Bad Times

Last updated

Bad Times is a computer virus hoax sent out by e-mail. This "virus" does not actually exist, and the "warning" is meant to parody the alarmist message that spread the hoax of the Goodtimes virus hoax.

The "Badtimes" email followed the principles of "Goodtimes", by warning of the horrible consequences that the alleged virus could inflict. However, "Badtimes" attempted to make itself implausible even to people unfamiliar with computers, although it started by claiming that the virus would wipe the victim's computer hard disk drive: implausible claims that "Badtimes" made included using subspace field harmonics to scratch any CDs that the victim attempted to play, drinking all the beer, and leaving dirty socks on the coffee table when the victim expected company. [1] Some versions of "Badtimes" claimed that the virus replaced lunch meat with Spam, while making the victim's cologne and perfume smell like pickled cucumber. [2]

It is unclear whether the "Badtimes" email can be classed as a joke or a hoax: in June 2006, Sophos acknowledged that "Badtimes" meant to parody virus hoax emails, but nevertheless advised against forwarding the joke email, in case the recipients misunderstood the threat to be real. [2]

The hoax inspired a musical version, by the group Laika, where the female lyricist recites the contents of one of the versions of the virus.

The "Weird Al" Yankovic song "Virus Alert" contains several similar claims in its lyrics.

Related Research Articles

The Goodtimes virus, also styled as Good Times virus, was a computer virus hoax that spread during the early years of the Internet's popularity. Warnings about a computer virus named "Good Times" began being passed around among Internet users in 1994. The Goodtimes virus was supposedly transmitted via an email bearing the subject header "Good Times" or "Goodtimes", hence the virus's name, and the warning recommended deleting any such email unread. The virus described in the warnings did not exist, but the warnings themselves were, in effect, virus-like. In 1997 the Cult of the Dead Cow hacker collective announced that they had been responsible for the perpetration of the "Good Times" virus hoax as an exercise to "prove the gullibility of self-proclaimed 'experts' on the Internet".

A chain letter is a message that attempts to convince the recipient to make a number of copies and pass them on to a certain number of recipients. The "chain" is an exponentially growing pyramid that cannot be sustained indefinitely.

<span class="mw-page-title-main">Hoax</span> Deliberately fabricated falsehood masquerading as truth

A hoax is a widely publicized falsehood so fashioned as to invite reflexive, unthinking acceptance by the greatest number of people of the most varied social identities and of the highest possible social pretensions to gull its victims into putting up the highest possible social currency in support of the hoax.

<i>Homestar Runner</i> American Flash-animated comedy web series

Homestar Runner is an American Flash animated comedy web series and website created by Mike and Matt Chapman, known collectively as The Brothers Chaps. The series centers on the adventures of a large and diverse cast of characters, headed by the lovable yet dense athlete Homestar Runner. It uses a blend of surreal humour, self-parody, and references to popular culture, in particular video games, classic television, and popular music.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

<span class="mw-page-title-main">Email spam</span> Unsolicited electronic advertising by e-mail

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming).

Faxlore is a sort of folklore: humorous texts, folk poetry, folk art, and urban legends that are circulated, not by word of mouth, but by fax machine. Xeroxlore or photocopylore is similar material circulated by photocopying; compare samizdat in Soviet-bloc countries.

Sophos Group plc is a British based security software and hardware company. Sophos develops products for communication endpoint, encryption, network security, email security, mobile security and unified threat management. Sophos is primarily focused on providing security software to 1- to 5,000-seat organizations. While not a primary focus, Sophos also protects home users, through free and paid antivirus solutions intended to demonstrate product functionality. It was listed on the London Stock Exchange until it was acquired by Thoma Bravo in February 2020.

Norton AntiVirus is an anti-virus or anti-malware software product founded by Peter Norton, developed and distributed by Gen Digital since 1991 as part of its Norton family of computer security products. It uses signatures and heuristics to identify viruses. Other features included in it are e-mail spam filtering and phishing protection.

SULFNBK.EXE is an internal component of the Microsoft Windows operating system for restoring long file names.

<span class="mw-page-title-main">Ransomware</span> Malicious software used in ransom demands

Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

Tuxissa is a fictional computer virus hoax made up by Humorix, a humor website on Linux.

A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipients to forward it to everyone they know, but it can also be in the form of a pop-up window.

<span class="mw-page-title-main">Rogue security software</span> Form of malicious software

Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer. It is a form of scareware that manipulates users through fear, and a form of ransomware. Rogue security software has been a serious security threat in desktop computing since 2008. An early example that gained infamy was SpySheriff and its clones.

<span class="mw-page-title-main">Swatting</span> Act of hoaxing an armed emergency response to a victims home

Swatting is a criminal harassment tactic of deceiving an emergency service into sending a police or emergency service response team to another person's address. This is triggered by false reporting of a serious law enforcement emergency, such as a bomb threat, murder, hostage situation, or a false report of a mental health emergency, such as reporting that a person is allegedly suicidal or homicidal and may or may not be armed, among other things.

Koobface is a network worm that attacks Microsoft Windows, Mac OS X, and Linux platforms. This worm originally targeted users of networking websites like Facebook, Skype, Yahoo Messenger, and email websites such as GMail, Yahoo Mail, and AOL Mail. It also targets other networking websites, such as MySpace, Twitter, and it can infect other devices on the same local network. Technical support scammers also fraudulently claim to their intended victims that they have a Koobface infection on their computer by using fake popups and using built-in Windows programs.

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. It is also used to install the CryptoLocker ransomware. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek. Similarly to Koobface, Zeus has also been used to trick victims of technical support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected.

Mac Defender is an internet rogue security program that targets computers running macOS. The Mac security firm Intego discovered the fake antivirus software on 2 May 2011, with a patch not being provided by Apple until 31 May. The software has been described as the first major malware threat to the Macintosh platform. However, it is not the first Mac-specific Trojan, and is not self-propagating.

Gruel is a worm first surfaced in 2003 targeting Microsoft Windows platforms. It spreads via email and file sharing networks.

<span class="mw-page-title-main">Technical support scam</span> Type of fraud and confidence trick

A technical support scam, or tech support scam, is a type of fraud in which a scammer claims to offer a legitimate technical support service. Victims contact scammers in a variety of ways, often through fake pop-ups resembling error messages or via fake "help lines" advertised on websites owned by the scammers. Technical support scammers use social engineering and a variety of confidence tricks to persuade their victim of the presence of problems on their computer or mobile device, such as a malware infection, when there are no issues with the victim's device. The scammer will then persuade the victim to pay to fix the fictitious "problems" that they claim to have found. Payment is made to the scammer through ways which are hard to trace and have fewer consumer protections in place which could allow the victim to claim their money back, usually through gift cards.

References

  1. Greenspan, Todd (17 March 1998). "Here's my favorite "VIRUS WARNING"". GNU Operating System. Free Software Foundation. Archived from the original on 28 December 2022. Retrieved 28 December 2022.
  2. 1 2 "Badtimes". Sophos. Abingdon. 8 June 2006. Archived from the original on 9 July 2017. Retrieved 28 December 2022.