Home Malware Programs Browser Hijackers PUM.Security Hijacks

PUM.Security Hijacks

Posted: June 2, 2015

Threat Metric

Threat Level: 8/10
Infected PCs: 10
First Seen: June 2, 2015
OS(es) Affected: Windows

PUM.Security Hijacks are Potentially Unwanted Modifications of your Web browser that could disable its security features or otherwise open your PC up to Web-based attacks. PUM.Security Hijacks may include different kinds of browser changes, rather than a single change with predictable symptoms, which may complicate the process of identifying them or the unwanted software that causes them to occur. Using your PC's security software for detecting associated threats, along with removing the PUM.Security Hijacks is the response malware experts would suggest.

The Hijackings You don't See Until after Their Consequences

PUM.Security Hijacks are browser changes that may tie into the presence of threatening software or unwanted software, such as adware, search engine hijackers or toolbars. Examples of other PUMs include PUM.Hijack.StartMenu and PUM.Hijack.HomepageControl, which may be present alongside PUM.Security Hijacks. Personal, user-based changes to your browser settings shouldn't cause your security software to detect PUM.Security Hijacks, and you should feel free to report inaccurate alerts when needed.

PUM.Security Hijacks may have relationships with third-party attacks that disable Chrome's update manager. They also may be associated with other changes, such as reduced security settings that then may allow other add-ons to be installed. Because non-updated browsers are prime targets for attacks by Web threats, malware researchers recommend removing any program that triggers alerts for PUM.Security Hijacks or is otherwise responsible for their appearance.

Conventional attacks that take advantage of out-of-date browsers may include distribution campaigns for high-level threats, such as Blackhole Exploit Kit-based attacks that may install spyware. These scripts may run without any visible elements although they sometimes may be identifiable through pop-up alerts and other kinds of toxic browser content.

Pumping a PUM out of Your Browser

A majority of PUM.Security Hijacks noted by malware researchers base themselves on changes to the Windows Registry. These changes don't necessarily show any immediate symptoms that are identifiable on sight, and may remain intact regardless of any changes you make in your browser's settings menus. However, scans by appropriate anti-malware products should be able to detect most PUM.Security Hijacks and other Registry-based threats. Advanced PC users may use the Windows Registry Editor to examine problematic data explicitly, but, as a warning, should try to avoid making any changes to Registry entries that could cause system-critical software to behave improperly.

PUM.Security Hijacks are part of the ongoing landscape of browser attacks that assist with the circulation of Trojans like Gameover, Trojan Zeus and Chthonic. Despite their low profiles, they may be instigators of infections and security problems with the potential to spiral rapidly out of control. An occasional system scan by your anti-malware tools can identify low-key threats like PUM.Security Hijacks, removing them before they can realize their full purpose. PUM.Security Hijacks most often are seen in the Chrome browser but are applicable, as a heuristic category of threat, to all brands of Web browsers.

Loading...