ChatGPT Check Browser Extension
During a research investigation focused on untrustworthy websites, infosec experts stumbled upon the ChatGPT Check browser extension. Their discovery was prompted when they encountered a webpage promoting the installation of this extension, accompanied by what seemed to be the 'official' promotional page for ChatGPT Check.
The promotional page for this extension claims that it is a useful tool for individuals who prefer not to create user accounts or pay for access to ChatGPT. It purports to offer the advantage of a hassle-free experience by not requiring users to sign up and granting them the ability to perform three daily searches using an AI chatbot, all without any charges.
However, upon conducting a detailed analysis of this software, researchers concluded that the ChatGPT Check browser extension is, in reality, a browser hijacker with the primary objective of promoting the chatcheckext.com fake search engine.
It is of utmost importance to underline that this rogue browser extension has no legitimate affiliation with the genuine ChatGPT or its developer, OpenAI. Instead, it operates deceptively, misleading users into believing it provides access to ChatGPT while redirecting their online searches through a fraudulent search engine.
The ChatGPT Check Browser Hijacker Performs Unauthorized Changes
ChatGPT Check is a potentially harmful software that manipulates your browser settings, specifically targeting the default search engine, homepage, and new tab pages. When this software is installed, it redirects these browser components to the chatcheckext.com website. Consequently, any new tabs opened or search queries initiated through the URL bar will lead to redirects to chatcheckext.com.
Fake search engines, like chatcheckext.com, are typically incapable of providing legitimate search results. Instead, they often redirect users to well-known and legitimate search engines like Yahoo, as was observed during our research. However, it's essential to note that the destination of these redirects can vary based on factors such as user geolocation.
Browser-hijacking software often employs mechanisms to make it challenging to remove and to hinder users from restoring their browsers to their original settings. In the case of ChatGPT Check, the variant we discovered utilizes the 'Managed by your organization' feature in Google Chrome to maintain control over your browser settings.
Additionally, ChatGPT Check goes beyond manipulating browser settings and also collects browsing histories. This is concerning because browser hijackers often target sensitive information, including internet cookies, usernames and passwords, personally identifiable information, and financial data. This collected data can be monetized by selling it to third parties, posing a significant privacy and security risk to users. It is essential to be vigilant and take steps to protect your browser and personal information from such threats.
Keep in Mind the Dubious Distribution Techniques Utilized by PUPs (Potentially Unwanted Programs) and Browser Hijackers
It's important to remain aware of the questionable distribution methods employed by PUPs and Browser Hijackers. These types of software often use deceptive or unethical tactics to infiltrate users' systems, potentially leading to undesirable consequences.
Some common distribution techniques used by PUPs and Browser Hijackers include:
Software Bundling: PUPs and Browser Hijackers are frequently bundled with legitimate software downloads. Users may unknowingly install them alongside desired programs, as these unwanted applications are often hidden in the installation process.
Misleading Ads and Pop-ups: These programs may use deceptive advertisements or pop-ups, enticing users to click on them and inadvertently install the malicious software.
Fake Updates: PUPs and Browser Hijackers may disguise themselves as software updates or security patches. Users who believe they are improving their system's security or functionality may unknowingly install the unwanted software.
Malicious Websites: Visiting compromised or malicious websites can expose users to drive-by downloads, where PUPs and Browser Hijackers are automatically downloaded and installed without user consent.
Social Engineering: Cybercriminals sometimes employ social engineering tactics, such as fake alerts or messages claiming that the user's system is infected. Users may be tricked into downloading and installing these malicious programs to resolve nonexistent issues.
Freeware and Cracked Software: Illegitimate sources offering cracked or pirated software often bundle PUPs and Browser Hijackers with their downloads as a way to monetize their offerings.
To protect your computer and personal data from these unwanted intrusions, it's crucial to exercise caution when downloading software, only obtain applications from reputable sources, and regularly update your security software. Additionally, be mindful of suspicious pop-ups, ads, and unexpected software update alerts. Educating yourself about these distribution techniques can help you avoid falling victim to PUPs and Browser Hijackers.