{"id":186344,"date":"2022-03-22T10:54:40","date_gmt":"2022-03-22T09:54:40","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=186344"},"modified":"2025-07-01T20:52:28","modified_gmt":"2025-07-02T03:52:28","slug":"bitrat-trojan-malware-windows-10","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/bitrat-trojan-malware-windows-10\/","title":{"rendered":"BitRAT trojan malware spreads via pirated Windows 10 downloads"},"content":{"rendered":"\n<p>If you\u2019re looking to obtain a pirated copy of <a href=\"https:\/\/windows-10.en.softonic.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Windows 10<\/a>, you may just be setting your device up for the <strong>BitRAT trojan virus<\/strong>. The new cyber attack is available to online criminals for a low amount, and they have the ability to mask it with phishing or other malware distribution channels. For the moment, it only seems to be targeting unofficial Microsoft Windows 10 Pro licenses.<\/p>\n\n\n\n<p>Based on the <strong>Korean characters<\/strong> found in the code, it appears as if the source country is known. To be more specific, cybercriminals seem to be using webhards, which are cloud storage services that many people in South Korea use. Perhaps they\u2019re close to finding the culprits behind BitRAT if they know the location where it was created.<\/p>\n\n\n\n<p>So<strong>, how does the BitRAT trojan malware work?<\/strong> When you download the pirated Windows 10, you\u2019ll receive a file called W10DigitalActiviation.exe. Activating it looks like a standard license activator. However, it actually <strong>downloads malware<\/strong> in the background that infects the system and registry.\u00a0<\/p>\n\n\n\n<p>What it does is <strong>collect information<\/strong> from the computer, which BitRAT sends to the hacker. It can also perform DDoS attacks or bypass the UAC. For more extreme malware actions, it records your keyboard tapping, which means the hacker can spy on your passwords and discussions. It can even go as far as offering complete remote control of your desktop.<\/p>\n\n\n\n<p>With so many malware attacks happening in 2022, it\u2019s imperative that you learn <a href=\"https:\/\/en.softonic.com\/articles\/easy-free-ways-to-be-safe-online\" target=\"_blank\" rel=\"noreferrer noopener\">how to remain safe online<\/a>. Piracy always comes with inherent risks, and it\u2019s always better to <strong>obtain official licenses<\/strong> to safeguard against cybercriminals. Don\u2019t take the chance, and pay for Windows 10 if you need to.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re looking to obtain a pirated copy of Windows 10, you may just be setting your device up for the BitRAT trojan virus. The new cyber attack is available to online criminals for a low amount, and they have the ability to mask it with phishing or other malware distribution channels. For the moment, &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/bitrat-trojan-malware-windows-10\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;BitRAT trojan malware spreads via pirated Windows 10 downloads&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9205,"featured_media":186346,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[2351],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-186344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-app-subdomain-redirectionwindows-10"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/186344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9205"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=186344"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/186344\/revisions"}],"predecessor-version":[{"id":324213,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/186344\/revisions\/324213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/186346"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=186344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=186344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=186344"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=186344"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=186344"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=186344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}