Description Screenshot, or, is a fake search engine website that’s gained visibility recently due to its connections with highly invasive rootkits that redirect web searches to without permission. Like other fake search engines such as Click System or, only links to content that has a financial incentive to display and doesn’t bother with the usual safety measures that reputable search engines utilize. Behind the tired cat meme that ( uses to promote itself, is a surprisingly dangerous website and may install or be the result of the installation of rootkits that are also capable of stealing private information or creating backdoor security holes on your PC. Resultantly, malware analysts strongly discourage any interaction with and suggest quick application of anti-malware software if your browser shows signs of being afflicted by browser redirects.

Resolving the Questions That Doesn’t Want You to Ask

Exposure to is almost always caused by web browser redirects that force to load regardless of what your original destination might have been. Although these redirect attacks can be caused by browser hijackers that have no other functions worth mentioning, malware experts are displeased to find that redirects are commonly linked to dangerous rootkits such as ZeroAccess Rootkit and rootkit:Alureon/Mbr.

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.

Because these rootkits may have extra functions besides forcing your browser towards, immediate removal of all PC threats via anti-malware products is absolutely required to insure your computer’s safety and privacy.

The visibility for most symptoms of advanced rootkits like browser hijackers for can be negligible, but this doesn’t change the risks of attacks behind the scenes such as:
  • Infection of normal Windows processes that allow browser hijackers to launch themselves automatically, remain active in the background and make use of system resources without your permission.
  • Keylogging and other forms of privacy-invading attacks that steal private information, including passwords and financial info.
  • Arbitrary-blocking of unrelated programs such as PC security tools that could remove a rootkit from your computer.
  • Backdoor access to your PC that allows criminals to force the system into performing self-destructive actions.
  • The presence of other PC threats, such as rogue anti-virus programs, viruses or worms that are installed without consent.

How You Can Give the Answer That Makes It Hush

Rootkits and browser hijackers tend to be propagated via software packages that contain a Web Search toolbar. In some cases, this add-on may be avoidable by de-selecting the relevant option during the program’s installation process. Nonetheless, malware researchers recommend that you avoid software products that have links to disreputable search toolbars, and never trust their included removal tools to solve redirect attacks.

Removal of advanced PC threats like Zero Access Rootkit and rootkit:Alureon/Mbr may require additional steps (such as booting into the Command Prompt or disabling System Restore) to guarantee total deletion. However, a suitably competent anti-malware product remains the safest way to rid yourself of all PC threats, including its browser hijackers, as long as appropriate procedures are followed beforehand. Automatic Detection Tool (Recommended)

Is your PC infected with To safely & quickly detect we highly recommend you run the malware scanner listed below.

Posted: December 22, 2011 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Threat Metric
Threat Level: 5/10

One Comment

Leave a Reply

What is 8 + 3 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)