
But as we can see, attackers simply take advantage of those who download these files. AutoStart registry: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\prun:C:\WINDOWS\PublicGaming\prun.exeĪs previously mentioned, these cases come about because users search for free applications and trust that someone is going to put the cracked or stolen full version online as a gesture of good will.Specifically, the stored data in C:\Users\\AppData\Roaming\services64.exe"' We also observed that information in the browser's credential store was taken by the attacker. The user downloaded a malicious file disguised as a crack installer for the application. One example that we dive into here involves a user who tried to download an unauthorized version of TeamViewer (an app that has actually been used as camouflage for trojan spyware before). We saw users trying to download cracked versions of non-malicious applications that had limited free versions and paid full versions, specifically, TeamViewer (a remote connectivity and engagement solutions app), VueScan Pro (an app for scanner drivers), Movavi Video Editor (an all-in-one video maker), and Autopano Pro for macOS (an app for automated picture stitching). Some users fall into this trap when they search the internet for free or cracked versions of paid applications. These fake installers are not a new technique used by attackers in fact, they are old and widely used lures that trick users into opening malicious documents or installing unwanted applications.

We recently spotted some of these fake installers being used to deliver bundles of malware onto victims’ devices. One way that attackers trick users is by luring them with unauthorized apps or installers carrying malicious payloads. Employees are sometimes unaware of online threats, or are unfamiliar with cybersecurity best practices, and attackers know exactly how to take advantage of this gap in security. Enterprises can also suffer from these individual weak links.


This means that they become typical entry vectors for attacks and common social-engineering targets for hackers. It is widely known that with regard to cybersecurity, a user is often identified as the weakest link.
