Are hackers using Good Morning videos, pictures and messages to hack your devices, and steal your data?
Find out what is happening, and what the FACTS really are!
Claim : Hackers Are Using Good Morning Messages To Hack You!
This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, has gone viral on social media and WhatsApp :
Hackers Using Good Morning Messages To Hack You : Just Another Hoax!
Many of get blasted with Good Morning or Good Night messages every day from well-meaning friends and family.
While they are literally spam that clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.
While it would be nice to see people stop this irritating practice, here are the reasons why Good Morning messages are harmless…
Fact #1 : Shanghai China International News Does Not Exist
The news organisation, Shanghai China International News, that was stated in the hoax does not exist.
Fact #2 : No Reports On Hackers Designing Good Morning Pictures + Videos
There are no reports on hackers from China or anywhere else creating these Good Morning pictures and videos.
In fact, they are mostly created by websites and Facebook pages for people to share, and hopefully attract new followers.
Fact #3 : No Fraud Involving Good Morning Messages
There has been no fraud involving Good Morning or even Good Night messages, videos or pictures.
Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case.
Fact #4 : Image-Based Malware Is Possible, But…
Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.
It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself. At most, it can be used to hide the malware payload from antivirus scanners.
In January 2019, cybercriminals created an online advertisement with a script. The script itself would appear innocuous and pass any check.
However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.
Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.
Fact #5 : Malicious Code Executes Immediately
If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.
Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.
Also, most malware require some sort of action to trigger their execution. Generally (but not always), just downloading a malware won’t trigger it.
- Fact Check : Lazada Delivery Man Caught Licking Package?
- How Honeywell Is Helping Industries Tackle COVID-19
- RMCO / PKPP in Malaysia : New SOP for December 2020!
- Peninsular Malaysia CMCO : New December 2020 SOP!
- Pfizer COVID-19 Vaccine : 2020 Production Cut Explained!
- Sony PG Tec Facility Will Close By September 2021!
- Why Pfizer + Moderna mRNA Vaccines Are Not Good Enough
- Dell EMC PowerProtect Cyber Recovery for Sheltered Harbor!
- PowerProtect Data Manager Nov 2020 Update: What’s New?
- 2020 Dell EMC PowerProtect DP Series IDPA : What’s New?
- Is Gadget Radiation Killing Kids Forced To Study At Home?
- Lazada RedMart Data Breach : What You Need To Know!
- Fact Check : Avoiding The Future Plague, The Viral 1956 PSA!
- VMware vSphere 7 Now Supports AMD SEV-ES Encryption!
- How Hackers Attack Healthcare During COVID-19 Pandemic!
- Scam Alert : Bank Negara Malaysia Scam Email!
- WD NAS Can’t Be Seen In Windows? Here Are The Solutions!
- HUAWEI 5G Aces GSMA NESAS Security Audit : The Impact?
- AMD CDNA Architecture : Tech Highlights!
- AMD Instinct MI100 : 11.5 TFLOPS In A Single Card!
Go Back To > Cybersecurity | Software | Home
Support Tech ARP!