Threat Database Potentially Unwanted Programs iStart New Tab Browser Extension

iStart New Tab Browser Extension

Threat Scorecard

Ranking: 6,989
Threat Level: 50 % (Medium)
Infected Computers: 81
First Seen: May 9, 2023
Last Seen: September 27, 2023
OS(es) Affected: Windows

Upon analyzing the iStart New Tab browser extension, it was discovered by infosec researchers that it possesses the functionality of a browser hijacker. Indeed, the application modifies essential browser settings and promotes a fake search engine at letsearches.com. It should be noted that users are often unaware that they have added browser hijackers like iStart New Tab to their browsers.

Browser Hijackers and PUPs (Potentially Unwanted Programs) Often Lead to Privacy Concerns

Once the iStart New Tab is added to a browser, it modifies several settings, such as the new tab page, the default search engine and the homepage to promote letsearches.com. While this fake search engine displays search results from the legitimate search engine Bing, it still cannot be considered trustworthy.

Users should avoid trusting fake or unreliable search engines because they may present them with deceptive or harmful content and collect personal information and search queries. Cybercriminals may misuse the data gathered by these search engines, putting users' privacy and security at risk.

Moreover, browser hijackers like the iStart New Tab often prevent users from modifying their browser settings, making it difficult or impossible to revert to the affected settings back to their previous states. Hence, users should take the necessary steps to remove browser hijackers as soon as they detect their presence to ensure their online safety and privacy.

How Do PUPs and Browser Hijackers Get Installed on Users' Devices?

PUPs and browser hijackers can be installed on users' devices through various methods. One common method is through software bundling, where PUPs and browser hijackers are packaged with other software that the user intentionally installs. Sometimes, the user may not even realize that additional software is being installed.

PUPs and browser hijackers also can be installed through deceptive or misleading advertisements, such as fake system alerts or software update prompts that trick the user into installing unwanted software.

Finally, PUPs and browser hijackers also can be installed through social engineering tactics such as phishing tactics, where the attacker poses as a legitimate entity and convinces the user to install the unsafe software.

Trending

Most Viewed

Loading...