Matrix Start Tabs
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 13,570 |
Threat Level: | 50 % (Medium) |
Infected Computers: | 162 |
First Seen: | March 3, 2022 |
Last Seen: | August 5, 2023 |
OS(es) Affected: | Windows |
The Matrix Start Tabs is a browser extension that offers to modify the homepage and new tab page of user's Web browsers. Among the changes it enacts, are the inclusion of a different background, local weather information, and several easily accessible links for popular websites and social media platforms, such as Facebook, Twitter, Instagram and more.
Some users may find the behavior of the Matrix Start Tabs to be too intrusive and similar to that of a browser hijacker. Fortunately, the application can be easily removed from the system and the affected browsers will revert to their previous settings.
This would not be the case when dealing with a browser hijacker. Many of these intrusive applications attempt to hide their installation from the user's attention. Once inside the system, they may establish persistence mechanisms to protect the changes they make. One of the most annoying characteristics of a browser hijacker is that the application will be responsible for causing unwanted redirects to an unfamiliar, sponsored page. It does so by assuming complete control over the browser's homepage, new tab page and default search engine.
The intruder application also is most likely going to run data-harvesting routines designed to siphon a vast amount of data from the system and transmit it to a remote server continuously. Typically, browser hijackers and other PUPs (Potentially Unwanted Programs) go after the user's browsing information and numerous device details. However, it also is possible for the PUP to try and extract sensitive information that may include banking details, payment data, and even credit/debit card numbers from the affected browsers.