Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law.

We distinguish several type of software privacy:

  • End user: sing one licensed copy to install a program on multiple computers,copying distrubuting applications for installation, usage of limited versions for an unqualified purpose.
  • Internet : offer of illegal software for download over the Internet. To give you some sample consider a software distribution trought a website that offer the possibility to download the requested files in exchange for uploading another program and so violing your licence agreement in return for other downloads, and becoming a software pirate yourself.Another good example are all those mechanisms to share pirated software using peer-to-peer networks that enable unauthorized transfer of copyrighted programs.
  • Software counterfeiting, copyrighted materials illegally duplicated and sold  to unsuspecting customers who believe they’re acquiring  genuine software.
To give an idea of the dimension of the phenomen let give a look to the BSA study of 2010 and discussed several times during the 2011. Theft of software for personal computers leapt 14 percent globally in 2010 to a commercial value of $59 billion. That total amount has significantly grown during the last years with extraordinary case in  emerging economies that are the really driving forces behind the trend.

Emerging markets contribute for a quote of $32 billion and the main reason is that around 50% of the overall of personal personal in the world went to emerging markets.
What is worrysome is the a few percentage (around 20%) of that has installed unlicensed software. Central/Eastern Europe, Asia-Pacific region and Latin America had the highest piracy rates meanwhile North America had the lowest piracy rate.

In Europe the situation is not so good. rance had the highest rate of financial impact from software piracy, with $2.6 Billion, followed by Germany with $2.1 Billion, Italy with $1.9 Billion, and the United Kingdom with $1.8 Billion in losses.

 

Why distribute piracy software?

Basically the studies have identified 3 main categories of crimes:

  • unintentional crime, people ignore that they’re committing a crime distribuiting a software copy (e.g. users believe buying a single software license but they are authorized to install the applications on multiple pc)
  • criminal organizzations that distribute software to have an economical return.
  • hacking. In this case some fake or altered software version are deployed with the intent to install backdoors or other malware in the final host for several intents.
The impact of piracy on the world economy is impressive and it is difficult to assess the amount of direct losses (e.g. loss of profits for software producers, jobs reduction) and indirect losses (e.g. image brand damage). It has been calculated that a reducing of the piracy rate for PC software by 10 percentage points — 2.5 points per year for four years — would create $142 billion in new economic activity while adding nearly 500,000 new high-tech jobs and generating roughly $32 billion in new tax revenues by 2013. That is amazing.

The phenomenon is of great concern on the security front. For if the end user is encouraged to use piracy software to save license costs and to be able to test any other kind of application it is exposed to the risk of being victim of such malware with dangerous consequences. Software obtained through illegal channels has a good chance of being faulty, impossible to register and so not upgradable  and infected with malwares.

And if I were the victim of an attack of madness and I inconceivable another bad event. If behind the phenomenon of piracy for some applications there were real cyber warfare operations? Distributing pirated copies a government could inject malware or can project a botnet creation plan with the intent to attack specific targets. Pirated software may be a vector privileged, out of control, and well established in many contexts. Consider that with the distrubution of a cracked operating system we now can control a PC but also a mobile device. Through a jailbreak so I could spy on a user who is willing to sacrifice their privacy for installing any application or fashion new features not available in official versions of the software.

As usual … meditate.

Pierluigi Paganini

References

http://portal.bsa.org/piracyimpact2010/studies/piracyimpactstudy2010.pdf

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

3 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

4 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

9 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

20 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

1 day ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

1 day ago

This website uses cookies.