unTabs Browser Extension Virus – Remove It Completely - How to, Technology and PC Security Forum | SensorsTechForum.com

unTabs Browser Extension Virus – Remove It Completely

This article has been created to demonstrate how to remove unTabs browser extension virus from your Google Chrome browser and your PC completely.

A suspicious browser extension which claims to be of legitimate character, but is associated with intrusive software has been reported by users. The extension is called unTabs and it is for the web browser Google Chrome. The browser extension is distributed via third-party software and has been associated with information collection and multiple third-party advertisements so it’s removal is strongly advisable. If you have the unTabs browser extension on your computer and are struggling to remove it, we recommend you to read this post.

Threat Summary

NameunTabs
TypePUA (Potentially Unwanted Application), Adware
Short Description unTabs aims to display advertisements from various third-party websites and may collect crucial information from your computer.
Symptoms May slow down your computer significantly, display various forms of advertisements and be associated with other adware.
Distribution MethodVia third-party installers and bundling.
Detection Tool See If Your System Has Been Affected by unTabs

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss unTabs.

unTabs Virus Extension -How Did I Get It

The primary method which unTabs uses to spread is to be silently installed on your computer along third-party program installers. Usually these may be freeware programs that you are looking to download on your computer. These programs could be your free media player, codec pack, file converter, torrent downloader or any other app you have googled for. There are some suspicious websites that spread modified installers of freeware programs and unTabs may be bundled within those installers “as a free useful extra”. You can usually encounter the unTabs application in one of the steps of the “Custom” or “Advanced” installation modes in the setup of the program you may have recently installed.

Other methods by which unTabs may have been situated on your computer is if you have visited a suspicious website and approved it as a browser extension on Google Chrome.

unTabs Extension – More Information

The unTabs extension is initially advertised on their web page as a completely legitimate program that helps to save opened tabs for later so that your PC is faster:

However, the app is nothing like it says it is. Instead it aims to display you multiple advertisements and slow down your computer even more.

Once is situated on your PC, it immediately attacks your web browser and your Windows system. For starters, unTabs creates multiple different types of files in the following system folder:

→ %System32%\GroupPolicyUsers
%System32%\GroupPolicy

In addition to creating files in the system directory of Windows, the suspicious application also creates multiple different Windows registries in the Windows Registry Editor. These value strings include attacking the following sub-keys:

  • Google Chrome
  • Run

After the unTabs virus has already modified your computer, the suspicious extension may collect the following information from it, in order to display it’s targeted advertisements:

  • Your IP address and location.
  • System language.
  • Browsing history.
  • Online clicks.

Although this information is not known to be shared with third-parties, the unTabs extension may display you advertisements based on what you have searched online to get you to click on them. And this cannot be good in any way, because some of those advertisements may lead to third-party websites that may be tech support scams, phishing sites or even malicious web sites that may infect your computer.

But this is not where the nightmare ends. The application is reported to also run processes in the background of Windows which may take up system resources, like the CPU and the RAM. This results in your computer slowing down significantly.

How to Remove unTabs Fully from Your Computer and Chrome

Many affected users of the app have reported it very difficult to delete it. Reinstalling Google Chrome does not help either. Many users also report it to have malware-like behavior and similar to malware, this unwanted software stays persistent on your computer. This is why, security experts recommend to use adware-specific software for the removal of the program. It will not only remove one or two files of the program, but permanently eradicate it from your computer, so that you will never have to hear the name unTabs once more.

For more information and removal instructions, we advise you to follow the steps below. They are specifically designed to help you eliminate this unwanted application. For maximum effectiveness it Is recommended to follow the automatic instructions than the manual ones.

Manually delete unTabs from Windows and your browser

Note! Substantial notification about the unTabs threat: Manual removal of unTabs requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1.Remove or Uninstall unTabs in Windows
2.Remove unTabs from Your Browser
3.Fix registry entries created by unTabs on your PC

Automatically remove unTabs by downloading an advanced anti-malware program

1. Remove unTabs with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against attacks related to unTabs in the future
Optional: Using Alternative Anti-Malware Tools

How to Protect Yourself in the Future

Cyber-crooks have become very smart in both developing viruses as well as methods of infection of users. Both home users and enterprises should beware and always apply the following advises to the PCs in their networks:

  • Make sure to use additional firewall protection. Downloading a second firewall (like ZoneAlarm, for example) is an excellent solution for any potential intrusions.
  • Make sure that your programs have less administrative power over what they read and write on your computer. Make them prompt you admin access before starting.
  • Use stronger passwords. Stronger passwords (preferably ones that are not words) are harder to crack by several methods, including brute forcing since it includes pass lists with relevant words.
  • Turn off AutoPlay. This protects your computer from malicious executable files on USB sticks or other external memory carriers that are immediately inserted into it.
  • Disable File Sharing – it is recommended if you need file sharing between your computer to password protect it to restrict the threat only to yourself if infected.
  • Switch off any remote services – this can be devastating for business networks since it can cause a lot of damage on a massive scale.
  • If you see a service or a process that is external and not Windows critical and is being exploited by hackers (Like Flash Player) disable it until there is an update that fixes the exploit.
  • Make sure always to update the critical security patches for your software and OS.
  • Configure your mail server to block out and delete suspicious file attachment containing emails.
  • If you have a compromised computer in your network, make sure to isolate immediately it by powering it off and disconnecting it by hand from the network.
  • Make sure to educate all of the users on the network never to open suspicious file attachments, show them examples.
  • Employ a virus-scanning extension in your browser that will scan all the downloaded files on your computer.
  • Turn off any non-needed wireless services, like Infrared ports or Bluetooth – hackers love to use them to exploit devices. In case you use Bluetooth, make sure that you monitor all of the unauthorized devices that prompt you to pair with them and decline and investigate any suspicious ones.
  • Employ a virus-scanning extension in your browser that will scan all the downloaded files on your computer.
  • Employ a powerful anti-malware solution to protect yourself from any future threats automatically.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...