赛派号

80w电器一天耗电多少度 Fake Windows activation domain infects users with Cosmali Loader malware – HackMag

Users he discovered a fake domain posing as the MAS utility (Microsoft Activation Scripts) from the Massgre project. The domain was used to distribute malicious PowerShell scripts that infected Windows systems with the Cosmali Loader malware.

As Bleeping Computer reports, this week Reddit users started posting (1, 2) about strange pop-up notifications appearing on their computers. These notifications reported that the system was infected with Cosmali Loader malware and even explained the reason — a typo made while entering the Windows activation command.

“You are infected with malware called Cosmali Loader because you mistakenly typed get.activated.win as get.activate[.]win when activating Windows using PowerShell.

The malware control panel is not secure, and anyone viewing it has access to your computer.

Reinstall Windows and don’t repeat this mistake next time.

To confirm that your computer is infected, check Task Manager and look for suspicious PowerShell processes,” read the notification in one of the cases.

As discovered by a researcher known as RussianPanda, these messages are linked to the open-source malware loader Cosmali Loader. This malicious tool had previously come under the scrutiny of GDATA analyst Karsten Hahn, who also wrote about similar pop-up windows.

According to data from RussianPanda, Cosmali Loader delivered cryptominers and the XWorm remote access trojan to infected systems.

However, it is still unclear who exactly was sending the warnings to infected users. It is assumed that this may he been done by an anonymous cybersecurity researcher who somehow gained access to the malware’s C&C panel and decided to use it to notify victims of the compromise.

MAS is a well-known set of open-source PowerShell scripts that automate the activation of Windows and Office. The tool uses HWID activation, KMS emulation, and relies on Ohook and TSforge to bypass protection. The project is maintained by the Massgre team and the community, and is hosted on GitHub.

It’s worth noting that Microsoft considers MAS a pirated tool that activates products without a license using unauthorized methods. And although GitHub (which is owned by Microsoft) does not remove these tools, the company’s developers recently began cracking down on KMS-based Windows activation.

Massgre representatives he already warned users about the get.activate[.]win threat and urged everyone to double-check the commands they type before executing them.

 

 

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至lsinopec@gmail.com举报,一经查实,本站将立刻删除。

上一篇 没有了

下一篇没有了