Most hoaxes are sensational in nature and easily identified by the fact that they indicate that the virus will do nearly impossible things, like blow up the recipient's computer and set it on fire, or less sensationally, delete everything on the user's computer. They often include fake announcements claimed to originate from reputable computer organizations together with mainstream news media. These bogus sources are quoted in order to give the hoax more credibility. Typically, the warnings use emotive language, stress the urgent nature of the threat and encourage readers to forward the message to other people as soon as possible.
Virus hoaxes are usually harmless and accomplish nothing more than annoying people who identify it as a hoax and waste the time of people who forward the message. Nevertheless, a number of hoaxes have warned users that vital system files are viruses and encourage the user to delete the file, possibly damaging the system. Examples of this type include the jdbgmgr.exe virus hoax and the SULFNBK.EXE hoax.
Some consider virus hoaxes and other chain e-mails to be a computer worm in and of themselves. They replicate by social engineering—exploiting users' concern, ignorance, and disinclination to investigate before acting.
Hoaxes are distinct from computer pranks, which are harmless programs that perform unwanted and annoying actions on a computer, such as randomly moving the mouse, turning the screen display upside down, etc.
We are advising users who receive the email to delete it and DO NOT pass it on as this is how an email HOAX propagates.
Do not forward hoax messages.
Hoax warnings are typically scare alerts started by malicious people – and passed on by innocent individuals that think they are helping the community by spreading the warning.
Corporate users can get rid of the hoax problem by simply setting a strict company guideline: End users must not forward virus alarms. Ever. It's not the job of an end user anyway. If such message is received, end users could forward it to the IT department but not to anyone else.
List of computer virus hoaxes
|Antichrist||(none)||Monmouth(uk)||Dylan Nicholas||This is a hoax that warned about a supposed virus discovered by Microsoft and McAfee named "Antichrist", telling the user that it is installed via an e-mail with the subject line: "SURPRISE?!!!!!!!!!!" after which it destroys the zeroth sector of the hard disk, rendering it unusable.|
|Black in the White House'||Black Muslim in the White House||A chain message beginning around 2006. It begins with the message warning of a virus that hides in an attachment labeled Black in Whitehouse or something similar, saying that if you open it, then it opens an Olympic Torch that burns down the C disk.|
|Budweiser Frogs||BUDSAVER.EXE||Unknown||Unknown||Supposedly would erase the user's hard drive and steal the user's screen name and password.|
|Goodtimes virus||(none)||Unknown||Unknown||Warnings about a computer virus named "Good Times" began being passed around among Internet users in 1994. The Goodtimes virus was supposedly transmitted via an email bearing the subject header "Good Times" or "Goodtimes," hence the virus's name, and the warning recommended deleting any such email unread. The virus described in the warnings did not exist, but the warnings themselves, were, in effect, virus-like.|
|Invitation attachment (computer virus hoax)||(Allright now/I'm just sayin)||Michiana Shores, Long Beach, Jamestown Manor, Michigan City (IN), Schaumburg (IL)||Jim Flanagan||The invitation virus hoax involved an e-mail spam in 2006 that advised computer users to delete an email, with any type of attachment that stated "invitation" because it was a computer virus. This is also known as the Olympic Torch virus hoax (see below).|
|Jdbgmgr.exe||(bear.a)||Unknown||Unknown||The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).|
|Life is beautiful||Life is wonderful||Unknown||Supposedly, a hacker with the alias "Life owner" or "Dono da vida"||The hoax was spread through the Internet around January 2001 in Brazil. It was a virus attached to an e-mail, which was spread around the Internet. The attached file was supposedly called "Life is beautiful.pps" or "La vita è bella.pps".|
|NVISION DESIGN, INC. games ("Frogapult," "Elfbowl")||Sometimes included their other game "Y2KGame"||Unknown||Unknown||Programs were actual, legitimate computer games; author claimed that they were viruses which would "wipe out" the user's hard drive on Christmas Day.|
|Olympic Torch||Postcard or Postcard from Hallmark||Unknown||Unknown||Olympic Torch is a computer virus hoax sent out by e-mail. The hoax e-mails first appeared in February 2006. The "virus" referred to by the e-mail does not actually exist. The hoax e-mail warns recipients of a recent outbreak of "Olympic Torch" viruses, contained in e-mails titled "Invitation", which erase the hard disk of the user's computer when opened. The hoax email further purports the virus to be acknowledged by such reputable sources as CNN, McAfee and Microsoft as one of the most dangerous viruses yet reported.
