Stonkstime.com
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 4,663 |
Threat Level: | 20 % (Normal) |
Infected Computers: | 164 |
First Seen: | April 9, 2023 |
Last Seen: | September 26, 2023 |
OS(es) Affected: | Windows |
Stonkstime.com is a website that computer users may encounter if they have an unwanted browser extension or other PUP (Potentially Unwanted Program) installed on their device. This website redirects the browser to advertisements for dubious and intrusive Chrome extensions, shady surveys, adult sites, online web games, fake software updates, and PUPs.
The Stonkstime.com site may appear on the computer screen through various channels, such as websites that redirect users to the site, push notifications, or intrusive apps that open the site without the user's consent. The advertisements shown on the Stonkstime.com site can be intrusive and potentially harmful to the device if users download an untrustworthy.
Table of Contents
Browser Hijackers and PUPs Often Cause Annoying Redirects
Having a browser hijacker or a potentially unwanted program (PUP) installed on a device can pose several risks to the user. Firstly, these programs can modify the user's browser settings without their knowledge or consent, redirecting them to questionable or outright scam websites. This can expose the user to phishing scams and other forms of online issues.
Browser hijackers and PUPs often serve intrusive ads, pop-ups, and banners, which can significantly disrupt the user's browsing experience. These ads may also be misleading and encourage users to download or install potentially harmful software or enter personal information.
In addition, browser hijackers and PUPs are notorious for spying on users. These apps may collect various sensitive information, including browsing history, search queries, personal information, and system information. This information could then be sold to third-party advertisers or used for fraudulent purposes, such as identity theft or financial fraud.
Overall, having a browser hijacker or a PUP present on the device can compromise the user's privacy, security, and browsing experience, making it important to remove them as soon as possible.
PUPs are Spread Through Deceptive Tactics
Potentially Unwanted Programs (PUPs) are often distributed using questionable tactics that deceive users into installing them. One such tactic is bundling, where PUPs are packaged with legitimate software and installed alongside it without the user's knowledge or consent.
Another method is through misleading ads, such as fake download buttons on websites that can download the PUP when clicked. PUPs may also be distributed through social engineering tactics, such as fake tech support scams, fake software update notifications, or fake security alerts that trick users into downloading and installing PUPs.
Additionally, PUPs may be disguised as useful software, such as system optimizers or security tools, to convince users to download and install them. These tactics are used to exploit users' trust and lack of knowledge about these unwanted programs to get them installed on their devices, which can lead to a range of risks and problems.
Stonkstime.com Video
Tip: Turn your sound ON and watch the video in Full Screen mode.

URLs
Stonkstime.com may call the following URLs:
stonkstime.com |