Go Back   Cyber Tech Help Support Forums > Software > Malware Removal

Notices

Malware Removal Discussion about Trojans, viruses, hoaxes, firewalls, spyware, and general Security issues. If you suspect your PC is infected with a virus, trojan or spyware app please include any supporting documentation or logs

Closed Topic
 
Topic Tools
  #1  
Old June 19th, 2007, 11:21 PM
AnnMarie's Avatar
AnnMarie AnnMarie is offline
CTH Subscriber
 
Join Date: Oct 2001
O/S: Windows Vista 32-bit
Location: New Zealand
Posts: 59,810
The risks of obtaining and using pirated software

See here

Quote:
Key findings
•25 percent of the Web sites we accessed offering counterfeit product keys, pirated software, key generators or crack tools attempted to install either malicious software or potentially unwanted software. A significant number of these Web sites attempted to install malicious or unwanted code.
•11 percent of the key generators and crack tools downloaded from Web sites contained either malicious or potentially unwanted software.
•59 percent of the key generators and crack tools downloaded from peer-to-peer networks contained either malicious software or potentially unwanted software. A significant amount of malicious or unwanted code was present in the key generators and crack tools.
•The cost of recovering from an incident of malicious software on a single workstation could exceed one thousand dollars (USD). The cost of lost or compromised data could exceed tens of thousands of dollars (USD) per incident. Thus, the cost savings of using pirated software could be eradicated with a single security breach.
•The malicious and unwanted code found is indicative of the shift noted by security professionals in attackers' motivations. Attacks have evolved from hacking for fun to seeking confidential information assets and other malisiouc intent. By offering pirated software, crack tools, and key generators, attackers could lure potential victims.
•There are several methods for obtaining and using counterfeit software, including acquiring counterfeit product keys, obtaining "key generator" programs, and using crack tools to bypass licensing and activation mechanisms. IDC investigated the security risks of visiting the Web sites and peer-to-peer networks that use these methods to distribute counterfeit software.
•Simple Web searches often led to Web sites that offered pirated software, key generators, crack tools, and so on. Furthermore, it was easy to locate key generators and crack tools for Microsoft Windows and the Microsoft Office System.
  #2  
Old June 19th, 2007, 11:22 PM
AnnMarie's Avatar
AnnMarie AnnMarie is offline
CTH Subscriber
 
Join Date: Oct 2001
O/S: Windows Vista 32-bit
Location: New Zealand
Posts: 59,810
Before posting your logs and seeking help in the Cyber Safety Forum, you should know that this site does NOT help anyone we suspect has obtained software illegally and any such topics will be closed without any further discussion. You should also know that some software you may be asked to run will identify pirated software and cracks. Additionally, in the event of a complaint or legal action arising from any message posted by you, we may be forced to reveal your identity (or whatever information we know about you).

Therefore, if your malware problem is the result of an illegal download of a file, software package or crack from a website or using a p2p program, do not waste your time and ours. Our best advice is to reformat and purchase the music, movie, game or program you stole.

In the instance that illegal software was downloaded and installed by a minor, relative or friend - Dad, Mom or Owner, please click here for more information regarding software piracy.
  #3  
Old June 21st, 2017, 08:19 PM
Jintan's Avatar
Jintan Jintan is offline
Cyber Tech Help Moderator
 
Join Date: Dec 2004
Posts: 52,284
Just an update on this subject. Since we are here to help folks, we truly don't want to exclude helping just because folks made some bad choices in the past. So before posting a new request thread, please uninstall any illegal software, and delete any illegal software files.

If we see any in initial scans, we will stop the repair process, to allow the person to remove the illegal software. However, if illegal software still shows in subsequent scan logs, then yes, we will close the request thread. Thanks.
Closed Topic

Bookmarks

Topic Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Topics
Topic Topic Starter Forum Replies Last Post
Need help removing pirated software dmpiano Malware Removal 1 December 19th, 2008 08:51 PM
How can I Identify Pirated software so I can remove it Brunobasser Malware Removal 1 June 6th, 2008 08:30 AM
The truth about pirated software and malware (moved from Cyber Safety Forum) Ben321 Open Discussion 13 February 28th, 2008 10:05 AM
installing pirated software buzzin The Anything Else Board 2 February 26th, 2005 10:38 AM


All times are GMT +1. The time now is 11:39 PM.