{"id":53278,"date":"2025-04-08T06:02:38","date_gmt":"2025-04-08T10:02:38","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53278"},"modified":"2025-04-08T06:02:38","modified_gmt":"2025-04-08T10:02:38","slug":"what-happens-if-you-download-cracked-program","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/what-happens-if-you-download-cracked-program\/53278\/","title":{"rendered":"What happens if you download a cracked program?"},"content":{"rendered":"<p>What do you do when you need a program but can\u2019t buy an official license yet? Correct answer: <em>\u201cUse the trial version\u201d<\/em> or <em>\u201cFind a free alternative.\u201d<\/em> Wrong answer: <em>\u201cSearch online for a cracked version.\u201d<\/em><\/p>\n<p>Sketchy alternative sources are known to offer cracked versions of software, along with <em>other goodies<\/em>. After wading through sites stuffed with ads, you may get the program you want (usually minus the future updates and network functionality), but with a miner, stealer, or whatever else thrown in for good measure.<\/p>\n<p>Based on real-world examples, we explain why you should avoid sites that offer instant downloads of in-demand programs.<\/p>\n<h2>Miner and stealer on SourceForge<\/h2>\n<p>SourceForge was once the largest site for all things open source, the forerunner of GitHub. But don\u2019t think that SourceForge is dead \u2013 today it provides software hosting and distribution services. Its software portal hosts multiple projects, uploaded by anyone who wants to.<\/p>\n<p>And, <a href=\"https:\/\/www.kaspersky.com\/blog\/malicious-code-in-github\/53085\/\" target=\"_blank\" rel=\"noopener nofollow\">as with GitHub<\/a>, it\u2019s this cosmopolitanism that is a barrier to high-level security. Let\u2019s take just one example: our experts found a project called <em>officepackage<\/em> on SourceForge. At first glance, it looks harmless: a clear description, no-nonsense name, even a positive review.<\/p>\n<div id=\"attachment_53284\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/08053012\/what-happens-if-you-download-cracked-program-01.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53284\" class=\"size-large wp-image-53284\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/08053012\/what-happens-if-you-download-cracked-program-01-1024x586.png\" width=\"1024\" height=\"586\"><\/a><p id=\"caption-attachment-53284\" class=\"wp-caption-text\">\u201cOfficepackage\u201d page on SourceForge<\/p><\/div>\n<p>But what if we told you that the description and files were copied outright from an unrelated project on GitHub? Alarm bells are already ringing. That said, no malware lands on your computer when you click the <strong>Download<\/strong> button \u2013 the project is apparently clean. Apparently, because the malicious payload was not distributed directly through the <em>officepackage<\/em> project, but through the web page associated with it. How is this possible?<\/p>\n<p>The fact is that every project created on SourceForge gets its own domain name and hosting on <em>sourceforge.io<\/em>. So a project named <em>officepackage<\/em> is given a web page at <em>officepackage.sourceforge[.]io. <\/em>Such pages are easily indexed by search engines and rank high in search results. This is how attackers attract victims.<\/p>\n<p>When visiting <em>officepackage.sourceforge[.]io<\/em> from a search engine brought users to a page offering downloads of almost any version of the Microsoft Office suite. But, as ever, the devil was in the detail: when you hovered over the <strong>Download<\/strong> button, the browser\u2019s status bar showed a link to <em>https[:]\/\/loading.sourceforge[.]io\/download<\/em>. Spotted the trap? The new link has nothing to do with <em>officepackage<\/em>; <em>loading<\/em> is an entirely different project.<\/p>\n<div id=\"attachment_53283\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/08052909\/what-happens-if-you-download-cracked-program-02.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53283\" class=\"size-large wp-image-53283\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/08052909\/what-happens-if-you-download-cracked-program-02-1024x552.png\" width=\"1024\" height=\"552\"><\/a><p id=\"caption-attachment-53283\" class=\"wp-caption-text\">The \u201cDownload\u201d button on the \u201cofficepackage\u201d page of the SourceForge software portal leads to a completely different project<\/p><\/div>\n<p>And after clicking, users were redirected not to the page of the <em>loading<\/em> project, but to another intermediary site with another <strong>Download<\/strong> button. And only after clicking this did the user, weary of surfing, finally receive a file \u2013 an archive named <em>vinstaller.zip<\/em>. Inside was another archive, and inside this second archive was a malicious Windows Installer.<\/p>\n<p>At the heart of this evil nesting doll were two nasties: instead of Microsoft products, a miner and ClipBanker \u2013 malware for substituting crypto wallet addresses in the clipboard \u2013 were let loose on the victim\u2019s device after running the installer. Details of the infection scheme can be found in the <a href=\"https:\/\/securelist.com\/miner-clipbanker-sourceforge-campaign\/116088\/\" target=\"_blank\" rel=\"noopener\">full version of the study on our Securelist blog<\/a>.<\/p>\n<h2>Malicious TookPS installer disguised as legitimate software<\/h2>\n<p>Cybercriminals do not limit themselves to SourceForge and <a href=\"https:\/\/www.kaspersky.com\/blog\/beware-github-malicious-links\/51203\/\" target=\"_blank\" rel=\"noopener nofollow\">GitHub<\/a>. In another recent case unearthed by our experts, attackers were found distributing the malicious TookPS downloader, <a href=\"https:\/\/www.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/53116\/\" target=\"_blank\" rel=\"noopener nofollow\">already familiar to us from the fake DeepSeek and Grok clients<\/a>, through fake websites offering free downloads of specialized software. We discovered a whole series of such sites offering users <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/crack\/\" target=\"_blank\" rel=\"noopener\">cracked versions<\/a> of UltraViewer, AutoCAD, SketchUp and other popular professional software, meaning that the attack was not only aimed at home users, but also at professional freelancers and organizations. Other malicious files detected included the names <em>Ableton.exe<\/em> and <em>QuickenApp.exe<\/em>, purported versions of the popular music creation and money management applications.