Feeds

Hoax Facebook virus makes more trouble than a real virus

Don't tell all your friends

Using blade systems to cut costs and sharpen efficiencies

A hoax Facebook virus is spreading rapidly across the social network.

Many users have been hoodwinked into forwarding an inaccurate warning about the spread of non-existent malware that claims a girl committed suicide over a post her father wrote on her Facebook wall.

No such tragedy has occurred but many are forwarding the wrong-headed message (extract below) creating confusion in the process.

WARNING: THERE IS A VIRUS GOING AROUND AGAIN, IF YOU SEE A GIRL WHO KILLED HERSELF OVER SOMETHING HER FATHER WROTE ON HER WALL DO NOT OPEN IT, IT IS A VIRUS AND IT WILL NOT ALLOW YOU TO DELETE IT, PLEASE PASS THIS ON BEFORE SOMEONE OPENS IT. (IT IS A SELF REPLICATING TROJAN)

People are passing on the warning in the mistaken belief they are helping Facebook friends to avoid a threat. In reality, they are spreading a hoax about a non-existent virus infection. The bogus warning is arguably causing more of a nuisance than a genuine malware infection, according to net security firm Sophos.

It adds that miscreants have exploited the confusion created by the warning by establishing Facebook pages that supposedly offer pictures from the fictitious girl's Facebook wall, but are really designed to make money by tricking surfers into wasting their time completing online surveys of dubious merit.

Malware hoaxes were part and parcel of net life long before the advent of social networking. Surfers are advised to check out warnings with reputable sources before spreading them along.

Internet rumours suggest a girl called Emma killed herself on Christmas Eve 2008 after being bullied on Facebook. However, supposed extracts of conversations that led up to this "tragic event" show "Like" buttons, a feature Facebook only introduced months later.

A more detailed explanation of the genesis of the hoax and its effects can be found in a blog post by Sophos here. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.