{"id":58,"date":"2022-03-04T17:10:25","date_gmt":"2022-03-04T17:10:25","guid":{"rendered":"https:\/\/threatinfo.net\/articles\/?p=58"},"modified":"2022-03-04T17:11:28","modified_gmt":"2022-03-04T17:11:28","slug":"pua-threat-description","status":"publish","type":"post","link":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/","title":{"rendered":"PUP\/PUA threat description"},"content":{"rendered":"<p style=\"text-align: justify\">A potentially unwanted program, or PUP, is an application that is considered unsafe. In rare cases, the exact app is safe, but there are a lot of alterations that are spread in the Internet and are malicious. Although these programs may carry a real functionality, they can damage your system or your files as well.<\/p>\n<h2 style=\"text-align: center\">What are unwanted programs (PUP\/PUA)?<\/h2>\n<p style=\"text-align: justify\">Unwanted programs may have different origins. Some of them are just poorly made, so their usage may lead to file corruption or system failures. Especially dangerous are ones that edit your registry or system files. Another widespread variation of \u201cbenevolent-but-unwanted\u201d apps are programs that contain a lot of advertisements &#8211; like uTorrent. They can be really useful and not harmful in their main task, but side actions can expose you to malware injection.<\/p>\n<figure id=\"attachment_61\" aria-describedby=\"caption-attachment-61\" style=\"width: 1014px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png\" alt=\"uTorrent ads\" width=\"1024\" height=\"566\" class=\"size-full wp-image-61\" srcset=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png 1024w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads-300x166.png 300w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads-768x425.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-61\" class=\"wp-caption-text\">uTorrent was considered a PUP after being flooded with ads<\/figcaption><\/figure>\n<p style=\"text-align: justify\">The other class of unwanted programs usually means that even the main functionality is questionable. You can think it is similar to poorly-made ones &#8211; and they really are. But the latter are made so they may damage your system unintentionally &#8211; because of low skills or so. Meanwhile, questionable tools expose you to the hazards directly and intentionally. Different driver updaters, system optimizers and other things may <a href=\"https:\/\/threatinfo.net\/articles\/downloader-threat-description\/\">act as trojan-downloaders<\/a>.<\/p>\n<p style=\"text-align: justify\">There are also variants of unwanted programs when they fully represent their naming. Such apps appear on your computer <a href=\"https:\/\/gridinsoft.com\/blogs\/is-vulkanrt-virus\/\">when you don\u2019t expect them<\/a>. Usually, such programs are getting into your system as a part of a bundle. Such a pack of programs may contain whatever &#8211; from full-fledged malware to just such annoying stuff. When it comes while you don\u2019t want it to come &#8211; it is definitely not a good case.<\/p>\n<h3 style=\"text-align: center\">PUA examples:<\/h3>\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<a href=\"https:\/\/threatinfo.net\/files\/DriversFix_Setup.exe-e345d89e01136e84982a83abc00fb362\">DriversFix<\/a><br \/>\n<a href=\"https:\/\/threatinfo.net\/files\/WinCleanerScannerSetup.exe-c32461fd1c248ed3aa1466d4e7c8018e\">WinCleanerScanner<\/a>\n<\/ul>\n<\/div><\/div>\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<a href=\"https:\/\/threatinfo.net\/files\/TabCareCenter.exe-461bc727c8102aabc381ebd8afdabf78\">TabCareCenter<\/a><br \/>\n<a href=\"https:\/\/threatinfo.net\/files\/Uninstall%2BRemo%2BRepair%2BMOV.lnk-6b91a704e3b6dde9bf44016086ab9d19\">Remo Repair MOV<\/a>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<h2 style=\"text-align: center\">Are unwanted programs dangerous?<\/h2>\n<p style=\"text-align: justify\">Depending on the class of such apps, their danger may vary from just annoying you to heavy corruption of your PC. Most of the unwanted programs cannot expose you to any serious threats, but it is still unpleasant to have some of your system elements malfunctioning. Such tools are registry optimizers, system boosters or some utilities for interface modifying. Even though they may have some useful functionality, the way these functions are realized feels like an elephant in the china shop.<\/p>\n<p style=\"text-align: justify\">Much more danger goes from so-called driver updaters and pseudo-antiviruses. Such utilities are also classified as rogue: once being created with a legit purpose, they became a source of problems for users. \u201cDriver updaters\u201d are a nightmare because no one can say for sure where they take those drivers. Hence, you may easily get an outdated one, or what is worse &#8211; malware instead of driver. Malware which is activated on the driver level can control the whole OS &#8211; and be sure, malware developers will never ignore such a chance.