Phishing with Love

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Erica: I sure hope that the latest script from Z-Daddy behind you.
Sean: What is your obsession with Scriptingthewhy!?
Photo by vjapratama, please support by following @pexel.com

Throughout the history of mankind, there is one emotion that has driven us to do many things. Some of these may be crazy and unconventional, but the result is done with good intentions…sometimes.

It’s the one emotion that no one can seem to live without unless you have no desire for it because you believe you’re cold-hearted, at this point I would cautiously call you a monster and bid you a good day. What is this emotion I’m alluding to?

It’s called love, love is a very interesting and powerfully intoxicating emotion we humans have.  If there is anything to know about love, it’s a good thing. However, if you’re rifling through piles and piles of emails from the weekend only to find one saying “ILOVEYOU” in the subject line followed by a “click here” attachment might not be the love you may want at the current point in time.

Don’t know what I’m talking about? Let me script to you what I mean.

Kim: You don’t even know why I’m mad at you.
Tim: It’s because I didn’t read that script thingy.
Kim: That and you didn’t change the toilet paper roll this morning.
Photo by Katerina Holmes, please support by following @pexel.com

A Lovely Chain Letter

As mentioned earlier, you’re rifling through all of your emails from the weekend, and you find one saying “ILOVEYOU”. While this may seem like someone sent this with the intent to brighten up your day and give you all of those cute, warm fuzzy feelings like reminiscing about grandma’s home cooking, the bad news is it’s not.

This event is referred to as the “Love Bug” or “Love Letter for You”, in other words, you’re getting duped with a computer virus, if you click on the attachment. Just when you thought someone was falling head over heels for you.

That’s a solid question Z-Daddy, I think I was in calculus with my crush Brinda Adams. I wonder if she knows that I exist.
Photo by Pavel Danilyuk, please support by following @pexel.com

Frat Worms in College

Here’s a question for you, can you remember what you were doing in the year 2000? If whatever you were doing doesn’t involve sitting in your room making computer viruses, congrats, you’re a part of the majority. I know there is someone reading this script saying “Actually, I was reverse engineering them because of lack of friends.”

Back in the heyday of the year 2000, on May 4th of that year. A 24-year-old college student from the Philippines, by the name of Onel de Guzman had created this computer virus to steal passwords for internet access because he couldn’t pay for it.

This is very reminiscent of trying to tune to the right frequency on the old-school cable box to get the pre-hub before the now prominent hub, black and orange baby. Page 153 and still can’t find anything, we’re all so broken.

At this junction and for my own sanity, I have to make it known that in some sources ILY is referred to as a virus but overall, it’s a worm. The difference is, viruses tend to come in ones or twos, and they muck up a few files in your computer system whereas worms on the other hand, just need you to open the door, and from there, one can multiply and muck up a whole network. Worms are like the frat boys of the computer world, once in, they like to party.   

YES, I AM LOVED…by a guy? Oh whatever, it’s 2023 I’m not judging, I just need someone to hold me and say it’s going to be all right.
Photo by Andrea Piacquadio, please support by following @pexel.com

Loving Dollar Decline

Here’s a scenario on the ILY process, yes, I know you’re dying to know. So, let’s say you are friends with Tom, and you get a message from Tom saying “ILOVEYOU” in the subject line. You open the email and see there’s an attachment. With you knowing Tom, you open the attachment thinking nothing of it but that’s when having to explain to someone why you ghosted them, and spontaneously pop back up begins.

This triggers an event of messages being re-sent to, not only everyone in your list of contacts but their list as well. Do you see how it wormed its way into your life? This scenario is what happens on small scale but on a larger one, ILY found its way into corporate networks due to Microsoft Outlook being widely used at the time which resulted in files of every type being wiped from the hard drives and in just about 10 business days resulted in 45 million users and cost about $10 billion in damages. That’s $3.5 billion in today’s currency, the power of the good ole American dollar, am I right?

