CommonAnalyser
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 9 |
First Seen: | August 23, 2021 |
Last Seen: | August 26, 2023 |
Mac users should be on the lookout for another intrusive application. Named CommonAnalyser, the PUP (Potentially Unwanted Program) belongs to the AdLoad adware family, and is most likely being distributed via underhanded methods, including shady software bundles or fake installers. The goal is for the application to avoid being noticed by users until it has already been installed on their Macs.
The main functionality of CommonAnalyser involves monetizing its presence via an annoying ad campaign. The application will be responsible for generating various unwanted advertisements and showing them to the user. The advertisements may take different forms - pop-ups, banners, in-text links, etc., and could even be injected into unrelated websites in an attempt to appear more legitimate. However, users should still avoid interacting with them, as doing so could take them to unsafe websites running online tactics, phishing schemes, spreading additional PUPs, or even threatening malware payloads.
While on the system, PUPs also may try to spy on the user's browsing activities. The application may access and transmit the entire browsing history, search history and each clicked URL. Other commonly obtained information includes device details, such as IP address, ISP, geolocation, browser type and more. However, users should keep in mind that some PUPs go far deeper and may try to harvest sensitive information that has been saved into the installed Web browsers. The data could include account credentials, the user's banking information or even debit/credit numbers and other payment details.