{"id":81,"date":"2022-04-07T15:37:07","date_gmt":"2022-04-07T15:37:07","guid":{"rendered":"https:\/\/threatinfo.net\/articles\/?p=81"},"modified":"2022-04-08T07:38:24","modified_gmt":"2022-04-08T07:38:24","slug":"spyware-threat-description","status":"publish","type":"post","link":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/","title":{"rendered":"Spyware threat description"},"content":{"rendered":"<p style=\"text-align: justify\">Spyware (spying software) is a term to mark a wide range of computer programs that track user behavior, collect sensitive data, and transfer it somewhere else as their primary purpose or one of the available functions. Some software like modern web browsers, for example, openly and with users&#8217; allowance conducts tracking to improve its performance. Such programs are not considered spyware. Spyware does its work unbeknownst to users, without their consent, and with different consequences.<\/p>\n<p style=\"text-align: justify\">Spyware automatically sends the collected data to the places whence it can be sold or immediately used against the victim. Many interested parties can use the stolen data to improve ad targeting, hack the injured party&#8217;s web accounts, penetrate their systems, blackmail, or racketeer them. The consequences of spyware infections vary. However, even the side effects of these programs&#8217; work determine spyware being most often classified as malware. If spying is only one of the functions of some uninstallable program, that piece of software precisely <a href=\"https:\/\/threatinfo.net\/articles\/pua-threat-description\/\">might be called a potentially unwanted application (PUA)<\/a> instead of malware. But that is rather an exception.<\/p>\n<h2 style=\"text-align: center\">Types of spyware<\/h2>\n<p style=\"text-align: justify\">Spyware can barely be divided into types. Modern examples of this sophisticated malware contain all things that were more typical for separated malware strains. These days, all these nasty things are present together, under the hood of a single malware sample. So don&#8217;t be surprised with seeing things that earlier were listed as a separate malware type.<\/p>\n<h3 style=\"text-align: center\">Keyloggers<\/h3>\n<p style=\"text-align: justify\">That malicious thing records each keystroke you do, including the buttons on system unit and mouse. You may think that such function may not be useful these days, but cybercriminals say contrary. With the help of keylogger, crooks may obtain your passwords even if you use secure software that does not keep your passwords in unprotected form. The ability to get this, and various other information from the hardware makes it pretty useful in spying purposes.<\/p>\n<figure id=\"attachment_83\" aria-describedby=\"caption-attachment-83\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/keylogger-logs.jpg\" alt=\"Keylogger malware logs\" width=\"800\" height=\"571\" class=\"size-full wp-image-83\" srcset=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/keylogger-logs.jpg 800w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/keylogger-logs-300x214.jpg 300w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/keylogger-logs-768x548.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-83\" class=\"wp-caption-text\">Keylogger malware logs<\/figcaption><\/figure>\n<h3 style=\"text-align: center\">Password stealers<\/h3>\n<p style=\"text-align: justify\">As it is clear from the name of this type of spyware, password stealers are targeting passwords and other automatically filled values stored in web browsers. Password stealers can work alongside keyloggers which then allows them to collect passwords ad hoc, right as the user enters them. However, much more often target of this kind of stealers are the programs that store your passwords in an unprotected form. Cybercriminals who design malware know which apps do so, hence, they will not get lost.<\/p>\n<h4 style=\"text-align: center\">Banking Trojans<\/h4>\n<p style=\"text-align: justify\">These spying programs have a lot in common with password stealers. The exception is that banking trojans aim specifically at the finance-related credentials of credit cards, bank accounts, and various digital wallets. They are widespread for both desktop and mobile operating systems. Since almost all people who have a bank account manage their stuff from the application or a website, banking trojans may bring a lot of money to cybercriminals.<\/p>\n<figure id=\"attachment_86\" aria-describedby=\"caption-attachment-86\" style=\"width: 780px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/cronos-banking-trojan.png\" alt=\"Cronos trojan\" width=\"790\" height=\"454\" class=\"size-full wp-image-86\" srcset=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/cronos-banking-trojan.png 790w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/cronos-banking-trojan-300x172.png 300w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/cronos-banking-trojan-768x441.png 768w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-86\" class=\"wp-caption-text\">Logs of Cronos banking trojan<\/figcaption><\/figure>\n<h3 style=\"text-align: center\">Info stealers<\/h3>\n<p style=\"text-align: justify\">Info stealers hunt for certain types of data: usernames and passwords, browser history, log files, documents, and media files. Deploying an info stealer is often a part of massive hacker campaigns. This malware type is considered to be the example of a classic stealer malware. They may aim on some file formats, or even look for a certain file on your disk &#8211; for example, a valuable report or compromising materials.