Threat Database Potentially Unwanted Programs Art New tabs Browser Extension

Art New tabs Browser Extension

Infosec researchers uncovered the Art New tabs browser extension, highlighting its deceptive practices. Although this extension presents itself as a beneficial tool for users, it has been unequivocally identified for its nefarious activities. Specifically, the Art New tabs is found to alter browser settings in a way that promotes the utilization of the goog.artnewtabs.com counterfeit search engine through redirections. This misconduct goes beyond mere manipulation, as the extension also engages in intrusive surveillance of users' online activities.

Browser Hijackers Like the Art New tabs Perform Unwanted Changes

The Art New tabs browser extension performs several changes to browser settings that extend to the homepage, new tabs, and default search engine. These modifications serve as a means for the extension to orchestrate redirects to the goog.artnewtabs.com website.

Typically, fake search engines like goog.artnewtabs.com lack the ability to deliver authentic search results, leading to automatic redirection to legitimate internet search engines. During the time of our research, goog.artnewtabs.com directed users to the Bing search engine. It's essential to note that the destination of such redirections can vary depending on factors like user geolocation, which may impact the specific search engine to which they are directed.

To maintain their presence and hinder removal, browser hijackers like the Art New tabs often incorporate persistence-ensuring mechanisms. These mechanisms may involve blocking access to settings that facilitate removal and undoing any changes initiated by the user in an effort to regain control of their browser.

Furthermore, it's common for browser hijackers like the Art New tabs to include data-tracking functionalities. This capability allows them to collect a wide range of user information, such as the URLs of visited websites, viewed Web pages, search queries, Internet cookies, login credentials, personally identifiable information, and financial data, among others. This harvested data can then be exploited for profit through sale to third parties or other questionable uses.

Users Should be Vigilant When Installing Applications from Unfamiliar Sources

Intrusive, Potentially Unwanted Programs (PUPs) and browser hijackers often use various distribution tactics to infiltrate users' systems and browsers without their knowledge or explicit consent. Here are some commonly employed distribution tactics by these unwanted software types:

  • Software Bundling: PUPs and browser hijackers are frequently bundled with legitimate software downloads. Users who hastily install software may overlook or accept additional offers or checkboxes during the installation process, unwittingly agreeing to install the PUP or browser hijacker.
  •  Deceptive Install Wizards: Some PUPs and browser hijackers use misleading installation wizards that employ confusing language or design to trick users into granting permission. Users may be persuaded to accept terms like "recommended options" or "enhanced features" without realizing the implications.
  •  Fake Updates: PUPs and browser hijackers may pose as critical software updates or security patches. Users, thinking they are enhancing their system's security or functionality, might unknowingly install the unwanted software.
  •  Malvertising: Malicious advertising, or malvertising, can be used to distribute PUPs and browser hijackers. Users who click on deceptive ads on websites may inadvertently trigger the download and installation of unwanted software.
  •  Social Engineering: Some PUPs and browser hijackers use social engineering techniques, such as fake alerts or warnings that claim the user's device is infected or at risk. Users are prompted to take action, such as downloading a security tool, which turns out to be unwanted software.
  •  Browser Extensions: Browser hijackers are often distributed in the form of seemingly benign browser extensions or plugins. Users may install these extensions believing they provide useful features, only to discover later that they interfere with their browsing experience.

These distribution tactics are used to manipulate users or hide the true nature of the software during installation. It's paramount for users to exercise caution when downloading software, keep their systems and browsers up to date, and use reputable security software to protect against PUPs and browser hijackers. Regularly reviewing installed software and browser extensions can help identify and remove unwanted programs from your system.

Trending

Most Viewed

Loading...