
Free PDF software EPI PDF Editor includes deceptive practices and does not perform its advertised converter function but hijacks browsers, which makes it a potentially unwanted program (PUP), according to McAfee's latest insights. Â
Free PDF tools, such as EPI PDF Editor, often bundle unwanted applications during installation, including toolbars, browser extensions, and even replacement search engines.Â
These actions are typically pre-selected in installation prompts, silently altering browser settings or running hidden processes on the user's device.Â
For example, McAfee's analysis highlighted how EPI PDF Editor disguises itself as a PDF converter, but the tool’s Privacy Policy and Terms say it operates as a web browser.Â
Further investigation revealed privacy policy conflicts and opt-out settings, such as pre-selected checkboxes to "import browser settings."Â
When the installation is complete, a Chromium-based browser opens with PDF actions that do not work, but it allows internet browsing by opening other tabs.
These hidden extras not only slow down system performance but also pose significant risks to user privacy, including unauthorized data collection and disclosure. Â
These PUPs may not qualify as traditional malware, but their intrusive nature can degrade user experience and potentially expose sensitive information. The deceptive bundling of browser hijackers and background apps creates avenues for data exploitation. Â
In April, TechNadu reported on a Trojanized npm package posing as PDF converter that compromised Atomic and Exodus wallets.
To protect against risks associated with free PDF tools, experts recommend the following steps:
Staying informed about these tactics and being vigilant during installations can help users bypass the dangers of EPI PDF Editor scams and other deceptive tools. Always think twice before you click "Next."