One attack would change that in a significant way.
In late March 1999, a programmer named David Lee Smith hijacked an America Online (AOL) account & used it to post a file on an Internet newsgroup named “alt.sex.” The posting promised dozens of free passwords to fee-based websites with adult content. When users took the bait, downloading the document & then opening it with Microsoft Word, a virus was unleashed on their computers.
On March 26, it began spreading like wildfire across the Internet.
The Melissa virus, reportedly named by Smith for a stripper in Florida, started by taking over victims’ Microsoft Word program. It then used a macro to hijack their Microsoft Outlook email system & send messages to the first 50 addresses in their mailing lists. Those messages, in turn, tempted recipients to open a virus-laden attachment by giving it such names as “sexxxy.jpg” or “naked wife” or by deceitfully asserting, “Here is the document you requested ... don’t show anyone else ;-).” With the help of some devious social engineering, the virus operated like a sinister, automated chain letter.
The virus was not intended to steal money or information, but it wreaked plenty of havoc nonetheless. Email servers at more than 300 corporations & government agencies worldwide became overloaded, & some had to be shut down entirely, including at Microsoft. Approximately one million email accounts were disrupted, & Internet traffic in some locations slowed to a crawl.
Within a few days, cyber security experts had mostly contained the spread of the virus & restored the functionality of their networks, although it took some time to remove the infections entirely. Along with its investigative role, the FBI sent out warnings about the virus & its effects, helping to alert the public & reduce the destructive impacts of the attack. Still, the collective damage was enormous: an estimated $80 million for the cleanup & repair of affected computer systems.
Finding the culprit didn’t take long, thanks to a tip from a representative of AOL & nearly seamless cooperation between the FBI, New Jersey law enforcement, & other partners. Authorities traced the electronic fingerprints of the virus to Smith, who was arrested in northeastern New Jersey on April 1, 1999. Smith pleaded guilty in December 1999, & in May 2002, he was sentenced to 20 months in federal prison & fined $5,000. He also agreed to cooperate with federal & state authorities.
The Melissa virus, considered the fastest spreading infection at the time, was a rude awakening to the dark side of the web for many Americans. Awareness of the danger of opening unsolicited email attachments began to grow, along with the reality of online viruses & the damage they can do.
Like the Morris worm just over a decade earlier, the Melissa virus was a double-edged sword, leading to enhancements in online security while serving as inspiration for a wave of even more costly & potent cyberattacks to come.
For the FBI & its colleagues, the virus was a warning sign of a major germinating threat & of the need to quickly ramp up its cyber capabilities & partnerships.
Fittingly, a few months after Smith was sentenced, the Bureau put in place its new national Cyber Division focused exclusively on online crimes, with resources & programs devoted to protecting America’s electronic networks from harm. Twenty years later, with nearly everything in our society connected to the Internet, that cyber mission is more crucial than ever.