{"id":16010,"date":"2019-06-19T17:14:36","date_gmt":"2019-06-19T11:44:36","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=16010"},"modified":"2020-04-02T16:07:46","modified_gmt":"2020-04-02T10:37:46","slug":"what-is-hoax-report","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/what-is-hoax-report\/16010\/","title":{"rendered":"What is a hoax, where do hoaxes come from, and why are they dangerous?"},"content":{"rendered":"<p>Kaspersky products characterize certain software as \u201cHoax.\u201d Let\u2019s investigate what this verdict means, in which cases our products deliver that verdict, and why users should beware of such programs.<\/p>\n<h2>Astrologers announce the year of the Hoax: Detections double<\/h2>\n<p>The reason for this post is the increase in the number of detections our products have been making with the Hoax verdict. The number of users who have encountered such software has doubled in the past year. In short, more and more users are being caught in the risk zone. So it\u2019s worth taking the time to dissect the problem, starting with a brief background discussion.<\/p>\n<p>Many users complain of slow computer bootup and application startup times, and even system crashes with errors. It\u2019s a problem that just about everyone faces now and again. It happens because during operation the computer gets clogged up with all kinds of data, affecting its processing speed.<\/p>\n<p>Demand generates supply, so programs promising to speed up and scrub down the computer soon started multiplying. The rapid growth in such software began in the late 2000s and never stopped.<\/p>\n<p>Cleanup programs generally look for unused or temporary files, registry keys, startup programs, and so forth, and report the presence of such \u201cdigital garbage\u201d to the user, who then decides to have the program clean up the computer. That does improve overall system performance to some extent.<\/p>\n<p>Unfortunately, not all cleanup\/speed-up software is equally benign. Amid the ranks of honest developers who create programs to help users, there are a good many cybercriminals at play.<\/p>\n<h2>What is a Hoax?<\/h2>\n<p>Some programs for cleaning up the computer and improving performance force the user to pay to get rid of alleged detected threats. Two key features help distinguish the good guys from the bad:<\/p>\n<ul>\n<li>First, the latter deliberately mislead the user by greatly overstating the risk, or even reporting non-existent errors.<\/li>\n<li>Second, they <em>compel<\/em>, rather than <em>invite<\/em> users to make a purchase, declaring that without payment the problem cannot be solved.<\/li>\n<\/ul>\n<p>At Kaspersky, we call such programs <em>Hoax \u2014 software that intentionally misleads the user<\/em>. Here are some examples of verdicts that <a href=\"https:\/\/www.kaspersky.co.in\/internet-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener\">Kaspersky products<\/a> assign to such programs:<\/p>\n<ul>\n<li>HEUR:Hoax.Win32.Uniblue.gen<\/li>\n<li>Hoax.Win32.PCFixer.gen<\/li>\n<li>Hoax.Win32.DeceptPCClean.*<\/li>\n<li>Hoax.Win32.PCRepair.*<\/li>\n<li>HEUR:Hoax.Win32.PCRepair.gen<\/li>\n<li>HEUR:Hoax.MSIL.Optimizer.gen<\/li>\n<li>Hoax.Win32.SpeedUpMyPC.gen<\/li>\n<\/ul>\n<h3>How Hoax programs work<\/h3>\n<p>After installation, Hoax programs run a system scan. They scan everything that legitimate cleaners do. After the scan, the user sees a window with information about issues detected.<\/p>\n<p>And that\u2019s the main problem with this breed of software. The user is shown intimidating messages about the supposedly huge number of errors found in the system. Here is an example of a \u201ccleaner\u201d that overplays potential problems with registry keys:<\/p>\n<div id=\"attachment_27376\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163829\/what-is-hoax-report-scr1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27376\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163829\/what-is-hoax-report-scr1.png\" alt=\"Example of a cleaner exaggerating the significance of potential problems with registry keys\" width=\"760\" height=\"582\" class=\"size-full wp-image-16013\"><\/a><p id=\"caption-attachment-27376\" class=\"wp-caption-text\">Example of a cleaner exaggerating the significance of potential problems with registry keys<\/p><\/div>\n<p>Or the tool might find some real bugs, but then overstate the level of importance through deceptive language. For example, in this driver updater, the driver status varies from \u201cold\u201d to \u201cancient\u201d:<\/p>\n<div id=\"attachment_27377\" style=\"width: 773px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163835\/what-is-hoax-report-scr2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27377\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163835\/what-is-hoax-report-scr2.png\" alt=\"This tool rates the driver version installed in the system as \" old or width=\"763\" height=\"547\" class=\"size-full wp-image-16015\"><\/a><p id=\"caption-attachment-27377\" class=\"wp-caption-text\">This tool rates the driver version installed in the system as \u201cold,\u201d \u201cvery old,\u201d or \u201cancient\u201d<\/p><\/div>\n<p>Some programs refuse to close immediately when the user clicks the little x, instead displaying another window with the intimidating message \u201cDamage level: high.\u201d<\/p>\n<div id=\"attachment_27381\" style=\"width: 776px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163840\/what-is-hoax-report-scr3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27381\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163840\/what-is-hoax-report-scr3.png\" alt=\"Attempting to close the program causes another intimidating window to appear\" width=\"766\" height=\"571\" class=\"size-full wp-image-16017\"><\/a><p id=\"caption-attachment-27381\" class=\"wp-caption-text\">Attempting to close the program causes another intimidating window to appear<\/p><\/div>\n<p>Hoax programs also like to add themselves to autorun and flood the user with pop-up notifications that something is wrong with the computer.<\/p>\n<div id=\"attachment_27370\" style=\"width: 337px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163845\/what-is-hoax-report-scr4.