{"id":71,"date":"2022-04-04T17:46:06","date_gmt":"2022-04-04T17:46:06","guid":{"rendered":"https:\/\/threatinfo.net\/articles\/?p=71"},"modified":"2022-04-04T17:53:26","modified_gmt":"2022-04-04T17:53:26","slug":"adware-threat-description","status":"publish","type":"post","link":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/","title":{"rendered":"Adware threat description"},"content":{"rendered":"<p style=\"text-align: justify\">Adware is the name for a vast amount of software that contains advertising. It can be both paid or free, handy or useless, annoying or harmful, but the unifying factor is the presence of advertising within the product.<\/p>\n<p style=\"text-align: justify\">In the context of Internet security, adware brings frustration and inconvenience to users, sneaks into their devices stealthily or via open deception, and most likely exploits users\u2019 ignorance. Adware refers to various types of desktop and mobile software. Its diversity is as wide as the range of programs adware tries to mimic and present itself as. These can be Internet-related applications of all sorts: <a href=\"https:\/\/howtofix.guide\/shieldbrowser-remove\/\" target=\"_blank\" rel=\"noopener\">web browsers<\/a>, browser extensions, image editors, messengers, GPS navigators, etc. Uselessness, pseudo-functionality, and intrusive advertising as their true purpose are the common attributes of such apps.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/browseradware.png\" alt=\"Adware in browser\" width=\"1366\" height=\"720\" class=\"aligncenter size-full wp-image-74\" srcset=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/browseradware.png 1366w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/browseradware-300x158.png 300w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/browseradware-1024x540.png 1024w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/browseradware-768x405.png 768w\" sizes=\"(max-width: 1366px) 100vw, 1366px\" \/><\/p>\n<h2 style=\"text-align: center\">What does adware look like?<\/h2>\n<p style=\"text-align: justify\">Adware is a very flexible and modifiable type of malware. Therefore, you may observe different forms this thing obtains, depending on the severeness and spreading method. The most \u201cclassic\u201d adware is more like any other malware type: it runs as a dubious .exe file in your Task Manager and sits somewhere in the AppData\\Local\\Temp folder. These malware strains are usually the hardest ones. You will likely struggle even to perform a search query &#8211; this thing will redirect you from Google to the page with ads or so.<\/p>\n<p style=\"text-align: justify\">Fortunately, we can conclude that these days such a severe thing is a minor case. More often the situation is an adware module inside of the thing that tries to look like something legit. <a href=\"https:\/\/howtofix.guide\/is-utorrent-safe\/\" target=\"_blank\" rel=\"noopener\">Torrent-trackers<\/a>, pseudo-navigators, network settings management tools &#8211; they may even carry the declared functionality. But simultaneously, you will see the ads on each page you open. Adware payload in those apps can forcibly open your browser to show you another portion of ads &#8211; it will be a very unpleasant experience during a conference of some sort.<\/p>\n<h2 style=\"text-align: center\">Adware classification<\/h2>\n<p style=\"text-align: justify\">Some of the security specialists classify this malware type <a href=\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/\">as potentially unwanted programs (PUPs)<\/a>, not malware. The reason for that is the absence of direct harm coming from adware. Yes, it does parasitize on uneducated users, it does hinder work, but users consent to install adware and, in most cases, can remove it just like any other application. That doesn\u2019t mean it does not endanger users\u2019 systems. On the contrary, it is a real threat. But there is a mediator between adware present on a PC and actual malware harming it &#8211; and it is the human user.<\/p>\n<figure id=\"attachment_61\" aria-describedby=\"caption-attachment-61\" style=\"width: 1014px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png\" alt=\"uTorrent ads\" width=\"1024\" height=\"566\" class=\"size-full wp-image-61\" srcset=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads.png 1024w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads-300x166.png 300w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/utorrent-ads-768x425.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-61\" class=\"wp-caption-text\">uTorrent was considered an adware-like PUA after being flooded with ads<\/figcaption><\/figure>\n<p style=\"text-align: justify\">However, many experts put adware alongside malware, since the disputed software obviously brings unwanted experience and blatantly fools users.