Chromesearch.club
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 9,861 |
Threat Level: | 50 % (Medium) |
Infected Computers: | 6,065 |
First Seen: | December 21, 2017 |
Last Seen: | September 19, 2023 |
OS(es) Affected: | Windows |
Chromesearch.club is a fake search engine that tries to pass itself as a legitimate one. According to its promotional activities, Chromesearch.club is capable of enhancing users' browsing experience thanks to the improved search results it delivers. Furthermore, its page is designed to mimic the appearance of other reputable engines, such as Google, Bing, Yahoo, etc., in an attempt to convince users that it also is trustworthy by association.
Fake and dubious search engines, such as Chromesearch.club, are often promoted through underhanded means. Typically, this includes the distribution of intrusive browser hijackers and PUPs (Potentially Unwanted Programs). These applications are equipped with certain routines that allow them to take control over users' web browsers. More specifically, the browser hijacker will change the current homepage, new tab page and default search engine with a sponsored address.
Apart from the annoying redirects, the installed PUP also could be silently spying on the browsing activities carried out on the device. Users risk having their browsing history, search history, and clicked URLs captured, packaged, and transmitted to the server controlled by the PUP's operators. Keep in mind that sometimes additional, far more sensitive data also is harvested. Device details (IP address, device type, browser type, OS version, etc.) and details harvested from the browser's autofill data (account credentials, banking details and payment information) could be included in the exfiltrated information.
URLs
Chromesearch.club may call the following URLs:
http://chromesearch.club/search?q= |