Of course this email, which was started in February 2006, is safe to delete when you want.
|SULFNBK.EXE Warning||none||Unknown||Unknown||SULFNBK.EXE (short for Setup Utility for Long File Name Backup) is an internal component of the Microsoft Windows operating system (in Windows 98 and Windows Me) for restoring long file names. The component became famous in the early 2000s as the subject of an e-mail hoax. The hoax claimed that SULFNBK.EXE was a virus, and contained instructions to locate and delete the file. While the instructions worked, they were needless and (in some rare cases, for example, when the long file names are damaged and need to be restored) can cause disruptions, as SULFNBK.EXE is not a virus, but instead an operating system component.|
A telephone scam, operated from call centres based in Kolkata, India, has been active since 2008. The victim is quoted his or her name and address, and is told: "I'm calling for Microsoft (or an entity that sounds like it is connected to Microsoft, such as the "Windows Service Center" or "Windows Technical Department"). We've had a report from your internet service provider of serious virus problems from your Windows computer." The victim is then directed to open the Windows event viewer, which displays apparently critical warnings, and is directed to a website to download an application to allow the scammer to control his or her computer remotely. The caller supposedly fixes the problems and demands a fee for the service. However, the process usually enables malware to be downloaded to the victim's computer.
The virus hoax has become part of the culture of the twenty-first century and the gullibility of novice computer users convinced to delete files on the basis of hoaxes has been parodied in several popular jokes and songs.
One such parody is "Weird Al" Yankovic's song "Virus Alert" from the album Straight Outta Lynwood. The song makes fun of the exaggerated claims that are made in virus hoaxes, such as legally changing your name or opening a rift in time and space.
Another parody of virus hoaxes is the honor system virus which has been circulated under the name Amish Computer Virus, manual virus, the Blond Computer Virus, the Irish Computer Virus, the Syrian Computer Virus, the Norwegian Computer Virus, Newfie Virus, the Unix Computer Virus, the Mac OS 9 virus, Discount virus and many others. This joke email claims to be authored by the Amish or other similar low-technology populations who have no computers, programming skills or electricity to create viruses and thus ask you to delete your own hard drive contents manually after forwarding the message to your friends.
The Tuxissa virus is another parody of the virus hoax, based on the concept of the Melissa virus, but with its aim of installing Linux on the victim's computer without the owner's permission. The story says that it was spread via e-mail, contained in a message titled "Important Message About Windows Security". It was supposed to first spread the virus to other computers, then download a stripped-down version of Slackware and uncompress it onto the hard disk. The Windows Registry is finally deleted and the boot options changed. Then the virus removes itself when it reboots the computer at the end, with the user facing the Linux login prompt and all his Windows security problems solved for him.
- List of computer viruses
- List of trojan horses
- Timeline of notable computer viruses and worms
- Mikkelson, Barbara and David P. (January 2008). "JDBGMGR.EXE Virus". Retrieved 2011-08-08.
- Mikkelson, Barbara and David P. (January 2008). "SULFNBK.EXE Virus". Retrieved 2011-08-08.
- McAfee, Inc (December 2003). "Virus Profile: A Virtual Card For You Hoax". Retrieved 2011-08-08.
- F-Secure Corporation (2009). "Hoax Warnings". Retrieved 2012-06-14.
- Gutierrez, Ralph (July 2001). "Antichrist Hoax". Retrieved 2011-08-08.
- "Black Muslim in the White House". snopes.com. 20 June 2013. Retrieved 17 January 2014.
- Mikkelson, Barbara and David P. (January 2008). "Budweiser Frogs Virus". Retrieved 2011-08-08.
- Jones, Les (December 1998). "Good Times Virus Hoax Frequently Asked Questions". Retrieved 2011-08-08.
- Christensen, Brett M. (2008). "Olympic Torch Invitation Virus Hoax". Retrieved 2011-08-08.
- Koris, George (2002-01-15). "Life is beautiful Hoax". Symantec.com. Symantec. Retrieved 2011-08-08.
- Symantec Corporation (February 2007). "FROGAPULT, ELFBOWL, Y2KGAME Virus Hoax". Retrieved 2011-08-08.
- Charles Arthur (18 July 2010). "Virus phone scam being run from call centres in India". Guardian News and Media Limited. Retrieved 1 May 2012.
- "Weird Al unleashes his new album with a Bill Plympton Video DON'T DOWNLOAD THIS SONG!!!". Ain't It Cool News. 2006-09-11. Retrieved 2011-08-08.
- Pearson, Karl (May 2000). "Humor: For a good time....". Retrieved 2011-08-08.
- Baughn, James (March 1999). "Attack of the Tuxissa Virus". Retrieved 2009-04-17.
- McAfee virus hoaxes
- Symantec Threat Explorer
- Trend Micro Virus Encyclopedia
- Sector Zero/Virtual Card for You Email