<\/p>\n<h3 style=\"text-align: center\">Trackers<\/h3>\n<p style=\"text-align: justify\">Analysts sometimes call it &#8220;a classic spyware&#8221;. Initially, spyware appeared to&#8230; spy on the victims. Hackers designed it to gather information about the victims&#8217; location, activity hours, personal information, PC configuration, and so on. Such a program alters your web browser&#8217;s settings and collects data that your browser generates and passes through itself. The spyware automatically delivers this data to the offenders who later sell it. In some cases, you can get spyware inside of the other malware &#8211; so-called browser hijackers. Spyware within a browser hijacker usually comes along with <a href=\"https:\/\/threatinfo.net\/articles\/adware-threat-description\">relatively harmless adware<\/a>. As soon as adware reveals its presence in a browser, it should be removed because of the concomitant spyware.<\/p>\n<h2 style=\"text-align: center\">Spyware examples<\/h2>\n<p style=\"text-align: justify\">There were hundreds, or even thousands spyware examples. However, only certain things worth your attention. <a href=\"\/\/howtofix.guide\/trojanwin32-azorultml\/\" target=\"_blank\" rel=\"noopener\">AzorUlt &#8211; Trojan-carried spyware<\/a> usually deployed along with ransomware. It steals finance-related data and might also steal cryptocurrency. Along with the targeted usage, it was also noted as an actor of wide-public attacks with ransomware spreading. However, when we talk about targeted attacks, it is impossible to ignore an Israeli brainchild &#8211; the Pegasus spyware. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pegasus_(spyware)\" rel=\"noopener\" target=\"_blank\">Pegasus is an example<\/a> of so-called &#8220;policeware.&#8221; This kind of spyware is developed for governmental needs, but criminals can also use it. Pegasus runs on iOS and Android portable devices where it can be covertly installed. The program can track calls, steal passwords, and spy on messaging.<\/p>\n<figure id=\"attachment_84\" aria-describedby=\"caption-attachment-84\" style=\"width: 1867px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/pegasus-output.png\" alt=\"Pegasus output\" width=\"1877\" height=\"638\" class=\"size-full wp-image-84\" srcset=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/pegasus-output.png 1877w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/pegasus-output-300x102.png 300w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/pegasus-output-1024x348.png 1024w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/pegasus-output-768x261.png 768w, https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/pegasus-output-1536x522.png 1536w\" sizes=\"(max-width: 1877px) 100vw, 1877px\" \/><figcaption id=\"caption-attachment-84\" class=\"wp-caption-text\">Pegasus spyware output logs<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Vidar &#8211; this Trojan, infiltrating <a href=\"https:\/\/threatinfo.net\/articles\/exploit\/\" rel=\"noopener\" target=\"_blank\">via system vulnerabilities<\/a>, allows criminals to specify the data they want to collect. It can be credit cards numbers or passwords, for example. Vidar can also jeopardize its victims&#8217; digital wallets. It is less widespread than ones I have mentioned above, but is famous for high efficiency.<\/p>\n<h2 style=\"text-align: center\">Harm and threats<\/h2>\n<p style=\"text-align: justify\">Spyware&#8217;s evident harm is systems performance degradation and problems with connectivity. Adware infestation is also possible as a collateral factor. However, the real threat is invisible. <a href=\"https:\/\/gridinsoft.com\/spyware\" target=\"_blank\" rel=\"noopener\">With the help of spyware<\/a>, hackers can steal money from the victim&#8217;s bank account, withdraw cryptocurrency from the wallet, blackmail, stalk, and racketeer the victim (based on gained sensitive materials.) Finally, they can bring to life the worst scenario that encompasses all the menaces of those already mentioned &#8211; identity theft.<\/p>\n<h2 style=\"text-align: center\">How can spyware infect the victim&#8217;s PC<\/h2>\n<p style=\"text-align: justify\">Spyware penetrates systems through system vulnerabilities or human inattentiveness. This happens either unbeknownst to users or via overt deception, but often hackers use both tactics at once. For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zlob_trojan\" rel=\"noopener\" target=\"_blank\">Zlob spyware<\/a> arrives in disguise as an ActiveX codec, but then the user is offered to download a fake anti-spyware program which turns out <a href=\"https:\/\/threatinfo.net\/articles\/downloader-threat-description\/\">to be a Trojan-Downloader<\/a> to bring much more threats to the victim&#8217;s PC.<\/p>\n<figure id=\"attachment_85\" aria-describedby=\"caption-attachment-85\" style=\"width: 634px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware-scheme.gif\" alt=\"Spyware scheme\" width=\"644\" height=\"278\" class=\"size-full wp-image-85\" \/><figcaption id=\"caption-attachment-85\" class=\"wp-caption-text\">Spyware spreading scheme<\/figcaption><\/figure>\n<h2 style=\"text-align: center\">How to protect yourself?<\/h2>\n<p style=\"text-align: justify\">Realize that the Internet is a place where you can encounter fraud and actual harm done to you by malefactors. Make no mistake: just like in the real world &#8211; there are safe and unsafe places on the Web. Most hacker attacks rely on the lack of this understanding.