Info.com
Posted: July 5, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 1,555 |
---|---|
Threat Level: | 1/10 |
Infected PCs: | 391,023 |
First Seen: | July 5, 2013 |
---|---|
Last Seen: | October 17, 2023 |
OS(es) Affected: | Windows |
Info.com is a search site that's used to expose you to advertisements and affiliated websites that are not necessarily germane to your queries, as well as malicious content that may promote malware. Unlike most search sites, Info.com has a history of being promoted by rootkits, which are high-level security risks that can enact their browser-redirecting attacks without any visible software to clue the victim in to their presence. If you experience redirects to Info.com without your permission, even in cases where they don't happen consistently, SpywareRemove.com malware experts strongly recommend using anti-malware applications to scan your PC and remove any malware related to your Info.com problems. Any significant lag in disinfecting your computer may cause other security issues in the meantime, such as loss of personal information or the installation of new malware.
Info.com: The Ripple of a Drop of Malware in Your Flash Update
The malware most well-known for causing Info.com redirects does set up various means of concealing itself, but can be detected indirectly by its redirects to Info.com, which occur in (on average) one out of every several Web searches. These redirect attacks also may promote other sites besides Info.com, such as BeesQ.net or szshamo.com. Info.com is regarded with especial wariness by SpywareRemove.com malware researchers for being a site that promotes malicious software in its results, although no signs of drive-by-downloads (browser exploits that install malware without your permission) have been seen thus far.
Rootkits providing redirects to Info.com use the ever-popular infection vector of fake Flash updates, which are displayed as pop-up alerts that inform you that Flash is outdated (no matter what version of Flash is installed). Installing this fake update will infect your computer with the rootkit, which deletes its original Trojan dropper and uses a common exploit to conceal itself within svchost.exe – a normal Windows process. SpywareRemove.com malware experts must emphasize that rootkits like the ones promoting Info.com are high-level PC threats that are capable of a variety of security and privacy-compromising attacks against you and your PC.
The Real Info on How to Rollback Info.com's Fake Update
Redirects to Info.com caused by rootkits are enacted through methods that are completely unlike those of a typical Potentially Unwanted Program, malicious browser add-on or even a browser hijacker. The complete cessation of such redirects requires the removal of the rootkit in question, which SpywareRemove.com malware experts recommend deleting with advanced and completely updated anti-malware utilities. To prevent the Info.com-promoting rootkit from interfering, you also may want to consider using extra security steps, such as booting your PC from a flash drive, which will provide your anti-malware software with an ideal scanning environment.
Contact with Info.com, itself, also is strongly unrecommended by SpywareRemove.com malware research team, who have noted that Info.com's results may include additional infection vectors for rogue anti-malware products and similar forms of malware, as well as potential phishing attacks (Web-based attacks that steal information through deceptive requests such as fake surveys).
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.