InitialConnection
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 2 |
First Seen: | September 23, 2021 |
Last Seen: | October 30, 2021 |
Infosec researchers have confirmed that the InitialConnection application is another representative of the prolific AdLoad adware family. The intrusive applications belonging to this family are targeting Mac users exclusively and their main goal is the delivery of unwanted advertisements. The problem with adware is that the frequently appearing advertisements could severely affect the user experience. In fact, the advertisements could easily be used as a way to promote questionable or even unsafe destinations - phishing portals, technical support frauds, fake giveaways, shady adult pages, dubious online betting/gaming platforms, etc.
Many adware or PUPs (Potentially Unwanted Programs) in general also are equipped with additional, invasive functions. While active on the user's device, these applications may establish data-tracking routines that will capture the browsing history, search history, clicked URLs, IP addresses, geolocation and many other details. Infosec researchers also have observed PUPs accessing browsers' autofill data and extracting sensitive details, such as banking information or account credentials. All of the data collected by these untrustworthy applications could be exploited for the delivery of targeted advertisements or potentially be sold to interested third parties.