<\/p>\n<p style=\"text-align: justify\">Don&#8217;t follow unchecked links or open attachments to strange emails you have never expected to receive. Examine the sender&#8217;s address and the body of the letter for typos and mistakes that would expose the deception. Try to contact the sender via other channels before you decide to do anything. The same goes for SMS, chats on social media, and messaging applications.<\/p>\n<p style=\"text-align: justify\">Install efficient anti-malware software. It will cover most of the human omissions. A good security program will detect and remove any hidden malware after scanning your computer&#8217;s drives. It will also protect your system from anything being installed thereon in real-time. <a href=\"https:\/\/gridinsoft.com\/spyware-remover\" target=\"_blank\" rel=\"noopener\">Finally, these programs feature<\/a> Internet browsing protection to block dangerous web pages and warn users about questionable ones.<\/p>\n<p style=\"text-align: justify\">Ignore web advertising that offers you anything (most likely a computer program) you never searched for and in which you are not a specialist. If you are still interested, consult an expert or at least read users&#8217; feedback on the solution in question.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spyware (spying software) is a term to mark a wide range of computer programs that track user behavior, collect sensitive data, and transfer it somewhere else as their primary purpose or one of the available functions. Some software like modern web browsers, for example, openly and with users&#8217; allowance conducts tracking to improve its performance. &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Spyware threat description\" class=\"read-more button\" href=\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#more-81\" aria-label=\"More on Spyware threat description\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":90,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[32],"tags":[47,48,49],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Spyware threat description - Threat Info<\/title>\n<meta name=\"description\" content=\"Spyware is a very massive class of malicious programs. Having a large industry of usage, it consumed the features of various other viruses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spyware threat description - Threat Info\" \/>\n<meta property=\"og:description\" content=\"Spyware is a very massive class of malicious programs. Having a large industry of usage, it consumed the features of various other viruses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/\" \/>\n<meta property=\"og:site_name\" content=\"Threat Info\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-07T15:37:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-08T07:38:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ThreatInfo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#website\",\"url\":\"https:\/\/threatinfo.net\/articles\/\",\"name\":\"Threat Info\",\"description\":\"All known threats info in one place\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/threatinfo.net\/articles\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png\",\"contentUrl\":\"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png\",\"width\":1600,\"height\":1000,\"caption\":\"Spyware, Spyware description, Spyware threat description\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#webpage\",\"url\":\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/\",\"name\":\"Spyware threat description - Threat Info\",\"isPartOf\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#primaryimage\"},\"datePublished\":\"2022-04-07T15:37:07+00:00\",\"dateModified\":\"2022-04-08T07:38:24+00:00\",\"author\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9\"},\"description\":\"Spyware is a very massive class of malicious programs. Having a large industry of usage, it consumed the features of various other viruses.\",\"breadcrumb\":{\"@id\":\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/threatinfo.net\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spyware threat description\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9\",\"name\":\"ThreatInfo\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/threatinfo.net\/articles\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g\",\"caption\":\"ThreatInfo\"},\"url\":\"https:\/\/threatinfo.net\/articles\/author\/threatinfo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spyware threat description - Threat Info","description":"Spyware is a very massive class of malicious programs. Having a large industry of usage, it consumed the features of various other viruses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/","og_locale":"en_US","og_type":"article","og_title":"Spyware threat description - Threat Info","og_description":"Spyware is a very massive class of malicious programs. Having a large industry of usage, it consumed the features of various other viruses.","og_url":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/","og_site_name":"Threat Info","article_published_time":"2022-04-07T15:37:07+00:00","article_modified_time":"2022-04-08T07:38:24+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"ThreatInfo","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/threatinfo.net\/articles\/#website","url":"https:\/\/threatinfo.net\/articles\/","name":"Threat Info","description":"All