Your application was hacked

Published 26.11.2019

Your application was hacked

Now that your application is known, it got hacked. This means that somebody took the time to reverse engineer your software, patch the licensing system you implemented and released it to the world.

You're doing something right if somebody was persistent enough to spend that much time to break into your application; however, I'm sure you've been having a headache since you heard of the compromised application.

To help you with the next steps that you must follow, we have made the post that you're reading now.


First, do not panic; Never pay the attacker; it is a common practice to blackmail software developers asking for monetary rewards.

The primary reason to avoid paying is the following: If the person managed to breach your current security, they will break it again and ask for further payments as soon as you perform any update.


The second step is verifying that the rest of the world can determine whether if the application they have is legit or not.

The moment your application is compromised, the chances of it being embedded with malware increase exponentially.

If somebody downloaded an illegitimate copy of your software without knowing it and they get infected, they will not hesitate to let the internet know about their experience. This may lead into huge losses and damage the image of your application for good.

Sign your code and inject tamper checks in your application, this way, your application will always be marked as legit by AV companies and people will know whether if what they're dealing with is your legitimate software or not.


The final step is the most important one: ensure that the attackers are not able to hijack your application again.

You can achieve this by buying an obfuscator that will protect your intellectual property, making it extremely hard for future attackers to understand the logic behind your program.

Our service is updated frequently enough to ensure that attackers can't keep up the rhythm, check out here and see which obfuscation settings fit your project best. If you're not sure, please contact us, and we will reach you back within time.


I sincerely hope these quick tips helped you out, do not ever give up on this field, the moment you decide to ignore the problem is the moment in which the attacker starts to absorb your profit.

Newest Blog Posts

Your application was hacked
Your application was hacked

Published on 26.11.2019

Read More »
How to Decompile .NET Applications
How to Decompile .NET Applications

Published on 15.11.2019

Read More »
Code Encryption vs Code Virtualization
Code Encryption vs Code Virtualization

Published on 10.09.2019

Read More »