AssetFrame
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 5 |
First Seen: | September 8, 2021 |
Last Seen: | May 29, 2022 |
AssetFrame is an intrusive application that aims to sneak itself onto users' Mac devices. This particular PUP (Potentially Unwanted Program) has been classified as adware. In fact, according to cybersecurity researchers who have analyzed AssetFrame, the application is yet another addition to the AdLoad family.
While not nearly as unsafe as malware threats, having adware, browser hijackers, and other PUP types installed on your Mac is not entirely without risk. AssetFrame will begin delivering various untrustworthy advertisements to the system. The advertisements could promote unsafe destinations, such as phishing portals, online betting platforms and more. Furthermore, interacting with the advertisements could trigger forced redirects. Users also may be presented with enticing offers for software products that turn out to be additional PUPs in disguise.
Another important characteristic of most PUPs is their ability to collect data. The operators of such applications are typically interested in obtaining users' browsing history, search history, clicked URLs, and numerous device details (IP address, geolocation, browser type, OS type, etc.). However, some PUPs also could try to harvest confidential information extracted from the browser's autofill data. This may even include account credentials or banking details that will be transmitted to a remote server.