Can hackers use Good Morning videos, pictures and messages to hack your devices, and steal your data?!
Find out what is happening, and what the FACTS really are!
Updated @ 2023-04-21 : Updated with a new 2023 version of the hoax
Originally posted @ 2022-11-01
Claim : Hackers Are Using Good Morning Messages To Hack You!
This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, keeps going viral on social media and WhatsApp.
It’s a long message, so just skip to the next section for the facts!
Dear friends, please delete all welcome photos and videos in Good Morning format and the like. Read below the article to the end, which will be clear why I ask about it. From now on I will only send personally prepared greetings.
Read all! Please send this message urgently to as many friends as possible to prevent illegal intrusion.
Warning from Olga Nikolaevnas lawyer:
Recommended : Can Approve New Participant block WhatsApp hackers?!
Truth : Good Morning Greetings Not Being Used To Hack You!
Many of us get spammed with Good Morning or Good Night messages every day from family and friends.
While they often clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.
Here are the reasons why Good Morning messages are very irritating, but harmless…
Fact #1 : Shanghai China International News Does Not Exist
The news organisation that was claimed to be the source of this warning – Shanghai China International News – does not exist!
Fact #2 : Good Morning Greetings Not Created By Hackers
Hackers (from China or anywhere else) have better things to do than to create these Good Morning pictures and videos.
They are mostly created by websites and social media influencers for people to share and attract new followers.
Recommended : Scam Alert : Watch Out For Telegram Phishing Attack!
Fact #3 : No Fraud Involving Good Morning Messages
There has been no known fraud involving Good Morning or even Good Night messages, videos or pictures.
Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case…. because it never happened.
Fact #4 : Image-Based Malware Is Possible, But…
Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.
It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself.
At most, it can be used to hide the malware payload from antivirus scanners, which is pretty clever to be honest…
Recommended : How To Block Facebook Ads + Pay Scammers!
Fact #5 : Image-Based Malware Requires User Action
In January 2019, cybercriminals created an online advertisement with a script that appears innocuous and would pass any malware check.
However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.
Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.
Such a clever way to bypass malware checks, but even so, this image-based malware requires user action.
You cannot get infected by the Trojan if you practice good “Internet hygiene” by not downloading or installing anything from unknown websites.
Fact #6 : Malicious Code Executes Immediately
If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.
Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.
There is really no reason for malware to wait before it infects your devices. Waiting will only increase the risk of detection.
Whether the malware serves to take over your device, steal your information or encrypt it for ransom, it pays to do it at the first opportunity.
Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
- MSI Users At Risk Of Rogue BIOS / Firmware Updates!
- MSI Hit By $4 Million Ransomware Attack + Data Theft!
- Did US Pay For COVID-19 Research Before It Existed?!
- Can Approve New Participant block WhatsApp hackers?!
- Scam Alert : Watch Out For Telegram Phishing Attack!
Go Back To > Cybersecurity | Software | Tech ARP
Support Tech ARP!
Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!