Piracy is when a malicious person or group steals goods or resources from another person or group. Applied to the digital era, software piracy is the fraudulent copying, distribution, or use of copyrighted programs; thus, piracy is related to copyright infringement.

The term piracy is rooted in the violent robberies at sea executed by pirates often unaligned to any state or country. Piracy in the 2020s takes on many forms, including advanced persistent threats (APT) and ransomware families that don’t claim any national allegiance.

The dramatic expansion of digital technology in the 20th century provided malicious actors a new attack vector in online piracy. While most countries have intellectual property laws and license compliance standards, software piracy remains a low priority for many governments.

Types of software piracy

Type Description
Counterfeiting Producing fake copies of software for resale
Hard disk loading Hardware producers load unauthorized software to machines for sale
Unbundling Selling parts of software meant to be bundled
Online piracy Universe of websites offering stolen software for download
Renting Lending authorized software to others outside of user agreement
Softlifting Loading a copy of software onto several machines when it’s meant for one

Consequences of using pirated software

Piracy: Targets and worst offenders

Online piracy makes up a quarter of Earth’s internet bandwidth. The most pirated items on the web include TV shows, movies, video games, music, books, and software. Windows OS (XP/7/10) takes the lead for most pirated software, with Microsoft Office not far behind. Other top pirated programs include a download accelerator, Internet Download Manager, antivirus software, and Adobe software.

In a review of software piracy worldwide, software company Revenera – which specializes in mitigating license compliance – released data on the worst offending nations. In 2021, piracy combined $17.1 billion in lost revenue from software vendors. The top ten offending countries in order are:

  • China
  • Russia
  • Ukraine
  • Italy
  • India
  • France
  • Mexico
  • United States
  • South Korea
  • Germany

State of modern piracy

Technology innovation extends to every corner of the globe, including modern pirates. While cybersecurity professionals work to defend networks from the newest threats, advanced malicious actors might have the same tools and threat intelligence at their disposal.

Piracy is a constant threat on the internet. Every day individuals offer a bundle of sensitive data about themselves and others. Rogue hackers and nation-state operatives know how to target and take advantage of unexpecting internet users, often without the user even knowing.

Ransomware is one of the most critical threats to organizations today. Threat actors gain unauthorized access to a company network, move laterally to their network segment of choice, and can exfiltrate and encrypt the organization’s data. With access to critical data shut off, the organization must decide whether to pay the pirate’s ransom. In these instances, hackers display immense patience and attention to detail to avoid detection.

Sam Ingalls
Sam Ingalls
Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, TechRepublic, ServerWatch, Webopedia, and Channel Insider.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Best Managed Security Service Providers (MSSPs)

Organizations of all sizes can outsource their management of security devices and systems to a Managed Security Service Provider (MSSP). For most companies, it...

National Security Agency (NSA)

The National Security Agency (NSA) is the most important intelligence agency in the United States. The NSA's mission is to "protect U.S. information systems...


SHA-256 is an algorithm used for hash functions and is a vital component of contemporary cybersecurity. It is part of the Secure Hash Algorithm...

Defense Advanced Research Projects Agency (DARPA)

The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense (DOD). The agency stands...


ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...


Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...