veihqy.click is a deceptive adware campaign that tricks users into enabling browser notifications. This rogue site often masquerades as a fake CAPTCHA or video prompt, and once permissions are granted, floods your desktop or device with intrusive ads—even if the browser is closed.
Threat Overview
| Category | Details |
|---|---|
| Threat type | Adware / Browser notification spam |
| Associated domain | veihqy.click (multiple subdomains like 27lh.veihqy.click) |
| Detection names | Combo Cleaner (Phishing), Fortinet (Phishing), Sophos (Phishing), G‑Data (Phishing) |
| Symptoms of infection | Unexpected pop-ups/ads via browser notifications, slowed browsing |
| Damage / Distribution | Browser hijacking via deceptive pop-ups, potential redirects to scams |
| Danger level | Medium — leads to privacy issues, annoyances, and can expose to more malware |
| Removal tool | SpyHunter – Download SpyHunter |
Detailed Evaluation
How I got infected
Most users land on veihqy.click via malicious ads or redirects from compromised websites. The site prompts you to “Click Allow to watch video” or “confirm you’re not a robot.” Once you click “Allow,” you grant permission for persistent notifications.
What it does
With notification permission enabled, the site sends a barrage of ads—fake software updates, adult websites, dubious gaming links, tech support scams—all designed to trick you into clicking. This not only disrupts browsing but can lead you to even more malicious content.
Should you worry?
Yes and no. While veihqy.click itself doesn’t directly infect your system, it functions as a gateway to riskier threats. Persistent notifications are a sign of adware, which often accompanies browser extensions or PUPs. If left unchecked, they can degrade performance, invade your privacy, and expose you to phishing or malware.
Scam Message (Example Notification Prompt)
“Click Allow to verify you are not a robot”
“Press Allow to watch the video”
This is a typical social engineering trick—persistent and misleading calls to action designed to exploit trust and trick users into enabling these intrusive notifications.
Manual Adware Removal (Windows & Mac)
Step 1: Identify Suspicious Applications
For Windows Users
- Press
Ctrl + Shift + Escto open the Task Manager. - Check the “Processes” tab for unfamiliar or suspicious programs consuming excessive CPU or memory.
- If you find any, note their names and close them.
- Open
Control Panel>Programs>Programs and Features. - Locate the suspicious application, right-click it, and select “Uninstall.”
For Mac Users
- Open
Finderand navigate toApplications. - Look for any suspicious or unknown applications.
- Drag them to the
Trash, then right-click on theTrashand selectEmpty Trash. - Open
System Preferences>Users & Groups>Login Itemsand remove any unrecognized startup programs.
Step 2: Remove Adware-Related Browser Extensions
Google Chrome
- Open Chrome and go to
Menu(three dots in the top-right corner) >Extensions. - Locate suspicious extensions and click “Remove.”
- Reset Chrome: Go to
Settings>Reset settings> “Restore settings to their original defaults.”
Mozilla Firefox
- Open Firefox and go to
Menu(three lines in the top-right corner) >Add-ons and themes. - Locate and remove suspicious extensions.
- Reset Firefox: Go to
Help>More troubleshooting information> “Refresh Firefox.”
Safari (Mac)
- Open Safari and go to
Preferences>Extensions. - Locate and remove any unknown extensions.
- Reset Safari: Go to
History> “Clear History.”
Microsoft Edge
- Open Edge and go to
Menu(three dots in the top-right corner) >Extensions. - Remove suspicious extensions.
- Reset Edge: Go to
Settings>Reset settings> “Restore settings to their default values.”
Step 3: Delete Adware-Related Files and Folders
For Windows Users
- Press
Win + R, type%AppData%, and press Enter. - Look for suspicious folders and delete them.
- Repeat for
%LocalAppData%,%ProgramData%, and%Temp%.
For Mac Users
- Open Finder, press
Shift + Command + G, and enter~/Library/Application Support/. - Locate and delete suspicious folders.
- Repeat for
~/Library/LaunchAgents/,~/Library/LaunchDaemons/, and~/Library/Preferences/.
Step 4: Flush DNS Cache (Recommended)
For Windows Users
- Open
Command Promptas Administrator. - Type
ipconfig /flushdnsand press Enter.
For Mac Users
- Open
Terminal. - Type
sudo killall -HUP mDNSResponderand press Enter.
Step 5: Restart Your Computer
Restart your device to complete the manual removal process.
Automatic Adware Removal Using SpyHunter (Windows & Mac)
For a hassle-free and effective removal, use SpyHunter, a robust anti-malware tool designed to detect and remove adware efficiently.
Step 1: Download SpyHunter
Download SpyHunter from the official website: Click here to download SpyHunter.
Step 2: Install SpyHunter
Follow the installation instructions based on your operating system:
For Windows Users:
- Open the downloaded
.exefile. - Follow the on-screen installation instructions.
- Launch SpyHunter and allow it to update its malware definitions.
For Mac Users:
- Open the downloaded
.dmgfile. - Drag and drop SpyHunter into the Applications folder.
- Launch SpyHunter and allow it to update its malware definitions.
Step 3: Perform a System Scan
- Open SpyHunter.
- Click on
Start Scan. - Wait for the scan to complete.
- Review the detected threats and click
Fix Threatsto remove adware.
Step 4: Restart Your Device
After SpyHunter removes the threats, restart your computer to finalize the process.
For the most secure and effective removal, we recommend downloading and using SpyHunter: Download SpyHunter Here.
Stay safe and keep your system clean!
Conclusion
veihqy.click leverages rogue ads and deceptive prompts to hijack your notification settings. While not malicious in itself, it functions as a delivery network for intrusive or harmful content. To clean your browser and regain control:
- Revoke notification permissions for suspicious domains (like veihqy.click).
- Scan your system with SpyHunter to detect and remove leftover adware or extensions.
- Stay vigilant: don’t permit notifications from unknown sites, and consider using ad blockers.