Jake: So, I walked up that computer virus and was like “What’s up”.
Z-Daddy: Jake…you know that’s not help you deal with computer viruses, right?
Jake: Pfft, whatever bro, waited long enough and screen went off. Mission accomplished.
Z-Daddy: That’s…never mind.
Photo by Rusian Alekso, please support by following @pexel.com

Effects and After Effects

Now while this worm had spread its way across many, many, many systems, some of which include the Pentagon, CIA, and U.S. Army, and even ventured to the United Kingdom, this one isn’t much to worry about. A part of it was caught on a server that was quickly turned offline and with no other servers to send information to, there was nowhere for it to spread.

Many large companies had to make the decision to completely turn off their emailing systems. As we all may know, being able to email can convey information and information is money, so you can picture a lot of money was lost throughout this whole endeavor. At this junction you have nothing to worry about, however, this doesn’t mean one can run around clicking on emails with “ILOVEYOU” in the subject title.

Being aware of a potential cyber-attack could make a world of difference when it comes to protecting your computer and your life in general. If you get an email from someone you know and you’re curious about it, check with them on another medium (i.e., text message or phone call) to ensure that it was them that sent the email.

Of course, you should have anti-virus and malware protection on your computer and that it and your operating system is up to date as the older systems have vulnerabilities that are not patched. To touch back onto Guzman, while he has one of the world’s first global computer viruses (worm) under his belt which affected 45 million, charges against him and his buddy were dropped, and he regrets unleashing ILY.

When ILY did its thing and pretty much destroyed email by storm, Guzman was so shaken up that he took a year off from working with computers. He now runs a phone repair shop with his buddy in the Philippines.

She sent I love you and the attachment was her. Thank you, Z-Daddy, for keeping us aware.
Photo by Nataliya Vaitkevich, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you think there’s something I may have missed about ILOVEYOU? Script a comment below.

A Virus Built with Love

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Sean: I’m always here for you.
Samantha: That’s great but you only have $30 in your pocket, and I only have three more minutes left.
Photo by Ana Maria Moroz, please support by following @pexel.com

Here’s a strange question for you. Have you ever loved someone so much that you create something in their name? Not like a creepy shrine or anything like that, I mean create something and let it loose on the internet for it to wreak havoc on the world.

If you haven’t, then you’re a part of the unlucky club as most people haven’t experienced that kind of love. Well… I say love but it very well could be just wanting a good “fun hugging” time and things just didn’t work out because well, money.

It kind of makes the world go round. However, let me script to you someone who has and how the internet went ablaze with the “You got mail” era.

You pay, I slay.
Photo by Efigie lima Marcos, please support by following @pexel.com

50 Networks of Melissa

Back in the heyday of AOL (America Online), there once was a virus called “Melissa”. I know someone is probably offended and wondering why their name is a computer virus that may be oddly categorized wrong since worms replicate themselves throughout a network, which is what this “virus” did.

I’m not going to get into the politics of it. Just know this virus was created and released, and many people were upset. Melissa (sorry for anyone known by this name and reading this), is what is called a “macro virus” – meaning this virus was written in the same language Microsoft Word and Excel were developed in.

Melissa (again, sorry, I didn’t choose the name) would hide in spreadsheets and activate as soon as you open the file, once opened triggers malware made to wreak havoc on your machine and further spread the virus to the edges of your contacts list and theirs and so on and so on. Melissa was the kind of gal that kept on giving.

David: I told you already, her name is Melissa, and she loves me.
Dr. Paterson: David, we’ve been over this. A computer virus that you created can’t love you.
Photo by Timur Weber, please support by following @pexel.com

Breaking AOL and Beyond

You may be wondering, who was this madman or madwoman, it’s wrong to assume the gender nowadays, that created this virus in the name of love. Look at no other person than David Lee Smith.

David chose to make use of the confusion surrounding the internet and email at the time since the internet or web1 was in its early stages. I don’t see how there was that much confusion, it was either you have mail or you don’t have mail. It seems pretty straightforward if you ask me, but you didn’t so whatever. Rambling aside, David, in late March of 1999, hijacked an AOL account and used it to post a file on an Internet newsgroup name “alt. sex”.

