{"id":65803,"date":"2017-07-20T10:31:00","date_gmt":"2017-07-20T17:31:00","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=65803"},"modified":"2020-10-15T12:17:09","modified_gmt":"2020-10-15T19:17:09","slug":"why-bittorrent-sites-are-a-malware-cesspool","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/","title":{"rendered":"Why BitTorrent Sites Are a Malware Cesspool"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-68254\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Malware-Cesspool.jpg\" alt=\"Why BitTorrent Sites are a Malware Cesspool\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Malware-Cesspool.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Malware-Cesspool-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Malware-Cesspool-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Often when people hear &#8220;BitTorrent,&#8221; they assume it&#8217;s illegal and dangerous. While it can be used as a perfectly legitimate system for <a href=\"http:\/\/www.techsupportalert.com\/content\/finding-legal-and-free-torrents.htm\" target=\"_blank\" rel=\"noopener noreferrer\">sharing files<\/a>, <a href=\"https:\/\/www.resilio.com\/individuals\/?utm_source=homepage&amp;utm_medium=btsync\" target=\"_blank\" rel=\"noopener noreferrer\">syncing files<\/a>, and\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/\" target=\"_blank\" rel=\"noopener noreferrer\">messaging<\/a>\u2014in fact, I use it myself every day\u2014BitTorrent sites in general have a bad rap, but why is that? One word: Malware.<\/p>\n<p>A lot of apps available through BitTorrent websites are paid products that have either been cracked or that come with a crack that turns it into a fully functional application, without having to pay a penny. &#8220;Cracked&#8221; software means it has been modified to bypass the registration process or unlock paid-only functionality, so it can be used without paying anything for it. In many cases, demo or trial versions of apps are cracked, so they are extended indefinitely, and the licensing process is cracked to accept any details as valid, or the software may come with a key generator that spits out a name and password that can be used to unlock it.<\/p>\n<p>These cracks, patches, and key generators are also more often than not the source of malware and, in some cases, the software itself has been modified to deliver malware.<\/p>\n<h3>Is BitTorrent safe to use?<\/h3>\n<p>The short answer is that the BitTorrent program itself is relatively safe, but like any software that connects to the Internet, it is susceptible to attacks. However, do not confuse the safety of peer-to-peer programs like BitTorrent with the files that are shared through those programs. These files are the real threat. But are some of them safe?<\/p>\n<h3>How safe are\u00a0files shared through BitTorrent?<\/h3>\n<p>To find out the risks of\u00a0BitTorrent and whether or not files shared through the program\u00a0are as bad as its reputation is made out to be,\u00a0I browsed a few BitTorrent sites and downloaded the popular software they had available (strictly for testing purposes, all of which I promptly deleted after\u00a0testing).<\/p>\n<p>If every piece of software from BitTorrent programs are malware laden, why would it still be around? Do vast numbers of ordinary\u00a0people risk malware attacks, possible fines and jail time (downloading these kinds of files is illegal in most countries) by downloading cracked software from BitTorrent?\u00a0Surely it can&#8217;t be that bad.<\/p>\n<p>Malware\u00a0like <a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" target=\"_blank\" rel=\"noopener noreferrer\">SilverInstaller<\/a>, and ransomware like <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-hit-by-rare-ransomware-attack-spread-via-transmission-bittorrent-app\/\" target=\"_blank\" rel=\"noopener noreferrer\">KeyRanger<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/patcher-ransomware-attacks-macos-encrypts-files-permanently\/\" target=\"_blank\" rel=\"noopener noreferrer\">Patcher<\/a> must be the rare exception. So I took it upon myself to find out, and here&#8217;s what I discovered.<\/p>\n<p>After pulling in several gigabytes of software shared through BitTorrent, I fired up <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> and let it loose on the Downloads folder. The results were shocking.<\/p>\n<p><strong>Every crack, patch and key generator included in these downloads was flagged!<\/strong><\/p>\n<p>Here is a screenshot showing just a small part of the results:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-65881 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Torrents-Scan-Results.png\" alt=\"VirusBarrier antivirus scan of BitTorrent files\" width=\"600\" height=\"328\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Torrents-Scan-Results.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Torrents-Scan-Results-150x82.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Torrents-Scan-Results-300x164.