<\/p>\n<div id=\"attachment_53282\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/08052742\/what-happens-if-you-download-cracked-program-03.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53282\" class=\"size-large wp-image-53282\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/08052742\/what-happens-if-you-download-cracked-program-03-1024x480.png\" alt=\"Fake pages distributing TookPS\" width=\"1024\" height=\"480\"><\/a><p id=\"caption-attachment-53282\" class=\"wp-caption-text\">Fake pages distributing TookPS<\/p><\/div>\n<p>By circuitous means, the installer downloaded <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/backdoor\/\" target=\"_blank\" rel=\"noopener\">two backdoors<\/a> to the victim\u2019s device: <strong>Backdoor.Win32.TeviRat<\/strong> and <strong>Backdoor.Win32.Lapmon<\/strong>. See another <a href=\"https:\/\/securelist.com\/tookps\/116019\/\" target=\"_blank\" rel=\"noopener\">Securelist post<\/a> to find out exactly how the malware was delivered to the victim\u2019s device. The malware gave the attackers full access to the victim\u2019s computer.<\/p>\n<h2>How to protect yourself<\/h2>\n<p>First, do not download pirated software. Under any circumstances. Ever. A cracked program may be temptingly free and instantly available, but the price you pay will be measured not in money, but in data \u2013 your data. And no, that doesn\u2019t mean family photos and chats with friends. Cybercriminals are after your crypto wallets, payment card details, account passwords \u2013 and even your computer\u2019s resources for cryptocurrency mining.<\/p>\n<p>Here\u2019s a list of rules we recommend for anyone who uses SourceForge, <a href=\"https:\/\/www.kaspersky.com\/blog\/beware-github-malicious-links\/51203\/\" target=\"_blank\" rel=\"noopener nofollow\">GitHub<\/a> and other software portals.<\/p>\n<ul>\n<li>If you can\u2019t buy the full version of an application, <strong>use alternatives or trial versions, not cracked software<\/strong>. You might not get the full functionality, but at least your device is <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">guaranteed<\/a>\u00a0to be safe.<\/li>\n<li><strong>Only download programs from trusted sources. <\/strong>As SourceForge and <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/github\/\" target=\"_blank\" rel=\"noopener nofollow\">GitHub<\/a> practice shows, even then you should proceed with caution and <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">scan all downloaded files with an antivirus<\/a>.<\/li>\n<li><strong>Protect your cryptocurrency and banking data with <a href=\"https:\/\/www.kaspersky.com\/lp\/crypto-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team______\" target=\"_blank\" rel=\"noopener nofollow\">reliable tools<\/a>. <\/strong>Treat virtual wallets with the same reverence as physical ones.<\/li>\n<\/ul>\n<blockquote><p><em>Further reading in support of not downloading pirated software:<\/em><\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/malware-in-pirated-games-2021\/41352\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>The dangers of pirated games<\/em><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/nullmixer-trojan-dropper\/45723\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>NullMixer: multiple malware in one<\/em><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/miner-xmrig-delivered-via-torrents\/53061\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>XMRig miner as a New Year\u2019s gift<\/em><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/beware-github-malicious-links\/51203\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Malware lurking in \u201cofficial\u201d GitHub and GitLab links<\/em><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-generic\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"premium-crypto-generic\" value=\"47975\">\n","protected":false},"excerpt":{"rendered":"<p>Spoiler: nothing good. Along with pirated software, you&#8217;ll probably pick up a miner, stealer, or backdoor. <\/p>\n","protected":false},"author":2706,"featured_media":53279,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[1449,4635,2756,1521,3244,723],"class_list":{"0":"post-53278","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-backdoors","9":"tag-cryptocurrency","10":"tag-miners","11":"tag-pirates","12":"tag-stealers","13":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-happens-if-you-download-cracked-program\/53278\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-happens-if-you-download-cracked-program\/28740\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-happens-if-you-download-cracked-program\/23981\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/what-happens-if-you-download-cracked-program\/12360\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-happens-if-you-download-cracked-program\/28857\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-happens-if-you-download-cracked-program\/28026\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-happens-if-you-download-cracked-program\/30869\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-happens-if-you-download-cracked-program\/29571\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-happens-if-you-download-cracked-program\/39345\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-happens-if-you-download-cracked-program\/13248\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-happens-if-you-download-cracked-program\/22697\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-happens-if-you-download-cracked-program\/23582\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-happens-if-you-download-cracked-program\/32057\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-happens-if-you-download-cracked-program\/29009\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-happens-if-you-download-cracked-program\/34804\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-happens-if-you-download-cracked-program\/34436\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/pirates\/","name":"pirates"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53278"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53278\/revisions"}],"predecessor-version":[{"id":53281,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53278\/revisions\/53281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53279"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}