Browser hijacking

From Wikipedia, the free encyclopedia
  (Redirected from Browser hijacker)
Jump to: navigation, search

Browser hijacking is a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser. A browser hijacker may replace the existing home page, error page, or search page with its own.[1] These are generally used to force hits to a particular website, increasing its advertising revenue.

Some browser hijackers also contain spyware, for example, some install a software keylogger to gather information such as banking and e-mail authentication details. Some browser hijackers can also damage the registry on Windows systems, often permanently.

Some browser hijacking can be easily reversed, while other instances may be difficult to reverse. Various software packages exist to prevent such modification.

Many Browser Hijacking programs are included in software bundles that the user did not choose, and are included as "offers" in the installer for another program, often included with no uninstall instructions, or documentation on what they do, and are presented in a way that is designed to be confusing for the average user, in order to trick them into installing unwanted extra software.[2][3][4][5]



A major sector of companies related to browser hijacking, as well as other aggressive and often malicious forms of adware and spyware, has grown in Israel's high tech region known as Download Valley[citation needed].

Rogue security software[edit]

Some rogue security software will also hijack the start page, generally displaying a message such as "WARNING!Your computer is infected with spyware!" to lead to an antispyware vendor's page. The start page will return to normal settings once the user buys their software. Programs such as WinFixer are known to hijack the user's start page and redirect it to another website.

Non-existent domain pages[edit]

The Domain Name System is queried when a user types in the name of a website (e.g. and the DNS returns the IP address of the website if it exists. If a user mistypes the name of a website then the DNS will return a Non-Existent Domain (NXDOMAIN) response.

In 2006, EarthLink started redirecting mistyped domain names over to a search page. This was done by interpreting the error code NXDOMAIN at the server level. The announcement led to much negative feedback, and EarthLink offered services without this feature.[6]


Unwanted programs often include no sign that they are installed, and no uninstall or opt-out instructions.[2]

Most hijacking programs constantly change the settings of browsers, meaning that user choices in their own browser are overwritten. Some Antivirus software identifies browser hijacking software as malicious software and can remove it. Some spyware scanning programs have a browser restore function to set the user's browser settings back to normal or alert them when their browser page has been changed.

Some of the more malicious browser hijacking programs steal browser cookies on a person's computer, in order to manipulate online accounts they are logged into.[7] One company maliciously used Google cookies to install Android apps onto a user's phone without their knowledge or consent.

Examples of hijackers[edit]

A number of hijackers change the browser homepage, display adverts, and/or set the default search engine; these include Astromenda (;[8][9][10] Ask Toolbar (; ESurf ( Binkiland (; Delta and Claro; Dregol;[11] Jamenize; Mindspark; Groovorio; Sweet Page; Trovi; Tuvaro; Spigot;etc.

Ask Toolbar[edit]

Ask Toolbar has been widely bundled with the installer for Oracle Java SE and has been criticized for being malware as users had to remember to manually deselect the toolbar installation during a Java installation.

This has been especially severe in Denmark where the government sponsored digital signature system NemID (which in reality is more of a single sign on system for public servers such as banks and government offices) up to 2015 relied on Java on the client side and thus most computers running Microsoft Windows in Denmark was vulnerable to get the unwanted Ask Toolbar installed.

Babylon Toolbar[edit]

Babylon Toolbar is a browser hijacker that will change the browser homepage and set the default search engine to It is also a form of adware. It displays advertisements, sponsored links, and spurious paid search results. The program will collect search terms from your search queries.

Babylon's translation software prompts to add the Babylon Toolbar on installation. The toolbar also comes bundled as an add-on with other software downloads.[12]

In 2011, the Cnet site started bundling the Babylon Toolbar with open-source packages such as Nmap. Gordon Lyon, the developer of Nmap, was upset over the way the toolbar was tricked onto users using his software.[13] The vice-president of, Sean Murphy, released an apology: The bundling of this software was a mistake on our part and we apologize to the user and developer communities for the unrest it caused.[14]

Conduit Search (Search Protect)[edit]

Conduit is a PUP/browser hijacker. It steals personal and confidential information from the user and transfers it to a third party. This toolbar has been identified as Potentially Unwanted Programs (PUPs) by Malwarebytes[15] and is typically bundled with free downloads.[16][17] These toolbars modify the browser's default search engine, homepage, new tab page, and several other browser settings.[18]

A program called "Conduit Search Protect", better known as "Search Protect by conduit", can cause severe system errors upon uninstallation. It claims to protect browser settings but actually blocks all attempts to manipulate a browser through the settings page; in other words, it makes sure the malicious settings remain unchanged.[citation needed]The uninstall program for Search Protect can cause Windows to be unbootable because the uninstall file not only removes its own files, but also all the boot files in the root of the C: drive.[citation needed] and leaves a BackGroundContainer.dll file in the start-up registry.[19] Conduit is associated with malware, spyware, and adware, as victims of this hijacker have reported unwanted pop-ups and embedded in-text advertisements, on sites without ads.

