All In One Office Redirect Removal Guide
THREAT REMOVAL

All In One Office Redirect Removal Guide

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by All In One Office and other threats.
Threats such as All In One Office may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

The All in One Office redirect is a browser hijacker that upon infection redirects the victims to a hacker-controlled page. It has the ability to steal sensitive data from the users and install other viruses as well.

Threat Summary

NameAll In One Office
TypeBrowser Hijacker, PUP
Short DescriptionUpon installation the browser hijacker changes the default settings of the target applications to point to a hacker-controlled page.
SymptomsModified browser settings include the homepage, default search engine and the new tab page.
Distribution MethodFreeware Installations, Bundled Packages
Detection Tool See If Your System Has Been Affected by All In One Office

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss All In One Office.

All in One Office – Distribution

All In One Office Redirect image

The All In One Office redirect is a browser hijacker that is actively being distributed to users worldwide. The hacker operators behind it are utilizing the most popular infection strategies in order to maximize the infection ratio.

One of the main methods at the moment is the creation of malware download pages that promote the site via fraud features. Many hijackers like this one promise to add useful new capabilities or enhance already existing ones. One of the pages shows the following description:

Easily create new documents in different formats, share and organize them. Quickly create notes, manage your calander and get detailed weather forecast for your location.

Criminals can also opt to use email spam messages to spread the malware code. There are two primary ways of configuring them depending on the way the hijacker code is delivered:

  • File Attachments — The All In One Office redirect can be directly attached to the messages. The body contents uses different approaches into making sure that the victim executes the file. In many cases they are placed in archives and the passwrod is placed in the body contents of the message.
  • Hyperlinks — Links to hosted instances of the All in One Office redirect can be placed in the contents posing as legitimate setup files, documents or other other files of user interest.

In a similar way the attackers can also opt to utilize two other mechanisms in conjunction with the emails. One of them is the use of infected documents that contain dangerous scripts. Once the victims open them up a notification prompt appears which asks them to enable the macros (scripts). Once this is done the virus file is downloaded from a remote location and executed on the local machine.

Malware software installers can be used as well. They represent hacker-modified setup files that are created by taking the legitimate installers from the official vendors and modifying them to include the All In One Office redirect code. In similar ways they are distributed using email tactics and fake pages.

Still one of the the most effficient distribution tactics remain the spread of browser hijackers on the official software repositories such as the Chrome Web Store.

All in One Office – Information

Usually browser hijackers like this one are made compatible with the most popular web browsers: Mozilla Firefox, Safari, Google Chrome, Internet Explorer, Opera and Microsoft Edge. Once the users are infected with the All in One Office redirect they will notice that a lot of their browser settings are going to be modified. This includes the default home page, search engine and new tabs page.

Immediately after this a tracking cookie is imposed on the victims which starts to gather sensitive information about the users. The security experts usually classify it in two categories:

  • Personally-Identifiable Information — The gathered data can be used to expose the victims identity. Such information includes the victim’s name, address, number, preferences, passwords and account credentials.
  • Anonymous Data — This type of data is made up primarily of information related to the system. It is mainly composed of data about the hardware components and software configuration.

The behavior patterns can be reconfigured depending on the target hosts. In certain cases the malware code can be used to deliver additional threats to the compromised machines. This includes all kinds of Trojans and Ransomware.

The Trojans allow the hackers to take over control of the victim machines and spy on the user while the ransomware encrypt sensitive data and blackmail the victims for a ransom sum payment.

After the infection has infiltrated the browser the victims will be redirected to the hacker controlled page. It is made up of several components that adhere to a design that imitates well-known web services and legitimate search engines.

The top menu bar lists Google services and several options that are related to the malware’s functions. In the center of the page there is the search engine with links to popular services placed underneath it. The bottom bar displays the current weather conditions .

We remind all victims that the links and services offered by the All In One Office redirect link to hacker-controlled pages. They can be used in phishing attacks by forwarding the users to scam sites. This is a popular tactic used to access their account credentials and passwords.

All search queries also deliver sponsored or ad content that does not represent the best possible outcome.

All in One Office – Privacy Policy

The privacy policy shows that the site is operated by a comapny called Axel Division LP and shows the extent of the gathered information.

As soon as the infection is caused the site starts to extract all kinds of data. A partial list includes the following entries:

  • IP Address
  • Referral Data
  • Browser Type and Version
  • Interaction Activities
  • User Preferences
  • Contact Information (name, e-mail address, shipping address and zip code)
  • Demographic Information (age, gender, occupation and household income)

The gathered data is pooled into large databases that can then be sold to other parties such as marketing agencies.

Remove All in One Office Redirect

To remove All in One Office manually from your computer, follow the step-by-step removal instructions provided below. In case the manual removal does not get rid of the hijacker redirect and its files completely, you should search for and remove any leftovers with an advanced anti-malware tool. Such a program can keep your computer safe in the future.

Note! Your computer system may be affected by All In One Office or other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as All In One Office.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove All In One Office follow these steps:

1. Uninstall malicious programs from Windows
2. Clean your Browser and Registry from All In One Office

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...