Microsoft hasn’t but launched Home windows 11, however the brand new working system is already accessible for obtain and preview. Cybercriminals, in fact, are exploiting that, slipping malware to customers who assume they’re downloading Microsoft’s new working system.
Why obtain Home windows 11 now?
Microsoft really claimed Home windows 10 can be the last release of Windows, that the corporate would simply challenge updates from there on out. On June 24 this yr, nevertheless, the corporate unveiled Home windows 11. And although underneath the hood it’s mainly Home windows 10, Home windows 11 remains to be the OS’s greatest replace in six years, with a powerful variety of new options and interface modifications.
Formally, Home windows 11 will turn out to be accessible to most of the people in 2021, however a great deal of persons are attempting it out early by putting in a prerelease construct. Some fans need to attempt the brand new system for its novelty; others, equivalent to tech reporters, to tell customers in regards to the new options. As for software program builders, they want the OS to carry out compatibility testing with their very own merchandise and repair any points earlier than launch day.
Though Microsoft has made the method of downloading and putting in Home windows 11 from its official web site pretty easy, many nonetheless go to different sources to obtain the software program, which regularly incorporates unadvertised goodies from cybercriminals (and isn’t essentially Home windows 11 in any respect).
How scammers idiot Home windows 11 downloaders
Probably the most easy approach cybercriminals deceive customers is by slipping in one thing further (or else).
One instance includes an executable file referred to as 86307_windows 11 construct 21996.1 x64 + activator.exe. With a file measurement as massive as 1.75GB, it definitely appears believable. The truth is, although, the majority of that house consists of 1 DLL file that incorporates numerous ineffective data.
Opening the executable begins the installer, which appears like an extraordinary Home windows set up wizard. Its most important objective is to obtain and run one other, extra attention-grabbing executable. The second executable is an installer as effectively, and it even comes with a license settlement (which few individuals learn) calling it a “obtain supervisor for 86307_windows 11 construct 21996.1 x64 + activator” and noting that it could additionally set up some sponsored software program. In the event you settle for the settlement, quite a lot of malicious applications will likely be put in in your machine.
Kaspersky merchandise have already defeated a number of hundred an infection makes an attempt that used related Home windows 11–associated schemes. A big portion of those threats consists of downloaders, whose activity is to obtain and run different applications.
These different applications will be very wide-ranging — from comparatively innocent adware, which our options classify as not-a-virus, to full-fledged Trojans, password stealers, exploits, and different nasty stuff.
The place and the best way to obtain Home windows 11 safely
Obtain Home windows 11 from official sources solely, as Microsoft advises. Thus far, Home windows 11 is formally accessible solely to contributors within the Home windows Insider program — that’s, it’s a must to register. You’ll additionally want a tool with Home windows 10 already put in.
To improve your Home windows 10 pc to Home windows 11, go to Settings, click on Replace & Safety, then choose Home windows Insider Program and activate Dev Channel to get the replace.
We don’t suggest working the replace in your most important pc; prebuilds will be unstable.
We additionally advise you to make use of a reliable security solution and by no means disable it, in order that cybercriminals can not acquire entry to your pc via social engineering or vulnerabilities within the not-ready-for-primetime system.
https://www.kaspersky.com/weblog/fake-windows-11-installers/40718/ | Methods to obtain Home windows 11 whereas avoiding malware