<\/p>\n<figure id=\"attachment_62\" aria-describedby=\"caption-attachment-62\" style=\"width: 893px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/santivirus.jpg\" alt=\"sAntivirus PUP\" width=\"903\" height=\"635\" class=\"size-full wp-image-62\" srcset=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/santivirus.jpg 903w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/santivirus-300x211.jpg 300w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/santivirus-768x540.jpg 768w\" sizes=\"(max-width: 903px) 100vw, 903px\" \/><figcaption id=\"caption-attachment-62\" class=\"wp-caption-text\">The example of a pseudo-antivirus &#8211; sAntivirus<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Fake antivirus software is not so dangerous, but makes your PC usage experience as unpleasant as it can even be. They \u201cscan\u201d your computer, and then show you tons of \u201cmalware\u201d it has detected. In fact, all detected items are legit &#8211; it can mark your Photoshop projects as well as files of other antivirus software. Most of such programs will just distract you with continuous notifications, but the vilest ones will even block the detections. Hence, you may even lose access to some of your programs &#8211; just because that \u201cantivirus\u201d decided to block its .exe file.<\/p>\n<h2 style=\"text-align: center\">How to protect your computer from PUP\/PUA?<\/h2>\n<p style=\"text-align: justify\">PUAs are pretty easy to avoid. Fortunately, they are not spread in any sophisticated way, so following some basic rules will minimize the chances of being infected. However, since some PUPs are distributed <a href=\"https:\/\/howtofix.guide\/pornographic-virus-alert-remove\/\">with the use of social engineering<\/a>, it is important to be aware.<\/p>\n<p style=\"text-align: justify\">First and the most effective advice is to stop using untrustworthy\/unofficial sources of software. Those places are full of hacked programs, and bundles &#8211; the most widespread sources of unwanted programs &#8211; are the way to monetize the hackers\u2019 work. And they will not likely check the benevolence of programs they are offering in a bundle. When you have no choice instead of using the hacked app, check the installation window attentively for possible installation options.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A potentially unwanted program, or PUP, is an application that is considered unsafe. In rare cases, the exact app is safe, but there are a lot of alterations that are spread in the Internet and are malicious. Although these programs may carry a real functionality, they can damage your system or your files as well. &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"PUP\/PUA threat description\" class=\"read-more button\" href=\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#more-58\" aria-label=\"More on PUP\/PUA threat description\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[32,1],"tags":[42,41,39,40,43],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PUP\/PUA threat description - Threat Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PUP\/PUA threat description - Threat Info\" \/>\n<meta property=\"og:description\" content=\"A potentially unwanted program, or PUP, is an application that is considered unsafe. In rare cases, the exact app is safe, but there are a lot of alterations that are spread in the Internet and are malicious. Although these programs may carry a real functionality, they can damage your system or your files as well. ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/\" \/>\n<meta property=\"og:site_name\" content=\"Threat Info\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-04T17:10:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-04T17:11:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ThreatInfo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#website\",\"url\":\"https:\/\/threatinfo.net\/articles\/\",\"name\":\"Threat Info\",\"description\":\"All known threats info in one place\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/threatinfo.net\/articles\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png\",\"contentUrl\":\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png\",\"width\":1024,\"height\":566,\"caption\":\"uTorrent was considered an adware-like PUA after being flooded with ads\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#webpage\",\"url\":\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/\",\"name\":\"PUP\/PUA threat description - Threat Info\",\"isPartOf\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#primaryimage\"},\"datePublished\":\"2022-03-04T17:10:25+00:00\",\"dateModified\":\"2022-03-04T17:11:28+00:00\",\"author\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9\"},\"breadcrumb\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/threatinfo.net\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PUP\/PUA threat description\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9\",\"name\":\"ThreatInfo\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g\",\"caption\":\"ThreatInfo\"},\"url\":\"https:\/\/threatinfo.net\/articles\/author\/threatinfo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PUP\/PUA threat description - Threat Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/","og_locale":"en_US","og_type":"article","og_title":"PUP\/PUA threat description - Threat Info","og_description":"A potentially unwanted program, or PUP, is an application that is considered unsafe. In rare cases, the