Current location - Training Enrollment Network - Books and materials - Why should we prohibit the use of pirated software to prevent personal privacy information from being stolen?
Why should we prohibit the use of pirated software to prevent personal privacy information from being stolen?
In order to prevent personal privacy information from being stolen, it is forbidden to use pirated software, because it may be bound by Trojan virus by attackers.

After some pirated software bundles viruses and plug-ins, it will cause all scanned order information to be sent to the software author while serving, so that the user's information will naturally be leaked. After the order information is leaked, most of it will be sold to fraud gangs and marketing gangs by software authors.

At the same time, some viruses and plug-ins have a "back door", which makes it easy for hackers to steal user information, and it is also easy for hackers to enter some data centers through the "back door" to steal user personal information.

Extended data:

Monitoring by Kingsoft Internet Security Center found that some pirated AutoCAD software was cleverly implanted into the back door, and professional drawing companies became prey.

Antivirus software generally focuses on hundreds of startup items of Windows. If the virus modifies the sensitive location, it is easy to trigger the interception alarm of antivirus software. However, the newly discovered CAD virus has changed this conventional understanding. Jinshan security experts pointed out that CAD virus gave the virus author a new revelation: parasitic on professional application software is more conducive to long-term lurking.

A special EXE executable program is implanted in the pirated AutoCAD installation package downloaded from CD or network. When AutoCAD is installed, this EXE will release the CAD plug-in file (extension. Arx) in the support folder of AutoCAD. This arx file is a virus downloader. When AutoCAD is running, the virus will download pilfer date trojan or the back door on the Internet.

Jinshan security experts explained that the characteristics of using AutoCAD to start viruses are very similar to those of Office macro viruses: for example, Word macro viruses modify the template file of Normal.dot.