This article needs additional citations for verification. (November 2008) (Learn how and when to remove this template message)
CoolWebSearch has numerous effects when it is successfully installed on a user's computer. The program can change an infected computer's web browser homepage to coolwebsearch.com, and although originally thought to only work on Internet Explorer, recent variants affect Mozilla Firefox as well as others like Google Chrome. It can also create pop-up ads that redirect to other websites including pornography sites, collect private information about users and slow the speed of infected computers.
CoolWebSearch uses various techniques to evade detection and removal, and as such many common spyware removal programs fail to properly remove the software. Since it is bundled with many other potentially unwanted software or add-ons, users need to uninstall those unwanted programs first, or else CoolWebSearch can come back even after they have changed their home page and search engine provider.
Some versions of CoolWebSearch are installed through what's known as drive-by installation, in which browsing an infected webpage can automatically install CoolWebSearch without the user's knowledge. CoolWebSearch attempts to evade detection by not labelling its ads as such, not providing a EULA, not providing any data about itself and not having a website. Certain variants insert links on random text, leading to advertiser websites. Others attempt to access websites that are redirected to pay-per-click search engines which may install more malware display ads. Some variants of CoolWebSearch also add links to pornography, and gambling sites to the user's Desktop, Internet Explorer's bookmarks and history. Certain versions attempt to edit users' trusted sites and modify security settings as well as to hide from removal programs. Variants are often named for the effects they have such as msconfig, Msoffice, Mupdate, Msinfo and Svchost32.
The website claims that they are not responsible for the browser hijacking. They run an affiliate program that pays affiliates to direct others to their site with paid advertising links. Coolwebsearch.com's terms of service use the laws of Quebec, Canada, whilst their DNS registration lists an address in the British Virgin Islands, and their web server appears to be run by HyperCommunications in Massachusetts, USA. CoolWebSearch is also linked to CoolWebSearch.org and appears to be related to webcoolsearch.com. Investigation connected Stanislav Avdeyko, the Koobface hacker, with CoolWebSearch.
- "Encyclopedia entry: Spyware:Win32/Coolwebsearch.H". Microsoft Malware Protection Center.
- Russel, Charlie (May 13, 2005). "Dealing with an infected PC". Microsoft. Archived from the original on September 27, 2010.
...many of the Cool Web Search variants can prevent the other anti-spyware programs from doing their job correctly...
- Vincentas (5 July 2013). "CoolWebSearch in SpyWareLoop.com". Spyware Loop. Retrieved 28 July 2013.
- The Koobface malware gang - exposed! Indepth investigation by Jan Droemer and Dirk Kollberg, SophosLabs