My Text Case Browser Extension

The My Text Case extension was identified by our researchers during a routine examination of untrustworthy websites. It masquerades as a tool for altering text according to specified naming conventions (camel case, snake case, kebab case and so on).

However, upon closer inspection, it was determined that this extension operates as a browser hijacker. My Text Case modifies browser settings to initiate redirects and monitors users' browsing activities. Browser hijacking software typically alters default search engines, homepages, and new tab/window URLs, redirecting them to endorsed sites. Consequently, new browser tabs/windows and search queries lead to redirects to the promoted webpage.

Typically, browser hijackers endorse fake search engines that cannot generate search results, ultimately redirecting users to legitimate internet search sites. In our investigation, My Text Case redirected users to the Bing search engine (bing.com) directly, though it's crucial to note that the destination may vary.

Moreover, browser-hijacking software often employs persistence mechanisms to thwart removal efforts, such as restricting access to removal-related settings or reversing user-initiated changes to prevent browser recovery.

Additionally, My Text Case incorporates data-tracking features, collecting information such as visited URLs, viewed webpages, entered search queries, internet cookies, login credentials, personally identifiable information, and financial data. This sensitive data could be sold to third parties or exploited for profit.

What Are Browser Hijackers?

Browser hijackers are a type of malicious software or unwanted program designed to alter the settings of a web browser without the user's consent. These alterations typically involve changes to the default search engine, homepage, new tab settings, and sometimes the addition of unwanted browser extensions. The primary goal of browser hijackers is to redirect web traffic and manipulate the user's online experience for the benefit of the hijacker.

Key characteristics of browser hijackers include:

Modified Browser Settings: Browser hijackers make unauthorized changes to the browser's configuration settings. This can include changing the default search engine, homepage, and new tab settings.

Redirects: One of the main functionalities of browser hijackers is to redirect users to specific websites. This could be to promote certain sites, generate advertising revenue, or lead users to malicious pages.

Unwanted Toolbars and Extensions: Browser hijackers often come bundled with additional toolbars, extensions, or plugins that users did not explicitly install. These additions can clutter the browser interface and may have undesirable functionalities.

Fake Search Engines: Many browser hijackers promote fake search engines. These search engines often provide manipulated search results or may redirect users to legitimate search engines after generating revenue through advertising clicks.

Persistence: Browser hijackers are designed to be persistent, making them challenging to remove. They may resist attempts to change browser settings back to their defaults, ensuring the continued influence of the hijacker.

Data Collection: Some browser hijackers have the capability to collect user data, such as browsing habits, search queries, and login credentials. This collected information may be used for targeted advertising or sold to third parties.

February 26, 2024
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.