<\/p>\n<h2 style=\"text-align: center\">Harm and hazard<\/h2>\n<p style=\"text-align: justify\">Adware does harm and poses a threat. Its presence on the PC is self-evident, but it is reckless to underestimate its danger. Such applications are annoying, and they hinder the normal work process. Additional ad panels and popping-up banners reduce the field of view and block the parts of the viewed websites. Some examples of this virus add non-existent text hyperlinks ad hoc to the viewed websites. Adware PUPs consume resources of the system they inhabit, and users experience considerable loss of running speed as they browse the Internet.<\/p>\n<p style=\"text-align: justify\">The banners and links that malware throws at its victims are unsafe. Adware is a black-market phenomenon, and no law-abiding company would use intrusive advertising to promote its products. Therefore, advertisers who employ these platforms are unscrupulous. Since the victims of such malware are inexperienced at computers and the Internet (otherwise, they would never buy into the malware installation bait,) cybercriminals use adware as a filter. The one who installed it will more likely also click on the malware-related banners.<\/p>\n<figure id=\"attachment_75\" aria-describedby=\"caption-attachment-75\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/RogueBrowserAd.jpg\" alt=\"Malware ad\" width=\"780\" height=\"611\" class=\"size-full wp-image-75\" srcset=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/RogueBrowserAd.jpg 780w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/RogueBrowserAd-300x235.jpg 300w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/RogueBrowserAd-768x602.jpg 768w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><figcaption id=\"caption-attachment-75\" class=\"wp-caption-text\">Malware-related page with a rogue browser page<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Unsafe banners can lead to web pages stuffed with malicious scripts or download links that can infect the victim\u2019s PC with <a href=\"https:\/\/gridinsoft.com\/trojan\" target=\"_blank\" rel=\"noopener\">Trojan horses carrying harmful payloads<\/a>. Credulous users can get their systems infected with coin miners, <a href=\"https:\/\/threatinfo.net\/articles\/downloader-threat-description\/\">downloaders<\/a>, key loggers, backdoors, and the nastiest type of malware \u2013 ransomware. The spyware threat, already mentioned above, can be constituted by the initial adware app or the downloaded files (a consequence of such vile advertising.).<\/p>\n<h2 style=\"text-align: center\">How does adware find its way to its victims\u2019 computers?<\/h2>\n<p style=\"text-align: justify\">There are two main ways adware takes over normal browsing and Internet-related software. The first option is via false advertising and fraud promises of unseen beneficial features of the advertised programs (browsers, browser add-ons, etc.) The second option for adware is to be installed stealthily, unbeknownst to users, as a well-hidden complement to other software.<\/p>\n<h3 style=\"text-align: center\">Adware examples<\/h3>\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<a href=\"https:\/\/threatinfo.net\/files\/Trustzap.exe-4440320749edd6f5c36d00077f0f580f\">TrustZap<\/a><br \/>\n<a href=\"https:\/\/threatinfo.net\/files\/linker.exe-c895050e9ab21f05479e52040dcd093a\">Linker<\/a><br \/>\n<a href=\"https:\/\/threatinfo.net\/files\/tdget.exe-31281ec8e5a4e1e5483882bfef5eb1d0\">Tdget<\/a><br \/>\n<a href=\"https:\/\/threatinfo.net\/files\/Voyasollam.exe-c0a594e2bc24aa614a4040529937a379\">Voyasollam<\/a><br \/>\n<\/div><\/div>\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<a href=\"https:\/\/threatinfo.net\/files\/Plus-Ron.exe-6393719b8cfcd5caef98ad0df9e3b06c\">Plus-Ron<\/a><br \/>\n<a href=\"https:\/\/threatinfo.net\/files\/Quoteex.exe-ec89046b27cd9ab6ef8021871eabe892\">Quoteex<\/a><br \/>\n<a href=\"https:\/\/threatinfo.net\/files\/U-plus.exe-24cf0c10bcf69f2aef319d6faee231a9\">U-plus<\/a><br \/>\n<a href=\"https:\/\/threatinfo.net\/files\/ZaamTax.exe-b5d258028350457f73bc59c04eab8d4c\">ZaamTax<\/a><br \/>\n<\/div><\/div>\n<\/div>\n<h2 style=\"text-align: center\">How to protect yourself?<\/h2>\n<ul>\n<li><strong>Vigilance and safety rules<\/strong>. Double-check advanced options whenever you install programs. Uncheck all tick-boxes that allow installing unnecessary programs. Don\u2019t click on unknown links and don\u2019t open attachments to unexpected emails.<\/li>\n<li><strong>Education<\/strong>. Study what is possible and what is impossible in the modern cyber world. Know that modern browsers such as Google Chrome, Mozilla Firefox, Microsoft Edge, and others already possess all the features adware applications usually promise. As for any applications or browser extensions you want to download, always read users\u2019 feedback on them.