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27370\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163845\/what-is-hoax-report-scr4.png\" alt=\"Hoax pop-up notification\" width=\"327\" height=\"337\" class=\"size-full wp-image-16019\"><\/a><p id=\"caption-attachment-27370\" class=\"wp-caption-text\">Hoax pop-up notification<\/p><\/div>\n<p>Hoax programs are not restricted to the Windows ecosystem. Here is an example of one for MacOS, with mildly high log\/cache usage is reported as critical.<\/p>\n<div id=\"attachment_27372\" style=\"width: 849px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163853\/what-is-hoax-report-scr5.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27372\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163853\/what-is-hoax-report-scr5.png\" alt=\"Example of a Hoax in MacOS\" width=\"839\" height=\"552\" class=\"size-full wp-image-16021\"><\/a><p id=\"caption-attachment-27372\" class=\"wp-caption-text\">Example of a Hoax in MacOS<\/p><\/div>\n<p>To resolve the issue, the user is told to acquire the full version of the software. When the full version is purchased, many of these programs really do rid the computer of what they found, but the need for such services is overstated, as mentioned above. Some Hoax programs may not clean the computer at all. So at best the user overpays, and at worst, they get nothing for their money.<\/p>\n<h3>Bundled adware and the chance to win a Trojan<\/h3>\n<p>In their greed, some creators of fraudulent cleaners go a step further and, in addition to their own handiwork, install other programs on the user\u2019s computer. It\u2019s usually adware, but in some cases, it can be a Trojan.<\/p>\n<p>For example, getting mixed up with a Hoax utility could result in a user\u2019s computer being partially blocked. The program pictured below expands to full screen, overlaps the toolbar, and blocks attempts to switch between programs by pressing Alt+Tab and to get back by pressing F11.<\/p>\n<div id=\"attachment_27378\" style=\"width: 1290px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163859\/what-is-hoax-report-scr6.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27378\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163859\/what-is-hoax-report-scr6.jpeg\" alt=\"A screen blocking the computer with the option to open remote access\" width=\"1280\" height=\"368\" class=\"size-full wp-image-16023\"><\/a><p id=\"caption-attachment-27378\" class=\"wp-caption-text\">A screen blocking the computer with the option to open remote access<\/p><\/div>\n<p>Next, the user is prompted to enter a code to unblock the computer (which, of course, they do not have), or to open remote access to it through TeamViewer, AnyDesk, or other remote access programs whose icons are placed conveniently at the right of the window.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n<h3> How a Hoax penetrates the computer<\/h3>\n<p>Hoax developers\u2019 target audience is inexperienced home users not very familiar with device operating systems or concerned about \u201ctaking out the trash\u201d and updating the system.<\/p>\n<p>When the computer starts to slow down noticeably, many users search online for solutions and may pick up a Hoax app if they are not careful.<\/p>\n<p>But there is also another distribution method. A Hoax is sometimes acquired through promotional offers or scam Web pages. An adware-based infection might look as follows:<\/p>\n<div id=\"attachment_27374\" style=\"width: 807px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163908\/what-is-hoax-report-scr7.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27374\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163908\/what-is-hoax-report-scr7.png\" alt=\"Example of an infection through adware offering to speed up the computer\" width=\"797\" height=\"481\" class=\"size-full wp-image-16025\"><\/a><p id=\"caption-attachment-27374\" class=\"wp-caption-text\">Example of an infection through adware offering to speed up the computer<\/p><\/div>\n<p>You may also encounter fraudulent pages offering cleanup\/speed-up \u201cservices\u201d when visiting dubious websites. For example, this page displays a notification that spyware was detected on the computer.<\/p>\n<div id=\"attachment_27375\" style=\"width: 1187px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163925\/what-is-hoax-report-scr8.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27375\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163925\/what-is-hoax-report-scr8.png\" alt=\"Example of a page mimicking a Microsoft site and scaring the user with viruses\" width=\"1177\" height=\"891\" class=\"size-full wp-image-16027\"><\/a><p id=\"caption-attachment-27375\" class=\"wp-caption-text\">Example of a page mimicking a Microsoft site and scaring the user with viruses<\/p><\/div>\n<p>Usually, the user is prompted either to call \u201ctechnical support\u201d (where money is extorted verbally), or to download a Hoax utility. Don\u2019t trust such pages for one second \u2014 just close them immediately.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-porno-try\">\n<p>Another increasingly common way to spread Hoax software is through browser pop-up notifications, which some users agree to for without thinking. Browser push notifications are now very popular (including among scammers), and they are starting to cause many user headaches.<\/p>\n<p>Not everyone understands how they work, where they come from, and how to disable them. Sometimes users are not even aware these notifications come through their browser, and that they may come from websites with less-than-pure intentions.<\/p>\n<div id=\"attachment_27380\" style=\"width: 566px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163931\/what-is-hoax-report-scr10.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27380\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163931\/what-is-hoax-report-scr10.png\" alt=\"Browser notifications redirecting users to download a Hoax utility\" width=\"556\" height=\"249\" class=\"size-full wp-image-16029\"><\/a><p id=\"caption-attachment-27380\" class=\"wp-caption-text\">Browser notifications redirecting users to download a Hoax utility<\/p><\/div>\n<p>After clicking such notifications, users are taken to fraudulent pages masked as security components. Here is an example of a fraudulent website simulating the Windows Defender interface:<\/p>\n<div id=\"attachment_27371\" style=\"width: 474px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163936\/what-is-hoax-report-scr11.