BitcoinPriceSearch Redirect Removal Instructions

BitcoinPriceSearch Redirect Removal Instructions

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

The article will help you to remove BitcoinPriceSearch fully. Follow the browser hijacker removal instructions given at the end of the article.

The BitcoinPriceSearch redirect is a recently discovered browser plugin that can be used for hijacker purposes. Interaction with it can hijack personal data belonging to the victims. Our in-depth article explores some of the dangers associated with its presence on infected hosts.

Threat Summary

TypeBrowser Hijacker, PUP
Short DescriptionThe hijacker redirect can alter the homepage, search engine and new tab on every browser application you have installed.
SymptomsThe homepage, new tab and search engine of all your browsers will be switched to BitcoinPriceSearch. You will be redirected and could see sponsored content.
Distribution MethodFreeware Installations, Bundled Packages
Detection Tool See If Your System Has Been Affected by BitcoinPriceSearch


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss BitcoinPriceSearch.

BitcoinPriceSearch – Distribution Methods

The BitcoinPriceSearch redirect is a typical browser hijacker infection that is delivered using the main delivery methods The hackers behind it have been found to utilize all common distribution tactics in order to increase the number of infected hosts.

The hackers typically rely on the browser extension repositories as the main distribution technique. They upload plugins that utiize fake developer credentials and user reviews in order to confuse the victim targets into thinking that they are downloading a legitimate and useful tool. An elaborate description with screenshots and sometimes videos and animation is also used to market the extension.

The BitcoinPriceSearch redirect can also be spread using email SPAM messages utilizing social engineering techniques. They typically impersonate well-known Internet services or companies. The redirect code is typically embedded in files that are either directly attached or hyperlinked in the body contents. They are also the primary technique for spreading infected payloads. There are two primary types:

  • Infected Software Installers — The hacker operators can take the legitimate installers of popular software and embed the virus code into them. The hackers typically choose productivity apps, creativity suites or system utilities.
  • Infected Documents — The same strategy can be used with documents of various types: text files, spreadsheets, databases or presentations. Once they are opened by the victims a notification prompt appears which asks the users to enable the built-in code (macros). When this is done the virus infection will follow.

The BitcoinPriceSearch redirect can be distributed via hacker-constructed sites. They may imitate well-known sites and include web scripts such as: pop-ups, banners, redirects and etc. The redirect may also infect via file sharing networks like BitTorrent.

Once the browser plugin installation window appears the following permissions will be requested:

  • Read and change all your data on the websites you visit.
  • Replace the page you see when opening a new tab.
  • Manage your apps, extensions and themes.
  • Manage your downloads.

BitcoinPriceSearch – Detailed Description

Once the main BitcoinPriceSearch redirect is installed on the target hosts it will initiate its built-in behavior pattern. Threats like this one are particularly customizable and can adapt their actions depending on the hosts.

The operators behind the redirect can make use of an information harvesting module. It’s engine is configured to search for specific strings. Usually the collected information is classified into one of these two types:

  • Personally-Identifiable Data — The data can expose the victim’s identity as it is composed of their name, address, location, interests and passwords.
  • Campaign Metrics — The hackers can harvest information that can help them optimize the ongoing and any future attacks. Typically this consists of certain operating system values, regional settings and a report listing the installed hardware components.

This information can be relayed to the operators via a hacker server connection. This gives the criminals the ability to receive live reports of the infected hosts, as well as spy on the victims and take over control of their machines at any given time. This module is also used to deploy additional threats.

The next module can be the system manipulation one. It can make various changes to the infected host, most of them are connected to the installation of the BitcoinPriceSearch redirect as a persistent threat. This manipulates the Windows Registry by creating new entries belonging to the malware code. It automatically launches the virus engine as soon as the computer boots. The other changes to the operating system can make it impossible for the users to enter into the boot recovery menu. This renders the manual removal instructions non-working.

We expect that other modules can be added as the infection unfolds. The most obvious changes to the users remain the browser modifications — the default home page, search engine and new tabs page. Once the victim users open up their browser windows after the infection has been deployed they will be redirected to the hacker-controlled page.

The site itself follows the typical template used by popular search engines and Internet portals. It is composed of several elements:

  • Top Menu Bar — It consists of a search bar along with several links that are either sponsored or lead to other related sites, presumably operated by the same operators.
  • Main Search Bar — It presents a Google-powered search engine that is used to coerce the users into interacting with it. We remind our readers that all entered queries may present bad results: malware links, ads and sponsored results that may not represent the best possible results.
  • Links Bar — A bar that shows links to popular Internet services. In some cases if the users enter in their account credentials the browsed content can be made accessible to the operators of the browser redirect.
  • Bottom Menu Bar — It contains links to the service links: the privacy policy and terms of use documents.

The hacker operators have designed site to appear like a Bitcoin related portal site. This strategy is used to attract many users that may be interested in cryptocurrency as they include links to various Internet services. As soon as the visitors visit the site for the first time various web tracking technologies will be used.

BitcoinPriceSearch – Privacy Policy

The BitcoinPriceSearch redirect and its associated website is operated by MindSpark which is a well-known creator of similar software. They are known for creating hundreds of services that are linked between themselves. Their privacy policy and terms of use reveals that it pervasively tracks the users identity and creates a database containing a profile of each victim. The use of various web tracking technologies captures additional information such as the following:

  • Your name
  • Your address
  • Email address
  • Number of your page views
  • What links you clicked
  • Telephone number
  • Your login times

As stated in the Privacy Policy, Mindspark allows third-parties, including their authorized service providers, BitcoinPriceSearch affiliates, advertising companies, and ad networks, to display advertisements or place ad tags or beacons on or via their Services. Thus, these companies could also obtain information about you and your online behavior. In case you do not want your private space to be invaded in this or any similar way, you should remove the unwanted software.


Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share