The All in One Office redirect is a browser hijacker that upon infection redirects the victims to a hacker-controlled page. It has the ability to steal sensitive data from the users and install other viruses as well.
|Name||All In One Office|
|Type||Browser Hijacker, PUP|
|Short Description||Upon installation the browser hijacker changes the default settings of the target applications to point to a hacker-controlled page.|
|Symptoms||Modified browser settings include the homepage, default search engine and the new tab page.|
|Distribution Method||Freeware Installations, Bundled Packages|
|Detection Tool|| See If Your System Has Been Affected by All In One Office |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss All In One Office.|
All in One Office – Distribution
The All In One Office redirect is a browser hijacker that is actively being distributed to users worldwide. The hacker operators behind it are utilizing the most popular infection strategies in order to maximize the infection ratio.
One of the main methods at the moment is the creation of malware download pages that promote the site via fraud features. Many hijackers like this one promise to add useful new capabilities or enhance already existing ones. One of the pages shows the following description:
Easily create new documents in different formats, share and organize them. Quickly create notes, manage your calander and get detailed weather forecast for your location.
Criminals can also opt to use email spam messages to spread the malware code. There are two primary ways of configuring them depending on the way the hijacker code is delivered:
- File Attachments — The All In One Office redirect can be directly attached to the messages. The body contents uses different approaches into making sure that the victim executes the file. In many cases they are placed in archives and the passwrod is placed in the body contents of the message.
- Hyperlinks — Links to hosted instances of the All in One Office redirect can be placed in the contents posing as legitimate setup files, documents or other other files of user interest.
In a similar way the attackers can also opt to utilize two other mechanisms in conjunction with the emails. One of them is the use of infected documents that contain dangerous scripts. Once the victims open them up a notification prompt appears which asks them to enable the macros (scripts). Once this is done the virus file is downloaded from a remote location and executed on the local machine.
Malware software installers can be used as well. They represent hacker-modified setup files that are created by taking the legitimate installers from the official vendors and modifying them to include the All In One Office redirect code. In similar ways they are distributed using email tactics and fake pages.
Still one of the the most effficient distribution tactics remain the spread of browser hijackers on the official software repositories such as the Chrome Web Store.
All in One Office – Information
Usually browser hijackers like this one are made compatible with the most popular web browsers: Mozilla Firefox, Safari, Google Chrome, Internet Explorer, Opera and Microsoft Edge. Once the users are infected with the All in One Office redirect they will notice that a lot of their browser settings are going to be modified. This includes the default home page, search engine and new tabs page.
Immediately after this a tracking cookie is imposed on the victims which starts to gather sensitive information about the users. The security experts usually classify it in two categories:
- Personally-Identifiable Information — The gathered data can be used to expose the victims identity. Such information includes the victim’s name, address, number, preferences, passwords and account credentials.
- Anonymous Data — This type of data is made up primarily of information related to the system. It is mainly composed of data about the hardware components and software configuration.
The behavior patterns can be reconfigured depending on the target hosts. In certain cases the malware code can be used to deliver additional threats to the compromised machines. This includes all kinds of Trojans and Ransomware.
The Trojans allow the hackers to take over control of the victim machines and spy on the user while the ransomware encrypt sensitive data and blackmail the victims for a ransom sum payment.
After the infection has infiltrated the browser the victims will be redirected to the hacker controlled page. It is made up of several components that adhere to a design that imitates well-known web services and legitimate search engines.
The top menu bar lists Google services and several options that are related to the malware’s functions. In the center of the page there is the search engine with links to popular services placed underneath it. The bottom bar displays the current weather conditions .
We remind all victims that the links and services offered by the All In One Office redirect link to hacker-controlled pages. They can be used in phishing attacks by forwarding the users to scam sites. This is a popular tactic used to access their account credentials and passwords.
All search queries also deliver sponsored or ad content that does not represent the best possible outcome.
As soon as the infection is caused the site starts to extract all kinds of data. A partial list includes the following entries:
- IP Address
- Referral Data
- Browser Type and Version
- Interaction Activities
- User Preferences
- Contact Information (name, e-mail address, shipping address and zip code)
- Demographic Information (age, gender, occupation and household income)
The gathered data is pooled into large databases that can then be sold to other parties such as marketing agencies.
Remove All in One Office Redirect
To remove All in One Office manually from your computer, follow the step-by-step removal instructions provided below. In case the manual removal does not get rid of the hijacker redirect and its files completely, you should search for and remove any leftovers with an advanced anti-malware tool. Such a program can keep your computer safe in the future.