Threat Database Adware NetworkSync

NetworkSync

NetworkSync is a PUP (Potentially Unwanted Program) that is being leveraged against Mac users. PUPs typically do not wait for users to find, download, and install them willingly. On the contrary, they proliferate themselves via deceptive distribution techniques designed to hide their installation. Two of the more popular methods are bundling and fake software updaters/installers. 

No matter what features NetworkSync may boast as having, the truth is that the application's core functionalities are those of adware and a browser hijacker. The adware part is designed to generate monetary gains for the PUP's creators via an intrusive advertising campaign. The application will start to deliver unwanted pop-ups, banners, coupons, in-text links and more. The advertisements could try to lure the user into clicking on them with enticing messages or offers. However, doing so is strongly discouraged, as the advertisements could lead to unsafe third-party websites. Users could be brought to phishing pages trying to collect account credentials or other sensitive information. Among the popular destinations also are hoax websites running fake giveaways.

The impact of having NetworkSync installed on your Mac device doesn't stop here. The PUP also will take control over the Web browser and force it to open a dubious search engine. The homepage, new tab page, and the default search engine will all be modified. Afterward, whenever the user launches the browser, starts a new tab, or initiates a search in the URL bar, it would generate traffic towards the promoted site immediately. Typically, hoax search engines cannot provide any search results on their own and the one promoted via NetworkSync is not an exception - search queries will ultimately be run through the legitimate engine search.yahoo.com.

Users should keep in mind that nearly all PUPs also are capable of data harvesting. These applications could access the browsing history, search history and all clicked URLs. All gathered information is uploaded to a remote server where the operators of the PUP can exploit it in a variety of ways. 

Trending

Most Viewed

Loading...