Bing(.)vc er en velkendt browser hijacker, der har eksisteret i et stykke tid nu. Den nyeste version af flykaprer, dog, er blevet rapporteret at sprede sig via legitime-lignende applikationer. At skyde skylden for dette er den berygtede metode bundling.
Intel and McAfee security researchers have discovered that the Bing(.)vc malware is now bundled with apps by Lavians Inc. This is what the report says:
We have come across several files from Lavians Inc. that look like legitimate applications but may pose a serious risk. We have observed that Lavians Inc. is repackaging clean applications with a browser hijacker to avoid suspicion and to increase its outreach.
Ifølge Intel, most of the infected files are hidden as driver utilities and have names like:
→HP DESKJET F4580 Driver Utility Setup, DELL Inspiron 5100 Drivers Utility Setup, or Acer Aspire ONE ZG5 Drivers Utility Setup.
New Versions of Bing(.)vc Hijacker Affect Chrome, Firefox, og IE
Upon installation of the files, the user installs the particular app but also gets his browser hijacked with bing(.)vc. The hijacker is hidden inside a file identified as IconOverlayEx(.)etc..
Once into a system, the hijacker installs itself into Chrome, Firefox, og IE, and changes the browser’s homepage. Derudover, ads will be injected into all websites the user visits.
Trods navnet, the page, bing(.)vc doesn’t have anything to do with Microsoft’s Bing search engine. Researchers point out that it’s weird Microsoft hasn’t done anything to take the domain down. The most curious part of this new campaign, dog, is that it redirects users to a page that sells a very expensive tool to fix the victim’s browser.
Can Bing(.)vc Be Removed?
Desværre, users have shared negative experience in their attempt to clean their browsers and systems. Even though they have successfully removed the driver utility which brought the hijacker, the hijacker itself persists. One file that remains after the uninstallation of the app is indeed IconOverlayEx(.)etc..
Endvidere, Bing(.) would also modify the victim’s registry by adding two new entries to load the DLL on every restart of the system:
The only way to remove the malicious file is by manually removing the registry keys mentioned above, eller, if the user is inexperienced, run an automatic tool that offers this service. Besides doing that, users should do as shown in the image below – the affected browsers’ shortcuts need to be fixed by deleting the URL at the end of the app target parameter.
Også, make sure to get to know the basics of the pay-per-install affiliate business responsible for many of the bundled downloads currently spreading malware and adware.
Spy Hunter scanner kun detektere trussel. Hvis du ønsker, at truslen skal fjernes automatisk, du nødt til at købe den fulde version af anti-malware værktøj.Læs mere om SpyHunter Anti-Malware værktøj / Sådan fjernes SpyHunter