Home Guides Remove studynerdz.com virus from Android/Chrome/Firefox/IE/Safari

Remove studynerdz.com virus from Android/Chrome/Firefox/IE/Safari

4 min read
0
45,481
The prerogative of choosing which websites to visit and when slips out of one’s hands as long as the studynerdz.com virus is causing browser redirects.
  1. What is the studynerdz.com redirect/popup virus?
  2. Automated removal of studynerdz.com virus
  3. Studynerdz.com virus removal for Android
  4. Restore web browser settings to their original defaults


What is the studynerdz.com redirect/popup virus?

A very peculiar take on malvertising and spamming is quickly shaping up to be a big trend in the cybercrime underground. The malicious agents are heavily exploiting the “allow website notifications” service to reach despicable goals, as is the case with the studynerdz.com virus. Normally, the above-mentioned feature is used by website owners to let their visitors know when new information is published, but crooks have turned this benign state of things upside down. When a user goes to one of the fraudulent websites from this category – unwittingly or after clicking on a fishy ad – they are prompted to click “Allow” on the “Show notifications” dialog. Since many people are okay with granting that permission to regular sites, they run the risk of doing it for the wrong resource. In that scenario, a single click of a mouse means authorizing the dodgy traffic monetization framework to display sponsored content and redirect the affected browser.

Studynerdz.com trying to trick a user into allowing notifications
Studynerdz.com trying to trick a user into allowing notifications

Speaking of the studynerdz.com web page, it is very much like dozens of other tricky clickbait sites, including hogathe.com and nsbond.com. Users may be lured into visiting it by some eye-catching advertisement on another site, or they may hit it as a result of a redirect triggered by a piece of malware. The content allegedly available there is camouflaged as a leaked streaming footage of a video lots of movie fans are waiting for, so the would-be victim might think they are lucky to be on the pre-release spectators list. However, the media is a dummy and its only objective is to convince the person to click the “Allow” button on a popup that says, “Studynerdz.com wants to show notifications”. Those who get curious regardless and can’t wait to watch the video will probably follow the recommendation, only to realize they have been fooled into permitting an obnoxious web surf mayhem on their personal computer or Android device.

Now that the catch is clear, let’s look into the subsequent attack chain. The fact that the victim has expressed consent about notifications from studynerdz.com unleashes the traffic forwarding phase of the incursion. The web browser will be constantly redirected to numerous affiliated sites that promote gambling services, junk software or malicious code. These irritating events will be going off in a random fashion and they may as well accompany the commonplace browsing routine, such as opening a new tab, doing a search with preferred provider, or simply launching Firefox, Chrome, IE and Safari. By the way, the interesting thing about the attack on Android is that it’s more difficult to refrain from tapping “Allow”, because the dialog will usually float around the screen and an attempt to close studynerdz.com via the X button may have the opposite of the intended effect.

A particularly unsettling characteristic of this raid is that the first-stage redirects may be an outcome of virus activity on Android or PC. In other words, the browsing havoc is likely to be preceded by an instance of malicious plugin infiltrating the device. The infection can end up on the host as part of a freeware bundle whose complementary items aren’t clearly listed on the setup screens. Consequently, there are two facets of this issue. One comes down to a situation where the user unknowingly opts for notifications and the redirect frenzy to various rogue sites is underway. The other is about a piece of malware causing hits to studynerdz.com in the first place. Both of these predicaments should be addressed by cleaning up the misbehaving device – here’s how it’s done.


Automated removal of studynerdz.com virus

Owing to an up-to-date database of malware signatures and intelligent behavioral detection, the recommended software can quickly locate the infection, eradicate it and remediate all harmful changes. So go ahead and do the following:

1. Download and install the antimalware tool. Open the solution and have it check your PC for PUPs and other types of malicious software by clicking the Start Computer Scan button

Download studynerdz.com virus remover

2. Rest assured the scan report will list all items that may harm your operating system. Select the detected entries and click Fix Threats to get the troubleshooting completed.

