Akhil Bhartiya Cyber Suraksha Sangathan (Regd.)
Regd. with Registrar of Society of NCT Delhi-Regd. No-287
Cyber Criminals se Suraksha, Digital India ki Raksha
अखिल भारतीय साइबर सुरक्षा संगठन (पंजी)
भारत की पहली साइबर क्राइम इन्वेस्टीगेशन एन जी ओ
ऑनलाइन रहें सतर्क, साइबर अपराध से रहें सुरक्षित
www.abcss.org Email: info@abcss.org
AMIT MALHOTRA
(Cyber Crime Investigation Specialist)
Founder Akhil Bhartiya Cyber Suraksha Sangathan
18 years of experience in crime prevention, detection and investigation. Certified Ethical Hacker from EC-Council. Certified Cyber Crime Investigator from Asian School of Cyber Laws. Presently working in the area of cyber crime investigation.
⚠️ How Software Piracy Happens
- Downloading cracked software from torrent sites and shady websites
- Using key generators (keygens) to generate fake activation keys
- Installing software from unauthorized third-party sources or USB drives
- Using a single licensed copy on multiple computers (license violation)
- Buying fake or counterfeit software CDs/DVDs from local markets
- Sharing software installation files over WhatsApp or Telegram groups
- Using "portable" versions of paid software without a valid license
- Downloading "free" versions of paid software from unofficial links
- Using patch files or cracks to disable license verification
- Streaming or selling pirated software through fake online shops
✅ How to Protect Yourself from Software Piracy
- Always buy software from official websites or authorized retailers
- Use free and open-source alternatives (LibreOffice, VLC, GIMP etc.)
- Check if student/NGO discounts are available for paid software
- Never download software from torrent or unofficial sites
- Verify software authenticity through the publisher's official website
- Use reputable antivirus software and keep it updated
- Educate employees and family members about software licensing
- Report pirated software sellers to BSA (Business Software Alliance)
- Check software reviews and ratings only on official platforms
- Keep all installed software updated through official update channels
Lure — "Free Download of Premium Software"
Websites, Telegram channels, YouTube videos, and social media posts advertise "100% Free Download" of popular paid software like Windows, MS Office, Adobe Photoshop, AutoCAD, Tally, and antivirus tools. Users searching for free alternatives land on these malicious sources.
Download — Infected Installer or Crack File
The downloaded file appears to be a legitimate installer, but it comes bundled with hidden malware, trojans, keyloggers, adware, or crypto miners. The crack or keygen file is itself a malicious executable. The moment it is run, the attacker gains access to your system.
Installation — Malware Silently Runs in Background
While the software appears to install normally, malicious code runs silently in the background. It may disable your antivirus, create backdoors, steal saved passwords from your browser, or enroll your device in a botnet — all without your knowledge.
Data Theft — Credentials and Personal Files Stolen
Keyloggers record everything you type — passwords, credit card numbers, OTPs. Spyware collects your files, screenshots, and webcam footage. This data is sent to cybercriminals who use it for financial fraud, identity theft, or sell it on the dark web.
Ransomware — Files Encrypted, Ransom Demanded
In many cases, pirated software delivers ransomware that encrypts all your important files. A message appears demanding payment (usually in cryptocurrency) to unlock your files. Even after paying, there is no guarantee you will get your data back.
Legal Risk — Police Action and Heavy Fines
Using, distributing, or selling pirated software is a cognizable offence under Indian law. Organizations using unlicensed software face raids by cybercrime authorities, heavy financial penalties, and criminal prosecution under the IT Act and Copyright Act. Individuals are also not immune from prosecution.
Softlifting / End-User Piracy
Installing a single licensed copy of software on multiple computers. Very common in offices and homes. Example: buying one copy of MS Office and installing it on 10 computers. This is one of the most widespread forms of software piracy and violates the End User License Agreement (EULA).
Internet / Online Piracy
Downloading, uploading, or distributing copyrighted software through websites, torrents, file-sharing platforms, Telegram channels, or peer-to-peer (P2P) networks. This is the most common form of piracy today and is punishable under the IT Act and Copyright Act.
Hard Disk Loading (Pre-installation Piracy)
Computer dealers or shops pre-install pirated copies of operating systems and software on new devices before selling them. Customers unknowingly buy machines with unlicensed software. This is especially common in small computer shops across India.
Counterfeiting
Producing and selling fake software CDs, DVDs, or USB drives that look identical to genuine products — complete with fake holograms, packaging, and certificates. These are sold openly in local markets and online. They almost always contain malware along with the pirated software.
License Key Abuse / OEM Piracy
Using stolen, leaked, or illegally generated serial/license keys to activate genuine software. Also includes reselling OEM (Original Equipment Manufacturer) software separately from the hardware it was licensed for. Common for Windows OS, Office suites, and antivirus software.
Cracked / Patched Software Distribution
Modifying software to disable license verification, then distributing the modified version. Crack files, patch files, and loader programs are used to bypass activation. These modified files almost always contain hidden malicious code that harms the end user's device and data.
🚨 IF YOU HAVE BEEN A VICTIM OF SOFTWARE PIRACY OR DATA THEFT — DO THIS IMMEDIATELY
- Immediately disconnect the affected device from the internet to prevent further data loss
- Run a full antivirus and anti-malware scan using a trusted, genuine security tool
- Uninstall the pirated software and any programs you do not recognise
- Change all passwords — email, banking, social media — from a safe, clean device
- Inform your bank immediately if you suspect financial data was compromised
- Call National Cyber Helpline 1930 immediately for guidance
- File an online complaint at cybercrime.gov.in
- Visit your nearest Cyber Crime Cell or police station to file an FIR
- Save all evidence — screenshots, download links, receipts, purchase records
- Report the pirated software source to BSA (bsa.org/report) or the software developer
📞 CONTACT IMMEDIATELY — HELPLINE NUMBERS
IT Act Section 66: Dishonestly or fraudulently using, copying, or distributing software without authorization — imprisonment up to 3 years and/or fine up to ₹5 lakh.
IT Act Section 66B: Receiving or retaining stolen computer resources or communication devices — imprisonment up to 3 years and/or fine up to ₹1 lakh.
Copyright Act Section 63: Knowingly using, selling, distributing, or exhibiting copyrighted software without licence — imprisonment from 6 months to 3 years + fine from ₹50,000 to ₹2 lakh. Repeat offences attract enhanced punishment.
Copyright Act Section 65A: Circumventing Technological Protection Measures (TPMs) — i.e., using cracks, keygens, or patches to bypass software protection — imprisonment up to 2 years + fine.
BNS Section 318 (Old IPC 420) — Cheating: Selling counterfeit or fake software by misrepresenting it as genuine — imprisonment up to 7 years + fine.
BNS Section 316 (Old IPC 406) — Criminal Breach of Trust: Misusing software entrusted for a specific, limited purpose — imprisonment up to 3 years + fine.
TRIPS Agreement (International): India being a signatory to the WTO's TRIPS Agreement is bound to enforce intellectual property rights including software copyright at international standards. Violations can trigger trade-related diplomatic consequences.





