Jump to content

Recommended Posts

  • ExTS Admin
Posted

eFast browser poses as Chrome but inserts unwanted ads

 

There's a modified Google Chrome clone going around the Internet that's being used by attackers to show users unwanted ads and redirect them to other malware infection points.

 

The browser in question is named eFast, and according to security researchers at PCRisk and Malwarebytes, it infects user PCs after being installed alongside other applications.

 

This PUP (Potentially Unwanted Application) is based on the Chromium open source browser, the very same code on which Google Chrome is also built.

 

The shared codebase allows the browser to easily pass as the real deal, and successfully fool users into thinking they're actually using Chrome.

 

During eFast's installation, the browser takes special care to remove any Google Chrome shortcuts, and replaces them with its own, using an icon specifically designed to look like Chrome's, but slightly different.

 

Furthermore, additional shortcuts for popular sites like YouTube, Amazon, Facebook, Wikipedia, and Hotmail are all placed on the desktop, all primed to open inside an eFast browser.

 

http://img.photobucket.com/albums/v708/starbuck50/malware-disguises-as-a-google-chrome-browser-clone-494906-3_zpsgsidmtgd.jpg

 

 

eFast hijacks file and URL associations on infected systems

 

Malwarebytes has also observed the browser alters OS settings, eFast changing default file associations and URL types, so whenever the user clicked any HTML, GIF, or JPEG document inside their operating system, eFast would be used instead of the previously set application.

 

At the moment of writing this article, researchers have detected eFast placing itself as the default application for the following file types: HTM, HTML, SHTML, XHTML, XHT, WEBP, PNG, JPG, JPEG, GIF, and PDF.

 

Additionally, URLs with the following protocols were also opened by default in eFast: HTTP, HTTPS, FTP, IRC, MAILTO, MMS, SMS, SMSTO, TEL, NEWS, NNTP, URN, and WEBCAL.

 

eFast is being used to deliver adware and ads to users

 

Once the user was convinced (tricked) to use eFast, the browser's malware code injects ads inside their normal Web pages, and even redirect them to sites where other malware is being served.

 

Besides this, during the eFast installation, the predm.exe file was also placed inside the user's Program Files folder, file that is currently detected as infected by 44 antivirus engines on VirusTotal.

 

Both PCRisk and Malwarebytes provide instructions on how to remove eFast from infected computers.

 

http://img.photobucket.com/albums/v708/starbuck50/malware-disguises-as-a-google-chrome-browser-clone-494906-4_zpso5ksoikr.jpg

 

http://img.photobucket.com/albums/v708/starbuck50/malware-disguises-as-a-google-chrome-browser-clone-494906-5_zpsyxadrrjy.jpg

 

 

 

Source:

http://news.softpedia.com/news/malware-disguises-as-a-google-chrome-browser-clone-494906.shtml

Member of:

UNITE

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...