Hoax

What is a Hoax?

A computer virus hoax comprises sending out a false alert about a non-existent virus or malware via email or pop-up notifications, pushing recipients to forward it around.

These hoaxes frequently use startling language, stating that the virus has performed impossible behaviours, such as creating explosions or erasing all computer data. To increase credibility, they may falsely credit their origins to respectable computer organisations or mainstream media outlets. Although most hoaxes are harmless, some have caused users to remove critical system files under false pretences, potentially inflicting damage to their computers.

These hoaxes are usually easy to spot because they use dramatic language and exaggerated claims to create a sense of urgency and encourage mass distribution. Although hoaxes in and of themselves are undisruptive, the spread of them by well-intentioned people can cause needless anxiety and confusion. Anti-malware providers frequently offer tools to spot and disprove these scams, encouraging users to exercise caution before sharing alerts with other people.

Examples of Previously Circulated Computer Virus Hoax

  1. Good Times Virus: This hoax, which went viral in the 1990s, claimed to be a virus that would wipe out a recipient’s hard drive when they opened an email with the subject “Good Times.” It was fake that the Good Times Virus existed despite its dire warnings.
  2. ILOVEYOU Virus: The ILOVEYOU virus was a real threat that spread through email attachments in 2000 and did a great deal of damage, but there were later hoaxes that claimed new strains or comparable threats, which unnecessarily scared users.
  3. Hotmail Hoax: Early in the year 2000, a fake email went viral informing Hotmail customers that if they didn’t forward the message to a specific amount of recipients, their accounts would be cancelled. This scam exploited the panic that users would lose access to their email accounts.
  4. Bill Gates Email Tracking Hoax: In this hoax, users who sent the email would allegedly receive financial prizes, and it was stated that Microsoft and Bill Gates were undertaking an email tracking experiment. Sending the news around accomplished little more than spreading the hoax, as there was no such experiment.
  5. 911 Virus Hoax: After the September 11, 2001 attacks, fake emails went viral with the promise that opening an email with the subject “911” would infect the recipient’s computer with a virus that would erase all of its contents. This hoax took advantage of the increased anxiety and uncertainty caused by the tragic events.

Characteristics of Computer Virus Hoaxes

  1. Odd Claims: Hoaxes frequently make absurd or impractical claims about the alleged virus’s capabilities, including starting explosions or wiping out all of the computer’s files. Sensational wording in messages should raise suspicions.
  2. Urgent Language: Urgent language is a common tool used by hoaxes to convey a sense of urgency and motivate victims to take immediate action. Hoax alerts frequently include phrases like “Act now!” or “Forward this message immediately!”
  3. Chain Emails: A lot of scams propagate via chain emails that ask their victims to share the message with everyone they know. A communication is probably fake if it tells you to forward it to others in order to stop harm.
  4. False Authority: A common feature of hoaxes is their claimed affiliation with respectable organisations or governmental bodies. Before putting your reliance on a source, independently verify the information.
  5. Lack of Specifics: Hoaxes might not include detailed information about the virus, like its technical name, how it propagates, or how to get rid of it. Usually, legitimate warnings offer useful information to empower users to take preventative measures.
  6. No Confirmation: Check the legitimacy of a virus alert with reliable sources, such as antivirus software providers or the official websites of pertinent organisations, before acting upon it or sharing it.

How can iZOOlogic help my Company or Organisation?

Find out how iZOOlogic can protect you against threats of computer virus hoaxes with the Threat Intelligence solutions.

To find out more about how iZOOlogic can help protect your company’s cyber security, schedule a demo.