Streamic
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 9,619 |
Threat Level: | 50 % (Medium) |
Infected Computers: | 82 |
First Seen: | November 16, 2022 |
Last Seen: | September 17, 2023 |
OS(es) Affected: | Windows |
Streamic is presented to users as a convenient browser extension that will make it far easier and quicker to search for movies or TV series they wish to stream. Unfortunately, the application quickly reveals that its primary focus is on running an intrusive advertising campaign, a typical characteristic associated with adware. These dubious software tools also are frequently classified as PUPs (Potentially Unwanted Programs) because of the questionable tactic involved in their distribution.
Once activated on the user's device, Streamic will be able to read and change data on the visited pages. In practice, this ability will manifest in the frequent generation of unwanted advertisements. Users are highly likely to see advertising materials promoting shady, dubious or even unsafe destinations. Many adware applications deliver advertisements for phishing websites, fake giveaways, platforms spreading additional PUPs, etc.
At the same time, keeping applications of this type on the device could result in the users having their data spied upon. PUPs have been observed harvesting browsing histories, search histories, clicked URLs, IP addresses, geolocations and many other device details. The collected data is then exfiltrated to a server under the control of the specific PUP operators.