The article was talking about this being used in phishing emails targeting less-tech-savvy users, not mentioning piracy once. The point is that there can be a zip file that displays one set of files when opened in 7zip, while displaying another set of files when opened in Windows Explorer, or both sets of files when opened in WinRar. So a person or malware scanner opening the file using one extraction utility might only see the safe files, assuming the contents of the archive to be safe, while another person opening it with a different utility would get a different set of files that include an unsafe payload. Reading the actual article that this one was rehashing, the example found to be doing this was an email disguised as a shipping invoice with an attached archive that only appeared to contain a safe PDF document when opened in 7zip, but that instead contained an executable file when opened in Windows Explorer. It wasn't clear about how many antimalware utilities might actually miss such a file, though this is something that should be detectable if they look for it.