MusicBox Live Redirect Removal — How To Restore Your Browser

MusicBox Live Redirect Removal — How To Restore Your Browser

The article will help you to remove MusicBox Live fully. Follow the browser hijacker removal instructions given at the end of the article.

The MusicBox Live redirect is a recently discovered browser plugin that can be used for hijacker purposes. Interaction with it can hijack personal data belonging to the victims. Our in-depth article explores some of the dangers associated with its presence on infected hosts.

Threat Summary

NameMusicBox Live
TypeBrowser Hijacker, PUP
Short DescriptionThe hijacker redirect can alter the homepage, search engine and new tab on every browser application you have installed.
SymptomsThe homepage, new tab and search engine of all your browsers will be switched to MusicBox Live. You will be redirected and could see sponsored content.
Distribution MethodFreeware Installations, Bundled Packages
Detection Tool See If Your System Has Been Affected by MusicBox Live

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss MusicBox Live.

MusicBox Live – Distribution Methods

The MusicBox Live redirect is caused by various infection techniques. The operators behind it are targeting users worldwide by using several different methods at once, this is being done to increase the number of affected users.

A common strategy is to rely on phishing email messages that contain elements taken from legitimate sites. In most of the cases the hackers rely on elements such as text, images and the overall design to fool users into thinking that they have received a notification from a well-known company or service. Attached directly to the messages or linked in the body contents they find scripts or applications that are disguised as legitimate apps, documents or tools. Upon interaction with them the MusicBox Live redirect infection sequence is activated.

A similar technique can be used with fake download sites that are constructed in a similar way. Along with the email messages these sites are among the primary delivery tactics for infected payloads. They represent packages that have been infected with the virus code and forwarded to the target users. There are two main groups that are the most likely culprits:

  • Documents — The MusicBox Live redirect code can be inserted in files of various types such as documents, presentations, spreadsheets, databases and text documents. As soon as they are opened by the users a message will appear asking them to enable the built-in scripts. If this is done then the infection sequence will be started.
  • Software Install Packages — The criminals behind the redirect can manipulate popular application installers with the infection sequence. Typically the most popular installers are chosen: creativity suites, productivity and system utilities.

In addition the threat is made available on the respective web browser repositories. In most cases they are made available for the most popular web browsers and feature extensive descriptions and (counterfeit) user reviews.

MusicBox Live – Detailed Description

The MusicBox Live redirect is devised to look like an Internet service that serves music to its clients. Once the users install the browser-based extension they will be redirected to a hacker-controlled domain. In our test cases this linked to a domain that is still not functioning directly which means that it is probable that the site is in transition or the built-in list of addresses has not been updated.

The reason why threats such as this one are discouraged by the security experts is the fact that they often change the default browser settings (by changing the default home page, new tabs page and search engine to point to the site) and can also acquire all stored information. This includes any of the following data sets:

  • Cookies
  • History
  • Bookmarks
  • Settings
  • Passwords

These plugins are typically configured to perform several malicious actions on the infected machines.

First of all they may start a data harvesting campaign that is used to hijack sensitive information that can be used to optimize future campaigns or directly expose the victim’s identity. Such data can include strings that look out for their name, address, interests, location, passwords and certain operating system data — user-set regional settings, hardware components and etc.

Following this the hijacker code can institute itself as a persistent threat, this means that the underlying dangerous code will automatically start itself once the computer is booted. This action can be run alongside a command that will disable the boot recovery menu. A consequence of this is the inability to use certain manual recovery options.

These type of threats may be combined with a Trojan instance that creates a secure connection to a hacker-controlled server. It can be used to spy on the victims, install additional threats and take over control of the machines.

While the redirect does not point to a specific site at the moment, we presume that the operators behind it will soon switch addresses and point to a working site.

Manually delete MusicBox Live from Windows and your browser

Note! Substantial notification about the MusicBox Live threat: Manual removal of MusicBox Live requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Remove or Uninstall MusicBox Live in Windows
2. Remove MusicBox Live from Your Browser and Your Registry Editor

Automatically remove MusicBox Live by downloading an advanced anti-malware program

1. Remove MusicBox Live with SpyHunter Anti-Malware Tool and back up your data
Optional: Using Alternative Anti-Malware Tools

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...