Perion Network Ltd. acquired Conduit's ClientConnect business in early January 2014,[20] and later partnered with Lenovo to create Lenovo Browser Guard,[21] which uses components of Search Protect.

Victims of unwanted redirections to have also reported that they have been attacked by phishing attempts and have received unwanted email spam, junk mail, other messages, and telephone calls from telemarketers. Some victims claim that the callers claimed to be Apple, Microsoft, or their ISP, and are told that personal information was used in some phone calls, and that some of the calls concerned their browsing habits and recent browsing history. Personal information used in phishing attempts may be associated with spyware.[22]


This was one of the first browser hijackers. It redirected the user from their existing home page to the rogue CoolWebSearch search engine, with its results as sponsored links. With most antivirus and antispyware programs unable to properly remove this particular hijacker, a man named Merijn Bellekom developed a special tool called CWShredder specifically to remove this kind of hijacker. CoolWebSearch is a popular browser hijacker and is owned by 'fun web products'[citation needed].

Coupon Server[edit]

Coupon Server is an adware program bundled with multiple freeware applications that can be downloaded from the Internet by users. This program may appear on PCs without a user's knowledge. Coupon Server may appear to be useful, but can be intrusive and display ads without users' permissions.[23] Coupon Server is also considered as a malicious domain and browser hijacker. It will hijack your Internet browser and forcibly lead a user to its homepage, which is disguised as a legitimate search engine to fool visitors into using the website. It will also direct the browser to a suspicious domain and alter browser settings.


The ad-triggering software called GoSave has been reported to cause user experience issues because of its intrusive characteristics.[citation needed] The victim is not appropriately informed at installation, and ads are inserted into webpages. It adds a plugin or extension to whichever web browsers is the default. It is currently compatible with Internet Explorer, Firefox and Chrome. The name of the add-on is not necessarily "GoSave" – it varies from GS Booster, to GS Sustainer, or something else.


The browser hijacker may replace the preferred search tools. This infection travels bundled with third party applications and its installation may be silent. Due to this, affected users are not aware that the hijacker has infected their Internet Explorer, Google Chrome or Mozilla Firefox browsers.[24]


Mixi.DJ offers a media player, but also a free toolbar and Conduit-based search engine, the toolbar being the add-on prompted to add during installation. The toolbar is a new hijacker that alters a browser's homepage. It also adds itself to the computer's registry, creates strings in the memory, and changes Internet Explorer's icon to a magnifying glass.[citation needed]

MyStart.IncrediBar Search[edit]

MyStart.Incredibar Search (Mystart Search IncrediBar, MyStart toolbar, MyStart Search, IncrediBar, IncrediBar Games-EN) is a very dangerous Internet browser hijacker, virus, and spyware that often comes embedded with many download applications and installers such as HyperCam. It is known to install itself into Firefox, Internet Explorer, Safari, and Google Chrome

Symptoms range from no symptoms at all (simple processor drainage) to complete system crashes so severe that the victim has to re-install their entire operating system.[citation needed]

MyStart uses browser helper objects (in this case search tools) and infects users by installing MyStart search toolbar into their browser (Firefox is most vulnerable) which redirects internet users to MyStart’s websites, in particular. Some Internet users report that they are redirected for every search or webpage they visit.

Removing Incredibar can be an extremely daunting task since there are countless different variations and most infected systems can expect to find undesirable Windows registry changes, browser configuration changes, and files with random strings that are installed into the user's local settings folders and depending on the user's operating system, its version, and even computer the location will vary from one PC to the next. In one version of Incredibar it appears to be a removable add-on, plug-in, or extension within web browsers; however, simply removing Incredibar via the inbuilt browser add-on removal process is not enough since the program has already combined registry and file installs which re-installs itself upon a system or browser reboot.

A few virus and spyware removal applications such as Webroot Spysweeper, Eset NOD32, AdwCleaner, and Junkware Removal Tool are known to remove Mystart.Incredibar, but using these applications to do so will not revert the user to their default search engine.


