Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Remove SearchLock(.)com Browser Hijacker

Searchlock(.)com is the official domain of the browser hijacker SearchLock. Read the whole article carefully on why you should remove it. The hijacker can change the homepage, new tab setting, search engine of your browsers and set an add-on. The add-on is also available at Google’s Chrome web store. You might be redirected. Search results display adverts and could be incorrect.

NameSearchLock(.)com
TypeBrowser Hijacker, PUP
Short DescriptionThe homepage, new tab setting, and search engine of your browsers are changed.
SymptomsYour browsers will have their homepage, new tab setting and search engine modified. A browser extension can be added. You will see ads and incorrect search results.
Distribution MethodFreeware Installers, Bundle Packages, Chrome Web Store
Detection ToolDownload Malware Removal Tool, to See If Your System Has Been Affected by SearchLock(.)com
User Experience Join our forum to discuss SearchLock(.)com.

STF-searchlock-search-lock-hijacker-main-page

SearchLock(.)com – Distribution Methods

An effective distribution method for SearchLock(.)com is via third-party installs. Without you being aware, the hijacker can invade your computer. It resides in free installation setups and bundled packages. Additional components for installation are selected by default in such packs. The components often remain undisclosed, and SearchLock(.)com can be installed. Looking for a Custom or an Advanced option in setup is good way of preventing unneeded installations.

STF-searchlock-search-lock-hijacker-google-chrome-web-store-download-extension

Above you can see that there is even an extension related to SearchLock(.)com. It is offered at the Chrome Web Store and is helping it spread further. Another distribution method for the hijacker is via advertisements, like banners and pop-ups or from visiting sites that are unknown. Those sites can be partnered with the hijacker’s makers. Affected browsers are: Google Chrome, Mozilla Firefox, Internet Explorer and Safari.

SearchLock(.)com – More Information

SearchLock(.)com is the domain of the browser hijacker of the same name. If SearchLock is installed on your computer, you will see certain settings changed. Your browsers will have their homepage changed, as well as the search engine and new tab setting. It claims to be useful by making your searching private, but the information is collected by the hijacker instead.

A browser extension is available for installation. One of the locations is on the Chrome Web Store. It might also come bundled with other apps on your PC. The extension is also named SearchLock(.)com and can redirect you to business partners of the hijacker. You might get redirected and see targeted ad content. The browser extension does the following:

  • Read and change all your data on the websites you visit
  • Change your privacy related settings

All input typed in the SearchLock(.)com search engine will be filtered from it. So, if you type personal data, it will be collected by the hijacker. The search results delivered by the unwanted program can be misleading. Around the search results, there are many adverts and links, unrelated to the searches. This can be seen in the image here:

STF-searchlock-search-lock-search-results-brooklyn-decker-ads-adverts

Browser redirects can come from the new tab setting, the homepage, or from advertisements. Pop-ups, pop-unders, banners or even in-text links might show as part of the adverts content. The redirects may have the goal to generate more traffic to domains which get money by pay-per-click.

From the Privacy Policy of SearchLock(.)com is understood that the hijacker performs information collection. There are a few pages about privacy on the site, but the policy looks like this:

STF-searchlock-search-lock-hijacker-privacy-policy

The information that is clearly stated to be collected is the following:

  • Web browser (type and version)
  • Operating system
  • Numerical count of daily searches, ad and result clicks
  • Search terms
  • Date you installed SearchLock
  • Where you heard about SearchLock (example: Facebook)

If the hijacker makers know if you heard about their application through Facebook or other social media, they may know from which social account you ended up on their site. Tying your social media account will make any information you have on that account gathered by the hijacker as well.

As search terms are collected, using the services and site of SearchLock, gives your consent for any data typed in to be collected. Also, don’t be fooled by the TRUSTe certificate. You should remove this unwanted application.

Remove SearchLock(.)com Completely

To remove SearchLock(.)com manually from your computer, follow the step-by-step removal instructions provided below. If the manual removal does not get rid of this hijacker completely, you should search for and remove any leftovers with an advanced anti-malware program. Such software can keep your PC secure in the future.

Delete SearchLock(.)com from Windows and Your Browser

1.Remove or Uninstall SearchLock(.)com in Windows
2.Remove SearchLock(.)com from Your Browser

Remove SearchLock(.)com automatically by downloading an advanced anti-malware program.

1. Remove SearchLock(.)com with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against attacks related to SearchLock(.)com in the future
Optional: Using an Alternative Anti-Malware Tool
NOTE! Substantial notification about the SearchLock(.)com threat: Manual removal of SearchLock(.)com requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.