Fake MAS Windows Activation Domain

Fake MAS Windows Activation Domain Used to Spread PowerShell Malware

Recent reports detail a sophisticated typosquatting campaign that targets users attempting to use Microsoft Activation Scripts (MAS) by exploiting a single-letter domain error. By registering the deceptive domain "get.activate[.]win," cybercriminals trick victims into running malicious PowerShell scripts that deploy the Cosmali Loader. This infection facilitates the installation of cryptomining software and the XWorm remote access trojan, granting attackers full control over compromised systems. Security experts emphasize that while MAS is already considered a piracy tool by Microsoft, this specific campaign highlights the extreme danger of executing unverified remote commands. To mitigate these risks, users are urged to verify domain characters carefully and employ robust endpoint protection to monitor for suspicious background processes. Ultimately, the incident serves as a warning about the security vulnerabilities inherent in using unauthorized software activation methods. ... Read More