Onewebsearch, referred to as the onewebsearch virus, or redirection virus is malware, categorized as a browser hijacker. Onewebsearch utilizes browser hijackers and black-hat techniques to infect a computer system and attach add-ons, extensions, and toolbars to popular internet browsers without permission, which in turn causes internet browsers like Chrome, Firefox, and Internet Explorer to redirect to, search-, home-, or, related web pages, and third party domain names.


RocketTab is a browser hijacker that runs as a program and browser plugin. It embeds its own search results from RocketTab when you search with other providers. RocketTab sets itself as a proxy and runs all http and https traffic through itself. It is known to create problems for security applications. Uninstalling the application removes the proxy, the targeted ads and search results RocketTab provides.


Searchassist is a browser hijacker which piggybacks on other downloads from untrusted websites.

It will change the new tab homepage to and opens searchassist on browser start-up. It is stubborn, and if not uninstalled, will repeatedly change the browser tabs and homepage settings. It works with Firefox, Safari, Chrome, and Internet Explorer, though is only compatible with Windows and Linux. It can be detected by ADWcleaner, Spyhunter, and Malwarebytes. It is also known to slow down computer performance and cause the blue screen of death (BSOD), a screen that causes the computer to restart because of the viruses that come with searchassist. Searchassist, not unlike Vosteran, can have spyware links.

Review sites such as CNET may recommend searchassist, but many users rate it poorly. Searchassist claims to be a legitimate search engine with great personal results, tempting victims into the hijack, making it one of the hardest hijacks to recognize because the image on search assist is very much like a genuine Google Doodle. [edit] is a hijacker that may be downloaded by the Zlob trojan. It redirects the user's searches to pornography sites. It is also known to slow down computer performance.[25][edit] is a browser hijacker that replaces users home page, new tab page and default search engine. The program is advertised as a browser add-on that is supposed to help customize tabs and protect browsers from being affected by other is associated with malware distribution. The website displays a banner ad just below the search box. Most often, these are adverts for Flash games.[edit] (can also be found as Search-Gol) is a search engine, which may show up on the infected computer instead of the user's default search engine. The cause of it getting onto the homepage is unknown, but it is known for downloading malware onto the computer. It replaces the default homepage without the user's permission. Numerous antivirus websites and blogs report that searchgol is a virus, but it is a potentially unwanted program (PUP) because it sneaks inside the system in a bundle with other programs and initiates some changes on the system without the user's permission. Removing Searchgol is not easy, as the victim must perform a browser restore, before removing programs related or downloaded by the browser hijacker.[edit] domain and the domain belong to the IAC Search & Media, Inc. This company is known by the name Ask Jeeves Inc. It has a lot of popular domains on the web and the most famous of them is When something is searched for through the Searchnu search engine, the search results will redirect to and related websites. The user can still access Google, either by entering it in the address bar or by searching for it, but Searchnu is still the homepage. Searchnu has 3 "clones" which are, /409, and /421. However, removing Searchnu is easy following instructions.[edit] (Smartbar developed by Resoft) is potential malware, categorized as a browser hijacker and spyware, that causes Internet browsers to redirect to the search engine. Snap.Do can be manually downloaded from the Resoft website, though many users are entrapped by their unethical terms. It affects Windows and can be removed through the Add/Remove program menu. Snap.Do also can download many malicious toolbars, add-ons, and plug-ins like DVDVideoSoftTB, General Crawler, and Save Valet.

General Crawler, installed by, has been known to use a backdoor process because it re-installs and re-enables itself every time an affected user removes it through their browser(s). will disable the option to change your homepage and default search engine.

Resoft will track the following information:

  • The Internet domain and IP address from which the user accesses the Resoft Products. (location, ID, etc.)
  • Screen resolution of the user's computer monitor (display).
  • The date and time the user intentionally or unintentionally accesses Resoft products.
  • The pages the user is visiting with the Resoft Products (with or without knowledge of using Resoft products,
  • If the user willingly or unwillingly linked to a Resoft website from another referring website, the address of that site.

By using the Resoft Products, the user consents to have their personal data transferred to and processed both within and outside of the United States of America.

By using the Resoft website, the user agrees to the preceding uses of their information in this way by Resoft.[26]

SourceForge Installer[edit]

The new installer of SourceForge changes the browser settings of Firefox, Chrome and InternetExplorer to show the website "" as the homepage. It does so by changing registry settings and installing software which resets the settings if the user tries to change them.


