CMSC426 – Computer Security
Research Paper Outline – Conduit Browser hijacker
I. Introduction A. What is Conduit? i. Malware ii. Spyware iii. Adware B. What does Conduit effect on a computer? C. How does a computer become infected with Conduit? D. Why were the intentions and motives behind the creators of Conduit? E. How do you remove Conduit from an infected computer?
II. What does Conduit effect on a computer? A. Changes the users browsers homepage to Conduit search i. Effects not only Internet Explorer but Firefox, Safari, and Chrome as well B. Redirects all searches made through Conduits search engine C. Makes some websites inaccessible D. Risk of being completely locked out of internet connection E. Increased adware i. Pop ups (Some with no “close” or “X” button) ii. In text advertisements iii. Unwanted emails, phone calls and messages F. Increased phishing attempts G. Slowed PC performance
III. How does a computer become infected with Conduit? A. Bundled with freeware i. Automatically installed when user selects “express” or “recommended” install options ii. Video codecs iii. ActiveX Updates iv. Download.com B. Disguised as other software/files i. Fake “updates” ii. Fake installers C. Advertised as “Search Protect Toolbar”
IV. What were the intentions and motives behind the creators of Conduit? A. Search information is collected by Conduit for marketing and advertisement B. Every click made on a search result