“The HoeflerText font wasn’t found” ads (Virus Removal Instructions) - Feb 2019 update
“The HoeflerText font wasn’t found” ads Removal Guide
What is “The HoeflerText font wasn’t found” ads?
“The HoeflerText font wasn’t found” is a social engineering attack that installs ransomware and other malware on the system
“The HoeflerText font wasn’t found” is a virus that distributes GandCrab, Spora, Zeus Panda, and other dangerous malware
“The HoeflerText font wasn’t found” is a cleverly engineered scam that displays a fraudulent popup, asking users to install the fake font to view the contents of the site.[1] It mainly targets Google Chrome and Mozilla Firefox users, as the alleged missing packages come under names Chrome_Font.exe, Chrome_Font_v7.87.zip, and Mozilla_Font_v7.87.zip, although users who use Safari or other browsers might encounter a “The HoeflerText font wasn’t found” pop-up message as well. The bogus alert shows up when the potential victim visits compromised websites[2] infected with a malicious JavaScript code.[3] The scam is developed to automatically scramble the text on a hacked site, which is why a warning about Chrome being outdated seems credible for less experienced PC users. Those who agree to install the fake font end up with dangerous malware, like ransomware or a banking trojan, on their system.
Name | The HoeflerText font wasn’t found |
Type | Malware |
Associated threats |
|
Infiltration | Malicious JavaScript |
Symptoms | Varies, depending on malware installed |
Elimination | Use reputable anti-malware software to scan your device |
Recovery | Download FortectIntego and scan your device for full recovery after malware infection |
The initial version of the HoeflerText font[4] wasn’t found on the affected computer scam asks potential victims to update “Chrome Font Pack” in order to fix this error. However, instead of this font pack, you can end up with Fleercivet Ad Clicking Trojan or even Spora ransomware on your computer.[5] However, Spora is not the only crypto-malware that might be disseminated via HoeflerText scam.
At the end of February 2018, nao_sec analysis revealed that HoeflerText Font Update virus turned to GandCrab ransomware distribution. When redirected to hacked websites, potential victims are offered to fix the problem by installing an update for Google's Font Pack. Unfortunately, the supposed Font Pack downloads Font_Update.exe executable, which runs g.js and hacks the legitimate Netsupport Manager tool to download the ransomware payload. In case of success, the GandCrab ransomware renders all personal files useless by locking them with .GDCB file extension.
Although the “hoefler text” font wasn't found Chrome version prevails, on May 2017, malware researchers has discovered a new variant of the scam that targets Mozilla Firefox users. Cyber criminals use the same social engineering scheme. However, this time users are asked to install “Mozilla Font Pack.” However, installation of this fake update ends up terribly wrong. This scam distributes a Zeus Panda banking trojan.
Beware that the developers of this scam made it look very professional and realistic by filling it with the names of current and latest versions of the font and claiming that the message is delivered by Google or Mozilla Corporation. Bear in mind that your browser doesn’t need any updated fonts from the suspicious notification which is designed with the only purpose – to deceive you and make you open a malicious executive file that you can download from the described pop-up.
"The HoeflerText font wasn’t found" is a bogus pop-up that prompts users to install fake font
We suggest that you stay away from websites that display the defined alert because it is a sign that they have been compromised by cyber criminals. If you agreed to install the described update, your browser and computer need you to start “The HoeflerText font wasn’t found” removal. It’s the only way to get rid of the malware that infiltrated the PC and protect your computer from further attacks.
Remember that malicious programs are dangerous cyber threats[6] that can download and install additional malware to the compromised system, so you should take actions immediately to remove “The HoeflerText font wasn’t found” malware from the system. Therefore, do not hesitate and uninstall “The HoeflerText font wasn’t found” virus with the help of anti-malware software like FortectIntego or SpyHunter 5Combo Cleaner.
“The HoeflerText font wasn’t found” pop-ups are responsible for spreading Spora ransomware virus
Considering how successful this technique was, it is not surprising that ransomware developers were quick to try these new malware distribution methods. The first one to employ “The HoeflerText font wasn’t found” scam[7] was Spora virus, the infamous ransomware that is well-known for using sophisticated ransom payment websites and providing a variety of paid services to the victims.
Ransomware is one of the most devastating cyber infections – it encrypts files with a sophisticated cryptography algorithms and suggests paying a ransom in exchange for data decryption tool. Based on the fact how quickly Spora adapts new distribution techniques and also considering how professionally-made this virus is, we expect nothing more but an increased number of virus attacks shortly.
Reportedly, compromised websites feature a Javascript code that attackers insert at the end of the page. This JavaScript code recognizes visitors who enter the site via Chrome and shows not the real, but a corrupted version of the website and triggers a pop-up stating that visitor's Chrome browser lacks the HoeflerText font, and suggests installing it in order to view contents of the website. The message says:
The “HoeflerText” font wasn't found.