The post was promising a really good time because it offered over a dozen free passwords to websites where you had to pay for adult content. Posting like that nowadays wouldn’t have much of an effect since most of what you want to watch is free however, I am aware there are a number of you out there who are broken and may need to find some “harder material”. Like cats being shuffled around in duffle bags, Z-Daddy isn’t judging.

Oh, and he chose to name this virus Melissa after a stripper that he was into. I’m guessing the story is, he fell in love, and she said you don’t have any more money, he got depressed and created a virus, giving it her name to make her famous.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Hello from the other side, I’ve must’ve called a thousand times.
Photo by Hebert Santos, please support by following @pexel.com

Setting Fire to the Network

So, what were the effects of Melissa’s presence? Well aside from overloading email servers at more than 300 corporations, government agencies included, no the government is not happy when you mess with them however they are giddy when they get to mess with you, it ended up shutting them down entirely along with costing $80 million in damages.

The virus functionality worked in the form of phishing, where you would open an email and click on an attachment, the infected file would then activate and read to the computer’s storage where it would create an Outlook Global Address. After this, the virus would then send copies of itself to the addresses read.

So in a nutshell, this would get into your machine, find your list of contacts, and begin its great journey spreading itself down everyone’s cornhole. Psychotic ex strippers…am I right?

I will siren your bank account and beyond.
Photo by Somewherewith Tom, please support by following @pexel.com

Protection Against Sirens

You don’t need to worry about this Melissa getting into your life and mucking it up anymore, well for the most part. The news spread fast enough to slow the spread allowing cybersecurity professionals to contain and restore their networks. However, this doesn’t mean that you’re free to run around clicking on links promising you a good time.

There is a wide array of viruses out on the internet that have the same attributes as Melissa. But ways you could prevent her from ever knocking on your door…well, one way is not forgetting to tip your bartender and close your tab.

Always follow good bar patron best practices. When checking your email, if you find you have to take a double look because something seems grammatical or misspelled, for example, “h0w ar e    you” versus “how are you”. If the email you received came from someone you know, it’s always a good thing to double-check with them to confirm that they sent it.

Always use an antivirus/antimalware/antispyware and make sure your operating system is up to date as patches for any vulnerabilities would include improving the safety of not only your computer but your wallet as well.

But to protect yourself entirely is just to use common sense and if it looks phishy, then don’t engage, and delete it immediately. On the internet Melissa has friends and they can do the same thing as her, if not better, just when you thought she was one of a kind.

Seth: The latest script was like OMG, and it made me ten times happier to be with you.
Tina: I know, Z-Daddy made me feel the same way.
Photo by cottonbro studio, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Think there was something I missed or may have gotten wrong about Melissa? Script a comment about it down below.

A Stealthy My Little Pony

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

webcam sat on top of monitor.
Not all webcams are set to record but it doesn’t hurt to double check.
Photo by Matheus Bertelli, please support by following @pexel.com

It’s 8:35 AM on a Monday morning and you know what time it is. Time to start your daily routine of shoveling through your email and what could possibly be considered PUMs (Potentially Unwanted Messages).

While skimming through the mass emails of bills, spam that didn’t get caught in the filter, and mail-order brides offers, have you ever had a creepy, eerie vibe that something is a bit off?

You look into the blackness of your webcam and have the feeling that something or someone is on the other side peering back at you.

Have you never had that experience? Okay, it’s just me then. Well, whether you had the feeling that someone was Sam Rockwelling you or not, let me make you aware of the possibility that something could be spying on your every move the next time you log in.

senior man sat across from computer.
Tom: So…am I to talk to it or?
Director: Tom, shut up, we’re trying to take a picture.
Photo by Ron Lach, please support by following @pexel.com

Watching Eyes & London

On the internet of yesteryear, before you had to watch your back online as you did on the dark cold mist-fog streets of London. Don’t ask me how I know, I’ve never been to London but that’s always the setup in movies dealing with the Great Brit.

