Hoax.

Short bio

“Hoax.” is Malwarebytes’ detection name for a particular kind of riskware that tricks users into believing something that isn’t factual.

Type and source of infection

A virus hoax is typically spread via email chains, social media posts, and other methods, claiming to warn potential victims of a threat, often in an exaggerated tone. The classic example of this is the Teddy Bear virus hoax of 2002.

This hoax urged people to remove JDBGMGR.EXE, a file that has an icon that looks like a teddy bear. In fact, this executable is a legitimate Windows file known as the Java Debug Manager—thus, jdbgmgr. It is used by Java programmers. Microsoft’s Windows 3.1 development team used the teddy bear icon (dubbed the Microsoft Bear) in homage to their mascot. This icon is also regarded as one of the many hidden Easter eggs in Microsoft products through the years.

Users can safely ignore hoaxes or validate supposed truthfulness by doing a simple Google search or visiting Snopes.com, Hoax-Slayer, or ThruthOrFiction.com.

Protection

Malwarebytes protects users from hoax files in the form of an executable by using real-time protection.

Add an exclusion

Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.

The Exclusions tab includes a list of items to be excluded from scans. The items may include files, folders, websites, or applications that connect to the Internet, as well as previously detected exploits.

To access the exclusions in Malwarebytes:

  • Click on the Settings tab in the left pane.
  • Click on the Exclusions tab.
  • Click the Add Exclusion button.
  • Select the exclusion type Exclude a File or Folder and use the Browse button to select the main folder for the software that you wish to keep.
  • Repeat this for any secondary folder(s) that belong to the software.

If you want to allow the program to connect to the Internet, for example to fetch updates, add an exclusion of the type Exclude an application that Connects to the Internet and use the Browse button to select the file you wish to grant access.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language