The website you are trying to load is displayed incorrectly, as it uses the”HoeflerText” font. To fix the error and display the text, you have to update “Chrome Font Pack”.
ManuFacturer: Google Inc. All Rights Reserved
Current Version: [version]
Latest version: [version]
The new campaign that spreads the ransomware promotes Update.exe file. If the user clicks the Update button, downloads this file and executes it, the system gets infected with Spora malware, and the victim loses access to all of his files instantly.
The HoeflerText font wasn’t found scam is known to be involved in Spora ransomware distribution
HoeflerText attacks Mozilla Firefox users and spreads Zeus Panda banking Trojan
At the beginning of March 2017, security experts have noticed new HoeflerText ads attack targeted at Mozilla Firefox users.[8] Victims are tricked into visiting an infected website that includes a malicious JavaScript code. In this site, people receive a warning message that HoeflerText font was not found and due to this reason this web page is displayed incorrectly.
In order to fix this issue, victims are asked to install “Mozilla Font Pack” update. This alert window might look legitimate because it provides information about manufacturer, current and latest version of the Mozilla. Thus, computer users can get quite easily get tricked into clicking an “Update” button.
Once they do that, they initiate a download procedure. Users are shown a regular download window which informs about downloading a “Mozilla_Font_v7.87.zip” archive. Inside it, there’s a malicious Mozilla_Font_v7.87.js JavaScript file.
Meanwhile, the crafted website changes the fake alert window and provides instructions how to install a fake Mozilla font package. As soon as the download completes, users need to double-click the JavaScript file and start the installation. Once it’s done, users are supposed to reboot Mozilla and enjoy installed updates.
However, instead of updates, users agree to install Panda Banker virus. The virus is one of many versions of Zeus banking Trojan; thus, their private information is put at risk. When users click on this malicious file, they allow downloading a malware payload called “Mozilla_Font_v7.87.exe.”
As soon as it is successfully saved in C:\ directory, it is executed and starts the installation of banking Trojan. Malware infects two svchost.exe processes and launches its hazardous task. If you got tricked into this scam, you should initiate virus removal immediately by running a full system scan with malware removal software.
HoeflerText Font Update scam spreads GandCrab virus, specialists warn
Followed by a great success of Spora distribution, hackers decided to use the HoeflerText font update scam for GandCrab ransomware distribution. Cybersecurity researcher officially shared the results of the nao_sec analysis,[9] which revealed the new tendency of the HoeflerText virus to redirect people to hacked sites injected with a JavaScript, which display scrambled text by default. Such sites generate a fake update prompt and urge the potential victim to update the Font Pack to fix the scrambled text.
GandCrab is one of the most prominent ransomware threats on the web and HoeflerText scam can install it on your computer
If Chrome's or Firefox's user clicks on the Update button, the Font_Update.exe file is downloaded and executes a g.js script. The latter may differ depending on the location of the victim. g.js file connects to NetSupport Manager remote access utility and can be found in a tokipp folder under %AppData%. In other words, the “hoeflertext” font wasn't found virus employs Font_Update.exe executable to run g.js script, which hacks the legitimate NetSupport Manager tool to download the GandCrab ransomware payload.
Thus, Google Chrome users have to beware that Font_Update.exe is not a HoeflerText font update. It's a GandCrab ransomware executable, which once activated renders all personal files useless by locking them with .GDCB file extension. In general, do not fall for clicking on pop-ups that offer to download updates unless you like dealing with cyber infections continuously.
Misleading warnings might appear on legitimate websites
As we have mentioned before, you can encounter these pop-ups on websites compromised by hackers who insert an additional piece of JavaScript code at the end of the page's source code. Consequently, Chrome or Firefox users will see a corrupted version of the website instead of the real one.
What is more, the additional code prompts a pop-up message stating that “The HoeflerText font wasn’t found.” If the victim agrees to install the suggested update, one simply downloads the Chrome_Update.exe or Mozilla_Font_v7.87.js file, which needs to be opened in order to activate the malware.
This fake Chrome update reportedly was used to distribute ad fraud malware dubbed Fleercivet[10]. As far as we know, the latest compromised websites that display “The HoeflerText font wasn’t found” alerts are serving Update.exe file, which is an installer for Spora ransomware virus.
Meanwhile, a fraudulent Firefox update is used for distribution and infiltration of Panda Banking trojan. Thus, this alert includes similar information about inability to show a website's content correctly and asks to install necessary updates. If you happen to enter a website that displays the described pop-up, better quit it immediately and do not come back to it. It might take some time for it to be fixed. If you have encountered such website, you can report it to us.
