OnlineClient
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 3 |
First Seen: | January 12, 2022 |
Last Seen: | August 14, 2022 |
OnlineClient is an intrusive application that is being spread via deceptive and underhanded methods. Cybersecurity researchers have observed the application being offered by questionable websites. In addition, PUPs (Potentially Unwanted Programs) also are commonly distributed as part of shady software bundles or outright fake installers/updates pretending to be for legitimate software products.
Once OnlineClient is installed on the Mac, it will begin monetizing its presence there by generating dubious advertisements. Users risk being presented with advertisements for phishing schemes that collect private information, fake giveaways, suspicious adult-oriented platforms and other similarly questionable destinations. It is also important to keep in mind that adware, browser hijackers, and other PUPs also are likely to possess data-tracking functions.
Indeed, while installed on the device, these applications could be continuously tracking users' browsing activities and transmitting them to their operators. Some PUP also could harvest numerous device details and exfiltrate them as well. Even the autofill data saved into the Web browsers on the system could not be safe. Some PUPs have been observed attempting to access it and extract sensitive account credentials or payment details.