Use Control Panel to get rid of the studynerdz.com virus

• Open up the Control Panel from your Start menu in Windows XP/Vista/7/8/8.1/10 and select Uninstall a program
Access program uninstall screen on Windows
• To facilitate the process of locating the threat, sort the programs list by date to get the latest ones displayed at the very top. Find an unfamiliar, suspicious entry under the Name column, click Uninstall and follow further directions to get the removal doneUninstall unwanted program


Studynerdz.com virus removal for Android

Here’s a walkthrough to sort out the studynerdz.com malware issue on an Android device, which might also be a target in this malvertising campaign. Keep in mind, though, that uninstall attempts in regular mode may be futile due to the mechanics of this persistent infection. Therefore, you need to perform the procedure in safe mode. Go ahead and do the following:

• Press and hold the Power button. Then, tap and hold the Power off option on the screen. Doing so will boot your device into safe mode
Android power off
• Android will ask you to confirm that you’d like to enter safe mode. Tap OK on the dialog
Safe mode reboot confirmation
• You will now see the Safe mode inscription at the bottom left of your screen. Go to Settings and choose Apps
Go to Settings - Apps
• Scroll down the list of applications, focusing on the ones that were installed recently. Find Studynerdz or a sketchy entry with a different name that could as well be the culprit
Spot the unwanted app
• Select the misbehaving app and tap Uninstall
Uninstall the PUA
• Confirm removal on the relevant dialog box and reboot your device. By default, Android will get you back into regular mode. You should now be good to go – the studynerdz.com virus won’t be triggering any redirects or irritating popups anymore.


Restore web browser settings to their original defaults

In the circumstances of a complex browser hijack like this, executing a reset makes the most sense despite a few obvious downsides. Customizations such as saved passwords, bookmarked pages etc. will be gone, but so will all the changes made by the potentially unwanted program. The instructions below address the workflow for the web browsers most targeted by the studynerdz.com virus.

Reset Google Chrome

• Open Chrome, expand the Customize and control Google Chrome menu and choose Settings
Go to Settings in Chrome
• Scroll down the settings screen and click Advanced down at the bottom
Advanced settings in Chrome
• Move on to the Reset and clean up sub-section and select the option that says Restore settings to their original defaults
Restore Chrome settings to their original default
• Finally, confirm the restoration by clicking Reset settings on the warning message
Reset Chrome settings
• Restart Chrome.

Reset Mozilla Firefox

• Open Firefox, type about:support in the URL area and press Enter. Alternatively, you can click on the Open menu icon in the top right-hand part of the browser window, then select the Help option and proceed to Troubleshooting Information
Access Troubleshooting Information page in Firefox
• On the Troubleshooting Information screen, spot the Refresh Firefox button and click on it
Refresh Firefox button
• Follow subsequent directions to reset Firefox to its original settings
Complete refreshing Firefox
• Restart the browser.

Reset Internet Explorer

• Select Internet options under IE’s Tools (Alt+X)
Open up Internet options in Internet Explorer
• Proceed by clicking on Advanced tab, then select Reset
Locate and click the Reset button in IE
• To confirm the intended changes, click Reset on the Reset Internet Explorer Settings screen after ascertaining that the Delete personal settings checkbox is enabled
IE reset confirmation
• Reboot the machine to fully implement the fix.

Reset Safari

• Go to the Safari menu and select Preferences
Go to Safari Preferences
• When on the Preferences screen, select the Privacy tab and hit the Remove All Website Data button if you are up to erasing all website data stored on your Mac. Otherwise, you can use a site-specific removal option described below
Remove All Website Data button
• A dialog will appear, asking you to validate your choice. Click the Remove Now button if you are sure. Be advised this will log you out of online services and undo personalized web browser settings such as saved passwords, etc.
Confirm website data removal
• Safari also allows deleting data for specific sites rather than all sites in general. To use this option, click the Details button under Privacy tab
Details button under Privacy tab
• Select the websites for which you would like to erase data and click the Remove button
Removing data for selected sites in Safari
• Click the Done button to confirm and exit. You can also select the Remove All option to remove all data stored by the listed websites.

Revise your security status

Post-factum assessment of the accuracy component in malware removal scenarios is a great habit that prevents the comeback of harmful code or replication of its unattended fractions. Make sure you are good to go by running an additional safety checkup.

Download studynerdz.com redirect virus removal tool

Rate article

5/5 (2)

Leave a Reply

Your email address will not be published. Required fields are marked *