Threat Database Potentially Unwanted Programs Sports Engine Browser Extension

Sports Engine Browser Extension

Threat Scorecard

Ranking: 11,777
Threat Level: 50 % (Medium)
Infected Computers: 21
First Seen: February 26, 2023
Last Seen: August 10, 2023
OS(es) Affected: Windows

Upon analysis of the Sports Engine browser extension, it was discovered that it employs browser-hijacking techniques to manipulate and modify the settings of users' web browsers. The primary objective of this intrusive app is to promote a fake search engine called sportengine.info, which users may unintentionally use instead of their preferred search engine. The same address has also been observed being promoted by a similar PUP (Potentially Unwanted Program) known as Sport Engine.

Browser Hijackers and PUPs may be Equipped with Various Intrusive Capabilities

After the Sports Engine browser extension is installed, it takes over control of the user's browser settings and modifies the default homepage, search engine, and new tab page to now lead to a fake search engine at sportengine.info. Although this fake search engine is designed to imitate the behavior of legitimate ones, it is, in fact, incapable of producing any search results on its own. Instead, it further redirects the user's search query and shows search results from the legitimate search engine Bing.

It is also likely that Sports Engine can access a list of the user's most frequently visited websites, including visited websites, viewed pages, used search terms, and other related data that may be utilized to construct a profile of the user's online behavior. This raises privacy concerns since browsing history can reveal personal interests, preferences, and habits, and this information could potentially be used for targeted advertising or other purposes.

PUPs and Browser Hiajckers Often Hide Their Installation via Questionable Distribution Tactics

Potentially Unwanted Programs (PUPs) and browser hijackers often use deceptive tactics to mask the fact that they are going to be installed on the user's device. Some of these tactics include bundling their software with legitimate programs, disguising their installation as a necessary update, or using misleading pop-up ads. In some cases, PUPs and browser hijackers may also use social engineering techniques to convince users to install them, such as by claiming to offer a useful service or promising to enhance the user's browsing experience.

The use of these questionable distribution tactics allows PUPs and browser hijackers to be installed without the user's knowledge or consent. This can be a major problem because these types of programs can cause a range of issues, including displaying unwanted ads, causing redirects to untrustworthy destinations, and even posing a privacy risk by collecting sensitive user information. Additionally, removing PUPs and browser hijackers can be difficult, as they may hide their files and processes or attempt to reinstall themselves after being removed.

Trending

Most Viewed

Loading...