IdentityStack
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 4 |
First Seen: | November 30, 2022 |
Last Seen: | April 10, 2023 |
After analyzing the IdentityStack application, cybersecurity experts confirmed that it falls under the adware classification. This means that once IdentityStack has been installed on users' Mac devices, it will activate an intrusive functionality responsible for the delivery of unwanted and annoying advertisements. In many cases, adware applications get installed without users even realizing it due to the questionable methods used in their distribution. Indeed, these PUPs (Potentially Unwanted Programs) are often included in shady software bundles as items preselected for installation, injected into outright fake installers or promoted by deceptive websites.
Dealing with adware and, by extension, with IndentityStack could be problematic. Many PUPs establish persistence mechanisms on the users' devices to ensure their prolonged presence there. Meanwhile, users are likely to continue receiving dubious advertisements that may appear as pop-ups, browser redirects, banners, notifications and more. At the same time, the shown advertisements could try and promote untrustworthy websites running various online tactics (fake giveaways, phishing tactics, technical support frauds) or push additional PUPs under the guise of legitimate products.
PUPs are infamous for having additional invasive capabilities. Many applications of this type also monitor the users' browsing activities. They may monitor the search history, browsing history, and clicked URLs, as well as capture the device's IP address, model, browser type and many other details. Some PUPs could even try to extract account credentials, banking details, and other sensitive information that has been saved as part of browsers' autofill data.