SHARE
Facebook X Pinterest WhatsApp

P2P File-Sharing Malware & Botnets

Security 2016: What to Expect in the New Year Peer-to-peer (P2P) file sharing and the downloading of illegal content might be synonymous with Napster, appearing to be a technology that is ancient history. But it is still used regularly (and some of it illegally when using copyrighted materials), now with even more security threats. BitSight […]

Written By
SP
Sue Poremba
Dec 31, 2015
Slide Show

Security 2016: What to Expect in the New Year

Peer-to-peer (P2P) file sharing and the downloading of illegal content might be synonymous with Napster, appearing to be a technology that is ancient history. But it is still used regularly (and some of it illegally when using copyrighted materials), now with even more security threats.

BitSight Technologies studied the P2P file sharing activity of over 30,700 companies, analyzing the percentage of P2P downloads containing malware, the top torrented games and applications on corporate networks and the correlation between file sharing and botnet infections.

What the report found is that 43 percent of application files and 39 percent of games shared in P2P files contained malicious software. It also revealed a clear correlation between botnet activity and file sharing activity.

As the report stated:

Much of this activity is likely against corporate policies; although there are no published metrics on what percent of companies prohibit P2P file sharing, many companies have explicit rules against it. . . . For many companies, peer-to-peer file sharing is a result of shadow IT – where employees are downloading copyrighted business applications such as Microsoft or Adobe products.

When you see the amount of malware that is spread via P2P file sharing, it appears to be a wise move for companies to prohibit the practice, especially when you continue to read the report and discover this tidbit:

While we cannot demonstrate that malicious software from downloaded BitTorrent files caused these observed botnet infections, we can definitively say that companies with more BitTorrent activity are more likely to have an increased number of botnet infections. This has major implications for security and risk professionals: if a company or important third party has increased BitTorrent activity, this could indicate more serious security issues such as botnet infections.

As we’ve learned, restricting online behavior is easier said than done. It’s even more difficult when you consider that much of what is being shared on P2P networks are applications that can improve work production. Even so, its use needs to be better monitored. As Stephen Boyer, co-founder and CTO of BitSight Technologies, stated in a formal release:

Movies and games often come to mind when organizations think about P2P file sharing; however, the majority of infected applications that we uncovered were either Adobe Photoshop, Microsoft Office or various versions of the Microsoft Windows operating system. Our analysis found a high degree of correlation between organizations participating in P2P activity and system compromises via malware infections. The high malware infection rates suggest that organizations with file sharing activity are more susceptible to machine takeover. File sharing activity can serve as one of many key risk indicators and should be considered not only internally, but also when assessing vendor risk, conducting M&A due diligence, and underwriting cyber insurance.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.