<\/li>\n<li><strong>Decent security software<\/strong>. Install an antivirus program \u2013 it will make your life much easier. A proper anti-malware warns you about suspicious webpages and blocks access to overtly dangerous ones. On-run protection function will be the pleasant addition which will make your system much more protected. It detects and removes any infectious agent that might end up on your PC. Choose wisely and you will never have various malware on your PC.<\/li>\n<li><strong>Conscious browsing<\/strong>. Know what you\u2019re up to on the Internet. Don\u2019t allow advertising and clickbait to take over your attention and curiosity. Keep an eye on the latest malware trends &#8211; to know where to expect the tricks from cybercriminals.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Adware is the name for a vast amount of software that contains advertising. It can be both paid or free, handy or useless, annoying or harmful, but the unifying factor is the presence of advertising within the product. In the context of Internet security, adware brings frustration and inconvenience to users, sneaks into their devices &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Adware threat description\" class=\"read-more button\" href=\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#more-71\" aria-label=\"More on Adware threat description\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":77,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[32],"tags":[44,46,45],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Adware threat description - Threat Info<\/title>\n<meta name=\"description\" content=\"Adware is one of the most annoying malware types. However, it may bring not only nasty banners, but some really serious malware to your PC.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adware threat description - Threat Info\" \/>\n<meta property=\"og:description\" content=\"Adware is one of the most annoying malware types. However, it may bring not only nasty banners, but some really serious malware to your PC.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/\" \/>\n<meta property=\"og:site_name\" content=\"Threat Info\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-04T17:46:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-04T17:53:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ThreatInfo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#website\",\"url\":\"https:\/\/threatinfo.net\/articles\/\",\"name\":\"Threat Info\",\"description\":\"All known threats info in one place\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/threatinfo.net\/articles\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png\",\"contentUrl\":\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png\",\"width\":1366,\"height\":768,\"caption\":\"Adware, Malware, Threat description\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#webpage\",\"url\":\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/\",\"name\":\"Adware threat description - Threat Info\",\"isPartOf\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#primaryimage\"},\"datePublished\":\"2022-04-04T17:46:06+00:00\",\"dateModified\":\"2022-04-04T17:53:26+00:00\",\"author\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9\"},\"description\":\"Adware is one of the most annoying malware types. However, it may bring not only nasty banners, but some really serious malware to your PC.\",\"breadcrumb\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/threatinfo.net\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adware threat description\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9\",\"name\":\"ThreatInfo\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g\",\"caption\":\"ThreatInfo\"},\"url\":\"https:\/\/threatinfo.net\/articles\/author\/threatinfo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adware threat description - Threat Info","description":"Adware is one of the most annoying malware types. However, it may bring not only nasty banners, but some really serious malware to your PC.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/","og_locale":"en_US","og_type":"article","og_title":"Adware threat description - Threat Info","og_description":"Adware is one of the most annoying malware types. However, it may bring not only nasty banners, but some really serious malware to your PC.","og_url":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/","og_site_name":"Threat Info","article_published_time":"2022-04-04T17:46:06+00:00","article_modified_time":"2022-04-04T17:53:26+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"ThreatInfo","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/threatinfo.net\/articles\/#website","url":"https:\/\/threatinfo.net\/articles\/","name":"Threat Info","description":"All known threats info in one place","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/threatinfo.net\/articles\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#primaryimage","inLanguage":"en-US","url":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png","contentUrl":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png","width":1366,"height":768,"caption":"Adware, Malware, Threat