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27371\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163936\/what-is-hoax-report-scr11.png\" alt=\"Fraudulent page simulating the Windows Defender interface\" width=\"464\" height=\"275\" class=\"size-full wp-image-16031\"><\/a><p id=\"caption-attachment-27371\" class=\"wp-caption-text\">Fraudulent page simulating the Windows Defender interface<\/p><\/div>\n<p>Once the user is sufficiently spooked by all the apparent problems with their computer, they are redirected to a Hoax download page.<\/p>\n<div id=\"attachment_27373\" style=\"width: 621px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163940\/what-is-hoax-report-scr12.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27373\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/06\/19163940\/what-is-hoax-report-scr12.png\" alt=\"Hoax download page\" width=\"611\" height=\"308\" class=\"size-full wp-image-16033\"><\/a><p id=\"caption-attachment-27373\" class=\"wp-caption-text\">Hoax download page<\/p><\/div>\n<h3>Hoax distribution statistics and geography<\/h3>\n<p>As mentioned at the start of the post, in late 2018 we observed a boom in activity in the market for fraudulent performance optimization software. That boom is ongoing. The number of affected users has doubled since the beginning of last year, with a corresponding rise in complaints.<\/p>\n<p>Our statistics show that the most popular target country for Hoax creators and distributors is Japan, where in recent years one in eight users has encountered it. Japan is followed by Germany and, surprisingly, Belarus. Italy and Brazil round out the top five.<\/p>\n<p>Antivirus developers are stemming the Hoax tide to some extent, with some fraudulent programs even banished from the \u201cmarket.\u201d<\/p>\n<p>In response, various Hoax distributors are abandoning the \u201cintimidation\u201d distribution model in favor of informing users more properly, not overly inflating the severity of the issues they find, and offering free trial versions of their products. All the same, the struggle is far from over.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n<h3>Why are Hoax apps bad?<\/h3>\n<p>We consider it important to warn users about Hoax-category programs for several reasons:<\/p>\n<ul>\n<li>The creators of such software deliberately mislead users by overstating the risk of the problems they detect \u2014 or even reporting nonexistent ones.<\/li>\n<li>Such \u201cservices\u201d can be unreasonably costly.<\/li>\n<li>Some Hoax programs do not address any real issues at all, and only create the illusion of fixing errors.<\/li>\n<li>A number of Hoax creators additionally install software ranging from adware to downright malware along with their programs.<\/li>\n<\/ul>\n<h2>How to protect against Hoax software<\/h2>\n<p>These tips will help you guard against the potential threat:<\/p>\n<ul>\n<li>Ignore intimidating warnings about viruses or errors on your computer displayed by websites. Never click on such warnings, let alone download and install anything.<\/li>\n<li>Take care to select a quality cleanup tool, if you want to use one; do some research and heed the advice of reputable computer publications.<\/li>\n<li>To avoid a rendezvous with a Hoax, install a <a href=\"https:\/\/www.kaspersky.co.in\/internet-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener\">reliable antivirus solution<\/a> that will warn you about fraudulent programs.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>What the Hoax verdict means, and why such software is becoming more of a problem.<\/p>\n","protected":false},"author":2511,"featured_media":16011,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2196],"tags":[80,367,28,352,504,591,706,527],"class_list":{"0":"post-16010","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-fraud","10":"tag-hoax","11":"tag-kaspersky","12":"tag-kaspersky-lab","13":"tag-products-2","14":"tag-report","15":"tag-research","16":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-hoax-report\/16010\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-hoax-report\/13517\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/what-is-hoax-report\/6299\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-is-hoax-report\/17906\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-hoax-report\/16041\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-is-hoax-report\/14784\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-is-hoax-report\/18710\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-is-hoax-report\/17501\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-is-hoax-report\/22878\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-is-hoax-report\/6087\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-hoax-report\/27282\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-is-hoax-report\/11878\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-is-hoax-report\/12020\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-is-hoax-report\/19583\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-is-hoax-report\/23480\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-is-hoax-report\/18554\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-hoax-report\/22772\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2511"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=16010"}],"version-history":[{"count":18,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16010\/revisions"}],"predecessor-version":[{"id":20181,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16010\/revisions\/20181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/16011"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=16010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=16010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=16010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}