Archive
004
EXH-0041999Fictional reconstruction

Friday Afternoon

March 26, 1999. A Word macro arrives as list.doc from someone you know. By Monday the mail servers at Intel and Microsoft are holding tens of thousands of copies.

Type
Classic
Difficulty
Beginner
Era
1990s
Time
7 min

Briefing

The attachment is `list.doc`, same 40-name Outlook address book blast that made Melissa famous. You do not have live SMTP here. Read the samples the gateway already caught.

Your role

Email administrator watching queue depth spike during Melissa's first exponential hour.

Objective

From quarantine excerpts alone, identify the propagation mechanism and why the From: address looked trustworthy.

Terminal environment

user
analyst
host
msg-gw-east
cwd
/var/mail/exchange-mirror
steps
3
Enter the terminalAbout 7 minutesSafe simulation

Safety note. This is a safe reconstruction. All systems, files, hosts, credentials, and outputs are simulated. Do not use these techniques on systems you do not own or have explicit permission to test.