KickassTorrents clone contains malicious scamming code | Inquirer Technology

KickassTorrents clone contains malicious scamming code

/ 10:39 AM August 16, 2016

This screen is what will greet users who attempt to download from Kat.am, a KickassTorrents clone. Image Screencapped from KickassTorrets

Clones are popping up one by one to take over and fill the void left by the shutdown of original torrenting sites such as KickassTorrents. However, take heed as it seems that not all clones are created equal.

KAT.am was the first to pop up after KickassTorrents had been taken down but was also put offline shortly after due to a complaint from the Motion Pictures Association, reports TorrentFreak.

ADVERTISEMENT

When users browsed through the KAT.am site, it appeared to be legitimately serving out torrent links. However, once users clicked on a download link, a new window would pop up with a message stating that a free account was required. The original KickasTorrents site did not require any sort of log-in detail to download torrents.

FEATURED STORIES

It would seem that when the .am domain became vacant after the first KickassTorrents clone, KAT.am, was brought offline, scammers got hold of the domain and put up their own mirroring scam site which looked like KAT.am.

This type of “register to download” scam is by no means new but many still fall for this due to ignorance. Don’t be too eager to provide personal details or create a new account if a site requires it to download data. Alfred Bayle

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: kickasstorrents, peer-to-peer, scam
TAGS: kickasstorrents, peer-to-peer, scam

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.