ObjectRemote
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 1 |
First Seen: | January 12, 2022 |
Last Seen: | January 14, 2022 |
Mac users need to be aware of another intrusive application. Named ObjectRemote, this program is most likely being spread via questionable methods, such as shady software bundles or fake app installers/updates.
While ObjectRemote may rely on sneaky tactics to enter the Mac system, once there, its presence becomes obvious quite fast. After all, the main purpose of the application is to run an intrusive ad campaign that will see the user's device flooded by unwanted advertisements. Typically, the advertisements generated by adware PUPs (Potentially Unwanted Programs) promote dubious or even unsafe websites, cause unwanted redirects to suspicious game or betting platforms, or try to convince users to install additional PUPs disguised as seemingly useful programs.
While installed on the Mac, ObjectRemote also may try to obtain various user information, mainly concerning the browsing activities carried out on the system. The intrusive application, which is from the AdLoad adware family, may collect the browsing history, search history, clicked URLs, IP address, geolocation, device type, browser type and more. All harvested data will be packaged and exfiltrated to a server controlled by the PUP's operators.