“Hoax.” is Malwarebytes’ detection name for a particular kind of riskware that tricks users into believing something that isn’t factual.
A virus hoax is typically spread via email chains, social media posts, and other methods, claiming to warn potential victims of a threat, often in an exaggerated tone. The classic example of this is the Teddy Bear virus hoax of 2002.
This hoax urged people to remove JDBGMGR.EXE, a file that has an icon that looks like a teddy bear. In fact, this executable is a legitimate Windows file known as the Java Debug Manager—thus, jdbgmgr. It is used by Java programmers. Microsoft’s Windows 3.1 development team used the teddy bear icon (dubbed the Microsoft Bear) in homage to their mascot. This icon is also regarded as one of the many hidden Easter eggs in Microsoft products through the years.
Malwarebytes protects users from hoax files in the form of an executable by using real-time protection.
Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.
The Exclusions tab includes a list of items to be excluded from scans. The items may include files, folders, websites, or applications that connect to the Internet, as well as previously detected exploits.
To access the exclusions in Malwarebytes:
If you want to allow the program to connect to the Internet, for example to fetch updates, add an exclusion of the type Exclude an application that Connects to the Internet and use the Browse button to select the file you wish to grant access.
Your intro to everything relating to cyberthreats, and how to stop them.