top of page

What is Adware?

  • Writer: Rolando Ramos
    Rolando Ramos
  • Nov 21
  • 2 min read

Updated: Dec 6


Threat Type: Adware


Threat Category: Malware-Based Threat


Cyber Threat Indicators


Adware is software that automatically displays, shows, or downloads advertisements on a user's computer, tablet, or mobile device.


While some adware is considered legitimate (when bundled with free software and explicitly disclosed to the user), the term is most often associated with Potentially Unwanted Programs (PUPs) or malicious software that displays intrusive, unauthorized, or excessive advertisements.


Adware is primarily designed to generate revenue for its developer or distributor through various means, such as:


  • Pay-per-click (PPC): Earning money each time a user clicks on an ad.


  • Pay-per-view (PPV): Earning money simply for displaying the ad.


  • Data sales: Collecting and selling user data and browsing habits to third parties for targeted advertising.


Core Characteristics


Intrusive Advertising: The most noticeable trait is the constant and unsolicited display of ads, often in the form of pop-ups, new browser windows, full-screen ads, or advertisements injected into legitimate websites. These ads disrupt the normal user experience.


Unauthorized System Changes (Browser Hijacking): Adware frequently alters web browser settings without the user's permission. This can include:


  • Changing the default homepage or search engine.


  • Installing new, unwanted browser extensions, plugins, or toolbars.


  • Redirecting searches or website visits to specific, advertising-laden sites.


Data Collection (Spyware Functionality): Many adware programs include features to track and record a user's online activities, such as browsing history, search queries, and general usage patterns. This data is collected to serve more tailored and effective advertisements, essentially giving the adware the functionality of spyware.


System Performance Degradation: The continuous running of ad-displaying and data-collecting processes consumes significant system resources (CPU, memory, and network bandwidth). This often leads to a noticeable slowdown in the computer's speed, sluggish internet browsing, and increased device crashes.


Stealthy Installation: Malicious adware typically installs without the user's explicit consent or knowledge, often by hiding deep within a legitimate software package.


Common Examples and Tactics


Software Bundling adware is packaged with legitimate, free, or shareware applications (often games, file managers, or media players). The user installs the main program and unknowingly consents to the adware, typically hidden within the fine print of the installation agreement or disguised as an "optional extra" that's hard to uncheck.


Drive-by Downloads simply visiting a compromised or malicious website can trigger the download and installation of adware, exploiting vulnerabilities in the web browser or its plug-ins without any active click from the user.


Deceptive Pop-ups fake security alerts, system warnings, or "required" software updates that trick users into clicking and installing the adware, often referred to as scareware.


Malvertising injecting malicious code into legitimate online advertising networks. When a user sees or clicks a seemingly harmless banner ad on a trusted site, they are redirected to a hostile page that installs the adware.


---


VIIEGO the human security agency for human security research and consulting in identity manipulation and fraud prevention to decode human behavior and secure your identity.


www.viiego.com | Protect What's Yours.

How Can We Help?

VIIEGO

bottom of page