{"id":51569,"date":"2016-08-10T11:38:50","date_gmt":"2016-08-10T18:38:50","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=51569"},"modified":"2025-05-28T18:38:51","modified_gmt":"2025-05-29T01:38:51","slug":"bing-vc-hijacks-browser-using-legitimate-applications","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/","title":{"rendered":"Bing.VC Hijacks Browsers Using Legitimate Applications"},"content":{"rendered":"<p>Browser hijackers are a type of malware that\u00a0modifies a web browser\u2019s settings without the user\u2019s permission. Generally a browser hijacker injects unwanted advertising into the browser. It replaces the home page or search page with its own. It also steals cookies and can install a keylogger to fetch other sensitive information. McAfee Labs has recently seen a variant of the hijacker Bing.vc.<\/p>\n<h2>Browser hijackers usually display the following symptoms:<\/h2>\n<ul>\n<li>Redirection to an unintended page.<\/li>\n<li>Unusual pop-ups showing advertisements.<\/li>\n<li>Browser may become unstable and exhibits frequent errors.<\/li>\n<li>Problems accessing security-related sites (antimalware, antispyware).<\/li>\n<\/ul>\n<h2>Hijackers usually infect via\u00a0one of three vectors:<\/h2>\n<ul>\n<li>Generally bundled with legitimate software applications.<\/li>\n<li>As part of freeware.<\/li>\n<li>Through email or a drive-by download.<\/li>\n<\/ul>\n<p>Bing.vc\u00a0is a malicious browser hijacker that installs itself into Internet Explorer, Firefox, and Chrome without the user\u2019s consent.<\/p>\n<ul>\n<li>Hash: d88443ff67f5c0713067e21982e31706<\/li>\n<li>Description: * Drivers Utility Setup<\/li>\n<li>Company: Lavians Inc.<\/li>\n<\/ul>\n<p>We have come across several files from Lavians Inc.\u00a0that look like legitimate applications but may pose a serious risk. We have observed that Lavians Inc.\u00a0is repackaging clean applications with a browser hijacker to avoid suspicion and to increase its outreach. It usually hides in drivers utilities such as:<\/p>\n<ul>\n<li>HP DESKJET F4580 Driver Utility Setup<\/li>\n<li>DELL Inspiron 5100 Drivers Utility Setup<\/li>\n<li>Acer Aspire ONE ZG5 Drivers Utility Setup<\/li>\n<\/ul>\n<p>McAfee advises users to not use third-party free utilities to fix driver issues. It&#8217;s always better to\u00a0directly download drivers from the manufactures sites. Also carefully read the EULA\/disclaimers before\u00a0installing any software.<\/p>\n<p>For our analysis, we examined the \u201cDELL Latitude D810 Drivers Utility Setup\u201d from Lavians Inc. This application installed without any problems and showed no suspicious behavior, but it hijacked our browser and changed the homepage to \u201chxxp:\/\/bing.vc\/?r=15443&amp;lnk=sct2\u201d for all installed browsers and changed their default search engine to bing.vc. (This browser hijacker has nothing to do with Microsoft&#8217;s\u00a0Bing search engine.)<\/p>\n<h2>Upon execution, Bing.vc added the following files onto our\u00a0system:<\/h2>\n<ul>\n<li>C:\\Documents and Settings\\Administrator\\Local Settings\\Application Data\\IconOverlayEx.dll<\/li>\n<li>C:\\Program Files\\DELL Latitude D810 Drivers Utility\\DPInst.exe<\/li>\n<li>C:\\Program Files\\DELL Latitude D810 Drivers Utility\\DriverBackUp.exe<\/li>\n<li>C:\\Program Files\\DELL Latitude D810 Drivers Utility\\driverlib.dll<\/li>\n<li>C:\\Program Files\\DELL Latitude D810 Drivers Utility\\DriverUpdateUtility.exe<\/li>\n<li>C:\\Program Files\\DELL Latitude D810 Drivers Utility\\unins000.dat<\/li>\n<li>C:\\Program Files\\DELL Latitude D810 Drivers Utility\\unins000.exe<\/li>\n<li>C:\\Program Files\\DELL Latitude D810 Drivers Utility\\update.dll<\/li>\n<li>C:\\Documents and Settings\\All Users\\Desktop\\DELL Latitude D810 Drivers Utility.lnk<\/li>\n<li>C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\DELL Latitude D810 Drivers Utility\\DELL Latitude D810 Drivers Utility.lnk<\/li>\n<li>C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\DELL Latitude D810 Drivers Utility\\Uninstall DELL Latitude D810 Drivers Utility.lnk<\/li>\n<\/ul>\n<p>All the new files were\u00a0clean except for\u00a0IconOverlayEx.dll\u00a0(6D37DD857500184164947DD6C8DEE54A), the\u00a0file responsible for redirection.\u00a0When we tried to uninstall the application, it removed all other installed components except for IconOverlayEx.dll and added two registry entries:<\/p>\n<ul>\n<li>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\ShellIconOverlayIdentifiers\\ IconOverlayEx\\: &#8220;{E1773C0E-364D-4210-B831-72F5A359E88F}&#8221;<\/li>\n<li>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Shell Extensions\\Approved\\{E1773C0E-364D-4210-B831-72F5A359E88F}: &#8220;Icon Overlay Shell Extension&#8221;<\/li>\n<\/ul>\n<p>The shell extension handler is a well-known trick that malware uses for persistence, and it requires no administrator rights. After uninstalling the application and restarting the machine, we saw that the home page had been changed in all the installed browsers without our knowledge. The malware\u00a0changed the homepage <em>after<\/em>\u00a0we uninstalled the application.