Friday, December 20, 2024
HomeAnti VirusAvast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy...

Avast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy and Selling to Its Clients – Google, Microsoft, Pepsi

Published on

SIEM as a Service

Anti-virus software firm Avast reportedly spying hundreds of millions of Users browsing activities including, every click, every purchase you made online, and selling the collected data into various clients that include Home Depot, Google, Microsoft, Pepsi, and McKinsey and many other companies.

Avast is one of the leading security firms with more than 435 million active users per month, and well known for offering Free Anti-Virus software.

The report claims that Avast has collected data from hundreds of millions of users, and then gives that to Jumpshot, a subsidiary of Avast that’s been offering access to user traffic from 100 million devices, including PCs and phones.

- Advertisement - SIEM as a Service

Once the collected data will be handover to the Jumpshot, it repackages the collected data into different products and sells it into various largest companies in the world.

 Avast
Credits: Motherboard

In return, these companies are paid millions of dollars for Jumpsuit products such as “All Clicks Feed,” which tracks user behavior, clicks and other behavior on the internet.

Jumpsuit offers different products that collecting users’ activities data in different ways, for example, a product that focuses on providing the searches that people are making, including what keywords used and which results that were clicked.

This mass data collection activities related to data obtained that reported by the Motherboard and PCMag has including various highly sensitive users behavior and activities including Google searches, lookups of locations and GPS coordinates on Google Maps, people visiting companies’ LinkedIn pages, particular YouTube videos, and people visiting porn websites.

Evidence of these activities shows that Avast also collecting through Jubmsuit including, sensitive searches for pornographic related activities such as underage sex.

“Jumpsuit also offering the data based on the price and how much they are paying for them and supply the URL string to each site visited, the referring URL, the timestamps down to the millisecond, along with the suspected age and gender of the user, which can inferred based on what sites the person is visiting,” PCMag said.

Last year Avast committing data collection activities through its browsers plug and soon after Mozilla, Opera, and Google removed Avast’s and subsidiary AVG’s extensions from their respective browser extension stores.

If you install Avast or AVG products, it throws a popup and asks users that ”  “Mind sharing some data with us? ” and it tells you that the collected data will be de-identified and aggregated as a way to protect your privacy.

  Avast

But there was no clear information that how the same data can be combined with other information to connect your identity to the collected browser history but users always believe that it will protect their privacy.

Still, Data Collection is Ongoing

Avast response this allegation and says that it was stopped sharing the data collected by these extensions to Jumpshot, but the documents say that the data collection is ongoing.

But not through the browser software extension instead, Avast committing massive data collection via its free anti-virus software.

” Despite Avast currently asking users to opt back into the data collection via a pop-up in the antivirus software, multiple Avast users said they did not know that Avast was selling browsing data.”

Journalists contacted the companies that purchased data from Jumpsuit, in response, those companies use information from third-party providers to help improve our business, products, and services.

Jumpshot gave access to Omnicom, a marketing company all click feeds from 14 different countries around the world, including the U.S., England, Canada, Australia, and New Zealand. Omnicom did not respond to the question regarding these activities.

In this case, Microsoft has strongly declined why they have purchased these collected data and also said that they don’t have a current relationship with the company.

Avast declined to answer for so many questions and said that “Because of our approach, we ensure that Jumpshot does not acquire personal identification information, including name, email address or contact details, from people using our popular free antivirus software.” Motherboard said.

Also Read: Avast Hacked – Hackers Gained Network Access Via Avast Own VPN With Compromised Credentials

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware

Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify...

Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace

Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the...

Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email...

BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes

BADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...

Beware Of Dating Apps Exposing Your Personal And Location Details To Cyber Criminals

Threat actors often attack dating apps to steal personal data, including sensitive data and...