EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
|Threat Level:||50 % (Medium)|
|First Seen:||March 8, 2023|
|Last Seen:||May 26, 2023|
The Infinity Search browser extension was discovered by cybersecurity researchers to be promoted by suspicious websites. The extension promises to provide users with helpful features, but analysis has revealed that it carries browser hijacker functionality. Indeed, downloading and installing Infinity Search could result in crucial browser settings being modified to redirect users to the fake search engine search.infinity-searches.com instead of their default search engine. This browser hijacking has serious implications, as it could potentially result in privacy breaches or other potential risks.
Browser Hijackers Like the Infinity Search may Perform Numerous Intrusive Actions
The Infinity Search browser extension may modify various browser settings, including the default search engine, homepage, and new tab/window settings, to redirect users to the search.infinity-searches.com site. As a result, any searches conducted through the URL bar or new browser tabs will be redirected to this fake search engine. In most cases, fake search engines typically cannot provide accurate search results. As for search.infinity-searches.com, it was observed taking results from the legitimate Bing search engine. However, this may vary depending on factors such as the user's location.
To ensure its persistence, Infinity Search employs various techniques to prevent users from removing the extension and recovering their original browser settings.
Moreover, the Infinity Search is likely designed to track user data, which may include browsing and search histories, cookies, login credentials, personally identifiable information, financial data, and more. The collected data may be sold to third parties or used for profit by the attackers.
Browser Hijackers and PUPs (Potentially Unwanted Programs) Often Hide Their Installation
Browser hijackers and PUPs are often distributed through dubious tactics that can catch users off guard. Some of the most common tactics used by distributors of these programs include bundling them with legitimate software downloads, disguising them as software updates or security patches, and using deceptive advertising to encourage users to install them.
In many cases, users are not even aware that they are installing a browser hijacker or PUP until after it has already been installed on their computer. Once installed, these programs can modify browser settings, redirect users to unwanted websites, inject ads into web pages, and track user activity.
Distributors of browser hijackers and PUPs also may use social engineering schemes to induce users into installing these programs. For example, they may use scare tactics, such as displaying fake warnings or error messages, to convince users that their computer is infected with malware or needs immediate attention. They may also offer free software or other incentives to encourage users to install their programs.
In some cases, browser hijackers and PUPs may also be distributed through malicious websites, phishing emails, or other misleading content. To avoid falling victim to these tactics, users should be cautious when downloading software from unfamiliar websites, always read the terms and conditions carefully before installing any software, and use reputable antivirus software to protect their computers from malware and other threats.