<\/p>\n<p>The following snippets illustrate the homepages changed to bing.vc:<\/p>\n<p><strong>Internet Explorer<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51765\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png\" alt=\"Explorer_1\" width=\"447\" height=\"173\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Explorer_1-300x116.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Explorer_1.png 437w\" sizes=\"auto, (max-width: 447px) 100vw, 447px\" \/><\/p>\n<p><strong>Chrome<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51767\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Chrome_1-300x75.png\" alt=\"Chrome_1\" width=\"448\" height=\"112\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Chrome_1-300x75.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Chrome_1.png 428w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/p>\n<p><strong>Firefox<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51768\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/FireFox_1-300x95.png\" alt=\"FireFox_1\" width=\"448\" height=\"142\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/FireFox_1-300x95.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/FireFox_1.png 399w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/p>\n<p>When we checked our browser properties, we saw that the targets were set for bing.vc:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51763\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Properties-1-300x292.png\" alt=\"Properties\" width=\"347\" height=\"338\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Properties-1-300x292.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Properties-1-32x32.png 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Properties-1.png 364w\" sizes=\"auto, (max-width: 347px) 100vw, 347px\" \/><\/p>\n<p>When we started our browser, we saw the new homepage:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51770\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/5-6-300x207.png\" alt=\"5\" width=\"496\" height=\"343\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-6-300x207.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-6.png 605w\" sizes=\"auto, (max-width: 496px) 100vw, 496px\" \/><\/p>\n<p>The FixBrowserRedirect link on the redirected home page sent us to the\u00a0site hxxp:\/\/fixbrowserredirect.net\/, where we learned about browser redirection and were offered the convenience of buying software to fix the redirection. How thoughtful!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51774\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/6-5-300x198.png\" alt=\"6\" width=\"504\" height=\"333\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-5-300x198.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-5.png 578w\" sizes=\"auto, (max-width: 504px) 100vw, 504px\" \/><\/p>\n<h2><strong>Restoring the system<\/strong><\/h2>\n<p>In addition to removing the registry entries and deleting IconOverlayEx.dll, users should\u00a0also remove the malicious target in the properties of any\u00a0installed browsers: hxxp:\/\/bing.vc\/?r=15443&amp;lnk=sct2.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51777\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/7-3-300x242.png\" alt=\"7\" width=\"338\" height=\"273\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-3-300x242.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-3.png 325w\" sizes=\"auto, (max-width: 338px) 100vw, 338px\" \/><\/p>\n<p>McAfee detects this type of browser hijacking as BingVC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Browser hijackers are a type of malware that\u00a0modifies a web browser\u2019s settings without the user\u2019s permission. Generally a browser hijacker&#8230;<\/p>\n","protected":false},"author":846,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,4452,338,180],"coauthors":[4709],"class_list":["post-51569","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybersecurity","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bing.VC Hijacks Browsers Using Legitimate Applications | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Browser hijackers are a type of malware that\u00a0modifies a web browser\u2019s settings without the user\u2019s permission. Generally a browser hijacker injects\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bing.VC Hijacks Browsers Using Legitimate Applications | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Browser hijackers are a type of malware that\u00a0modifies a web browser\u2019s settings without the user\u2019s permission. Generally a browser hijacker injects\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-10T18:38:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T01:38:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Explorer_1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"437\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Santhosh