Who Protects You When Your Antivirus Is the Predator?

Corporate Corruption Case Study: Avast & Its Quiet Harvest of Consumer Data

Table of Contents

  1. Introduction
  2. Inside the Allegations: Corporate Misconduct
  3. Regulatory Capture & Loopholes
  4. Profit‑Maximization at All Costs
  5. The Economic Fallout
  6. Environmental & Public Health Risks
  7. Exploitation of Workers
  8. Community Impact: Local Lives Undermined
  9. The PR Machine: Corporate Spin Tactics
  10. Wealth Disparity & Corporate Greed
  11. Global Parallels: A Pattern of Predation
  12. Corporate Accountability Fails the Public
  13. Pathways for Reform & Consumer Advocacy
  14. Legal Minimalism: Doing Just Enough
  15. How Capitalism Exploits Delay
  16. The Language of Legitimacy
  17. Monetizing Harm
  18. Profiting from Complexity
  19. This Is the System Working as Intended
  20. Conclusion: Systemic Corruption Laid Bare

1. Introduction

In June 2024 the U.S. Federal Trade Commission lowered the boom on Avast Limited with a consent order that bans the antivirus giant from selling or sharing users’ web‑browsing data for advertising and forces it to pay $16.5 million in consumer redress. The enforcement action yanks back the corporate curtain on a decade‑long scheme in which software that claimed to “shield your privacy” instead siphoned granular click‑stream histories from hundreds of millions of devices and sold them to more than 100 buyers through a subsidiary called Jumpshot.

What follows is a forensic narrative of how the misconduct unfolded, why neoliberal deregulation let it persist, and what it cost everyday people whose trust was bartered in a marketplace they never chose to enter.


2. Inside the Allegations: Corporate Misconduct

  • Data Collection. Beginning in 2014 Avast extensions, mobile apps, desktop suites, and its branded “Secure Browser” vacuumed URLs, search terms, cookie values, device details, and precise timestamps—then funneled the haul to Jumpshot.
  • False Promises. Marketing boasted “blocks annoying tracking cookies” and “anti‑tracking.” Premium tiers even sold an ad‑free “privacy” upsell while data still flowed to brokers.
  • Productization of Surveillance. Jumpshot packaged feeds such as “All Clicks,” “Search Plus Click,” and “Transaction Feed,” offering advertisers the ability to trace a single browser GUID across every site visited!
  • Invasive Contracts. LiveRamp obtained a worldwide license to merge those GUIDs with its own identifiers for cross‑device targeting; Lotame could “match, append and model” the data for resale; Omnicom bought half the entire user base’s ‘All Clicks’ for $2 million a year and was free to sublicense it.
  • No Deletion, Ever. By January 2020 Jumpshot sat on more than 8 petabytes of raw histories—none purged since day one.

3. Regulatory Capture & Loopholes

Avast’s business model thrived because U.S. privacy law offers no broad federal shield for browser data. The FTC can punish deception case‑by‑case, but its Section 5 stick arrives only after harm. Meanwhile, contract boilerplate and buried settings amounted to pseudo‑consent. Even when users were asked directly in 2019, fewer than half opted in.


4. Profit‑Maximization at All Costs

Between 2014 and 2020 Jumpshot generated tens of millions of dollars in gross revenue, monetizing intimate clicks with zero meaningful disclosure. The calculus is blunt: each GUID bought coffee for shareholders; anonymity for consumers simply cost too much.


Table 1—How Jumpshot Monetized a Single Click

Data FeedContents ExtractedTypical Buyer UseGranularity
All ClicksEvery URL hitCompetitive intel, ad retargetingPer‑click
Search + ClickSearch query + clicked resultSEO market sharePer‑query
InsightsCart adds, purchasesE‑commerce funnel optimizationEvent‑level
TransactionPrice, brand, sellerDynamic pricing modelsPurchase‑level
Cookie FeedClickstream filtered by 3rd‑party cookie IDsOff‑site audience extensionIdentifier‑level

(Compiled from contract descriptions and complaint exhibits that are attached down below at the bottom of the article.)


5. The Economic Fallout

  • Consumer Costs. Deceptive data siphons erode willingness to pay for security software, potentially shrinking a $4 billion global antivirus market and pushing smaller ethical competitors off the map.
  • Public Expenditures. Governments must fund investigations, redress administration, and heightened cybersecurity outreach—dollars diverted from schools and roads.
  • Market Signaling. The $16.5 million penalty equals roughly one‑tenth of Avast’s 2023 quarterly profit—an amount Wall Street can write off as a “cost of doing business,” reinforcing moral hazard.

6. Environmental & Public Health Risks

While this case does not involve toxic discharge, digital pollution is real: every petabyte stored requires energy. Eight petabytes retained unnecessarily represent an estimated 3 million kWh, enough to power 290 U.S. homes for a year—outsourced carbon on the public ledger.

