Moneymaking schemes through the proliferation of malicious software tend to be volatile. As some techniques go obsolete, prevalently due to law enforcement countermeasures, new or previously dormant approaches don’t fail to occupy the vacant niche in an amazingly short time span. More likely than not, this pattern is precisely characteristic of the interrelation between the downswing of pushy scareware and the enormous rise of browser hijackers at large.
Browser hijacking is a term denoting unauthorized modification of web browser settings, such as the homepage or search preferences aimed at intrusive ad delivery. In the IT security circles, this concept is often associated with adware, a type of potentially unwanted programs (PUP) whose objective is to impose excessive advertising upon compromised computer users. This sort of activity is believed to have originated back in 1999 with the launch of the infamous Gator adware campaign.
Later on, even reputable companies such as the Charter ISP, EarthLink and Verisign have scandalously ventured to redirect bad DNS queries to ad-powered search pages rather than error code pages. Whereas such dubious practice by these particular companies went defunct in the light of overall disapproval and lawsuits filed, cybercrime actors never abandoned this malicious goldmine.
The contemporary hijackers such as WSE_Astromenda or Conduit Search are mimicking the regular browser extensions in many ways: they are professionally tailored and exhibit cross-browser compatibility, sleek looks and smooth functioning. Below the tip of the iceberg, though, there are corrupt features such as the bundling approach leveraged for covert infiltration as well as circumventing user consent when custom browser parameters get twisted. The goals being pursued include recurrent redirecting to so-called “landing pages” with redundant ads, the triggering of annoying promotional pop-ups during Internet sessions, or recommending spoof software updates for more severe contamination. This entire routine narrows down to a clearly commercial implication, where the fraudsters get paid by interested parties for advertising their products or services.
Not only do browser hijackers achieve their goals in an intrusive fashion, they are too persistent to be easily removed from an infected system. The distorted homepage and default search settings are unlikely to get manually restored to their normal state through toggling the browsing configuration. This is why the efficient cure is usually a matter of combining several cleanup techniques. On the other hand, preventing the contamination is not much of a problem as long as a reliable Internet security suite is protecting the PC in real time.
via Examiner National Edition Gadgets & Tech Channel Articles http://ift.tt/1u5XeFa