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>And it&#8217;s not just the downloaded software from BitTorrent that poses a risk, the torrent websites themselves try very hard to get extra stuff installed on your system as well. Most time spent on those websites is spent fighting off pop-ups and redirects, each presenting you with tons of fake Flash Player update alerts, scare tactics and more.<\/p>\n<p>Just a few examples of the things that popped up can be seen in the graphic below:<\/p>\n<div id=\"attachment_66274\" style=\"width: 1930px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Barrage-of-popups.jpg\"><img aria-describedby=\"caption-attachment-66274\" loading=\"lazy\" class=\"wp-image-66274 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Barrage-of-popups.jpg\" alt=\"BitTorrent malware cesspool \" width=\"1920\" height=\"1080\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Barrage-of-popups.jpg 1920w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Barrage-of-popups-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Barrage-of-popups-300x169.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Barrage-of-popups-768x432.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Barrage-of-popups-1024x576.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Barrage-of-popups-657x370.jpg 657w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><p id=\"caption-attachment-66274\" class=\"wp-caption-text\">Merely two minutes torrenting lands you in a malware cesspool.<\/p><\/div>\n<p>This is just what popped up after merely\u00a0two minutes of browsing torrent sites, not including duplicates! It&#8217;s exhausting, and it certainly makes you wonder how people get around to downloading anything at all from these sites. Seriously.<\/p>\n<p>Each and every cracked software shared on BitTorrent will download malware to your Mac, if clicked. A quick sampling showed several <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-malware-definitions-for-netweirdrc\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bundlore<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/genieo\/\" target=\"_blank\" rel=\"noopener noreferrer\">Genieo<\/a>, <a href=\"https:\/\/discussions.apple.com\/thread\/7395813?start=0&amp;tstart=0\" target=\"_blank\" rel=\"noopener noreferrer\">AMC installers<\/a>, and even the recently covered <a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/\" target=\"_blank\" rel=\"noopener noreferrer\">SilverInstaller<\/a> popped up. Quite a few\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" target=\"_blank\" rel=\"noopener noreferrer\">PUA&#8217;s<\/a> also popping up. Each of these sites also asked me to activate Flash Player in my browser, no doubt looking for vulnerabilities to exploit.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-65887 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results.png\" alt=\"BitTorrent malware\" width=\"849\" height=\"831\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results.png 849w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results-150x147.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results-300x294.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results-768x752.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results-657x643.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Quick-scan-results-64x64.png 64w\" sizes=\"(max-width: 849px) 100vw, 849px\" \/><br \/>\nSome of these fake warnings and messages look better than others. All it takes is one to successfully trick a user into installing it, and malware will be brought onto the system.<\/p>\n<h3>The good, bad, and\u00a0ugly of BitTorrent downloads<\/h3>\n<p>There are good reasons for using BitTorrent, as mentioned at the beginning of this article, but the bad news is it is by far mostly used for the downloading of illegal software, TV shows and games. Both the websites that offer up this content and the content itself are\u00a0a major risk to the security of your Mac and your data.<\/p>\n<p>Furthermore, your Internet service provider may also disconnect you if they see that you&#8217;re downloading illegal software. The ugly truth is you could even get sued by the developer of the software or producer of the show\/movie\/music. Trust me, they keep a close eye on these downloads to see exactly who is infringing on their copyright.<\/p>\n<p>So is it worth the risk? You decide. But\u00a0take heed: Every user should take extra precautions when using BitTorrent sites. Do you have a different opinion or perhaps a BitTorrent horror story of your own? Drop us a comment below!<\/p>\n<p>As for the test software\u00a0I downloaded from BitTorrent:\u00a0<img loading=\"lazy\" class=\"alignnone size-full wp-image-65893\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/empty-trash.png\" alt=\"\" width=\"135\" height=\"158\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/empty-trash.png 135w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/empty-trash-128x150.png 128w\" sizes=\"(max-width: 135px) 100vw, 135px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While BitTorrent itself is not inherently unsafe, the files shared through it (and other peer-to-peer networks) are very often infected with malware. If you think cracked software or other questionable downloads are safe, prepare to be surprised. Here&#8217;s what our investigation revealed.