CycleAfter

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 26
First Seen: March 17, 2022
Last Seen: February 24, 2023

Mac users are still being targeted by more intrusive applications created as part of the proliferous AdLoad adware family. One such example is the CycleAfter application. No matter what functions it may boast of having, the primary goal of the application appears to be the delivery of unwanted advertisements to the user's Mac. As is typically the case with adware programs, the shown advertisements are unlikely to be for legitimate websites, services or products.

Users will usually be presented with advertisements for dubious destinations, such as hoax websites, phishing portals, platforms spreading PUPs (Potentially Unwanted Programs), shady betting/dating sites and more. In addition, any interaction with the generated advertisements could trigger a forced redirect, again leading to untrustworthy websites.

The problems caused by having adware, browser hijackers, and PUPs in general, present on the computer or device may not stop there. These invasive applications also are notorious for spying on users' browsing activities. The collected data may include device details (IP address, geolocation, browser type, OS type and more) as well. Some PUPs even try to extract information from the browser's autofill data. This feature is usually used as a way to easily populate login credentials, banking details, or payment data, including credit/debit card numbers.

Trending

Most Viewed

Loading...