The study provides an overview of the most up-to-date examples of malware and potentially unwanted programs found on suspected copyright-infringing websites and mobile applications. Some of these programs use deceptive techniques and social engineering to trick end-users into disclosing their sensitive information. In addition, information about the computer itself might be leaked to other parties without explicit user consent.
Executive summary of the study can be found here.
The entire study can be found here.