Protected-Browsing
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 13,578 |
Threat Level: | 20 % (Normal) |
Infected Computers: | 89 |
First Seen: | March 13, 2022 |
Last Seen: | August 17, 2023 |
OS(es) Affected: | Windows |
Protected-Browsing is an intrusive browser extension. After installing it, users will quickly realize that their browser has been taken over and several of its important settings have been modified. Indeed, Protected-Browsing has been classified by cybersecurity experts as a browser hijacker and a PUP (Potentially Unwanted Program).
When activated, Protected-Browsing will substitute the current homepage, new tab page, and default search engine of the browser with a sponsored address. The page that will now be opened any time the user launches the affected browser, tries to search the Internet via the URL bar or opens a new tab will be protected-browsing.xyz, a fake search engine.
Fake engines are commonly associated with browser hijackers because they are incapable of attracting any legitimate users. After all, these search engines cannot actually perform any search functions on their own. Instead, they will take the entered search queries and redirect them through another search engine. The source could a legitimate one, such as Bing in this case, or a dubious engine delivering low-quality results filled with advertisements.
PUPs also can possess data-tracking capabilities. These annoying applications could spy on the user's browsing activities, harvest numerous device details, or even extract sensitive data that has been saved as autofill information. All gathered information will be transmitted to the PUP's operators who can try to monetize it by offering it for sale to third parties.