known threats info in one place","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/threatinfo.net\/articles\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#primaryimage","inLanguage":"en-US","url":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png","contentUrl":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png","width":1600,"height":1000,"caption":"Spyware, Spyware description, Spyware threat description"},{"@type":"WebPage","@id":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#webpage","url":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/","name":"Spyware threat description - Threat Info","isPartOf":{"@id":"https:\/\/threatinfo.net\/articles\/#website"},"primaryImageOfPage":{"@id":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#primaryimage"},"datePublished":"2022-04-07T15:37:07+00:00","dateModified":"2022-04-08T07:38:24+00:00","author":{"@id":"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9"},"description":"Spyware is a very massive class of malicious programs. Having a large industry of usage, it consumed the features of various other viruses.","breadcrumb":{"@id":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/threatinfo.net\/articles\/spyware-threat-description\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/threatinfo.net\/articles\/spyware-threat-description\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/threatinfo.net\/articles\/"},{"@type":"ListItem","position":2,"name":"Spyware threat description"}]},{"@type":"Person","@id":"https:\/\/threatinfo.net\/articles\/#\/schema\/person\/7e4b11580d8a3c68ddda8259208a36e9","name":"ThreatInfo","image":{"@type":"ImageObject","@id":"https:\/\/threatinfo.net\/articles\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09b237c3990a96e07661b1248c7a1de2?s=96&d=mm&r=g","caption":"ThreatInfo"},"url":"https:\/\/threatinfo.net\/articles\/author\/threatinfo\/"}]}},"jetpack_featured_media_url":"https:\/\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/spyware.png","jetpack-related-posts":[{"id":29,"url":"https:\/\/threatinfo.net\/articles\/exploit\/","url_meta":{"origin":81,"position":0},"title":"Exploit threat description","date":"February 1, 2022","format":false,"excerpt":"Exploit malware is a pretty new type of malware. Well-known stuff like worms, viruses, spyware or adware have been present since the early \u201900s, one may say - since the late \u201990s. Meanwhile, exploits in their current state appeared in the mid-10\u2019s, after the first ransomware boom. Exploit virus threat\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Exploit threat description","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/02\/what-is-exploit.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":71,"url":"https:\/\/threatinfo.net\/articles\/adware-threat-description\/","url_meta":{"origin":81,"position":1},"title":"Adware threat description","date":"April 4, 2022","format":false,"excerpt":"Adware is the name for a vast amount of software that contains advertising. It can be both paid or free, handy or useless, annoying or harmful, but the unifying factor is the presence of advertising within the product. In the context of Internet security, adware brings frustration and inconvenience to\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Adware threat description","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/04\/torrentadware.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":50,"url":"https:\/\/threatinfo.net\/articles\/downloader-threat-description\/","url_meta":{"origin":81,"position":2},"title":"Downloader threat description","date":"March 3, 2022","format":false,"excerpt":"Downloader, or dropper malware is a malware type that is used in a wide range of attacks. The main purpose of this virus type is to deliver the malicious payload to the victim\u2019s PC, additionally defusing the protection mechanisms. Downloader malware threat summary Downloader virus is a malicious script, or\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"Dropper malware algorithm","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/dropper-algo.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":58,"url":"https:\/\/threatinfo.net\/articles\/pua-threat-description\/","url_meta":{"origin":81,"position":3},"title":"PUP\/PUA threat description","date":"March 4, 2022","format":false,"excerpt":"A potentially unwanted program, or PUP, is an application that is considered unsafe. In rare cases, the exact app is safe, but there are a lot of alterations that are spread in the Internet and are malicious. Although these programs may carry a real functionality, they can damage your system\u2026","rel":"","context":"In &quot;Threat summary&quot;","img":{"alt_text":"sAntivirus PUP","src":"https:\/\/i0.wp.com\/threatinfo.net\/articles\/wp-content\/uploads\/2022\/03\/santivirus.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/81"}],"collection":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":3,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/81\/revisions"}],"predecessor-version":[{"id":88,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/posts\/81\/revisions\/88"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/media\/90"}],"wp:attachment":[{"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/media?parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/categories?post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/threatinfo.net\/articles\/wp-json\/wp\/v2\/tags?post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}