Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Keygen
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Malware keygens== Keygens, available through P2P networks or otherwise, can contain [[Malware|malicious payloads]].<ref name=msir13>{{Cite web|url=http://download.microsoft.com/download/C/1/F/C1F6A2B2-F45F-45F7-B788-32D2CCA48D29/Microsoft_Security_Intelligence_Report_Volume_13_English.pdf|title=Microsoft Security Intelligence Report Volume 13, p14|accessdate=19 August 2024|archive-date=19 August 2024|archive-url=https://web.archive.org/web/20240819024612/http://download.microsoft.com/download/C/1/F/C1F6A2B2-F45F-45F7-B788-32D2CCA48D29/Microsoft_Security_Intelligence_Report_Volume_13_English.pdf|url-status=live}}</ref> These key generators may or may not generate a valid key, but the embedded malware loaded invisibly at the same time may, for example, be a version of [[CryptoLocker#Imitators|CryptoLocker]] ([[ransomware]]).<ref name=eset-cl2>{{cite web|title=Cryptolocker 2.0 β new version, or copycat?|url=http://www.welivesecurity.com/2013/12/19/cryptolocker-2-0-new-version-or-copycat/|work=WeLiveSecurity|date=19 December 2013|publisher=ESET|access-date=18 January 2014|archive-date=22 November 2016|archive-url=https://web.archive.org/web/20161122005648/http://www.welivesecurity.com/2013/12/19/cryptolocker-2-0-new-version-or-copycat/|url-status=live}}</ref><ref name=tm-newcl>{{cite web|title=New CryptoLocker Spreads via Removable Drives|date=26 December 2013|url=http://blog.trendmicro.com/trendlabs-security-intelligence/new-cryptolocker-spreads-via-removable-drives/|publisher=Trend Micro|access-date=18 January 2014|archive-date=4 November 2016|archive-url=https://web.archive.org/web/20161104095631/http://blog.trendmicro.com/trendlabs-security-intelligence/new-cryptolocker-spreads-via-removable-drives/|url-status=live}}</ref> [[Antivirus software]] may discover malware embedded in keygens; such software often also identifies unauthorized keygens which do not contain a payload as [[potentially unwanted software]], often labelling them with a name such as Win32/Keygen or Win32/Gendows.<ref name=msir13/> ===HackTool.Win32.HackAV=== A program designed to assist [[Hacker (computer security)|hacking]] is defined as HackTool.Win32.HackAV or not-a-virus:Keygen from [[Kaspersky Labs]] or as HackTool:Win32/Keygen by [[Microsoft Malware Protection Center]]. According to the ''Microsoft Malware Protection Center'', its first known detection dates back to 16 July 2009.<ref name=msi>{{Cite web |title=HackTool:Win32/Keygen threat description |publisher=Microsoft |website=Microsoft Security Intelligence |date=16 July 2009 |url=https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=HackTool:Win32/Keygen |access-date=18 August 2022 |archive-date=18 August 2022 |archive-url=https://web.archive.org/web/20220818011523/https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=HackTool:Win32/Keygen |url-status=live }} Updated 15 September 2017</ref> The following security threats were most often found on PCs that have been related to these tools: * ''[[Blackhole exploit kit]]'' * ''Win32/Autorun'' * ''Win32/Dorkbot'' * ''Win32/Obfuscator''<ref name=msi/>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)