Solved

CDN Redirects

  • 13 April 2018
  • 2 replies
  • 59 views

Hi there. Is anyone familiar with random redirects from trusted websites that are somehow initated through CDNs/content delivery networks?
 
I was redirected from a legit website to a spammy url ("murt.parkipeer.com...etc. etc."), and then I found a CDN-based url in my browsing history ("cdn.grabmetric.com...etc. etc."). Both urls had the name of the original, trusted website embedded in the middle, something like "......d=[websitename].com......."
 
Any ideas on, or experience with this phenomenon? Some articles posted here earlier were suggesting that CDNs are being used to deliver malicious content on Facebook and whatnot, but I'm not aware of any methods to prevent this.
 
Thanks for your thoughts!
icon

Best answer by BurnDaddy 13 April 2018, 16:21

View original

2 replies

Hi SO3,
 
Welcome to the Webroot Community.
 
What you are seeing and describing sounds like it may be what we on the Community refer to as a PUA. (Potentially Unwanted Application) These are very annoying at best in that they cause pop-us, redirect your browser home page, and other behavior that may slow down the computer and direct ads your way, but they are not actually doing anything bad like damaging files or stealing information. Often they are installed intentionally by you the user as browser add-ons for various tasks such as quick search tools.. but they also come with the result of added annoying pop-ups and ads. Other times they 'piggy back' with other software that you installed, or try to 'sneak' onto your system entirely.
 
WSA does detect and remove many PUA's, and more are being added, but WSA does not detect all of them. A simple browser add-on with PUA behavior that is easy to identify and easy to remove is not likely to be detected and removed by WSA. Those that are intentionally difficult to locate and remove are. Please see THIS LINK for more information regarding Webroot's stance on these annoying programs.
 
For those that are not detected by WSA, please see this KB Article. It has some easy to follow directions on locating and removing PUA's. You may also want to submit a Support Ticket, especially if you cannot remove it easily from the directions in the KB Article.
 
For those that ARE detected by WSA, but cannot be removed automatically, you can submit a Support Ticket.  Webroot Support will help you get these annoying 'crapware' off your computer at no extra charge, and the additional examples may help to better automatic removal of that particular PUA for all users in the future.
 
To make sure that your WSA is checking for PUA's with the best proficiently, it sometimes helps to reset the PUA detection within WSA's settings. For PUA's that had previously been scanned and determined to be OK, but have since been added to detection/removal, you may want to complete the following steps:
 
  • Open Webroot SecureAnywhere
  • Click on ‘Advanced Settings’ from the top right
  • Select ‘Scan Settings’ from the left side
  • Unselect the option “Detect Potentially Unwanted Applications”
  • Click on the Save button (you may have to enter in a CAPTCHA)
  • Reselect the option to “Detect Potentially Unwanted Applications”
  • Click on the Save button
  • Run another scan with Webroot and remove any items that get detected.
To help avoid PUA's in the future, remember to read all of the information when installing or updating software (Adobe downloads often have those "extra special offers"attached... PUA'S!: often the PUA included will be mentioned, and you can opt out of installing it.  Those check boxes you see? Usually only one of them is for the User Agreement of the software you want, the others are for the junk you don't.
 
 I hope this helps you both understand, and resolve the problem and if not please let us know!
 
 
Thanks for your helpful reply, BD!
 
I made sure to follow all of the steps outlined, and I ran enough scans with various tools to be reasonably sure there isn't any PUA lingering.
 
Since the issue wasn't recurring, I think it may have been an isolated redirect, caused by some code embedded in that particular podcast/website's ads or banners, etc.
 
Well, fingers crossed, and with Webroot and uBlock Origin at the ready, hopefully this issue won't "pop up" again.  :D
 
Thanks a bunch!

Reply