AdzEater Adware

Threat Scorecard

Ranking: 1,256
Threat Level: 20 % (Normal)
Infected Computers: 1,080
First Seen: February 13, 2023
Last Seen: September 30, 2023
OS(es) Affected: Windows

During an investigation into deceptive Web pages, infosec researchers discovered the AdzEater browser extension. This extension is promoted as an ad blocker for the YouTube video-hosting platform. However, analysis has revealed that instead of blocking advertisements, AdzEater operates in the exact opposite manner and displays additional advertisements. This behavior classifies AdzEater as advertising-supported software (adware).

Users Should Recognize the Typical Behavior of AdzEater and PUPs (Potentially Unwanted Programs)

Adware is software that is designed to display various advertisements, including banners, pop-ups, coupons, surveys, etc. on websites and interfaces. Unfortunately, many of these advertisements can promote online tactics, unreliable or harmful software and even malware. In some cases, users may inadvertently download and install adware on their systems, and when they click on the advertisements, the advertisements may execute scripts that download and install software without the user's consent.

Keep in mind that even though genuine content may be advertised through these advertisements, it is unlikely to be promoted by the developers of these websites. Rather, it is more probable that fraudsters are abusing the product's affiliate programs to acquire illegitimate commissions.

Adware may require specific conditions, such as a compatible browser or system, user geolocation, or visits to particular sites, to run intrusive advertisement campaigns. However, even if an adware extension like AdzEater does not display advertisements, its presence on a system could still pose a risk.

Additionally, AdzEater is likely to be equipped with data-tracking capabilities, which can allow it to collect information about users. This information may include browsing and search engine histories, usernames and passwords, personally identifiable details, credit card numbers and more. The collected data may be shared with or sold to third parties, including cybercriminals.

Questionable Methods Involved in the Spread of PUPs and Adware

PUPs and adware are spread through various methods, including but not limited to software bundling, social engineering, email attachments, unsafe websites and fake software updates.

One common method is software bundling, where PUPs and adware are packaged with legitimate software installers. When users download and install the desired software, they unwittingly install the bundled PUP or adware as well.

Social engineering involves tricking users into installing PUPs or adware by making them think they are installing something beneficial. For example, a pop-up may appear on a website claiming that the users' computers are infected with a virus and they need to install a program to remove it.

Email attachments also may be used to spread PUPs and adware. The email may contain an attachment that, when opened, installs the unwanted program on the user's device.

Trending

Most Viewed

Loading...