
8
9
10
11
12
13
14
About This Presentation
This is a presentation on the iloveyou virus prepared by students at St. John Baptist De La Salle Catholic School in Addis Ababa, Ethiopia.
Size: 1.13 MB
Language: en
Added: May 28, 2024
Slides: 14 pages
Slide Content
THE ‘LOVE BUG’
The ‘iloveyou’ virus , also known
as the ‘Love Bug’, is one of the
most infamous computer viruses
in history. It spread rapidly
through email systems in May
2000, infecting millions of
computers worldwide. The virus
was disguised as a love letter or
romantic message, enticing users
to open the attachment and
inadvertently unleash the
malicious code.
Behind the
SCENES...
Onel De Guzman
The virus was made
using visual basic
scripting and social
engineering.
The Virus had three main missions once inside a host
computer:
1. OVERWRITING FILES
2. STEALING PASSWORDS
3. SPREADING TO CONTACTS
This is how it looked like…
Effects
1.FINANCIAL LOSS: The virus
caused an estimated $15
billion in damages
worldwide, making it one of
the most costly computer
viruses in history.
2. Data Loss and corruption: The
virus was designed to overwrite
files on the infected computers,
including documents, images and
other important data.
3. Service Disruption: The virus
caused disruptions to email
systems, network communications,
and other essential functions for
business and organizations. Many
companies had to shut down their
systems temporarily to contain
the virus and prevent further
damage.
4. Reputational Damage:
organizations damaged by this
virus suffered from a reputation
decline as they were primarily
conceived as ‘ not prepared for
cyber threats’. Customers and
partners gradually lost trust in
these organizations.
5.Increased Awareness: this virus
served as a ‘wake-up’ call for
many individuals and
organizations to focus on the
importance of cybersecurity.
MEASURES TAKEN
1.Patching and updating
2.Antivirus Software
3.Email filtering
4.User Awareness Training
5.Incident Response Plan
6.Backup and recovery
7.Legal procedures on the criminals