[ Home Page ]
virus hoax collection
A virus hoax is a false virus warning that is often spread through
e-mail causing confusion and panic. On this page you can find some of the
funniest ones.
If you receive a virus warning you should ALWAYS veryify it
by checking a antivirus companys homepage or by contacting your MIS / IT
department.
Other virus hoaxes that aren't mentioned here are:
PKZIP 300
Irina
Good Times
Deeyenda Maddick
Ghost
Make Money Fast
Naughty Robot
PenPal Greetings
Eyes
Sheep
3b Trojan (alias PKZIP Virus)
Death69
Red Alert
AOL 4 Free (can also be a real virus)
Matra R-440 Crotale
YUKON3U.mp
Join the Crew
Cancer chain letter
Hacker Riot
2400 baud modem virus
One of the first virus hoaxes was the 2400 baud modem virus
SUBJ: Really Nasty Virus
AREA: GENERAL
I've just discovered probably the world's worst computer virus
yet. I had just finished a late night session of BBS'ing and file
treading when I exited Telix 3 and attempted to run pkxarc to
unarc the software I had downloaded. Next thing I knew my hard
disk was seeking all over and it was apparently writing random
sectors. Thank god for strong coffee and a recent backup.
Everything was back to normal, so I called the BBS again and
downloaded a file. When I went to use ddir to list the directory,
my hard disk was getting trashed again. I tried Procomm Plus TD
and also PC Talk 3. Same results every time. Something was up so I
hooked up to my test equipment and different modems (I do research
and development for a local computer telecommunications company
and have an in-house lab at my disposal). After another hour of
corrupted hard drives I found what I think is the world's worst
computer virus yet. The virus distributes itself on the modem sub-
carrier present in all 2400 baud and up modems. The sub-carrier is
used for ROM and register debugging purposes only, and otherwise
serves no other (sp) purpose. The virus sets a bit pattern in one
of the internal modem registers, but it seemed to screw up the
other registers on my USR. A modem that has been "infected" with
this virus will then transmit the virus to other modems that use a
subcarrier (I suppose those who use 300 and 1200 baud modems
should be immune). The virus then attaches itself to all binary
incoming data and infects the host computer's hard disk. The only
way to get rid of this virus is to completely reset all the modem
registers by hand, but I haven't found a way to vaccinate a modem
against the virus, but there is the possibility of building a
subcarrier filter. I am calling on a 1200 baud modem to enter this
message, and have advised the sysops of the two other boards
(names withheld). I don't know how this virus originated, but I'm
sure it is the work of someone in the computer telecommunications
field such as myself. Probably the best thing to do now is to
stick to 1200 baud until we figure this thing out.
Mike RoChenle
60 Hz
The 2400 baud modem bogus virus description spawned a humorous alert by Robert Morris III :
Date: 11-31-88 (24:60)
To: ALL Refer#: NONE
From: ROBERT MORRIS III
Subj: VIRUS ALERT Status: PUBLIC MESSAGE
Warning: There's a new virus on the loose that's worse than
anything I've seen before! It gets in through the power line,
riding on the powerline 60 Hz subcarrier. It works by changing the
serial port pinouts, and by reversing the direction one's disks
spin. Over 300,000 systems have been hit by it here in Murphy,
West Dakota alone! And that's just in the last 12 minutes.
It attacks DOS, Unix, TOPS-20, Apple-II, VMS, MVS, Multics, Mac,
RSX-11, ITS, TRS-80, and VHS systems.
To prevent the spresd of the worm:
1) Don't use the powerline.
2) Don't use batteries either, since there are rumors that this virus has
invaded most major battery plants and is infecting the positive poles
of the batteries. (You might try hooking up just the negative pole.)
3) Don't upload or download files.
4) Don't store files on floppy disks or hard disks.
5) Don't read messages. Not even this one!
6) Don't use serial ports, modems, or phone lines.
7) Don't use keyboards, screens, or printers.
8) Don't use switches, CPUs, memories, microprocessors, or mainframes.
9) Don't use electric lights, electric or gas heat or airconditioning,
running water, writing, fire, clothing or the wheel.
I'm sure if we are all careful to follow these 9 easy steps, this
virus can be eradicated, and the precious electronic fluids of
our computers can be kept pure.
---RTM III
Good Times Spoof
This is a humorous version of the goodtimes virus.
The latest breaking news on the GOODTIMES virus.
It turns out that this so-called hoax virus is very dangerous after
all. Goodtimes will re-write your hard drive. Not only that, it will
scramble any disks that are even close to your computer. It will
recalibrate your refrigerator's coolness setting so all your ice
cream goes melty. It will demagnetize the strips on all your credit
cards, screw up the tracking on your television and use subspace
field harmonics to scratch any CDs you try to play.
It will give your ex-girlfriend your new phone number. It will mix
Kool-aid into your fishtank. It will drink all your beer and leave
dirty socks on the coffee table when company comes over. It will
put a dead kitten in the back pocket of your good suit pants and
hide your car keys when you are late for work.
Goodtimes will make you fall in love with a penguin. It will give
you nightmares about circus midgets. It will pour sugar in your gas
tank and shave off both your eyebrows while dating your girlfriend
behind your back and billing the dinner and hotel room to your
Discover card.
