Auto Refresh Browser Extension
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 6,360 |
Threat Level: | 20 % (Normal) |
Infected Computers: | 60 |
First Seen: | May 9, 2023 |
Last Seen: | September 27, 2023 |
OS(es) Affected: | Windows |
During the investigation of untrustworthy websites, researchers discovered the Auto Refresh browser extension. The app claims to provide users with a convenient way to refresh Web pages automatically at set intervals. However, upon examining the Auto Refresh, it was concluded that this extension mainly functions as adware.
Adware and PUPs (Potentially Unwanted Programs) could Cause Various Issues
Adware is a type of software designed primarily to show intrusive advertisements to users on websites and other interfaces. These advertisements can promote schemes, dubious applications, and, in some cases, even malware.
Although legitimate content may be advertised through these advertisements, it is unlikely to be done with the support of its actual developers. It is more likely that fraudsters are promoting the product through affiliate programs as a way to obtain illegitimate commissions.
The Auto Refresh, a browser extension discovered by researchers, is an example of adware. It likely has data-tracking abilities as well, which is common for adware. Advertising-supported software often collects browsing and search engine histories, Internet cookies, account log-in credentials, personally identifiable details, finance-related information, and more. The collected data can be monetized by selling it to third parties.
PUPs Often Try to Hide Their Installation
PUPs often use deceptive tactics to hide their installation from users. One common method is bundling, where PUPs are packaged with legitimate software and installed without the user's knowledge or consent. PUPs also may be disguised as legitimate programs or browser extensions, using names, logos, and user interfaces that mimic popular products.
Another tactic used by PUPs is social engineering, where the software tricks users into installing it. PUPs may use persuasive language, fake security warnings, or claims of free downloads to entice users into installing them. PUPs also may use techniques such as clickjacking, where a user clicks on a hidden button or link, and the click is redirected to initiate an unwanted download.