[Infowarrior] - Melissa virus turns 10
Richard Forno
rforno at infowarrior.org
Sat Mar 28 14:43:01 UTC 2009
March 28, 2009 6:00 AM PDT
Melissa virus turns 10
by Elinor Mills
http://news.cnet.com/8301-1009_3-10206275-83.html?part=rss&subj=news&tag=2547-1_3-0-20
A decade ago there was no Facebook, no iPhone, and no Conficker. There
was dial-up and AOL and a nasty virus called Melissa that ended up
being the fastest spreading virus at the time.
CNET News talked to Dmitry Graznov, a senior research architect at
McAfee Avert Labs who was among the researchers who worked to fight
the Melissa outbreak and track down the creator.
Q: How was Melissa discovered?
Graznov: Avert as a whole discovered it as did some of the
competitors. It was submitted to us by customers as it started to
spread around the world (on March 26, 1999).
What made Melissa different from previous viruses?
Graznov: It was the first mass-mailing virus, which used e-mail to
spread on a large scale.
What harm did the virus do?
Graznov: In some cases the load on the e-mail servers in some
organizations was so high that the servers were effectively shut down.
How many computers were affected and what did the virus do?
Graznov: Hundreds of thousands of computers were affected. That's a
guess...Melissa infected other documents a user opened in Microsoft
Word. It also connected to Outlook if it was running and selected 50
entries in the address book and e-mailed an infected document to those
addresses...including mailing lists...As a result, the virus was sent
not just to 50 people, but to thousands of people easily. We didn't
have any firm numbers to go by, but we did have reports from customers
saying their Exchange servers were overwhelmed.
How long did the outbreak last?
Graznov: Several days, but the infections continued to be registered
for a long time after that. It was just a macro virus and we were well
equipped to provide detection and removal for people's computers even
then...The fact that it was so widespread in the world already meant
it took a long time to remove the infections.
Security researcher Dmitry Graznov as he looked in 1999 when he was
chasing down the creator of the Melissa virus for McAfee Avert Labs.
(Credit: Dmitry Graznov)
How did the virus writer get caught?
Graznov: I was running, actually still am, a project called Usenet
Virus Patrol, which scans Usenet articles for viruses. The author of
Melissa posted the virus to a newsgroup called "alt.sex." It was
zipped up and sent as if it was a list of passwords to like 80-
something different porno sites...It was just bait to entice people
into downloading it and opening it. Once it was opened, it started e-
mailing itself around. It was relatively easy to go back and find the
exact Usenet posting that started all this. In the header of the
posting it was possible to find out not only the e-mail address from
which it was sent but also the IP address of the computer from which
it was sent. That IP was linked to an AOL account and from that the
FBI subpoenaed AOL and they provided the dial-in logs...and found out
what computer was assigned that IP address and from what telephone
number the call was made. The AOL account was a compromised one...The
phone call that used that account came from New Jersey and the FBI
linked the phone number to a particular address. That is how they
found the guy's computer...The data we provided them was the clue that
led straight to the criminal. (David L. Smith pleaded guilty and was
sentenced to 20 months in prison and $5,000 in fines.)
What was the motivation behind Melissa?
Graznov: There was no material gain. Back then, people didn't do it
for money. They did it for mischief, for fame...Today there is huge
money in computer crime...Back then, we had 200 times fewer pieces of
malware than we have today.
Any comments on Conficker and Melissa and how far we've come?
Graznov: Conficker is a completely different type of thing. It's not a
macro virus. It's an executable and a botnet, and it downloads lots of
stuff on your computer. It's basically a network for sale. It can be
rented out. It can be used for password stealing. Back in 1999 there
wasn't such a thing as a business model for malware...Today, big money
is involved in computer malware. You cannot even compare them.
Elinor Mills covers Internet security and privacy. She joined CNET
News in 2005 after working as a foreign correspondent for Reuters in
Portugal and writing for The Industry Standard, the IDG News Service,
and the Associated Press. E-mail Elinor.
More information about the Infowarrior
mailing list