It will seduce your grandmother. It does not matter if she is dead,
such is the power of Goodtimes, it reaches out beyond the grave to
sully those things we hold most dear.
It moves your car randomly around parking lots so you can't find it.
It will kick your dog. It will leave libidinous messages on your
boss's voice mail in your voice! It is insidious and subtle. It is
dangerous and terrifying to behold. It is also a rather interesting
shade of mauve.
Goodtimes will give you Dutch Elm disease. It will leave the toilet
seat up. It will make a batch of Methanphedime in your bathtub and
then leave bacon cooking on the stove while it goes out to chase
gradeschoolers with your new snowblower.
Free Money
There is a computer virus that is being sent across the Internet. If you
receive an e-mail message with the subject line "Free Money," DO NOT read
the message. DELETE it immediately, UNPLUG your computer, then BURN IT to
ASHES in a government-approved toxic waste disposal INCINERATOR.
Once a computer is infected, it will be TOO LATE. Your computer will begin
to emit a vile ODOR. Then it will secrete a foul, milky DISCHARGE. Verily,
it shall SCREECH with the tortured, monitor-shattering SCREAM of 1,000
hell-scorched souls, drawing unwanted attention to your cubicle from
co-workers and supervisors alike. After violently ripping itself from the
wall, your computer will punch through your office window as it STREAKS
into the night, HOWLING like a BANSHEE. Once free, it will spend the rest
of its days CRUSHING household PETS and MOCKING the POPE.
Independence hoax
This was a joke, which was distributed as an official-looking CERT alert
and was based on the movie 'Independence Day'. Here is the original
message:
Independence Day - CERT alert
--------------------
From: CERT Bulletin
Newsgroups: comp.security.announce,rec.humor
Subject: CERT Advisory CA-96.13 - Alien/OS Vulnerability
Date: 4 July 1996 20:52:15 GMT
Organization: CERT(sm) Coordination Center - +1 412-268-7090
====================
CERT(sm) Advisory CA-96.13
July 4, 1996
Topic: ID4 virus, Alien/OS Vulnerability
--------------------
The CERT Coordination Center has received reports of weaknesses in
Alien/OS that can allow species with primitive information sciences
technology to initiate denial-of-service attacks against MotherShip(tm)
hosts. One report of exploitation of this bug has been received.
When attempting takeover of planets inhabited by such races, a trojan
horse attack is possible that permits local access to the MotherShip
host, enabling the implantation of executable code with full root access
to mission-critical security features of the operating system.
The vulnerability exists in versions of EvilAliens' Alien/OS 34762.12.1
or later, and all versions of Microsoft's Windows/95. CERT advises
against initiating further planet takeover actions until patches
are available from these vendors. If planet takeover is absolutely
necessary, CERT advises that affected sites apply the workarounds as
specified below.
As we receive additional information relating to this advisory, we will
place it in
ftp://info.cert.org/pub/cert_advisories/CA-96.13.README
We encourage you to check our README files regularly for updates on
advisories that relate to your site.
--------------------
I. Description
Alien/OS contains a security vulnerability, which strangely enough
can be exploited by a primitive race running Windows/95. Although
Alien/OS has been extensively field tested over millions of years by
EvilAliens, Inc., the bug was only recently discovered during a
routine invasion of a backwater planet. EvilAliens notes that
the operating system had never before been tested against a race
with "such a kick-ass president."
The vulnerability allows the insertion of executable code with
root access to key security features of the operating system. In
particular, such code can disable the NiftyGreenShield (tm)
subsystem, allowing child processes to be terminated by unauthorized
users.
Additionally, Alien/OS networking protocols can provide a
low-bandwidth covert timing channel to a determined attacker.
II. Impact
Non-privileged primitive users can cause the total destruction of
your entire invasion fleet and gain unauthorized access to
files.
III. Solution
EvilAliens has supplied a workaround and a patch, as follows:
A. Workaround
To prevent unauthorized insertion of executables, install a
firewall to selectively vaporize incoming packets that do not
contain valid aliens. Also, disable the "Java" option in
Netscape.
To eliminate the covert timing channel, remove untrusted
hosts from routing tables. As tempting as it is, do not use
target species' own satellites against them.
B. Patch
As root, install the "evil" package from the distribution tape.
(Optionally) save a copy of the existing /usr/bin/sendmail and
modify its permission to prevent misuse.
--------------------
The CERT Coordination Center thanks Jeff Goldblum and Fjkxdtssss for
providing information for this advisory.
--------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident
Response and Security Teams (FIRST).
We strongly urge you to encrypt any sensitive information you send by
email. The CERT Coordination Center can support a shared DES key and
PGP. Contact the CERT staff for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
CERT Contact Information
--------------------
Email cert@cert.org
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
CERT publications, information about FIRST representatives, and other
security-related information are available for anonymous FTP from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for CERT advisories and bulletins,
send your email address to
cert-advisory-request@cert.org
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission
provided it is used for noncommercial purposes and the copyright
statement is included.
CERT is a service mark of Carnegie Mellon University.
[ Home Page ]
[ GeoCities ]
[ Silicon Valley ]
visitors:
last modified: 1999-12-31