Life was simple, you could log in, veg out, and log off without worry of passively downloading spyware leading you to feel like Sam Rockwell and asking every five minutes; “Who’s watching me?” What spyware could have you feeling like this? It’s Pegasus, the cute horse with wings based on Greek mythology that every daughter would beg their father to have, it seems harmless, but your safe space will result in a 404 error. This is an error code (for those who don’t know) results when a web page cannot be found.

Pegasus was created by an Israeli cyber-arms company NSO (Niv, Shalev, and Omri: the names of the company founders) Group. NSO created Pegasus to collect important and sensitive information mainly on cellphones but why stop there when the capability of installing it on other devices could be added?

The installation of Pegasus would be triggered via what’s called a “zero-click”- meaning the software could be downloaded without interaction of the individual. So to translate this, this is like the activation of a tripwire, or for all of you Yu-Gi-Oh card game players out there, you’ve activated my trap card and now I can watch every move you make like the Police from the 80s.

a woman walking ahead of a man.
Maria: You didn’t subscribe so it’s over and I don’t know you, Eric. STRANGER DANGER!
Eric: BUT YOU JUST SAID MY NAME!
Photo by RODNAE Productions, please support by following @pexel.com

Followed Faithfully

Now that we have addressed your stalker, how or what is being done while you are unaware of the spyware present? Well, as mentioned earlier, once the tripwire or trap card is activated, this could happen in several ways such as opening an email or text or instant message and like your ideal date that’s withholding a slew of mental health issues, it’s in.

Pegasus is designed to read texts, and emails, monitor your application usage, collect user information (names and passwords), and gain access to your microphone and camera. You may be amazed and wondering, “Wow, what else can it do?” Well, to top all these features off, Pegasus can gain access to your GPS (Global Positioning System) and report back your whereabouts.

Earlier versions of Pegasus were installed on smartphones via weaknesses in commonly used apps or a cyber-attack technique called “spear-phishing”- this is sending a malicious link directly to an intended target for infection. Calling this spyware Pegasus seems like a one-off name, but it’s fitting as its ability to “fly through the air” from infected smartphone to smartphone and from infected device to device.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

electronic devices on top of a table
“I don’t need virus protection.” Every device can come with virus included.
Photo by Pixabay, please support by following @pexel.com

Good Intentions, Bad Market

The NSO Group created Pegasus with the claim that it would be only for use by “authorized” governments in the pursuit of preventing and fighting terror and crime however, this is an opinion; if it’s on the web, the dark web has it, and interested parties have it as well. Again, money is the kind of thing that makes the world go round.

At this junction, you may be wondering; “What devices are on the menu for Pegasus to peg?” Pegasus can peg Android, Blackberry, and iOS. Yes, Apple users, your coveted ecosystem prized Steve Jobs possessions aren’t safe from infiltration by viruses.

However, ironically the device to first discover the Pegasus spyware was through a failed attempt on an iPhone of a human rights activist that led to an investigation on the spyware back in 2016.  

men in black and red miliary uniform in a line.
Hey…what’s that virus doing over there?
Photo by Pixabay, please support by following @pexel.com

Active Protection

Right now, you’re probably wondering,” How can I detect or prevent this spyware from tracking me?” In most cases you would have some tell-tale signs that you may have an infection on your device however, this is not the case with Pegasus.

Though it may seem bleak, there are actions you can take to ensure you, your information, and your devices are safe. Following common best practices of keeping your OS (Operating System) up to date, not downloading any suspicious files from unknown sources, and not clicking on any links sent from someone you trust unless you’ve verified with them that they sent it.

Friendly confirmation can stop friendly fire.

man standing out in a field with a rifle.
To all those who read this and haven’t subscribed…I’m coming to collect. Z-Daddy is going to get his numbers.
Photo by Lukas, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you have any information to add on Pegasus? Script a comment below.