DominantInfo

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 6
First Seen: September 14, 2022
Last Seen: December 28, 2022

Infosec researchers have identified an intrusive app named DominantInfo that is targeted at Mac users. Analysis typically shows that apps of this type function as adware and may contain additional unwanted capabilities. In addition, DominantInfo has been confirmed to be part of the infamous AdLoad adware family of apps.

Users Should be Aware of the Risks Associated with Adware Like DominantInfo

Adware is software that is designed to display intrusive advertising campaigns on various interfaces. These advertisements often promote online scams, and untrustworthy or harmful software, and take users to shady destinations. Users may inadvertently click on these ads, which can result in stealthy downloads or installations of unwanted programs. It is important to note that any legitimate content displayed through these ads is most likely being promoted by scammers who abuse its affiliate programs to obtain illegitimate commissions.

It is also worth mentioning that advertising-supported software often requires specific conditions to run intrusive ad campaigns, such as a compatible browser or system or visits to particular websites. However, even if DominantInfo does not display ads, its presence can still pose a threat to the device and user privacy.

DominantInfo may also collect private information, including browsing and search engine histories, Internet cookies, log-in credentials, personally identifiable details, and credit card numbers. The collected information can be sold to third parties or used for other fraudulent purposes.

Distributors of PUPs (Potentially Unwanted Programs) Rely Heavily on Dubious Methods

PUPs often use various tactics for their distribution. One common method is bundling, where PUPs are packaged with legitimate software that users download and install. The PUPs may be disguised as optional or recommended software during the installation process, which users may overlook or fail to deselect.

Another common tactic is through misleading advertisements or download links on shady websites. The download link may appear to be for a legitimate program or file, but in reality, it leads to the PUP download. PUPs also may employ social engineering techniques, such as fake software updates or security alerts, to trick users into downloading and installing them.

PUPs also may be distributed through spam emails, where the email contains a link or attachment that downloads and installs the promoted program when clicked. In some cases, PUPs also may be disguised as browser extensions or plugins that offer additional features, but in reality, they deliver intrusive ads and track user data.

Users should be vigilant when downloading and installing software and only download it from trusted sources. They should carefully read the terms and conditions during installation and look out for any additional software or offers. Users should also keep their antivirus and anti-malware software up to date to detect and remove PUPs.

Trending

Most Viewed

Loading...