NewTube Redirect Removal — How To Restore Your Browser

The NewTube redirect is a recently discovered browser plugin that can be used for hijacker purposes. Interaction with it can hijack personal data belonging to the victims. Our in-depth article explores some of the dangers associated with its presence on infected hosts.

Threat Summary

TypeBrowser Hijacker, PUP
Short DescriptionThe hijacker redirect can alter the homepage, search engine and new tab on every browser application you have installed.
SymptomsThe homepage, new tab and search engine of all your browsers will be switched to NewTube. You will be redirected and could see sponsored content.
Distribution MethodFreeware Installations, Bundled Packages
Detection Tool See If Your System Has Been Affected by NewTube

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss NewTube.

NewTube – Distribution Methods

The NewTube redirect is distributed primarily through a browser hijacker (browser plugin). The security reports indicate that one of the primary methods is the distribution of the hijacker on the official plugin repositories. A common mechanism is that the developers make them available for the most popular web browsers: Mozilla Firefox, Google Chrome, Internet Explorer, Microsoft Edge, Opera and Safari. An elaborate description is posted that should convince the users into downloading it onto their computers.

The NewTube redirect can also be sent to the victims by email SPAM messages. They utilize social engineering tactics by sending attached copies or they are linked in the body contents. They are also the main mechanism for spreading infected payloads:

  • Infected Application Installers — The hackers can embed virus code into installers of popular applications. The list of target apps can range from system utilities to creativity suite and productivity apps.
  • Infected Documents — Using a similar approach the hackers can embed the virus code into files of different types: text documents, (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: