A recent threat emerged when Jiffy Reader, once prized for speeding up reading via bionic highlighting, quietly transformed into malware. A change in ownership led to malicious updates—harvesting cookies, hijacking sessions, and even mining cryptocurrency while disguised as a benign browser tool.
Threat Overview
- Category: Browser Hijacker / Potentially Unwanted Application
- Target: Web browsers (Chrome, Firefox, Opera, Edge, etc.)
- Why it matters: With full-site permissions, it can access and misuse sensitive data, inject pop‑ups, alter settings, or run covert background tasks.
✅ Key Details Table
Field | Details |
---|---|
Threat type | Browser hijacker / PUA |
Permissions | Full read/write on visited sites |
Detection names | Jiffy Reader flagged as Trojan/Hijacker |
Symptoms | Pop-ups, browser redirects, hidden background tasks |
Damage | Stolen cookies/session tokens, data leak, CPU usage spikes (crypto mining) |
Distribution method | Extension installed/updated via Web Store; malicious takeover post‑sale |
Severity | High – due to data theft and persistence mechanisms |
Removal Tool | SpyHunter (recommended) |
In-Depth Analysis
🔍 Infection Vector
Users installed a legitimate bionic‑reading extension. After acquisition by unknown parties—possibly via a sold or compromised developer account—it received stealthy malicious updates.
🧩 Behavioral Profile
Once activated, the malware:
- Stealthily stole browser cookies, session tokens, HTTP headers, and DOM data.
- Ran disguised background processes with elevated privileges.
- Possibly initiated unauthorized CPU/GPU usage for crypto mining.
🛡 Risk Assessment
- Data loss: stolen cookies/session tokens threaten account security.
- System impact: hidden processes may degrade performance or risk additional malware.
- Persistence: embedded across browser, file system, scheduled tasks, and registry—survives simple uninstall.
Manual Removal Guide for Browser Hijackers
Step 1: Uninstall Suspicious Programs (Windows & Mac)
Before resetting your browser, remove any software that may have installed the hijacker.
Windows (10, 11, 8, 7)
- Press
Win + R
, typeappwiz.cpl
, and hit Enter. - Find Unwanted Applications
- Look for recently installed programs that seem suspicious (e.g., “EasySearch,” “QuickFind,” “Search Manager”).
- Uninstall
- Click on the suspicious program > Select Uninstall > Follow on-screen instructions.
Mac (macOS Ventura, Monterey, Big Sur, Catalina, Mojave, etc.)
- Open Finder and go to Applications.
- Look for unknown or unwanted programs.
- Drag any suspicious apps to the Trash and empty the Trash.
Step 2: Remove Browser Hijacker from Web Browsers
Google Chrome
- Reset Chrome to Default Settings
- Open Chrome > Click ⋮ Menu (top-right corner) > Settings.
- Scroll down and select Reset settings > Click Restore settings to original defaults > Confirm.
- Remove Suspicious Extensions
- Open chrome://extensions/ and remove unknown extensions.
- Change Default Search Engine & Homepage
- Go to Settings > Search engine > Select Google or another trusted search engine.
- Under On Startup, remove any unwanted URLs.
Mozilla Firefox
- Reset Firefox
- Click the Menu (☰) > Select Help > Click More Troubleshooting Information > Refresh Firefox.
- Remove Unknown Extensions
- Open Add-ons Manager (
Ctrl + Shift + A
) > Remove any suspicious extensions.
- Open Add-ons Manager (
- Change Search Engine & Homepage
- Open Settings > Search > Choose Google or another safe search engine.
Microsoft Edge
- Reset Edge
- Click ⋮ Menu > Settings > Reset settings > Restore to default values.
- Remove Unwanted Extensions
- Open edge://extensions/ and remove any unfamiliar extensions.
Safari (Mac Only)
- Reset Safari & Clear Data
- Open Safari > Click Safari (top-left menu) > Select Clear History.
- Go to Preferences > Privacy > Click Manage Website Data > Remove All.
- Delete Suspicious Extensions
- Open Safari > Preferences > Extensions > Remove anything unfamiliar.
- Change Homepage & Search Engine
- Open Preferences > General > Change your homepage to a trusted site.
- In Search, set your search engine to Google or a preferred option.
Step 3: Check for Unauthorized System Changes
Windows – Check the Hosts File
- Open Notepad as Administrator (
Win + S
, type Notepad, right-click, Run as Administrator). - Click File > Open and navigate to:makefileCopyEdit
C:\Windows\System32\drivers\etc\hosts
- If you see unknown IPs or URLs at the bottom, remove them.
- Save changes and restart your computer.
Mac – Check the Hosts File
- Open Terminal (
Command + Space
, typeTerminal
). - Type:bashCopyEdit
sudo nano /etc/hosts
- Look for suspicious entries and delete them.
- Press
Ctrl + X
, thenY
, thenEnter
to save.
Automatic Removal Using SpyHunter (Windows & Mac)
For those who prefer a quick, hassle-free removal process, using SpyHunter is highly recommended.
Step 1: Download SpyHunter
Click here to download SpyHunter: Download SpyHunter
Step 2: Install & Run SpyHunter
- Follow the instructions on the SpyHunter Download Page to install the software.
- Open SpyHunter and run a full system scan.
Step 3: Remove Browser Hijackers
- SpyHunter will detect all malware and potentially unwanted programs.
- Click Fix Threats to remove the detected hijacker.
- Restart your device to complete the cleanup process.
Step 4: Reset Browser Settings (If Necessary)
Even after SpyHunter removes the hijacker, you may need to reset your browser settings manually (refer to browser-specific instructions above).
Preventing Future Browser Hijacker Infections
- Be cautious when installing free software – opt for Custom Installation to avoid bundled malware.
- Avoid clicking on suspicious ads or pop-ups – they often distribute browser hijackers.
- Keep your operating system and software updated – outdated programs are more vulnerable to infections.
- Use a trusted anti-malware tool like SpyHunter to provide real-time protection against threats.
Conclusion
Jiffy Reader morphed from a helpful reading aid into a stealthy hijacker. Its full-site permissions enabled deep data exploitation and persistent presence. Removing it swiftly using both manual and anti-malware methods (e.g., SpyHunter) is essential. Left unchecked, it poses ongoing risk to privacy and system performance.