ILOVEYOU Malware

Published date :10/07/2025

Written by: Monica Burgess

Glitch effectGlitch effect

What is ILOVEYOU Malware?

ILOVEYOU is a computer worm that rapidly spread across the globe by email in May 2000. Also known as the LoveLetter worm, this piece of malware relied on a simple but devastatingly effective social engineering trick. It arrived in users' inboxes with the subject line "ILOVEYOU" and an attachment named "LOVE-LETTER-FOR-YOU.txt.vbs". The double extension hid the file's true nature as a Visual Basic Script. Once a user opened the attachment, the worm would execute, overwriting files on the victim's computer and, most famously, sending a copy of itself to every contact in the user's Microsoft Outlook address book.

When was ILOVEYOU First Discovered?

The ILOVEYOU worm was first unleashed on May 4, 2000, originating from the Philippines. It spread with incredible speed, hitting email servers in Hong Kong first, then Europe, and finally the United States within a matter of hours. The worm's rapid propagation overwhelmed corporate email systems worldwide, forcing major organizations like Ford Motor Company and even the British Parliament to shut down their mail systems to contain the infection.

Who Created ILOVEYOU?

The ILOVEYOU worm was traced back to two Filipino programmers, Reonel Ramones and Onel de Guzman. De Guzman was a student at AMA Computer College in Manila, where he had submitted a thesis proposal for a program capable of stealing internet access passwords—a proposal that was rejected by the faculty. Due to a lack of laws against malware creation in the Philippines at the time, prosecutors could not secure a conviction, and all charges were eventually dropped.

What Does ILOVEYOU Target?

The ILOVEYOU worm primarily targeted computers running the Microsoft Windows operating system. Its propagation method was heavily dependent on Microsoft Outlook, which was the dominant email client in business environments at the time. The worm’s payload targeted a wide range of file types, including images (JPG, JPEG), music files (MP3), and various Microsoft Office documents. It overwrote these files with a copy of its own malicious script, effectively destroying the original data. This indiscriminate targeting affected businesses, government agencies, and individual users across the globe.

ILOVEYOU Distribution Method

The distribution method for ILOVEYOU was pure social engineering, delivered via a massive email phishing campaign. It capitalized on the one thing that never gets old: human curiosity.

Here’s the breakdown:

  • The Bait: Users received an email with the compelling subject line "ILOVEYOU."

  • The Hook: The email contained a seemingly innocent attachment, "LOVE-LETTER-FOR-YOU.txt.vbs." Because Windows systems at the time often hid known file extensions by default, many users only saw ".txt" and assumed it was a harmless text file.

  • The Trap: Opening the file executed the VBScript. The worm then mailed itself to all contacts in the user's Outlook address book, perpetuating the cycle on a massive scale. It also spread through IRC chat clients by sending itself to active channels.

This simple but brilliant strategy made ILOVEYOU one of the most successful and fastest-spreading malware attacks in history.

Technical Analysis of ILOVEYOU Malware

The ILOVEYOU worm was written in VBScript, a relatively simple scripting language. Its success wasn't due to technical complexity but its clever design and exploitation of user behavior and system defaults.

When a user executed the "LOVE-LETTER-FOR-YOU.txt.vbs" file, the script would:

  • Replicate: Copy itself to several locations in the Windows system directories.

  • Modify the Registry: Create registry keys to ensure it would run on system startup, achieving persistence.

  • Spread via Email: Access the Microsoft Outlook address book and send a copy of the malicious email to every single entry. This caused an email storm that crashed mail servers.

  • Overwrite Files: Search local and mapped network drives for files with specific extensions (like .jpg, .jpeg, .mp3, .css, .doc) and overwrite them with a copy of itself. This action led to massive data loss.

  • Steal Passwords: The worm also attempted to find cached passwords and mail them to an email address controlled by the attacker.

Tactics, Techniques & Procedures (TTPs)

Based on the MITRE ATT&CK framework, ILOVEYOU's behavior can be mapped to several TTPs:

  • T1566.001 - Phishing: Spearphishing Attachment: The primary vector was an email with a malicious VBScript attachment.

  • T1059.005 - Command and Scripting Interpreter: Visual Basic: The worm was executed using the Windows Script Host (wscript.exe).

