Melissa Virus
Origin
On 26 March last year as a few half-hearted flurries of snow danced across the unlovely suburban landscape of northern New Jersey,David Smith drew the curtains of the small garden apartment he shared with two cats called Rockabilly and Eggnog.
At 30, single and employed on an irregular
Smith settled down in front of a personal computer. It was one of several that he owned. Later, when things became hot, he would have to smash it up with a garden spade, and throw the pieces into a rubbish skip. But this afternoon, as the big East Coast cities of New York, Boston and Washington began to empty, his fingers moved smoothly over the keyboard.
He entered cyber-space using a stolen access authorisation that had been issued by America Online, the giant internet provider, to a customer in Florida called Scott Steinmetz. This allowed Smith to use Steinmetz's e-mail address, slrvrocket@aol.com, which he proceeded to do, to devastating effect.
A few clicks of the mouse took Smith to an internet chatroom - an electronic forum where subscribers can
It couldn't have been more than a few minutes before someone, somewhere out in the vastness of the internet, visited alt.sex, saw Smith's message - which purported to contain free access codes to other internet porn sites and opened it. And with that single click, the virus was free to fulfill its purpose - to spread, multiply and contaminate.
Later, investigators would decipher its name from the computer code that Smith had written. He had called the virus Melissa.Except that the chaos that followed would far exceed Smith's wildest imaginings. Within 24 hours, the computer systems of some of the biggest corporations on earth would be paralysed; Nato and the Pentagon would move on to a heightened security alert in the belief that cyber-terrorists were launching a global attack; and millions of computer users around the world would wake up to find their machines had been 'Melissa'd'. And in the days that followed, the biggest, most desperate manhunt in the history of computer crime would lead investigators, step by step, through a strange, barely charted electronic
How it works
The Melissa macro virus propagates in the form of an email message containing an infected Word document as an attachment. The transport message has most frequently been reported to contain the following Subject header
Subject: Important Message From Where The body of the message is a multipart MIME message containing two sections. The first section of the message (Content-Type: text/plain) contains the following text.
Here is that document you asked for ... don't show anyone else ;-) The next section (Content-Type: application/msword) was initially reported to be a document called "list.doc". This document contains references to pornographic web sites. As this macro virus spreads we are likely to see documents with other names. In fact, under certain conditions the virus may generate attachments with documents created by the victim. When a user opens an infected .doc file with Microsoft Word97 or Word2000, the macro virus is immediately executed if macros are enabled. Upon execution, the virus first lowers the macro security settings to permit all macros to run when documents are opened in the future. Therefore, the user will not be notified when the virus is executed in the future. The macro then checks to see if the registry key
has a value of "... by Kwyjibo". If that registry key does not exist or does not have a value of "... by Kwyjibo", the virus proceeds to propagate itself by sending an email message in the format described above to the first 50 entries in every Microsoft Outlook MAPI address book readable by the user executing the macro. Keep in mind that if any of these email addresses are mailing lists, the message will be delivered to everyone on the mailing lists. In order to successfully propagate, the affected machine must have Microsoft Outlook installed; however, Outlook does not need to be the mailer used to read the message. This virus can not send mail on systems running MacOS; however, the virus can be stored on MacOS. Next, the macro virus sets the value of the registry key to "... by Kwyjibo". Setting this registry key causes the virus to only propagate once per session. If the registry key does not persist through sessions, the virus will propagate as described above once per every session when a user opens an infected document. If the registry key persists through sessions, the virus will no longer attempt to propagate even if the affected user opens an infected document. The macro then infects the Normal.dot template file. By default, all Word documents utilize the Normal.dot template; thus, any newly created Word document will be infected. Because unpatched versions of Word97 may trust macros in templates the virus may execute without warning. Note that if you open an infected document with macros disabled and look at the list of macros in this document, neither Word97 nor Word2000 list the macro. The code is actually VBA (Visual Basic for Applications) code associated with the "document.open" method. You can see the code by going into the Visual Basic editor |
Impact
|
3 comments:
Smith rocks!!
yes, true said 'born'.
He's a damn Genius, instead of presenting him to the court, he should should have been hired by cyber-security professionals. :)
Except for the fact that, oh I don't know, he ruined millions of peoples, companies, and governments computer systems. I may be wrong, but I think that might just be illegal.
Post a Comment