LoyalShroud

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 15
First Seen: January 30, 2023
Last Seen: August 31, 2023

Infosec researchers have come across another intrusive application that tries to take advantage of users. This new PUP (Potentially Unwanted Programs) is named LoyalShroud, and it is designed to target Mac users in particular. The application displays the main characteristics associated with the typical behavior of adware - dubious programs tasked with generating revenue for their developers through the generation of ads on users' devices. In addition, LoyalShroud has been confirmed to belong to the prolific AdLoad adware family.

LoyalShroud and Other PUPs may Cause Privacy Concerns

Adware, short for advertising-supported software, operates by engaging in intrusive advertising campaigns. This type of software displays advertisements across various interfaces with the intention of promoting online scams, unreliable or harmful software, and even malware. Clicking on these intrusive ads could also lead to the execution of scripts that perform stealthy downloads or installations.

While some genuine products or services may be advertised through this medium, they are used by fraudsters as a way to abuse affiliate programs and gain illegitimate commissions.

It should be emphasized that advertising-supported software may not display ads in certain cases, such as when the browser or system specifications of the particular system are incompatible, specific websites are not visited, or other conditions are not met. However, even if the LoyalShroud application does not display advertisements, its presence on a system still poses a threat to the device and user safety.

Additionally, this rogue application often incorporates data-tracking functionalities. The gathered data may include browsing and search engine histories, internet cookies, personally identifiable information, usernames and passwords, credit card number and more. This collected information could easily be shared with or sold to third parties, potentially including cybercriminals.

PUPs are Often Installed through Deceptive Tactics

The distribution of PUPs and adware involves the exploitation of deceptive tactics to gain access to users' devices. These tactics are meant to trick users into inadvertently installing unwanted software onto their systems.

One common tactic is bundling, where PUPs or adware are bundled with legitimate software downloads. Users may be unaware that additional software is included in the package, and during the installation process, they might overlook or unintentionally consent to installing the unwanted programs.

Another deceptive tactic involves misleading advertising and deceptive marketing practices. Advertisements may display false claims or exaggerations to entice users into clicking on them. These ads often disguise themselves as legitimate offers or system alerts, leading users to believe they need to download certain software or take specific actions to address non-existent issues.

Social engineering techniques are also employed to manipulate users into installing PUPs or adware. Scareware, for example, presents fake security alerts or virus warnings, instilling fear in users and compelling them to download and install the suggested software, which is often malicious or unwanted.

Additionally, misleading software installers may use deceptive wording or unclear checkboxes during the installation process, making it difficult for users to understand or opt out of installing additional programs.

These deceptive tactics are aimed at exploiting users' lack of awareness or vigilance, tricking them into unintentionally installing PUPs or adware on their devices. Users must exercise caution, carefully review software installation processes, and be skeptical of suspicious or misleading advertisements to protect themselves from these deceptive practices.

Trending

Most Viewed

Loading...