HomesecurityCaution! Linkury adware distributes malware

Caution! Linkury adware distributes malware

According to a speech by researchers at the conference VirusBulletin 2020, one adware with the name Linkury, distributes malware and infects them Appliances of victims. This adware was previously known mainly for distribution browser hijackers.

Linkury adware

"What's dangerous with Linkury is how it uses its adware function as a gateway to spread malwareSaid Arun Kumar Shunmuga Sundaram and Rajeshkumar Ravichandran, two malware analysts of the Indian company security K7 Computing.

According to the researchers, Linkury combines standard adware with others malware and sometimes uses one function and the other, based on geographical criteria (depending on the country of the victim).

The two researchers security Linkury is said to have adapted its functions to hide its malicious techniques and to appear as a "legitimate adware".

Most companies, such as Malwarebytes, Microsoft products and Trend Micro, recognize Linkury as "adware". However, Sundaram and Ravichandran argue that “should also be labeled as malware, based on the data presented in their report ".

Facts about Linkury

Prior to the researchers' talk on VirusBulletin, Linkury was primarily known as adware.

Usually, it is distributed through SafeFinder widget, one browser extension that is supposed to be used to perform secure internet searches.

The widget is usually combined with others for free applications, as a secondary installer or distributed through web ads that redirect them users on SafeFinder download pages.

If a user installs the SafeFinder extension, their browser default search settings and homepage will change. However, it is not just this change. The installation of the extension is accompanied by the installation of additional binaries, which differ depending on the country of the user.

But K7 researchers recently discovered that SafeFinder widget has now started installing malware, As the Socelars and Kpot infostealer trojan.

In other cases, Linkury was installing a version of Opera browser to the infected computers, which operated "silently" in the background of the operating system to display pop-up ads, bringing profits to Linkury adware / malware operators.


In addition, the hackers behind Linkury, used the SafeFinder widget to install other extensions in its browsers user. K7 said it had located such facilities in Chrome and Firefox browser for Windows users and Safari, Chrome and Firefox for Mac users.

The problems, however, do not end here. The researchers also said that SafeFinder installer contained many malware features, such as PowerShell scripts for disabling Windows Defender and functions that allowed it to understand when the installer was running on virtual machines and sandboxes.

Finally, according to ZDNet, Linkury's SafeFinder widget does not obey their choices users, since its installer is designed to install its payload, even if the user tries to avoid the installation process by clicking "No" in the message that appears about the installation of SafeFinder.

Digital Fortress
Digital Fortress
Pursue Your Dreams & Live!