Google Chrome will usually warn you that the file might be malicious. Do not ignore these warnings
Getting rid of “The HoeflerText font wasn’t found” virus
“The HoeflerText font wasn’t found” virus is a very dangerous computer infection. After infiltration, it causes chaos on the browser by delivering misleading pop-ups, and it might also silently connect to various third-party websites via your Internet connection. However, in the worst case, you can get infected with a ransomware after installing this bogus update, and consequences will be devastating. So if you accidentally installed the virus, follow these instructions for a safe “The HoeflerText font wasn’t found” removal.
Getting rid of “The HoeflerText font wasn’t found” ads. Follow these steps
Manual removal using Safe Mode
If you have installed the virus and now your computer acts slowly or, in the worst case, you cannot access your files, reboot your PC using guidelines provided below. In case you cannot access your files, check out this article.
Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.
Step 1. Access Safe Mode with Networking
Manual malware removal should be best performed in the Safe Mode environment.
Windows 7 / Vista / XP
- Click Start > Shutdown > Restart > OK.
- When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
- Select Safe Mode with Networking from the list.
Windows 10 / Windows 8
- Right-click on Start button and select Settings.
- Scroll down to pick Update & Security.
- On the left side of the window, pick Recovery.
- Now scroll down to find Advanced Startup section.
- Click Restart now.
- Select Troubleshoot.
- Go to Advanced options.
- Select Startup Settings.
- Press Restart.
- Now press 5 or click 5) Enable Safe Mode with Networking.
Step 2. Shut down suspicious processes
Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:
- Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
- Click on More details.
- Scroll down to Background processes section, and look for anything suspicious.
- Right-click and select Open file location.
- Go back to the process, right-click and pick End Task.
- Delete the contents of the malicious folder.
Step 3. Check program Startup
- Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
- Go to Startup tab.
- Right-click on the suspicious program and pick Disable.
Step 4. Delete virus files
Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:
- Type in Disk Cleanup in Windows search and press Enter.
- Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
- Scroll through the Files to delete list and select the following:
Temporary Internet Files
Downloads
Recycle Bin
Temporary files - Pick Clean up system files.
- You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):
%AppData%
%LocalAppData%
%ProgramData%
%WinDir%
After you are finished, reboot the PC in normal mode.
Remove “The HoeflerText font wasn’t found” using System Restore
-
Step 1: Reboot your computer to Safe Mode with Command Prompt
Windows 7 / Vista / XP- Click Start → Shutdown → Restart → OK.
- When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
- Select Command Prompt from the list
Windows 10 / Windows 8- Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
- Now select Troubleshoot → Advanced options → Startup Settings and finally press Restart.
- Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window.
-
Step 2: Restore your system files and settings
- Once the Command Prompt window shows up, enter cd restore and click Enter.
- Now type rstrui.exe and press Enter again..
- When a new window shows up, click Next and select your restore point that is prior the infiltration of “The HoeflerText font wasn’t found”. After doing that, click Next.
- Now click Yes to start system restore.
Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from “The HoeflerText font wasn’t found” and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes
How to prevent from getting malware
Choose a proper web browser and improve your safety with a VPN tool
Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.
Lost your files? Use data recovery software
While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.
To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.
- ^ Catalin Cimpanu. Chrome Users Targeted with Malware via New "Font Wasn't Found" Technique. BleepingComputer. News, Reviews, and Technical Support.
- ^ Josep Albors. Malicious scripts in compromised websites and how to protect yourself. WeLiveSecurity. IT security site covering the latest news, research, cyber threats and malware discoveries.
- ^ Andra Zaharia. JavaScript Malware – a Growing Trend Explained for Everyday Users. Heimdal Security. Threat research blog.
- ^ Hoefler Text. Wikipedia. The Free Encyclopedia.
- ^ Julie Splinters. Spora ransomware disguises under fake Chrome Font Pack update. 2spyware. Security news and virus removal guides.
- ^ The 4 most dangerous Cyber Security threats to watch out for in 2016 [Infographic]. IFSEC Global. The latest security, fire and CCTV news, product information and resources for the security and fire community.
- ^ EITest Fake Chrome Popup Leads To Spora Ransomware. Malware Traffic Analysis. News about current malware strains, tutorials and examples of traffic analysis.
- ^ Linas Kiguolis. Cyber criminals adopted HoeflerText scam and started using it against Firefox users. 2spyware. Security news and virus removal guides.
- ^ EiTest campaign Hoefler Text Pop-up delivers GandCrab Ransomware. Broad Analysis. Threat Intelligence and Malware Research.
- ^ EITest Nabbing Chrome Users with a “Chrome Font” Social Engineering Scheme. Proofpoint. Threat Insight Blog - Cybersecurity Intelligence.