CSSS-5220 Week 2 Assignment

docx

School

Webster University *

*We aren’t endorsed by this school

Course

5220

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by UltraKingfisherMaster1083

Report
Media Assignment: Virtual Attacks Manoj Kumar Madala Webster University CSSS – 5220 Cybersecurity Threat Detection Professor Jason Ham January 27, 2024
Summary: Here you will find a list of well-known computer viruses, each with its own destructive technique, and a list of harmful software attacks. Ransomware Trojans such as CryptoLocker, which extorted around $3 million from victims, the infamous "I Love You" virus, which spread via email and caused $15 billion in damages by stealing passwords, and the destructive MyDoom virus, which aimed to attack search engines, primarily Google, and caused around $38 billion in damages. From worms like Code Red, which defaced websites and infected over a million PCs, to the Slammer virus, which disrupted critical services and caused $1.2 billion in damage, the summary highlights the diversity of cyber threats, their effects on global networks, and the ongoing challenge of combating new and evolving computer viruses. One of the 15 Viruses: The "I Love You" virus is the third topic discussed on the list, so let's focus on it completely. People also called the "I Love You" virus the "Love Bug." It is a computer worm that spread through email in May 2000. Among the first malware assaults on the internet, this infection was among the most destructive and pervasive. Exfiltration and Mode of Entry: "I Love You" was a stand-alone program that was sent through email with the subject line "I Love You." The filename of the attached document was "LOVE-LETTER-FOR- YOU.TXT.vbs." Contrary to its appearance as a text file, the attachment was composed of Visual Basic Script (VBS). Upon opening the attachment, the script went into action, causing harm to naive people.
As soon as it ran, the virus exploited security holes in Windows and Outlook. Using the scripting features of Visual Basic for Applications (VBS), it overwrote files, sent copies to the victim's first fifty email contacts, and sunk its teeth into the system. Attack Consequences: The "I Love You" virus wreaked havoc and destruction across the world. Thanks to people's faith in email systems and the intrigue sparked by the subject line, it quickly spread. Upon activation, the virus caused multiple outcomes: 1. File overwriting: The virus overwrote several different kinds of data on the infected machine, including audio files, images, and more. Additionally, it replaced them with copies of the virus, which rendered the original files inaccessible to the viewer. 2. Email Propagation: The virus spread by infecting the first fifty contacts in the inbox of the victim. Infected systems multiplied exponentially because of this. 3. Passwords Theft: The "I Love You" virus had a part that stole passwords and other login information from computers that it attacked. It discreetly communicated this information to the hackers, jeopardizing the security and privacy of anyone affected. 4. Financial Impact: As a result of the attack, a lot of money was lost. The "I Love You" virus was one of the most expensive cyber-attacks of its time, with damage estimated at $5 billion to $15 billion. 5. Global Disruption: Email communication and network operations were disrupted because of the virus, which impacted individuals, governments, and corporations on a global scale.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
After the incident, people started paying more attention to cybersecurity, which improved email security and made it more important to teach people not to open unfamiliar attachments. The virus known as "I Love You" is a historical case that illustrates the possible implications of social engineering as well as the significance of implementing robust cybersecurity policies.