Threat Database Potentially Unwanted Programs Wise Search Browser Extension

Wise Search Browser Extension

Information security researchers have analyzed the Wise Search browser extension and discovered that it hijacks Web browsers to promote a deceptive search engine. This extension manipulates various critical browser settings to enforce the use of a specific Web address, effectively compelling users to utilize the fraudulent search engine it promotes.

The Wise Search Browser Hijacker may Expose Users to Increased Privacy Risks

Upon installation, the Wise Search browser extension alters key settings within a Web browser, including the default search engine, homepage, and new tab pages, directing them to blpsearch.com. As a result, whenever the affected browser or new tab is opened, users are automatically directed to blpsearch.com when performing a search query. An examination conducted by experts has revealed that blpsearch.com functions as a counterfeit search engine.

The investigation uncovered that blpsearch.com does not generate its own search results. Instead, it redirects users to google.com, presenting search results from the Google search engine. However, blpsearch.com may also redirect users to other search engines, both legitimate and unreliable, depending on factors such as the user's IP address and geolocation.

Fake search engines like blpsearch.com are often unreliable and may lead users to questionable or harmful websites. They can promote unsafe content, increasing the risk of encountering tactics, phishing sites, pages hosting malware or unwanted software.

Moreover, counterfeit search engines pose privacy and security risks by potentially collecting and exploiting browsing data and other personal information. This data could be sold to third parties or used for malicious purposes.

Browser Hijackers and PUPs (Potentially Unwanted Programs) a Lot of Times Sneak Their Installations on Users' Devices

Browser hijackers and PUPs employ various tactics to install themselves on users' devices sneakily. These tactics often exploit unsuspecting users and take advantage of vulnerabilities in software or user behavior:

  • Bundled Software: One of the most prevalent methods involves bundling the browser hijacker or PUP with legitimate software downloads. Users may unknowingly install the additional software along with the desired program by quickly clicking through installation prompts without closely reviewing the terms and conditions.
  • Misleading Advertisements and Pop-ups: Fraudulent advertisements or pop-ups on websites can trick users into clicking on fake download buttons or links that initiate the download and installation of browser hijackers or PUPs. These advertisements may falsely claim to offer helpful software updates or security scans.
  • Fraudulent Software Updates: Users may be prompted to install what appears to be a legitimate software update or plugin, only to install a browser hijacker or PUP instead unknowingly. These fake update alerts often mimic the appearance of genuine system notifications.
  • Freeware or Shareware: Free software applications sometimes come bundled with browser hijackers or PUPs. Users who opt for free software versions may inadvertently accept additional software during installation.
  • Unsolicited Email Attachments: Email attachments from unknown or suspicious senders can contain executable files that install browser hijackers or PUPs when opened. Users should exercise caution when downloading attachments from unfamiliar sources.
  • Social Engineering Tactics: Fraudsters may use social engineering tactics, such as fake alerts or warnings, to manipulate users into installing browser hijackers or PUPs to improve security or enhance the browsing experience.

To mitigate the risk of browser hijackers and PUPs, users should always download software from reputable sources, carefully read installation prompts before proceeding, keep programs and operating systems updated, use ad-blocking and anti-malware software, and exercise caution when accessing links or downloading attachments from unknown sources.

Trending

Most Viewed

Loading...