Revankar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Santhosh Revankar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/\"},\"author\":{\"name\":\"Santhosh Revankar\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/5f97ae5cec9736040cee55e9bedf9103\"},\"headline\":\"Bing.VC Hijacks Browsers Using Legitimate Applications\",\"datePublished\":\"2016-08-10T18:38:50+00:00\",\"dateModified\":\"2025-05-29T01:38:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/\"},\"wordCount\":737,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png\",\"keywords\":[\"computer security\",\"cybersecurity\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/\",\"name\":\"Bing.VC Hijacks Browsers Using Legitimate Applications | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png\",\"datePublished\":\"2016-08-10T18:38:50+00:00\",\"dateModified\":\"2025-05-29T01:38:51+00:00\",\"description\":\"Browser hijackers are a type of malware that\u00a0modifies a web browser\u2019s settings without the user\u2019s permission. Generally a browser hijacker injects\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Bing.VC Hijacks Browsers Using Legitimate Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/5f97ae5cec9736040cee55e9bedf9103\",\"name\":\"Santhosh Revankar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/23de410faf0ed7d83786071334aea285\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Santhosh-Revankar-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Santhosh-Revankar-96x96.jpg\",\"caption\":\"Santhosh Revankar\"},\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/santosh-revankar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bing.VC Hijacks Browsers Using Legitimate Applications | McAfee Blog","description":"Browser hijackers are a type of malware that\u00a0modifies a web browser\u2019s settings without the user\u2019s permission. Generally a browser hijacker injects","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Bing.VC Hijacks Browsers Using Legitimate Applications | McAfee Blog","og_description":"Browser hijackers are a type of malware that\u00a0modifies a web browser\u2019s settings without the user\u2019s permission. Generally a browser hijacker injects","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-10T18:38:50+00:00","article_modified_time":"2025-05-29T01:38:51+00:00","og_image":[{"width":437,"height":169,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Explorer_1.png","type":"image\/png"}],"author":"Santhosh Revankar","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Santhosh Revankar","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/"},"author":{"name":"Santhosh Revankar","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/5f97ae5cec9736040cee55e9bedf9103"},"headline":"Bing.VC Hijacks Browsers Using Legitimate Applications","datePublished":"2016-08-10T18:38:50+00:00","dateModified":"2025-05-29T01:38:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/"},"wordCount":737,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png","keywords":["computer security","cybersecurity","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/","name":"Bing.VC Hijacks Browsers Using Legitimate Applications | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png","datePublished":"2016-08-10T18:38:50+00:00","dateModified":"2025-05-29T01:38:51+00:00","description":"Browser hijackers are a type of malware that\u00a0modifies a web browser\u2019s settings without the user\u2019s permission. Generally a browser hijacker injects","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Explorer_1-300x116.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/bing-vc-hijacks-browser-using-legitimate-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Bing.VC Hijacks Browsers Using Legitimate Applications"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/5f97ae5cec9736040cee55e9bedf9103","name":"Santhosh Revankar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/23de410faf0ed7d83786071334aea285","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Santhosh-Revankar-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Santhosh-Revankar-96x96.jpg","caption":"Santhosh Revankar"},"url":"https:\/\/www.mcafee.com\/blogs\/author\/santosh-revankar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/846"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=51569"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51569\/revisions"}],"predecessor-version":[{"id":214655,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51569\/revisions\/214655"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=51569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=51569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=51569"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=51569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}