When confronted with a browser hijacker like nova.rambler.ru, PC users are unable to opt out the rogue service and define their desired Internet preferences.
Every browser hijack scenario follows a uniform route. The infection gets control of custom browsing settings without asking for the victim’s consent and reroutes online traffic to a page or set of pages that the user never agreed to visit. The malicious code behind the nova.rambler.ru redirect virus does the exact same thing. It wreaks havoc with the homepage, new tab page and default search settings so that the annoying nova.rambler.ru keeps popping up recurrently. The rogue website in question does not actually pose any direct risk as it contains no spyware or obfuscated drive-by payloads whatsoever. However, it literally forces the plagued user to use the apropos Russian search engine that displays ads all over the place.
If the page is visited directly from a non-infected machine, it resolves the r0.ru URL. The latter, in its turn, returns search results via nova.rambler.ru. Why the threat actors are applying this interchangeability is not quite clear, but it’s most likely part of their foul play aimed at redistributing and monetizing the mischievously obtained traffic. Any query entered in the search box there generates results with a bevy of advertisements above the fold, so there isn’t much value in the informative facet of this dubious resource.
There is more to the nova.rambler.ru hijacker than just the above-mentioned landing page. The core component of this malvertising campaign is a piece of malicious code that assumes the shape of a browser extension or plugin. The payload itself arrives at computers alongside various freeware solutions. By leveraging a routine referred to as “bundling”, the crooks incorporate their corrupt installer into so-called installation clients composed of several entities. One of them is a regular application, while the other may exhibit malware characteristics. It’s not by chance that most online security tutorials strongly recommend that users select the custom setup mode in such cases – the default option is often booby-trapped. After the installation has been completed, the potentially unwanted browser plugin replaces the values for the main web surfing preferences with nova.rambler.ru. If the user enters the right settings manually, the relief will be short-lived as the scheduled task added by the pest will make the wrong values take effect upon the next restart. Under the circumstances, only a specially crafted adware removal procedure will do the trick.
Automated removal of nova.rambler.ru virus
Owing to an up-to-date database of malware signatures and intelligent behavioral detection, the recommended software can quickly locate the infection, eradicate it and remediate all harmful changes. So go ahead and do the following:
1. Download and install the antimalware tool. Open the solution and have it check your PC for PUPs and other types of malicious software by clicking the Start Computer Scan button
2. Rest assured the scan report will list all items that may harm your operating system. Select the detected entries and click Fix Threats to get the troubleshooting completed.
Use Control Panel to get rid of nova.rambler.ru adware
• Open up the Control Panel from your Start menu in Windows and select Uninstall a program
• To facilitate the process of locating the threat, sort the programs list by date to get the latest ones displayed at the very top. Find an unfamiliar entry under the Name column, click Uninstall and follow further directions to get the removal done
Restore web browser settings to their original defaults
In the circumstances of a complex browser hijack like this, executing a reset makes the most sense despite a few obvious downsides. Customizations such as saved passwords, bookmarked pages etc. will be gone, but so will all the changes made by the potentially unwanted program. The instructions below address the workflow for the web browsers most targeted by nova.rambler.ru.
Reset Mozilla Firefox
• Open Firefox, type about:support in the URL area and press Enter
• On the Troubleshooting Information screen, spot the Refresh Firefox button and click on it
• Follow subsequent directions to reset Firefox to its original settings
• Restart the browser.
Reset Google Chrome
• Open Chrome, click the icon for Chrome menu and choose Settings
• Scroll down the settings screen and click Show advanced settings
• Click Reset settings
• Finally, confirm the restoration by clicking Reset on the warning message
• Restart Chrome.
Reset Internet Explorer
• Select Internet options under IE’s Tools
• Proceed by clicking on Advanced tab, then select Reset
• To confirm the intended changes, click Reset on the Reset Internet Explorer Settings screen after ascertaining that the Delete personal settings checkbox is enabled
• Reboot the machine to fully implement the fix.
• Go to the Safari menu and select Preferences
• When on the Preferences screen, select the Privacy tab and hit the Remove All Website Data button if you are up to erasing all website data stored on your Mac. Otherwise, you can use a site-specific removal option described below
• A dialog will appear, asking you to validate your choice. Click the Remove Now button if you are sure. Be advised this will log you out of online services and undo personalized web browser settings such as saved passwords, etc.
• Safari also allows deleting data for specific sites rather than all sites in general. To use this option, click the Details button under Privacy tab
• Select the websites for which you would like to erase data and click the Remove button
• Click the Done button to confirm and exit. You can also select the Remove All option to remove all data stored by the listed websites.
Revise your security status
Post-factum assessment of the accuracy component in malware removal scenarios is a great habit that prevents the comeback of harmful code or replication of its unattended fractions. Make sure you are good to go by running an additional safety checkup.
- Petya ransomware removal and system recovery (upd. June 27)
- Sorebrect ransomware – fileless malware exploits PsExec utility
- Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. June 15)
- Erebus ransomware infects Linux web servers in South Korea
- Decrypt .master ransomware files – BTCWare virus variant