  • T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys: It added registry keys to maintain persistence after a reboot.

  • T1057 - Process Discovery: It searched for running processes to terminate.

  • T1574.001 - Hijack Execution Flow: It overwrote files with its own code, a destructive form of hijacking.

  • T1083 - File and Directory Discovery: It scanned the filesystem for specific file types to overwrite.

  • T1555.003 - Credentials from Password Stores: Credentials from Web Browsers: It searched for cached passwords.

Indicators of Compromise (IoCs)

Defenders back in 2000 looked for these classic IoCs:

  • Email Subject: "ILOVEYOU"

  • Attachment Filename: "LOVE-LETTER-FOR-YOU.txt.vbs"

  • File Hashes: Specific MD5/SHA hashes associated with the VBScript file.

  • Registry Keys: Presence of new entries in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run pointing to copies of the worm.

  • Created Files: The worm created files like MSKernel32.vbs and Win32DLL.vbs in system directories.

  • Network Activity: A sudden, massive spike in outbound SMTP traffic (port 25) from infected machines.

How to Know if You’re Infected with ILOVEYOU?

Symptoms of an ILOVEYOU infection were hard to miss:

  • Massive Email Output: Your machine would start sending a flood of emails to your contacts without your knowledge.

  • Missing or Corrupted Files: Personal files like photos, music, and documents would suddenly become VBScript files and refuse to open.

  • New, Suspicious Files: The appearance of files like "LOVE-LETTER-FOR-YOU.txt.vbs" on your system.

  • System Slowdown: The constant scanning and email activity consumed significant system resources.

ILOVEYOU Removal Instructions

For those hit by the worm, removal involved a multi-step process. While manual removal was possible for savvy users, it was risky.

  • Disconnect: Immediately disconnect the infected computer from the network to stop it from spreading further.

  • Terminate the Process: Open Task Manager and kill the wscript.exe process that was running the malicious script.

  • Remove Registry Entries: Use the Registry Editor (regedit) to find and delete the startup entries created by the worm.

  • Delete Malicious Files: Manually search for and delete all copies of the worm, including the original attachment and files created in system directories.

  • Restore from Backup: The only way to recover overwritten files was to restore them from a recent backup. No backup? Those files were gone for good. 😥

Is ILOVEYOU Still Active?

No, the original ILOVEYOU worm is no longer considered an active threat. Antivirus software and email filters have been able to detect and block it for decades. However, its legacy is very much alive. ILOVEYOU proved the incredible power of social engineering and inspired countless copycats and more sophisticated phishing attacks that we still see today. Modern malware often uses the same core principle: trick a human into making a security mistake.

Mitigation & Prevention Strategies

While ILOVEYOU is a relic, the strategies to prevent similar attacks are more relevant than ever. Don't get caught by the next generation of social engineering malware.

  • Security Awareness Training: Train your users to be skeptical of unsolicited emails and attachments, even if they appear to come from a known contact. This is your first and best line of defense.

  • Email Filtering: Use modern email security gateways that can scan attachments for malicious code and block phishing attempts before they reach an inbox.

  • Disable Script Execution: Configure systems to prevent the automatic execution of script files like .vbs and .js when opened by a user.

  • Show File Extensions: Change the default Windows setting to always show file extensions. This makes it harder for attackers to disguise a malicious executable as a harmless document.

  • Managed Detection and Response: Deploy a 24/7 security solution like Huntress's Managed EDR to monitor endpoints for suspicious behavior. Our human-led ThreatOps team can spot the TTPs of a modern ILOVEYOU-style attack and shut it down before it spreads.

ILOVEYOU Malware FAQs

ILOVEYOU is a computer worm that spread through email attachments in 2000. It worked by tricking users into opening a malicious file disguised as a love letter, which then overwrote files and propagated itself to contacts.

ILOVEYOU infects systems by exploiting human curiosity. It arrives as an email with a subject line like “ILOVEYOU” and an attachment that, when opened, executes malicious scripts.

While ILOVEYOU itself is no longer active, its techniques have inspired modern malware. Organizations should remain vigilant against similar social engineering attacks.

Organizations can protect themselves by implementing email filtering, user training, and endpoint detection tools like Huntress to prevent similar threats.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free