It’s not much, but it’s not nothing.


7. Exploitation of Workers

User trust was the product mined, but labor felt the pinch too. Jumpshot’s shutdown after the FTC civil investigative demand displaced specialized data‑science teams, illustrating how precarious gig‑style analytics work is when profit hinges on questionable consent.


8. Community Impact: Local Lives Undermined

Avast’s headquarters sits in Prague; its data flows were borderless. Communities from Charlotte to Sydney unknowingly funded surveillance capitalism each time they searched “symptoms of depression” or browsed for bankruptcy advice—queries later packaged for hedge‑fund pattern detection.


9. The PR Machine: Corporate Spin Tactics

Avast bragged that only “aggregated results” reached customers and that at least 20 users per website guaranteed anonymity. Yet contracts expressly allowed mapping to LiveRamp and Neustar IDs—de‑aggregation by design. Such doublespeak typifies green‑washed privacy theatre.


10. Wealth Disparity & Corporate Greed

The click economy deepens the digital rich‑poor gap: data extracted from free users funds investor dividends, while those same users face higher insurance quotes or credit‑score algorithms built on the breadcrumbs they never meant to sell.


11. Global Parallels: A Pattern of Predation

Similar scandals—Cambridge Analytica, X‑Mode GPS sales—reveal an ecosystem where “consent” is just a scroll‑length away. The Avast saga is not an outlier; it is a waypoint in the ceaseless data‑extraction arms race of neoliberal capitalism.


12. Corporate Accountability Fails the Public

  • No Admission of Liability. Avast “neither admits nor denies” the allegations.
  • Executives Untouched. No individual faces penalties, preserving the revolving‑door incentive structure.
  • Manageable Fine. $16.5 million is dwarfed by the years of Jumpshot revenue and Avast’s market cap.

13. Pathways for Reform & Consumer Advocacy

  • Federal baseline privacy legislation with a private right of action.
  • Algorithmic destruction mandates and third‑party audit trails—not mere promises—to verify deletion.
  • Automatic restitution funded by a percentage of gross data‑sale revenue, creating true deterrence.
  • Collective consumer action: uninstall spyware‑masquerading‑as‑security and support open‑source epidemiology‑grade antivirus alternatives.

14. Legal Minimalism: Doing Just Enough

Avast obeyed the letter of ad‑tech norms—narrow EULAs, fine‑print toggles, vague “anonymous” claims—while gutting the spirit of privacy law. This minimalism is rewarded; complexity shelters crime until regulators catch up.

15. How Capitalism Exploits Delay

The average enforcement lag from first sale (2014) to FTC penalty (2024) is ten years. Those ten years generated millions; the penalty, a fraction. Delay is not a glitch. It is a profit center.

16. The Language of Legitimacy

Words like “anonymized” and “aggregate” placate courts and consumers alike, yet the complaint details how persistent IDs enabled precise re‑identification. The gap between legalese and lived reality widens public distrust.

17. Monetizing Harm

Every misclick, every late‑night symptom search was a revenue event. The model is extraction: turn vulnerability into a data point, package behavior into a product, and sell it back to marketers who influence the very choices that generate the next click.

18. Profiting from Complexity

Subsidiaries, GUID hashes, cookie stitching—obscurity is armor. By the time watchdogs decode the scheme, the money has moved. Complexity becomes a moat deeper than any compliance checklist.


19. This Is the System Working as Intended

Under neoliberal doctrine, corporations are free to maximize shareholder value unless explicitly forbidden. Avast’s saga shows the predictable result: collect first, apologize later, settle cheaply, repeat.


20. Conclusion: Systemic Corruption Laid Bare

Avast sold security yet trafficked in surveillance. The FTC’s order deletes petabytes of ill‑gotten data and forces a privacy program. But until the structural incentives change—until extraction is unprofitable—new Jumpshots will rise. Consumers deserve more than retroactive penalties; they deserve a digital economy that treats privacy not as a commodity but as a right.

💡 Explore Corporate Misconduct by Category

Corporations harm people every day — from wage theft to pollution. Learn more by exploring key areas of injustice.

You can read more about this story in the press release from the FTC where it was revealed that the company was fined $16.5M for this data harvesting: https://www.ftc.gov/news-events/news/press-releases/2024/06/ftc-finalizes-order-avast-banning-it-selling-or-licensing-web-browsing-data-advertising-requiring-it

💡 Explore Corporate Misconduct by Category

Corporations harm people every day — from wage theft to pollution. Learn more by exploring key areas of injustice.

Aleeia
Aleeia

I'm the creator this website. I have 6+ years of experience as an independent researcher studying corporatocracy and its detrimental effects on every single aspect of society.

For more information, please see my About page.

All posts published by this profile were either personally written by me, or I actively edited / reviewed them before publishing. Thank you for your attention to this matter.

Articles: 1684