CYBER NEWS

Bing(.)ve Hijacker nu spredt med Legitime driverindstillinger Utilities

Bing(.)vc er en velkendt browser hijacker, der har eksisteret i et stykke tid nu. Den nyeste version af flykaprer, dog, er blevet rapporteret at sprede sig via legitime-lignende applikationer. At skyde skylden for dette er den berygtede metode bundling.

Relaterede: Bing(.)vc Removal Manual

Intel and McAfee security researchers have discovered that the Bing(.)vc malware is now bundled with apps by Lavians Inc. This is what the report says:

We have come across several files from Lavians Inc. that look like legitimate applications but may pose a serious risk. We have observed that Lavians Inc. is repackaging clean applications with a browser hijacker to avoid suspicion and to increase its outreach.

Ifølge Intel, most of the infected files are hidden as driver utilities and have names like:

HP DESKJET F4580 Driver Utility Setup, DELL Inspiron 5100 Drivers Utility Setup, or Acer Aspire ONE ZG5 Drivers Utility Setup.

New Versions of Bing(.)vc Hijacker Affect Chrome, Firefox, og IE

Upon installation of the files, the user installs the particular app but also gets his browser hijacked with bing(.)vc. The hijacker is hidden inside a file identified as IconOverlayEx(.)etc..

Once into a system, the hijacker installs itself into Chrome, Firefox, og IE, and changes the browser’s homepage. Derudover, ads will be injected into all websites the user visits.

Trods navnet, the page, bing(.)vc doesn’t have anything to do with Microsoft’s Bing search engine. Researchers point out that it’s weird Microsoft hasn’t done anything to take the domain down. The most curious part of this new campaign, dog, is that it redirects users to a page that sells a very expensive tool to fix the victim’s browser.

Can Bing(.)vc Be Removed?

Desværre, users have shared negative experience in their attempt to clean their browsers and systems. Even though they have successfully removed the driver utility which brought the hijacker, the hijacker itself persists. One file that remains after the uninstallation of the app is indeed IconOverlayEx(.)etc..

Endvidere, Bing(.) would also modify the victim’s registry by adding two new entries to load the DLL on every restart of the system:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\ IconOverlayEx\: "{E1773C0E-364D-4210-B831-72F5A359E88F}"
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{E1773C0E-364D-4210-B831-72F5A359E88F}: “Icon Overlay Shell Extension”

The only way to remove the malicious file is by manually removing the registry keys mentioned above, eller, if the user is inexperienced, run an automatic tool that offers this service. Besides doing that, users should do as shown in the image below – the affected browsers’ shortcuts need to be fixed by deleting the URL at the end of the app target parameter.

bing-vc-browser-hijacker-stforum

Også, make sure to get to know the basics of the pay-per-install affiliate business responsible for many of the bundled downloads currently spreading malware and adware.

Hent

Værktøj til fjernelse af malware


Spy Hunter scanner kun detektere trussel. Hvis du ønsker, at truslen skal fjernes automatisk, du nødt til at købe den fulde version af anti-malware værktøj.Læs mere om SpyHunter Anti-Malware værktøj / Sådan fjernes SpyHunter

Milena Dimitrova

Milena Dimitrova

En inspireret forfatter og indhold leder, der har været med SensorsTechForum siden begyndelsen. Fokuseret på brugernes privatliv og malware udvikling, hun tror stærkt på en verden, hvor cybersikkerhed spiller en central rolle. Hvis almindelig sund fornuft giver ingen mening, hun vil være der til at tage noter. Disse noter senere kan blive til artikler! Følg Milena @Milenyim

Flere indlæg

Følg mig:
Twitter

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...