The NewTube redirect is a recently discovered browser plugin that can be used for hijacker purposes. Interaction with it can hijack personal data belonging to the victims. Our in-depth article explores some of the dangers associated with its presence on infected hosts.
NewTube – Distribution Methods
The NewTube redirect is distributed primarily through a browser hijacker (browser plugin). The security reports indicate that one of the primary methods is the distribution of the hijacker on the official plugin repositories. A common mechanism is that the developers make them available for the most popular web browsers: Mozilla Firefox, Google Chrome, Internet Explorer, Microsoft Edge, Opera and Safari. An elaborate description is posted that should convince the users into downloading it onto their computers.
The NewTube redirect can also be sent to the victims by email SPAM messages. They utilize social engineering tactics by sending attached copies or they are linked in the body contents. They are also the main mechanism for spreading infected payloads:
- Infected Application Installers — The hackers can embed virus code into installers of popular applications. The list of target apps can range from system utilities to creativity suite and productivity apps.
- Infected Documents — Using a similar approach the hackers can embed the virus code into files of different types: text documents, (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: https://sensorstechforum.com/newtube-redirect-removal-restore-browser/