Just sharing some of my inconsequential lunch conversations with you... RSS  

Wednesday, November 01, 2006

The risks of obtaining and using pirated software

I found this article at bink.nu:

This white paper from international market-research firm IDC presents the results of an investigation by IDC into the prevalence of malicious code and unwanted software from Web sites offering counterfeit product keys, pirated software, key generators, or crack tools for Microsoft Windows XP and the Microsoft Office System.

The investigation also examined the presence of malicious code in key generators and crack tools that are available for download from various Web sites and peer-to-peer networks.

The intent of the research was to determine the security risks of obtaining and using pirated software.

Key findings

• 25 percent of the Web sites we accessed offering counterfeit product keys, pirated software, key generators or crack tools attempted to install either malicious software or potentially unwanted software. A significant number of these Web sites attempted to install malicious or unwanted code.

• 11 percent of the key generators and crack tools downloaded from Web sites contained either malicious or potentially unwanted software.

• 59 percent of the key generators and crack tools downloaded from peer-to-peer networks contained either malicious software or potentially unwanted software. A significant amount of malicious or unwanted code was present in the key generators and crack tools.

• The cost of recovering from an incident of malicious software on a single workstation could exceed one thousand dollars (USD). The cost of lost or compromised data could exceed tens of thousands of dollars (USD) per incident. Thus, the cost savings of using pirated software could be eradicated with a single security breach.

• The malicious and unwanted code found is indicative of the shift noted by security professionals in attackers' motivations. Attacks have evolved from hacking for fun to seeking confidential information assets and other malisiouc intent. By offering pirated software, crack tools, and key generators, attackers could lure potential victims.

• There are several methods for obtaining and using counterfeit software, including acquiring counterfeit product keys, obtaining "key generator" programs, and using crack tools to bypass licensing and activation mechanisms. IDC investigated the security risks of visiting the Web sites and peer-to-peer networks that use these methods to distribute counterfeit software.

• Simple Web searches often led to Web sites that offered pirated software, key generators, crack tools, and so on. Furthermore, it was easy to locate key generators and crack tools for Microsoft Windows and the Microsoft Office System.

Nothing new here. My advise to you: if you ever need to retrieve that serial that you lost when you threw away the CD case (it happened to me!), please use an isolated virtual machine and throw away the snapshot.

9 comments:

mary tharpe said...

great sharing! thanks for giving information of pirated software.
software download for pc all software free

Unknown said...

download full verizon store and crack version.

annette cooper said...

thanks for this useful information about using pirated software.
best free portable software

mary tharpe said...

This is risky But Mostly Software are not with spy....
Free Download | Free Software Download

herin woods said...

pirated software are very powerful software. this post is very helpful.
free download latest pc software 2013

Anonymous said...

thanks for sharing your knowledge about pirated software....
Now I can prevent from the pirated Software.......
FREE SOFTWARE DOWNLOAD | PATCH

Paul Allen said...

very useful sharing for pirated software. thanks alot for nice post.
free software download full version with key

Anonymous said...

Nice sharing! thanks to share useful information for using pirated software.
Free Software Download

Unknown said...

Thanks for giving information of pirated software. it's a great sharing!
Full Version Software Download

Development Catharsis :: Copyright 2006 Mário Romano