ShareAdvantage
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 20 % (Normal) |
Infected Computers: | 23 |
First Seen: | March 2, 2022 |
Last Seen: | March 20, 2023 |
Cybercriminals continue to rely on the AdLoad family to create adware applications targeting Mac computers. The intrusive applications are mostly designed to act as adware, delivering numerous annoying and unwanted advertisements to the system and generating revenue for their operators. To avoid allowing such PUPs (Potentially Unwanted Programs) on their devices, users must always use caution when dealing with software bundles or software installers/updates taken from unproven sources.
Once fully deployed on the Mac, ShareAdvantage, just like other members of the AdLoad family, can severely impact the user experience. The application may be responsible for the creation of various deceptive pop-ups, banners, in-text links and more. The advertisements could be injected into otherwise unrelated websites in an attempt to make them appear more legitimate. The advertisements themselves could employ different social-engineering tactics to lure users into interacting with them. Users can trigger forced redirects to questionable or even unsafe websites or initiate unwanted downloads. It should be noted that the fraudsters also could be using legitimate applications in an attempt to earn commission fees for each sale made through the advertisement.
Adware and other PUPs are often equipped with some level of data-tracking capabilities. In most cases, the intrusive applications limit themselves to obtaining only browsing-related data, such as the user's browsing and search histories. However, there are those PUPs that dig deeper and collect device details (IP address, geolocation, device type, ISP, etc.) or even try to access autofill information saved into the installed browsers. This could potentially mean that the user's account credentials, banking information, or payment details could be packaged and transmitted to a remote server controlled by the PUP's operators.