Software Company ‘Fines’ Pirates After Monitoring Their Computers

upnorth

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,459
Individuals and companies using 'cracked' copies of graphics software are receiving worrying emails demanding large cash settlements. Information reviewed by TorrentFreak reveals that UK-based company Foundry is demanding thousands of dollars in compensation after unlicensed software 'phoned home' with details of users' alleged offending.

Every year, millions of software packages are downloaded from the Internet. In many cases, people pay for the privilege but in others, users aim to skip expensive licensing fees. Using software without an appropriate license ranges from flat-out simple to relatively complicated. In the case of unprotected software, users simply avoid paying for a license. When DRM techniques are deployed, so-called ‘cracks’ (software tools that circumvent restrictions) are the weapon of choice, activating full packages or upgrading limited demos. In many cases, ‘cracked’ software works like the real deal. In this Internet-connected world, however, some software has the ability to ‘phone home’ to its creators. For those who don’t take precautions (with firewall rules or an isolated offline machine) unexpected consequences could be lying in wait.

This is the case for unauthorized users of software offered by Foundry. The creative minds behind graphics tools including the popular NUKE, Foundry reportedly supplies software to companies including Disney, Sony, and Blizzard. It does not like its software being pirated and is going to fairly extreme lengths to enforce its rights. While many companies monitor torrent swarms for unauthorized sharing, it appears that Foundry prefers a more straightforward approach, by analyzing data sent back from the computers of alleged pirates and then making an approach, which includes an offer to settle for hard cash. Unlike many file-sharing cases where copyright trolls demand a few hundred dollars, pounds, or euros to make a case disappear, Foundry demands much larger sums of money. Documents and emails reviewed by TorrentFreak reveal demands reaching multiple tens of thousands. On top, Foundry also attempts to levy large fees to cover its “investigation costs”, meaning that companies and in some cases regular individuals face punishing bills for what they believed to be a free and consequence-free download. For those who care to read it, Foundry’s EULA appears to cover end-user data harvesting.

While some people are ignoring Foundry’s emails, others who do respond appear to trigger a kind of ‘fishing’ exercise. Foundry licensing compliance officers ask respondents to provide additional details such as IP and MAC addresses of their own machines, apparently to “eliminate people” from their inquiries. Precisely why this information should be provided isn’t made clear but it at least seems possible that Foundry is making an assessment whether software could have been used by an outsider, perhaps utilizing an individual’s WiFi connection without their knowledge.
 
E

Eddie Morra

When DRM techniques are deployed, so-called ‘cracks’ (software tools that circumvent restrictions) are the weapon of choice, activating full packages or upgrading limited demos.

They are also the weapon of choice by threat actors targeting home users, because they know that there's thousands and thousands of people out there who will be actively searching for "working" cracks on various software goods. It's an easy way for attackers to bait home users in.
 

Jimbo791

Level 2
Verified
Jul 23, 2018
69
1/ Always read PP of any software
2/ If you must use cracked software, it will at some point in time bite you.
 
  • Like
Reactions: upnorth

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top