Sunday, November 17, 2024
HomeAnti VirusAvast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy...

Avast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy and Selling to Its Clients – Google, Microsoft, Pepsi

Published on

Anti-virus software firm Avast reportedly spying hundreds of millions of Users browsing activities including, every click, every purchase you made online, and selling the collected data into various clients that include Home Depot, Google, Microsoft, Pepsi, and McKinsey and many other companies.

Avast is one of the leading security firms with more than 435 million active users per month, and well known for offering Free Anti-Virus software.

The report claims that Avast has collected data from hundreds of millions of users, and then gives that to Jumpshot, a subsidiary of Avast that’s been offering access to user traffic from 100 million devices, including PCs and phones.

- Advertisement - SIEM as a Service

Once the collected data will be handover to the Jumpshot, it repackages the collected data into different products and sells it into various largest companies in the world.

 Avast
Credits: Motherboard

In return, these companies are paid millions of dollars for Jumpsuit products such as “All Clicks Feed,” which tracks user behavior, clicks and other behavior on the internet.

Jumpsuit offers different products that collecting users’ activities data in different ways, for example, a product that focuses on providing the searches that people are making, including what keywords used and which results that were clicked.

This mass data collection activities related to data obtained that reported by the Motherboard and PCMag has including various highly sensitive users behavior and activities including Google searches, lookups of locations and GPS coordinates on Google Maps, people visiting companies’ LinkedIn pages, particular YouTube videos, and people visiting porn websites.

Evidence of these activities shows that Avast also collecting through Jubmsuit including, sensitive searches for pornographic related activities such as underage sex.

“Jumpsuit also offering the data based on the price and how much they are paying for them and supply the URL string to each site visited, the referring URL, the timestamps down to the millisecond, along with the suspected age and gender of the user, which can inferred based on what sites the person is visiting,” PCMag said.

Last year Avast committing data collection activities through its browsers plug and soon after Mozilla, Opera, and Google removed Avast’s and subsidiary AVG’s extensions from their respective browser extension stores.

If you install Avast or AVG products, it throws a popup and asks users that ”  “Mind sharing some data with us? ” and it tells you that the collected data will be de-identified and aggregated as a way to protect your privacy.

  Avast

But there was no clear information that how the same data can be combined with other information to connect your identity to the collected browser history but users always believe that it will protect their privacy.

Still, Data Collection is Ongoing

Avast response this allegation and says that it was stopped sharing the data collected by these extensions to Jumpshot, but the documents say that the data collection is ongoing.

But not through the browser software extension instead, Avast committing massive data collection via its free anti-virus software.

” Despite Avast currently asking users to opt back into the data collection via a pop-up in the antivirus software, multiple Avast users said they did not know that Avast was selling browsing data.”

Journalists contacted the companies that purchased data from Jumpsuit, in response, those companies use information from third-party providers to help improve our business, products, and services.

Jumpshot gave access to Omnicom, a marketing company all click feeds from 14 different countries around the world, including the U.S., England, Canada, Australia, and New Zealand. Omnicom did not respond to the question regarding these activities.

In this case, Microsoft has strongly declined why they have purchased these collected data and also said that they don’t have a current relationship with the company.

Avast declined to answer for so many questions and said that “Because of our approach, we ensure that Jumpshot does not acquire personal identification information, including name, email address or contact details, from people using our popular free antivirus software.” Motherboard said.

Also Read: Avast Hacked – Hackers Gained Network Access Via Avast Own VPN With Compromised Credentials

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...

Beware Of Dating Apps Exposing Your Personal And Location Details To Cyber Criminals

Threat actors often attack dating apps to steal personal data, including sensitive data and...

Europol Concerns Over Privacy Enhancing Technologies Challenge Lawful Interception

A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing...