Thursday, May 15, 2025
HomeAnti VirusAvast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy...

Avast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy and Selling to Its Clients – Google, Microsoft, Pepsi

Published on

SIEM as a Service

Follow Us on Google News

Anti-virus software firm Avast reportedly spying hundreds of millions of Users browsing activities including, every click, every purchase you made online, and selling the collected data into various clients that include Home Depot, Google, Microsoft, Pepsi, and McKinsey and many other companies.

Avast is one of the leading security firms with more than 435 million active users per month, and well known for offering Free Anti-Virus software.

The report claims that Avast has collected data from hundreds of millions of users, and then gives that to Jumpshot, a subsidiary of Avast that’s been offering access to user traffic from 100 million devices, including PCs and phones.

- Advertisement - Google News

Once the collected data will be handover to the Jumpshot, it repackages the collected data into different products and sells it into various largest companies in the world.

 Avast
Credits: Motherboard

In return, these companies are paid millions of dollars for Jumpsuit products such as “All Clicks Feed,” which tracks user behavior, clicks and other behavior on the internet.

Jumpsuit offers different products that collecting users’ activities data in different ways, for example, a product that focuses on providing the searches that people are making, including what keywords used and which results that were clicked.

This mass data collection activities related to data obtained that reported by the Motherboard and PCMag has including various highly sensitive users behavior and activities including Google searches, lookups of locations and GPS coordinates on Google Maps, people visiting companies’ LinkedIn pages, particular YouTube videos, and people visiting porn websites.

Evidence of these activities shows that Avast also collecting through Jubmsuit including, sensitive searches for pornographic related activities such as underage sex.

“Jumpsuit also offering the data based on the price and how much they are paying for them and supply the URL string to each site visited, the referring URL, the timestamps down to the millisecond, along with the suspected age and gender of the user, which can inferred based on what sites the person is visiting,” PCMag said.

Last year Avast committing data collection activities through its browsers plug and soon after Mozilla, Opera, and Google removed Avast’s and subsidiary AVG’s extensions from their respective browser extension stores.

If you install Avast or AVG products, it throws a popup and asks users that ”  “Mind sharing some data with us? ” and it tells you that the collected data will be de-identified and aggregated as a way to protect your privacy.

  Avast

But there was no clear information that how the same data can be combined with other information to connect your identity to the collected browser history but users always believe that it will protect their privacy.

Still, Data Collection is Ongoing

Avast response this allegation and says that it was stopped sharing the data collected by these extensions to Jumpshot, but the documents say that the data collection is ongoing.

But not through the browser software extension instead, Avast committing massive data collection via its free anti-virus software.

” Despite Avast currently asking users to opt back into the data collection via a pop-up in the antivirus software, multiple Avast users said they did not know that Avast was selling browsing data.”

Journalists contacted the companies that purchased data from Jumpsuit, in response, those companies use information from third-party providers to help improve our business, products, and services.

Jumpshot gave access to Omnicom, a marketing company all click feeds from 14 different countries around the world, including the U.S., England, Canada, Australia, and New Zealand. Omnicom did not respond to the question regarding these activities.

In this case, Microsoft has strongly declined why they have purchased these collected data and also said that they don’t have a current relationship with the company.

Avast declined to answer for so many questions and said that “Because of our approach, we ensure that Jumpshot does not acquire personal identification information, including name, email address or contact details, from people using our popular free antivirus software.” Motherboard said.

Also Read: Avast Hacked – Hackers Gained Network Access Via Avast Own VPN With Compromised Credentials

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled

Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows...

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild

Google has rolled out a fresh Stable Channel update for the Chrome browser across...

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Bluetooth Core 6.1 Released – What’s New!

Bluetooth SIG’s decision to transition to a bi-annual release cadence marks a strategic pivot...

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus...

Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and...