Email this Article Email   

CHIPS Articles: Identifying Hoaxes and Urban Legends

Identifying Hoaxes and Urban Legends
Chain letters can mask viruses and other malware
By Mindi McDowell and Allen Householder, US-CERT - October 20, 2014
Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or family members. Try to verify the information before following any instructions or passing the message along.

Why are chain letters a problem?

The most serious problem is from chain letters that mask viruses or other malicious activity. But even the ones that seem harmless may have negative repercussions if you forward them:

  • They consume bandwidth or space within the recipient's inbox;
  • They force people you know to waste time sifting through the messages and possibly taking time to verify the information; and
  • They spread hype and, often, unnecessary fear and paranoia.

What are some types of chain letters?

There are two main types of chain letters:

  • Hoaxes - Hoaxes attempt to trick or defraud users. A hoax could be malicious, instructing users to delete a file necessary to the operating system by claiming it is a virus. It could also be a scam that convinces users to send money or personal information. Phishing attacks could fall into this category.
  • Urban legends - Urban legends are designed to be redistributed and usually warn users of a threat or claim to be notifying them of important or urgent information. Another common form are the emails that promise users monetary rewards for forwarding the message or suggest that they are signing something that will be submitted to a particular group. Urban legends usually have no negative effect aside from wasted bandwidth and time.

How can you tell if the email is a hoax or urban legend?

Some messages are more suspicious than others, but be especially cautious if the message has any of the characteristics listed below. These characteristics are just guidelines—not every hoax or urban legend has these attributes, and some legitimate messages may have some of these characteristics:

  • Suggests tragic consequences for not performing some action;
  • Promises money or gift certificates for performing some action;
  • Offers instructions or attachments claiming to protect you from a virus that is undetected by anti-virus software;
  • Claims it's not a hoax;
  • Multiple spelling or grammatical errors, or the logic is contradictory;
  • Statement urging you to forward the message; and
  • Already been forwarded multiple times (evident from the trail of email headers in the body of the message).
  • If you want to check the validity of an email, refer to websites below:
    Urban Legends and Folklore - http://urbanlegends.about.com/ (link is external)
    Urban Legends Reference Pages - http://www.snopes.com/ (link is external)
    TruthOrFiction.com - http://www.truthorfiction.com/ (link is external)
    Symantec Security Response Hoaxes - http://www.symantec.com/avcenter/hoax.html (link is external)
    McAfee Security Virus Hoaxes - http://home.mcafee.com/VirusInfo/VirusHoaxes.aspx
    United States Computer Emergency Readiness Team (US-CERT) - https://www.us-cert.gov/

    Related CHIPS Articles
    Related DON CIO News
    Related DON CIO Policy
    CHIPS is an official U.S. Navy website sponsored by the Department of the Navy (DON) Chief Information Officer, the Department of Defense Enterprise Software Initiative (ESI) and the DON's ESI Software Product Manager Team at Space and Naval Warfare Systems Center Pacific.

    Online ISSN 2154-1779; Print ISSN 1047-9988