exact app is safe, but there are a lot of alterations that are spread in the Internet and are malicious. Although these programs may carry a real functionality, they can damage your system or your files as well. ... Read more","og_url":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/","og_site_name":"Threat Info","article_published_time":"2022-03-04T17:10:25+00:00","article_modified_time":"2022-03-04T17:11:28+00:00","og_image":[{"url":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"ThreatInfo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/threatinfo.net\/articles\/#website","url":"https:\/\/threatinfo.net\/articles\/","name":"Threat Info","description":"All known threats info in one place","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/threatinfo.net\/articles\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#primaryimage","inLanguage":"en-US","url":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png","contentUrl":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png","width":1024,"height":566,"caption":"uTorrent was considered an adware-like PUA after being flooded with ads"},{"@type":"WebPage","@id":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#webpage","url":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/","name":"PUP\/PUA threat description - Threat Info","isPartOf":{"@id":"https:\/\/threatinfo.net\/articles\/#website"},"primaryImageOfPage":{"@id":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#primaryimage"},"datePublished":"2022-03-04T17:10:25+00:00","dateModified":"2022-03-04T17:11:28+00:00","author":{"@id":"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9"},"breadcrumb":{"@id":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/threatinfo.net\/articles\/pua-threat-description\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/threatinfo.net\/articles\/"},{"@type":"ListItem","position":2,"name":"PUP\/PUA threat description"}]},{"@type":"Person","@id":"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9","name":"ThreatInfo","image":{"@type":"ImageObject","@id":"https:\/\/threatinfo.net\/articles\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g","caption":"ThreatInfo"},"url":"https:\/\/threatinfo.net\/articles\/author\/threatinfo\/"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":71,"url":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/","url_meta":{"origin":58,"position":0},"title":"Adware threat description","date":"April 4, 2022","format":false,"excerpt":"Adware is the name for a vast amount of software that contains advertising. It can be both paid or free, handy or useless, annoying or harmful, but the unifying factor is the presence of advertising within the product. In the context of Internet security, adware brings frustration and inconvenience to\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Adware threat description","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":81,"url":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/","url_meta":{"origin":58,"position":1},"title":"Spyware threat description","date":"April 7, 2022","format":false,"excerpt":"Spyware (spying software) is a term to mark a wide range of computer programs that track user behavior, collect sensitive data, and transfer it somewhere else as their primary purpose or one of the available functions. Some software like modern web browsers, for example, openly and with users' allowance conducts\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Spyware threat description","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":50,"url":"https:\/\/threatinfo.net\/articles\/downloader-threat-description\/","url_meta":{"origin":58,"position":2},"title":"Downloader threat description","date":"March 3, 2022","format":false,"excerpt":"Downloader, or dropper malware is a malware type that is used in a wide range of attacks. The main purpose of this virus type is to deliver the malicious payload to the victim\u2019s PC, additionally defusing the protection mechanisms. Downloader malware threat summary Downloader virus is a malicious script, or\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Dropper malware algorithm","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/dropper-algo.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":29,"url":"https:\/\/threatinfo.net\/articles\/exploit\/","url_meta":{"origin":58,"position":3},"title":"Exploit threat description","date":"February 1, 2022","format":false,"excerpt":"Exploit malware is a pretty new type of malware. Well-known stuff like worms, viruses, spyware or adware have been present since the early \u201900s, one may say - since the late \u201990s. Meanwhile, exploits in their current state appeared in the mid-10\u2019s, after the first ransomware boom. Exploit virus threat\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Exploit threat description","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/02\/what-is-exploit.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/58"}],"collection":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":5,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/58\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/58\/revisions\/65"}],"wp:attachment":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}