www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Errors
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: PelargoniumHortorum: A Deceptive Browser Extension with Privacy Risks
Share
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Adware > PelargoniumHortorum: A Deceptive Browser Extension with Privacy Risks
AdwareBrowser HijackersMac MalwarePotentially Unwanted Programs (PUPs)

PelargoniumHortorum: A Deceptive Browser Extension with Privacy Risks

riviTMedia Research
Last updated: January 18, 2024 6:58 pm
riviTMedia Research
Share
PelargoniumHortorum: A Deceptive Browser Extension with Privacy Risks
SHARE

In the ever-evolving landscape of cyber threats, PelargoniumHortorum has emerged as a concerning player, disguising itself as an unreliable app with the potential to compromise user privacy and browser security. This malicious extension, discovered within a malicious installer, has the capability to manipulate browser settings, manage themes and extensions, and activate the “Managed by your organization” feature in Chrome and Edge browsers. This article aims to shed light on the intricacies of PelargoniumHortorum, detailing its actions, consequences, and providing a thorough removal guide to safeguard users against potential privacy breaches.

Contents
PelargoniumHortorum in DetailRemoval GuideBest Practices for PreventionConclusion

PelargoniumHortorum in Detail

PelargoniumHortorum, categorized as an unwanted application, reveals its malicious intent by exhibiting the ability to read data on all websites, manage browser themes and extensions, and activate the “Managed by your organization” feature. This feature, intended for organizational use, becomes a vector for potential threats when exploited by harmful extensions like PelargoniumHortorum. By gaining control over various aspects of the browser, including settings, configurations, and policies, PelargoniumHortorum poses risks to user privacy and security.

Activation of the “Managed by your organization” feature grants PelargoniumHortorum the power to make adjustments to critical browser settings, potentially compromising security parameters, homepage preferences, default search engines, and other configurations. This elevated access raises concerns about the extension’s potential impact on user privacy.

PelargoniumHortorum’s ability to access diverse data within the browser suggests a potential threat to sensitive information stored on the device. Browsing history, login credentials, personal details, and more could be at risk, leading to privacy breaches and potential misuse of acquired data.

Additionally, the extension’s capacity to manage themes and extensions within the browser raises alarms about the potential for unauthorized modifications, introducing disruptions, unintended changes to user preferences, or the installation of additional unwanted software.

Threat Summary:

  • Name: PelargoniumHortorum unwanted application
  • Threat Type: Malicious Extension
  • Detection Names (Installer): Kaspersky (Not-a-virus:HEUR:AdWare.Win32.WebCompanion.gen), Rising (Adware.WebCompanion!8.171BF (CLOUD)), Zillya (Adware.WebCompanion.Win32.23), ZoneAlarm by Check Point (Not-a-virus:HEUR:AdWare.Win32.WebCompanion.gen).
  • Symptoms: Activation of “Managed by your organization” feature, Chromstera browser installation, sluggish computer performance, unwanted pop-up ads, redirection to dubious websites.

PelargoniumHortorum is distributed through various deceptive channels, including dubious websites, malicious installers, deceptive pop-up ads, and bundled with free software installations. Users should exercise caution while downloading software, especially from untrustworthy sources, to avoid inadvertent installation of such malicious extensions.

The damages caused by PelargoniumHortorum include:

  • Internet browser tracking: PelargoniumHortorum tracks your online activity, breaching your online privacy.
  • Display of unwanted ads: PelargoniumHortorum displays a plethora of annoying, intrusive, and often inappropriate ads, disrupting your ideal browsing experience.
  • Redirects to dubious websites: PelargoniumHortorum hijacks your browser and redirects you to malicious websites from which it collects revenue.
  • Potential loss of private information: PelargoniumHortorum might attempt to steal your private information (passwords, banking information). This information is usually sold to malicious third parties which exploit it, leading to potential financial losses.

Removal Guide

  1. Identify and Remove PelargoniumHortorum: Open your browser’s extensions or add-ons settings and remove PelargoniumHortorum.
  2. Deactivate “Managed by your organization” Feature: In Chrome or Edge browsers, go to settings, search for “Managed by your organization,” and revert any changes made by PelargoniumHortorum.
  3. Uninstall Chromstera Browser: Navigate to “Applications” on your system and uninstall the Chromstera browser if present.
  4. Clear Browser Cache and Cookies: In your browser settings, clear cache and cookies to eliminate any stored data related to PelargoniumHortorum.
  5. Inspect System for Additional Threats: Run a thorough system scan using reputable antivirus software to identify and remove any additional threats that may have accompanied PelargoniumHortorum.

Best Practices for Prevention

  1. Exercise Caution During Installations: Be vigilant when downloading and installing software, especially from untrustworthy sources. Read installation prompts carefully.
  2. Avoid Clicking on Suspicious Links: Steer clear of malicious websites and resist clicking on pop-up ads or download links from unverified sources.
  3. Regularly Update Software: Keep your operating system, browsers, and applications up to date to patch vulnerabilities and enhance security.
  4. Educate Yourself on Cyber Threats: Stay informed about emerging cyber threats and understand common tactics used by malware to bolster your online security.

Conclusion

PelargoniumHortorum poses a significant threat to user privacy and browser security. By understanding its capabilities and following the detailed removal guide, users can fortify their systems against this deceptive extension. Practicing vigilance and adopting best practices for prevention is crucial to maintaining a secure digital environment.

You Might Also Like

Anob.co.in Cyber Threat: A Comprehensive Removal Guide
Unchacting.co.in: The Deceptive Tactics of a Browser Hijacker
Doidacers.com Ads: A Threat Analysis and Removal Guide
opdomain22[.]online: Removing the Threat & Preventing Similar Infections
Pape Pre Sale Scam: Protect Yourself from Deceptive Crypto Schemes
TAGGED:AdwareBrowser Extensionsbrowser hijackerchromesteraMac Adwarepups

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Fearful.app: Unraveling the Web of Mac Adware
Next Article “Chase Bank Invoice” Email Scam: A Closer Look
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter 5
Download SpyHunter for Mac

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US