пятница, 25 мая 2012 г.

Each pirated copy of Windows is dangerous

Microsoft has published the results of studies on the safety of counterfeit distributions of Windows, conducted in early 2011 by Group-IB. Experts analyzed the unlicensed copies of the operating system Microsoft - Windows XP, Windows Vista and Windows 7.
About 25% of disks with counterfeit copies of Windows contain malicious software installed by experts of Group-IB. According to them, 12.5% ​​of the carrier also contains malicious code designed to steal personal user data.

Scanning of the distribution, and later, and installed with a version of the software was carried out by means of multi-vendor anti-virus. This method made it possible to increase the probability of detection of malicious software. Each product was analyzed by experts as the presence of malicious code, and the overall health. The study were unlicensed copies of the operating system, available to Russian users through the main channels of distribution: in the unauthorized retail outlets on physical media (DVD, CD) and online ( torrents and file sharing ).
According to the survey, 94 % of all pirated distributions contain mechanisms to bypass the activation software Windows, potentially affecting the stability of the system. In addition, 7% of all examined copies of the operating system it was found the software directly designed to steal passwords and other personal data.
In 96% of the operating systems Windows, available for download from torrent and file sharing, changed the original code - implemented bypassing the activation of the software that indicates the presence of unwanted or malicious software. Viruses and trojans are present in 6% of the installation files. Most of the detected viruses and Trojans can be used for identity theft. Interestingly, 29% of unlicensed copies of Windows, available for download on file storage, far proved unworkable.
In the case of purchase of counterfeit copies of Windows in the unauthorized retail outlets, the danger of becoming a victim of malicious software, and in fact voluntarily provide personal information to third parties increased by several times. One in four (25 %) of proven experts discs contain malicious software, and 12.5% ​​of drives include software for stealing passwords and personal data. It is noteworthy that CD-ROMs purchased on three markets of Moscow, in some cases turned out to be beta versions of Windows.
... This is a great temptation to have all sorts of crooks and criminals using malware to gain access to this data - says Denis Guz, head of the department to promote the licensing of Microsoft in Russia. - One of the most common methods for implementing these criminal schemes, research shows, is a counterfeit software with its extensive network of sales and millions of potential victims. Microsoft informs users about the risks they incur by installing software on their computers from dubious sources. This is especially true for the operating system, which turns on the computer even before the party has any remedy, which even after the installation is not always possible to recognize the problem initially modified system ...
On the basis of a study Group-IB experts classify the types and ways of accommodating the potential threats arising from the use of pirated distributions:.
• malicious software embedded in the distribution;.
• Malicious software is embedded in the means of activation;.
• availability of the code is not defined as a malicious, anti-virus programs, but potentially performing unauthorized actions in the system.
Particular attention researchers pay to the following fact: the absence of explicit threats with antivirus software pre- test distribution does not guarantee that after you install it will not appear previously undetected malware. At the same time, checking the operating system installed anti-virus tools are not always able to detect the presence of malicious or unwanted software. Consequently, the counterfeit software always contains a high level of risk to the user.
... - Piracy is causing financial loss, not only owners but also users. In 60% of incidents are investigated by our experts, it is unlicensed software was a major cause of system compromise and theft of funds ...







Discuss.