EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
|Threat Level:||20 % (Normal)|
|First Seen:||August 26, 2021|
|Last Seen:||March 18, 2022|
ConnectedProtocol is an application being promoted to Mac users by deceptive and dubious websites. The application could be presented under the guise of an important software update. In reality, when installed on the Mac, ConnectedProtocol will reveal that its main function is that of adware. The reliance on questionable distribution tactics also makes the application a PUP (Potentially Unwanted Program).
Adware is a category for intrusive applications designed specifically to generate and deliver unwanted advertisements to the computers or devices they are installed on. The operators of such software tools aim to earn profits in the process. Naturally, ConnectedProtocol may operate in the same manner. Users may be subjected to a constant influx of annoying and untrustworthy advertisements. The advertisements could contain promotional materials for fake giveaways, various online tactics, additional PUPs posing as legitimate applications, shady adult pages, etc.
PUPs also are infamous for having data-harvesting capabilities. While active on the device, these applications may spy on the users' browsing activities and collect numerous device details. The transmitted information may include IP addresses, visited websites, clicked URLs, and, in some cases, even banking information, account credentials and card details.