Figure 2: Ad-injectors, browser hijackers and utilities change system settings on the affected computed, leading to insecure configurations. Whether is in-browser ad-injection, pop-ups, word highlights or offering some fake service, all of them try to redirect users’ traffic to their own websites for profit.