<\/p>\n","protected":false},"author":79,"featured_media":68260,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[3565,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"While BitTorrent itself is not inherently unsafe, the files shared through it (and other peer-to-peer networks) are very often infected with malware. If you think cracked software or other questionable downloads are safe, prepare to be surprised. Here&#039;s what our investigation revealed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why BitTorrent Sites Are a Malware Cesspool - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"While BitTorrent itself is not inherently unsafe, the files shared through it (and other peer-to-peer networks) are very often infected with malware. If you think cracked software or other questionable downloads are safe, prepare to be surprised. Here&#039;s what our investigation revealed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-20T17:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-15T19:17:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg\",\"width\":400,\"height\":260,\"caption\":\"BitTorrent Sites Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\",\"name\":\"Why BitTorrent Sites Are a Malware Cesspool - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#primaryimage\"},\"datePublished\":\"2017-07-20T17:31:00+00:00\",\"dateModified\":\"2020-10-15T19:17:09+00:00\",\"description\":\"While BitTorrent itself is not inherently unsafe, the files shared through it (and other peer-to-peer networks) are very often infected with malware. If you think cracked software or other questionable downloads are safe, prepare to be surprised. Here's what our investigation revealed.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why BitTorrent Sites Are a Malware Cesspool\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Why BitTorrent Sites Are a Malware Cesspool\",\"datePublished\":\"2017-07-20T17:31:00+00:00\",\"dateModified\":\"2020-10-15T19:17:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#webpage\"},\"wordCount\":855,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg\",\"keywords\":[\"BitTorrent\",\"Malware\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"While BitTorrent itself is not inherently unsafe, the files shared through it (and other peer-to-peer networks) are very often infected with malware. If you think cracked software or other questionable downloads are safe, prepare to be surprised. Here's what our investigation revealed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/","og_locale":"en_US","og_type":"article","og_title":"Why BitTorrent Sites Are a Malware Cesspool - The Mac Security Blog","og_description":"While BitTorrent itself is not inherently unsafe, the files shared through it (and other peer-to-peer networks) are very often infected with malware. If you think cracked software or other questionable downloads are safe, prepare to be surprised. Here's what our investigation revealed.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-07-20T17:31:00+00:00","article_modified_time":"2020-10-15T19:17:09+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg","width":400,"height":260,"caption":"BitTorrent Sites Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/","name":"Why BitTorrent Sites Are a Malware Cesspool - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#primaryimage"},"datePublished":"2017-07-20T17:31:00+00:00","dateModified":"2020-10-15T19:17:09+00:00","description":"While BitTorrent itself is not inherently unsafe, the files shared through it (and other peer-to-peer networks) are very often infected with malware. If you think cracked software or other questionable downloads are safe, prepare to be surprised. Here's what our investigation revealed.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Why BitTorrent Sites Are a Malware Cesspool"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Why BitTorrent Sites Are a Malware Cesspool","datePublished":"2017-07-20T17:31:00+00:00","dateModified":"2020-10-15T19:17:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#webpage"},"wordCount":855,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg","keywords":["BitTorrent","Malware"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/BitTorrent-Sites-Malware.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-h7l","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65803"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=65803"}],"version-history":[{"count":42,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65803\/revisions"}],"predecessor-version":[{"id":92335,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65803\/revisions\/92335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/68260"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=65803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=65803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=65803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}