Taplika is a browser hijacker which contains Trojan Viruses which steals personal information from the user and sends it to third party. This can encrypt personal files & folders, as well as emails, photographs, video & documents etc. Once it infects the system, a user may lose all of their data from the affected system, and could cause possible hardware damage.

TV Wizard[edit]

TV Wizard (by Injekt) is an Internet toolbar/plugin (for Internet Explorer it runs as a BHO, in Chrome and Firefox it will run as an extension) that plugs into the user's default web browser and will modify a number of settings such as taking control of the browser's search and home pages, new tab functionality as well as DNS 'not found' redirections. Additionally TV Wizard will change some security settings of the browser that might also lower the overall security of the user's PC. This is done in order to allow the program to run uninterrupted. Should the user attempt to uninstall TV Wizard using the standard methods in Add/Remove Programs, only parts of the program will be uninstalled and some items such as the modified search and home pages, may still point to an unwanted web page. The privacy policy for he program states that the program will track and report behaviors of the user while the plugin is installed including, but not limited to, the URLs and web pages the user visits as well as search terms and search results the user queries.


Vosteran is a browser hijacker that changes a browser's home page and default search provider to This infection is essentially bundled with other third-party applications. Vosteran carries the PUP virus. The identity of Vosteran is protected by from Australia. Vosteran is registered through Whiteknight.[27]


  1. ^ "Browser Hijacking Fix & Browser Hijacking Removal". Microsoft. Retrieved 23 October 2012. 
  2. ^ a b "Malwarebytes Potentially Unwanted Program Criteria". Malwarebytes. 
  3. ^ "Rating the best anti-malware solutions". Arstechnica. Retrieved 28 January 2014. 
  4. ^ "Threat Encyclopedia – Generic Grayware". Trend Micro. Retrieved 27 November 2012. 
  5. ^ "PUP Criteria". Malwarebytes. 
  6. ^ Mook, Nate (2006-09-06). "EarthLink Criticized for DNS Redirects". betaNews. Retrieved 9 May 2012. 
  7. ^ Rudis Muiznieks. "Exploiting Android Users for Fun and Profit". The Code Word. 
  8. ^ "PUA.Astromenda". 
  9. ^ "How to Remove Astromenda Search From Your Browser". Lavasoft. 
  10. ^ "Remove Astromenda, Buzzdock and Extended Update toolbar from your browser". 
  11. ^
  12. ^ Getting rid of Babylon Jay Lee, The Houston Chronicle, July 25, 2012
  13. ^ sorry for bundling Nmap with crapware The Register December 9, 2011
  14. ^ A note from Sean regarding the Installer December 7, 2011
  15. ^ "How to remove Search Protect by Conduit Ltd". Lavasoft. 2013-06-01. Retrieved 2013-10-12. 
  16. ^ "Bundle Your Software with a Custom Toolbar & Start Making Money". Conduit Ltd. 2013. Archived from the original on 2014-03-13. Retrieved 2013-10-12. 
  17. ^ "Download me II—Removing the remnants of the Web’s most dangerous search terms". Ars Technica. 2013-08-25. Retrieved 2013-10-12. 
  18. ^ "So long, uTorrent". First Arkansas News. 2010-12-15. Retrieved 2011-08-11. 
  19. ^ "Fixing BackgroundContainer.dll Left Over by Conduit Ltd". appuals. Retrieved 20 March 2015. 
  20. ^ "Perion Completes Acquisition of Conduit’s ClientConnect Creating a Leading Provider of Digital Solutions for Publishers" (Press release). Tel Aviv, Israel; San Francisco. Business Wire. 2014-01-02. Retrieved 2015-06-07. 
  21. ^ "Perion Partners with Lenovo to Create Lenovo Browser Guard" (Press release). Tel Aviv, Israel; San Francisco. Business Wire. 2014-06-18. Retrieved 2015-06-07. 
  22. ^ "How To Remove Search Protect By Conduit Ltd". Lavasoft. Retrieved 3 December 2014. 
  23. ^ "Remove "Ads by Coupon Server" virus (Removal Guide)". Remove "Ads by Coupon Server" virus (Removal Guide). Stelian Pilic. Retrieved March 25, 2014. 
  24. ^ "Remove istartsurf". Kaspersky Lab. Retrieved 24 June 2010. 
  25. ^ "Browser Hijacker" (PDF). MySearchCorp. Retrieved 3 July 2012. 
  26. ^ "How To Remove Snap.Do Browser Hijacker". Lavasoft. Retrieved 4 August 2014. 
  27. ^ "Remove Vosteran". How To Remove. Retrieved 25 November 2014. 

External links[edit]