Infinity Search

Threat Scorecard

Ranking: 12,685
Threat Level: 50 % (Medium)
Infected Computers: 38
First Seen: March 8, 2023
Last Seen: September 29, 2023
OS(es) Affected: Windows

The Infinity Search browser extension was discovered by cybersecurity researchers to be promoted by suspicious websites. The extension promises to provide users with helpful features, but analysis has revealed that it carries browser hijacker functionality. Indeed, downloading and installing Infinity Search could result in crucial browser settings being modified to redirect users to the fake search engine search.infinity-searches.com instead of their default search engine. This browser hijacking has serious implications, as it could potentially result in privacy breaches or other potential risks.

Browser Hijackers Like the Infinity Search may Perform Numerous Intrusive Actions

The Infinity Search browser extension may modify various browser settings, including the default search engine, homepage, and new tab/window settings, to redirect users to the search.infinity-searches.com site. As a result, any searches conducted through the URL bar or new browser tabs will be redirected to this fake search engine. In most cases, fake search engines typically cannot provide accurate search results. As for search.infinity-searches.com, it was observed taking results from the legitimate Bing search engine. However, this may vary depending on factors such as the user's location.

To ensure its persistence, Infinity Search employs various techniques to prevent users from removing the extension and recovering their original browser settings.

Moreover, the Infinity Search is likely designed to track user data, which may include browsing and search histories, cookies, login credentials, personally identifiable information, financial data, and more. The collected data may be sold to third parties or used for profit by the attackers.

Browser Hijackers and PUPs (Potentially Unwanted Programs) Often Hide Their Installation

Browser hijackers and PUPs are often distributed through dubious tactics that can catch users off guard. Some of the most common tactics used by distributors of these programs include bundling them with legitimate software downloads, disguising them as software updates or security patches, and using deceptive advertising to encourage users to install them.

In many cases, users are not even aware that they are installing a browser hijacker or PUP until after it has already been installed on their computer. Once installed, these programs can modify browser settings, redirect users to unwanted websites, inject ads into web pages, and track user activity.

Distributors of browser hijackers and PUPs also may use social engineering schemes to induce users into installing these programs. For example, they may use scare tactics, such as displaying fake warnings or error messages, to convince users that their computer is infected with malware or needs immediate attention. They may also offer free software or other incentives to encourage users to install their programs.

In some cases, browser hijackers and PUPs may also be distributed through malicious websites, phishing emails, or other misleading content. To avoid falling victim to these tactics, users should be cautious when downloading software from unfamiliar websites, always read the terms and conditions carefully before installing any software, and use reputable antivirus software to protect their computers from malware and other threats.

Trending

Most Viewed

Loading...