Bing(.)vc is een bekende browser kaper die rond voor een tijdje is geweest. De nieuwste versie van de kaper, echter, is gerapporteerd verspreid via legitieme-achtige toepassingen. De schuld voor dit is de beruchte methode bundelen.
Intel and McAfee security researchers have discovered that the Bing(.)vc malware is now bundled with apps by Lavians Inc. This is what the report says:
We have come across several files from Lavians Inc. that look like legitimate applications but may pose a serious risk. We have observed that Lavians Inc. is repackaging clean applications with a browser hijacker to avoid suspicion and to increase its outreach.
Volgens Intel, most of the infected files are hidden as driver utilities and have names like:
→HP DESKJET F4580 Driver Utility Setup, DELL Inspiron 5100 Drivers Utility Setup, or Acer Aspire ONE ZG5 Drivers Utility Setup.
New Versions of Bing(.)vc Hijacker Affect Chrome, Firefox, en IE
Upon installation of the files, the user installs the particular app but also gets his browser hijacked with bing(.)vc. The hijacker is hidden inside a file identified as IconOverlayEx(.)etc..
Once into a system, the hijacker installs itself into Chrome, Firefox, en IE, and changes the browser’s homepage. Bovendien, ads will be injected into all websites the user visits.
Ondanks zijn naam, the page, bing(.)vc doesn’t have anything to do with Microsoft’s Bing search engine. Researchers point out that it’s weird Microsoft hasn’t done anything to take the domain down. The most curious part of this new campaign, echter, is that it redirects users to a page that sells a very expensive tool to fix the victim’s browser.
Can Bing(.)vc Be Removed?
Helaas, users have shared negative experience in their attempt to clean their browsers and systems. Even though they have successfully removed the driver utility which brought the hijacker, the hijacker itself persists. One file that remains after the uninstallation of the app is indeed IconOverlayEx(.)etc..
Bovendien, Bing(.) would also modify the victim’s registry by adding two new entries to load the DLL on every restart of the system:
The only way to remove the malicious file is by manually removing the registry keys mentioned above, of, if the user is inexperienced, run an automatic tool that offers this service. Besides doing that, users should do as shown in the image below – the affected browsers’ shortcuts need to be fixed by deleting the URL at the end of the app target parameter.
Ook, make sure to get to know the basics of the pay-per-install affiliate business responsible for many of the bundled downloads currently spreading malware and adware.
Spy Hunter scanner zal alleen de bedreiging op te sporen. Als u wilt dat de bedreiging voor automatisch verwijderd, je nodig hebt om de volledige versie van de anti-malware gereedschap kopen.Ontdek meer over SpyHunter Anti-Malware Tool / Hoe te verwijderen SpyHunter