| Threat | Description | |--------|-------------| | | Pre-activated or “Lite” versions include backdoors, keyloggers, cryptominers. | | Modified boot sectors | Rootkits embedded in the ISO that survive clean installs. | | Fake activation cracks | Included “loaders” that actually install botnet clients. | | Drive-by downloads | Sites that trick users into downloading .exe “download managers” that are actual malware. | | Outdated insecure builds | Even genuine ISOs without SP1 or post-SP1 updates are vulnerable to WannaCry, EternalBlue, etc. |