Sunday, February 23, 2025
HomeAnti VirusAvast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy...

Avast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy and Selling to Its Clients – Google, Microsoft, Pepsi

Published on

SIEM as a Service

Follow Us on Google News

Anti-virus software firm Avast reportedly spying hundreds of millions of Users browsing activities including, every click, every purchase you made online, and selling the collected data into various clients that include Home Depot, Google, Microsoft, Pepsi, and McKinsey and many other companies.

Avast is one of the leading security firms with more than 435 million active users per month, and well known for offering Free Anti-Virus software.

The report claims that Avast has collected data from hundreds of millions of users, and then gives that to Jumpshot, a subsidiary of Avast that’s been offering access to user traffic from 100 million devices, including PCs and phones.

Once the collected data will be handover to the Jumpshot, it repackages the collected data into different products and sells it into various largest companies in the world.

 Avast
Credits: Motherboard

In return, these companies are paid millions of dollars for Jumpsuit products such as “All Clicks Feed,” which tracks user behavior, clicks and other behavior on the internet.

Jumpsuit offers different products that collecting users’ activities data in different ways, for example, a product that focuses on providing the searches that people are making, including what keywords used and which results that were clicked.

This mass data collection activities related to data obtained that reported by the Motherboard and PCMag has including various highly sensitive users behavior and activities including Google searches, lookups of locations and GPS coordinates on Google Maps, people visiting companies’ LinkedIn pages, particular YouTube videos, and people visiting porn websites.

Evidence of these activities shows that Avast also collecting through Jubmsuit including, sensitive searches for pornographic related activities such as underage sex.

“Jumpsuit also offering the data based on the price and how much they are paying for them and supply the URL string to each site visited, the referring URL, the timestamps down to the millisecond, along with the suspected age and gender of the user, which can inferred based on what sites the person is visiting,” PCMag said.

Last year Avast committing data collection activities through its browsers plug and soon after Mozilla, Opera, and Google removed Avast’s and subsidiary AVG’s extensions from their respective browser extension stores.

If you install Avast or AVG products, it throws a popup and asks users that ”  “Mind sharing some data with us? ” and it tells you that the collected data will be de-identified and aggregated as a way to protect your privacy.

  Avast

But there was no clear information that how the same data can be combined with other information to connect your identity to the collected browser history but users always believe that it will protect their privacy.

Still, Data Collection is Ongoing

Avast response this allegation and says that it was stopped sharing the data collected by these extensions to Jumpshot, but the documents say that the data collection is ongoing.

But not through the browser software extension instead, Avast committing massive data collection via its free anti-virus software.

” Despite Avast currently asking users to opt back into the data collection via a pop-up in the antivirus software, multiple Avast users said they did not know that Avast was selling browsing data.”

Journalists contacted the companies that purchased data from Jumpsuit, in response, those companies use information from third-party providers to help improve our business, products, and services.

Jumpshot gave access to Omnicom, a marketing company all click feeds from 14 different countries around the world, including the U.S., England, Canada, Australia, and New Zealand. Omnicom did not respond to the question regarding these activities.

In this case, Microsoft has strongly declined why they have purchased these collected data and also said that they don’t have a current relationship with the company.

Avast declined to answer for so many questions and said that “Because of our approach, we ensure that Jumpshot does not acquire personal identification information, including name, email address or contact details, from people using our popular free antivirus software.” Motherboard said.

Also Read: Avast Hacked – Hackers Gained Network Access Via Avast Own VPN With Compromised Credentials

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

PriveShield – Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...