Threat Scorecard

Ranking: 304
Threat Level: 20 % (Normal)
Infected Computers: 6,715
First Seen: February 12, 2023
Last Seen: September 30, 2023
OS(es) Affected: Windows

Cybersecurity researchers have uncovered another dubious search engine that is being promoted through intrusive PUPs (Potentially Unwanted Programs) and browser hijackers. The fake search engine is, and the address could be forcibly set as browsers' homepages, new tab pages, and default search engines without users' realizing it. Such behavior is typical for browser-hijacking software. In addition to the unwanted redirects, PUPs and fake search engines also often spy on users' online activity.

Why is Your Browser Opening the page?

Browser hijackers are invasive applications that can be installed on devices without users' knowledge. They are most often used as tools promoting a fake or dubious search engine. This means that if a browser hijacker promoting is installed on your computer, any new tabs or opened windows and searches performed via the URL bar will be redirected to this site.

Furthermore, these unsafe programs also may restrict access to removal-related settings and undo user-made changes. Unlike legitimate search engines such as Yahoo, Bing, and Google, does not generate accurate search results and may even advertise deceptive or harmful content.

In addition to redirecting users to unwanted websites, browser hijackers also may collect sensitive data, such as searched queries, visited URLs, viewed Web pages, bookmarks, IP addresses, personally identifiable details, usernames/passwords, and finance-related information, which can then be sold to third parties or used for other nefarious purposes.

How are Browser Hijackers and PUPs (Potentially Unwanted Programs) Distributed?

It's a common tactic for hackers to embed unwanted items within free downloads from various sources like torrents, pirated video-on-demand services, software sites and more. A lot of users also may be deceived into clicking on deceptive advertisements that promote free downloads but deliver PUPs instead. Attackers also may repackage popular or freeware applications with additional items, so when the users download a trusted application, they could still unknowingly install a browser hijacker along with it. This tactic is typically known as 'bundling,' and users should always check the installation details for pre-selected items or additional programs set to be delivered to their devices.

URLs may call the following URLs:


Most Viewed