- Melissa (computer worm)
The Melissa worm, also known as "Mailissa", "Simpsons", "
Kwyjibo ", or "Kwejeebo", is a mass-mailing macro virus, hence leading some to classify it as acomputer worm .History
First found on
March 26 ,1999 , Melissa shut downInternet mail systems that got clogged with infected e-mails propagating from the worm.Melissa was not originally designed for harm, but it overflowed servers and caused unplanned problemsFact|date=May 2008.Melissa was first distributed in the
Usenet discussion groupalt.sex . The virus was inside a file called "List.DOC", which contained passwords that allow access into 80 pornographic websites. The worm's original form was sent via e-mail to many people.Melissa was written by David L. Smith in
Aberdeen Township, New Jersey , and named after alap dance r he encountered inFlorida . The creator of the virus called himself "Kwyjibo", but was shown to be identical to macrovirus writers "VicodinES" and "Alt-F11" who had several Word-files with the same characteristicGlobally Unique Identifier (GUID ), a serial number that was earlier generated with thenetwork card MAC address as a component. Smith was sentenced to 20 months in afederal prison and fined $5,000United States dollar s. cite press release
title = Creator of Melissa Computer Virus Sentenced to 20 Months in Federal Prison
publisher = U.S. Department of Justice
date = 2002-05-01
url = http://www.usdoj.gov/criminal/cybercrime/melissaSent.htm
accessdate = 2006-08-30] This arrest was a result of collaboration between theFBI ,New Jersey State Police and Monmouth Internet.cite press release
title = Tracking Melissa's alter egos
publisher = ZDNet
date = 1999-4-02
url = http://news.zdnet.com/2100-9595_22-514231.html]Worm specifications
Melissa can spread on
word processor s Microsoft Word 97 and Word 2000 and also Microsoft Excel 97, 2000 and 2003. It can mass-mail itself frome-mail client Microsoft Outlook 97 or Outlook 98.If a Word document containing the virus, either LIST.DOC or another infected file, is downloaded and opened, then the macro in the document runs and attempts to mass mail itself.
When the macro mass-mails, it collects the first 50 entries from the alias list or address book, and sends it to the e-mail addresses of those names.
Melissa.U
This variant also deletes critical files. Before deleting the files, it strips them of their archive, hidden, and read-only attributes.
* C:Command.com
* C:IO.SYS
* C:Ntdetect.com
* C:Suhdlog.dat
* D:Command.com
* D:Io.sys
* D:Suhdlog.datMelissa.V
This is another variant of the original Melissa macro virus, and is akin to Melissa.U. It uses Microsoft Outlook, and tries to send itself to the first 40 addresses in Outlook's address book. The subject line of the infected e-mail sent out is: "My Pictures (
) ", whereis the name to whom the sender's copy of Microsoft Word is registered. There is also a variant of the virus named Melissa.V/E which is known to seek and destroy Microsoft Excel documents, randomly deleting sets of data from files, or, at the worst, making them completely useless by applying a set of malicious Macro code. To make the code more simple, the author has incripted only a vectorial search pattern in it, so the virus can only delete linear sets of data, usually random rows or colums in a table. It also has a search parameter that makes it go only for unique sets of data, known to cause more damage.
A later edit of this variant makes backup copies of the destroyed files, and asks for a ransom of $100 to be transferred into an offshore account in return for the files. The account has been traced back to the owner. Though, due to a malfunction in code, this only happens in less than 1% of cases, but the code still makes copies.
This virus was rendered obsolete when it was discovered that it leaves visible traces in the
Windows Registry , providing enough data to ensure it's destruction, and the retrieval of stolen data.A special version of this variant also modifies the backed-up data, fooling the user even more. It searches for numeric data inside the files, and then, with the help of a random number generator, it slightly modifies the data, not visible, but making it useless.
There is no body to the email, but there is an infected document attached. If this is opened, the payload is triggered immediately. It tries to delete data from the following (local or network) destinations: F:, H:, I:, L:, M:, N:, O:, P:, Q:, S:, X:, and Z:.
Once complete, it beeps three times and then shows a message box with the text: "Hint: Get Norton 2000 not McAfee 4.02".
Melissa.W
This is the same as Melissa.A.
Melissa.AO
This is what the e-mails from this version contain: Subject: Extremely URGENT: To All E-Mail User -
Attachment: Body: This announcement is for all E-MAIL user. Please take note that our E-Mail Server will down and we recommended you to read the document which attached with this E-Mail. Melissa.AO's payload occurs at 10 a.m. on the 10th day of each month.The payload consists of the worm inserting the following string into the document: "Worm! Let's We Enjoy."
ee also
*
Timeline of notable computer viruses and worms
*List of computer viruses
*Morris worm
*SQL slammer worm
*Code Red worm Notes and references
ources/external links
* [http://www.f-secure.com/v-descs/melissa.shtml F-Secure Melissa Page]
* [http://www.melissavirus.com MelissaVirus.com]
* [http://www.havenofbliss.com/melissa.txt Source Code of the Virus]
Wikimedia Foundation. 2010.