Thursday, December 7, 2023

Avast Anti-Virus Spying Millions of Users Browsing Activities, Every Click, Every Buy and Selling to Its Clients – Google, Microsoft, Pepsi

Anti-virus software firm Avast reportedly spying hundreds of millions of Users browsing activities including, every click, every purchase you made online, and selling the collected data into various clients that include Home Depot, Google, Microsoft, Pepsi, and McKinsey and many other companies.

Avast is one of the leading security firms with more than 435 million active users per month, and well known for offering Free Anti-Virus software.

The report claims that Avast has collected data from hundreds of millions of users, and then gives that to Jumpshot, a subsidiary of Avast that’s been offering access to user traffic from 100 million devices, including PCs and phones.

Once the collected data will be handover to the Jumpshot, it repackages the collected data into different products and sells it into various largest companies in the world.

Credits: Motherboard

In return, these companies are paid millions of dollars for Jumpsuit products such as “All Clicks Feed,” which tracks user behavior, clicks and other behavior on the internet.

Jumpsuit offers different products that collecting users’ activities data in different ways, for example, a product that focuses on providing the searches that people are making, including what keywords used and which results that were clicked.

This mass data collection activities related to data obtained that reported by the Motherboard and PCMag has including various highly sensitive users behavior and activities including Google searches, lookups of locations and GPS coordinates on Google Maps, people visiting companies’ LinkedIn pages, particular YouTube videos, and people visiting porn websites.

Evidence of these activities shows that Avast also collecting through Jubmsuit including, sensitive searches for pornographic related activities such as underage sex.

“Jumpsuit also offering the data based on the price and how much they are paying for them and supply the URL string to each site visited, the referring URL, the timestamps down to the millisecond, along with the suspected age and gender of the user, which can inferred based on what sites the person is visiting,” PCMag said.

Last year Avast committing data collection activities through its browsers plug and soon after Mozilla, Opera, and Google removed Avast’s and subsidiary AVG’s extensions from their respective browser extension stores.

If you install Avast or AVG products, it throws a popup and asks users that ”  “Mind sharing some data with us? ” and it tells you that the collected data will be de-identified and aggregated as a way to protect your privacy.


But there was no clear information that how the same data can be combined with other information to connect your identity to the collected browser history but users always believe that it will protect their privacy.

Still, Data Collection is Ongoing

Avast response this allegation and says that it was stopped sharing the data collected by these extensions to Jumpshot, but the documents say that the data collection is ongoing.

But not through the browser software extension instead, Avast committing massive data collection via its free anti-virus software.

” Despite Avast currently asking users to opt back into the data collection via a pop-up in the antivirus software, multiple Avast users said they did not know that Avast was selling browsing data.”

Journalists contacted the companies that purchased data from Jumpsuit, in response, those companies use information from third-party providers to help improve our business, products, and services.

Jumpshot gave access to Omnicom, a marketing company all click feeds from 14 different countries around the world, including the U.S., England, Canada, Australia, and New Zealand. Omnicom did not respond to the question regarding these activities.

In this case, Microsoft has strongly declined why they have purchased these collected data and also said that they don’t have a current relationship with the company.

Avast declined to answer for so many questions and said that “Because of our approach, we ensure that Jumpshot does not acquire personal identification information, including name, email address or contact details, from people using our popular free antivirus software.” Motherboard said.

Also Read: Avast Hacked – Hackers Gained Network Access Via Avast Own VPN With Compromised Credentials


Latest articles

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Hackers Deliver AsyncRAT Through Weaponized WSF Script Files

The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being...

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles