Login

Welcome
Are you a new user?
Register Here





Retrieve Password
print   email   Share

Pirated Television Shows: Malware Hot Spots

A security firm discovered tens of thousands of instances of malware contained in downloads of popular television shows. Cybercriminals are targeting pirated television episodes as a way to spread malware.

The television shows most likely to contain malware are "Game of Thrones," "The Walking Dead" and "Arrow." In 2018, "Game of Thrones," according to the firm, "accounted for 17 percent of all infected pirated content, with 20,934 attacked users." Among those who downloaded episodes of "The Walking Dead," 18,794 were attacked with malware, and 12,163 "Arrow" watchers downloaded malware. The first and last episodes of a season are the most likely to contain malware.

Television shows are available digitally though online streaming and torrents. Because they are often distributed illegally through torrent-trackers and unauthorized streaming platforms, digital television shows provide an opportunity for cybercriminals. Hackers can easily replace television shows with malware-carrying versions on unauthorized sites. Illegally distributed television shows may prompt the user to download a file that claims to contain the episode but in fact contains malware. "Cybercriminals Using Popular TV Shows to Spread Malware" darkreading.com (Apr. 01, 2019).

Commentary

Whether it is pirated television shows or other popular content, cybercriminals will try to capitalize on users' impatience or loyalty to a show by promising episodes before they air or by offering behind-the-scenes content. Do not trust any download that claims to have otherwise unreleased content. Never select links promising early access to an unreleased episode.

Your employer most likely has a policy against downloading any non-work related content. No matter what web addresses you access for work or personal use, always confirm that the web address starts with HTTPS:// and that the URL is accurate. Check the security certificate. Make sure the spelling matches exactly.

Even if you are downloading from a trusted site, check the extension for signs that it could contain malware. In fact, follow this practice anytime you download a file. Legitimate video files should have an .avi, .mkv or .mp4 extension. Never download a file with an .exe extension.

Finally, your opinion is important to us. Please complete the opinion survey:

Today's Workplace

Fighting Cybercrime Starts With Addressing Employee Cyber Negligence

New statistics show the risks associated with employee negligence and cybercrime. We provide the data and provide some best practice steps.

read more

Protecting Privileged Credentials: An Essential Step In Cybersecurity

Organizations must take measures to prevent privileged access credential abuse, the leading cause of data breaches. Read ways to protect these valuable credentials.

read more

CEO And CFO Fraud Creates Exposures For Boards

The SEC finds two Silicon Valley company officers committed a $700 million fraud. What oversight was missing that led to this enormous fraud? We examine.

read more