InitialMethod
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 6 |
First Seen: | September 14, 2021 |
Last Seen: | May 1, 2022 |
InstallMethod is an adware application targeting Mac users. Adware programs are typically not interested in providing any useful features to users. Their main goal is to generate money for their operators through the delivery of unwanted and intrusive advertisements. In many cases, users do not even realize that such a PUP (Potentially Unwanted Program) was installed on their computers or devices, due to the questionable tactics involved in the distribution of these applications. Indeed, they are often injected into software bundles spread by questionable sources or presented to users inside completely fake installers/updates.
When InitialMethod is fully deployed on the user's Mac, it may start to frequently generate unwanted pop-ups, banners, notifications, etc. Users should be careful when interacting with advertisements associated with unfamiliar sources. The advertisements could promote various online schemes, fake giveaways, adult pages, shady online gambling/gaming platforms, etc. Furthermore, iterating with the advertisements could trigger forced redirects to additional rogue websites.
Many PUPs also collect information that is then transmitted to their operators. The targeted data may include the users' browsing activities, as well as numerous device details. However, some PUPs also are capable of accessing the browsers' autofill data. This could allow them to harvest sensitive information, such as account credentials, payment info, banking details and more.