logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
Crypto currency is mined by malware from cracked versions of popular software

Why pirated software is risky, and why you should always use licensed programs

[et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.4.6″ custom_padding=”||8px|||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″]

When you’re on a tight budget, it’s tempting to want to find a free version of the software you need. But it’s long been known that using pirated versions of popular software can put your computer at risk of getting malware. The discovery of a new “cryptojacking” virus is a good reminder that you should stick with using properly licensed software.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″]

How do attackers make pirated versions of popular software?

Most legitimate desktop software that isn’t free (including paid versions of freemium software) uses some form of “rights management” to detect whether you have paid for the full product or not. This ability to control access can involve very complex methods, including the use of digital signatures.

However, digital rights management or DRM has technical limitations just like any other security feature. So, attackers wanting to make money from “cracking” these restrictions spend a lot of time and money figuring out those limitations. Once they do, they can create a “free” version, and then add their own “package” to it, which can be effectively “invisible” when installed by a victim.

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_image src=”https://clickarmor.ca/wp-content/uploads/2021/06/crypto-currency-art-rachen-yJpjLD3c9bU-unsplash.jpg” alt=”supply chain factory” title_text=”crypto-currency-art-rachen-yJpjLD3c9bU-unsplash” show_in_lightbox=”on” _builder_version=”4.8.2″ width=”100%”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″ hover_enabled=”0″ sticky_enabled=”0″]

The latest threat from pirated software

Once you install pirated software on your computer, it will begin to look for ways to “turn off” your current anti-malware software, so it can do more devious things. The challenge of turning off security software is often as complicated as cracking the DRM licensing restrictions, but it is possible. If the attacker can turn off the security software on your system, then they can install other dangerous “packages” such as keyloggers or “rootkits”, which can take full control of your computer without you even knowing it.

Now, there is a “cryptominer” called “Crackonosh”, which is designed to turn your extra computing power into cryptomining software that creates currency for the attacker (using your CPU and memory capacity). So far, it’s reported that over $2 million worth of Moneris cryptocoin currency has been mined through this kind of attack, victimizing users of “cracked” software.

Avoid using “cracked” versions of software  to reduce risks from malware and cryptojacking

Never download and install software that you know is intentionally bypassing licensing restrictions, just so you can save money. In the end, you’ll likely get an immediate malware infection, plus your security software will likely be disabled, putting you at risk from other kinds of infections and attacks.

Security software has its limitations. So, it’s important to use caution and use legitimate software at all times.

If your team could use some new, engaging security awareness training and practice, you may be interested in checking out Click Armor’s gamified security awareness platform. It can provide immediate, measurable impacts on employee proficiency, and improve security culture.

Contact us to learn more.

 

Photo by Art Rachen on Unsplash

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]

Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use