description"},{"@type":"WebPage","@id":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#webpage","url":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/","name":"Adware threat description - Threat Info","isPartOf":{"@id":"https:\/\/threatinfo.net\/articles\/#website"},"primaryImageOfPage":{"@id":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#primaryimage"},"datePublished":"2022-04-04T17:46:06+00:00","dateModified":"2022-04-04T17:53:26+00:00","author":{"@id":"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9"},"description":"Adware is one of the most annoying malware types. However, it may bring not only nasty banners, but some really serious malware to your PC.","breadcrumb":{"@id":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/threatinfo.net\/articles\/adware-threat-description\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/threatinfo.net\/articles\/"},{"@type":"ListItem","position":2,"name":"Adware threat description"}]},{"@type":"Person","@id":"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9","name":"ThreatInfo","image":{"@type":"ImageObject","@id":"https:\/\/threatinfo.net\/articles\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g","caption":"ThreatInfo"},"url":"https:\/\/threatinfo.net\/articles\/author\/threatinfo\/"}]}},"jetpack_featured_media_url":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png","jetpack-related-posts":[{"id":81,"url":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/","url_meta":{"origin":71,"position":0},"title":"Spyware threat description","date":"April 7, 2022","format":false,"excerpt":"Spyware (spying software) is a term to mark a wide range of computer programs that track user behavior, collect sensitive data, and transfer it somewhere else as their primary purpose or one of the available functions. Some software like modern web browsers, for example, openly and with users' allowance conducts\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Spyware threat description","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":29,"url":"https:\/\/threatinfo.net\/articles\/exploit\/","url_meta":{"origin":71,"position":1},"title":"Exploit threat description","date":"February 1, 2022","format":false,"excerpt":"Exploit malware is a pretty new type of malware. Well-known stuff like worms, viruses, spyware or adware have been present since the early \u201900s, one may say - since the late \u201990s. Meanwhile, exploits in their current state appeared in the mid-10\u2019s, after the first ransomware boom. Exploit virus threat\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Exploit threat description","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/02\/what-is-exploit.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":50,"url":"https:\/\/threatinfo.net\/articles\/downloader-threat-description\/","url_meta":{"origin":71,"position":2},"title":"Downloader threat description","date":"March 3, 2022","format":false,"excerpt":"Downloader, or dropper malware is a malware type that is used in a wide range of attacks. The main purpose of this virus type is to deliver the malicious payload to the victim\u2019s PC, additionally defusing the protection mechanisms. Downloader malware threat summary Downloader virus is a malicious script, or\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Dropper malware algorithm","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/dropper-algo.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":58,"url":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/","url_meta":{"origin":71,"position":3},"title":"PUP\/PUA threat description","date":"March 4, 2022","format":false,"excerpt":"A potentially unwanted program, or PUP, is an application that is considered unsafe. In rare cases, the exact app is safe, but there are a lot of alterations that are spread in the Internet and are malicious. Although these programs may carry a real functionality, they can damage your system\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"sAntivirus PUP","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/santivirus.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/71"}],"collection":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":5,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/71\/revisions"}],"predecessor-version":[{"id":78,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/71\/revisions\/78"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/media\/77"}],"wp:attachment":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/media?parent=71"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/categories?post=71"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/tags?post=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}