Threat Database Potentially Unwanted Programs Sport Engine Browser Hijacker

Sport Engine Browser Hijacker

Infosec researchers have discovered a dubious browser extension named Sport Engine being promoted via questionable pages. The app is described as a helpful tool that will allow users to personalize their new browser tabs with sports-related backgrounds. However, further analysis conducted by the researchers indicated that the extension was actually a browser hijacker. It should be noted that many browser hijackers and PUPs (Potentially Unwanted Programs) get installed by users unintentionally.

Browser Hijackers may Cause Unwanted Redirects to Promoted Sites

After Sport Engine is installed, it causes several changes to the browser's settings. The extension modifies the browser's homepage, default search engine, and new tab addresses to 'sportengine.info.' As a result, every time users open a new browser tab or initiate a search query into the URL bar, they will be redirected to the promoted address.

Fake search engines like sportengine.info often cannot generate legitimate search results, so they tend to redirect to genuine ones. Researchers confirmed that sportengine.info redirects to Bing (bing.com) and displays results taken from it. However, it's important to note that the redirection may vary depending on user location and other factors.

Sport Engine, like most browser hijackers, may employ various persistence-ensuring techniques to prevent users from removing it from their browsers. Additionally, the extension is likely to collect information about the user's browsing activity, including visited URLs, viewed pages, search queries, internet cookies, log-in credentials, personally identifiable information, and financial data. This information could potentially be sold to third parties or otherwise used for profit. Therefore, users should be cautious when installing browser extensions and avoid granting excessive permissions to prevent falling victim to such browser hijackers.

Browser Hijackers And PUPs (Potentially Unwanted Programs) Often Disguise Their Installations

Browser hijackers and PUPs are typically distributed using deceptive and unethical methods. These methods may include disguising the software as a legitimate program or hiding it within other software downloads. In some cases, the software may be bundled with freeware or shareware programs, which may not disclose the presence of the unwanted program during installation.

Some browser hijackers and PUPs may also use social engineering tactics to trick users into installing them. For example, the software may be disguised as a security update or system optimization tool, with the promise of improving system performance or protecting against malware. These claims are often misleading or outright false, and the software may actually harm the user's computer or compromise their privacy.

Another shady method used for distributing browser hijackers and PUPs is through dubious websites and online ads. These sites may use pop-ups or other intrusive tactics to encourage users to download the software, often by making false claims about the benefits or features of the program. Once installed, the software may alter the user's browser settings, display unwanted ads, or track their online activity.

In some cases, browser hijackers and PUPs may also be distributed through email attachments or links, which may appear to be from a trusted source but actually contain malware or other malicious software. These emails may use social engineering tactics to trick users into clicking on the link or downloading the attachment, which can lead to the installation of unwanted programs or other security threats.

Overall, the distribution of browser hijackers and PUPs often relies on deception and trickery, with the goal of persuading users to install unwanted software on their computer systems that could compromise their privacy.

Trending

Most Viewed

Loading...