
2. Background
2.5 Browser Hijacking
Browser hijacking is an attack where the attacker tries to change the behavior of
the web browser without the user noticing [13]. This can be done by altering the
preferences of the web browser, common preference targets are for example search
engine, homepage and new tab page URLs.
A common intention of the attack is either to redirect the user to certain web pages
containing malicious software such as key loggers that will collect sensitive user data
such as passwords, user names or email addresses [13]. Another is forcing the user to
use your services generating more ad revenue and directing the user towards specific
web pages that pay for the service [13].
There exists various ways for the malicious software to enter your system but the
majority of the hijackers are installed by hazardous free applications, ad-supporting
programs or shareware. These often include a variety of toolbars and plug-ins. These
extensions will then access your preferences- and secure preference file in order to
change the values of the desired targets mentioned above [13].
2.5.1 Examples of Browser Hijacking Software
Trotux [15] - Trotux.com is a fishy website that claims to be a legit Internet search
engine. Trotux falsely claims that it generates the most relevant search results
and often tricks user into believing that it is legitimate. It often enters your system
through dubious installations or freeware and targets the most popular web browsers
Internet Explorer, Google Chrome and Mozilla Firefox. Trotux.com is then assigned
as the new tab URL, homepage and default search engine which forces the user to
encounter unwanted browser redirects upon doing things like opening the browser,
opening a new tab or simply trying to search the Internet. Trotux also makes it
hard for the user to roll back these changes, during the installation Trotux adds
a number of "helper objects" which are designed to automatically reassign settings
when the user attempts to change them. Websites visited, search queries, Internet
Protocol addresses and other similar information about the user’s web browsing ac-
tivity is recorded by Trotux. This information might be shared with third parties
who can use the private information to generate revenue. The data tracking that is
performed can lead to serious privacy issues or even identity theft.
WinYahoo [2] - This malware is not related to the legit company that is Yahoo
even though it tries to fool the user with its name and it also sets Yahoo as the
default search engine and homepage in the affected browsers. WinYahoo is bundled
in with a patent installer for Adobe Photoshop Album Starer Edition which fits the
trend for a lot of unwanted software. WinYahoo then recreates the Message Au-
thentication Code (MAC) for the Google Chrome browser which allows it to change
the Secure Preferences thus hijacking the browser. With the help of an extension
called Sale Charger the user’s browser is cluttered with annoying features such as
new tabs with advertisement or tech support scams.
9