News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Microsoft Activation Hacks Raise Questions About Software Piracy and Cybersecurity

The group of self-proclaimed pirates behind Massgrave has successfully hacked Microsoft's activation tools for Windows and Office, releasing a set of PowerShell scripts that can activate any edition of Windows or perpetual-license Office editions without paying licensing fees. The developers claim their methods are legal because they only use "forged product key data" and do not profit from piracy. However, using these scripts is still technically illegal.

See Also

Microsoft Quietly Updates Copilot to Cut Down on Unauthorized Windows Activations Δ1.82

Microsoft has implemented a patch to its Windows Copilot, preventing the AI assistant from inadvertently facilitating the activation of unlicensed copies of its operating system. The update addresses previous concerns that Copilot was recommending third-party tools and methods to bypass Microsoft's licensing system, reinforcing the importance of using legitimate software. While this move showcases Microsoft's commitment to refining its AI capabilities, unauthorized activation methods for Windows 11 remain available online, albeit no longer promoted by Copilot.

Microsoft Discoveries Vulnerable Software Attack. Δ1.81

Microsoft has confirmed that its Windows drivers and software are being exploited by hackers through zero-day attacks, allowing them to escalate privileges and potentially drop ransomware on affected machines. The company patched five flaws in a kernel-level driver for Paragon Partition Manager, which were apparently found in BioNTdrv.sys, a piece of software used by the partition manager. Users are urged to apply updates as soon as possible to secure their systems.

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.80

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.79

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Microsoft's Copilot AI to Stop Helping Pirates Δ1.77

Microsoft's AI assistant Copilot will no longer provide guidance on how to activate pirated versions of Windows 11. The update aims to curb digital piracy by ensuring users are aware that it is both illegal and against Microsoft's user agreement. As a result, if asked about pirating software, Copilot now responds that it cannot assist with such actions.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.76

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.76

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

Microsoft Names Cybercriminals Who Created Explicit Deepfakes Δ1.75

Microsoft has identified and named four individuals allegedly responsible for creating and distributing explicit deepfakes using leaked API keys from multiple Microsoft customers. The group, dubbed the “Azure Abuse Enterprise”, is said to have developed malicious tools that allowed threat actors to bypass generative AI guardrails to generate harmful content. This discovery highlights the growing concern of cybercriminals exploiting AI-powered services for nefarious purposes.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.75

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

Broadcom Releases Fixes for Multiple VMware Security Flaws Δ1.75

Broadcom has released patches for three critical vulnerabilities in its VMware products, which are already being exploited in the wild. The bugs were described as VM escape flaws and affect all supported versions of VMware ESX, vSphere, Cloud Foundation, and Telco Cloud Platform. These issues were deemed severe enough to warrant immediate attention from users, who are urged to apply the fixes as soon as possible.

Human Rights Abused: Governments Exploit Vulnerabilities to Silence Critics Δ1.74

Amnesty International has uncovered evidence that a zero-day exploit sold by Cellebrite was used to compromise the phone of a Serbian student who had been critical of the government, highlighting a campaign of surveillance and repression. The organization's report sheds light on the pervasive use of spyware by authorities in Serbia, which has sparked international condemnation. The incident demonstrates how governments are exploiting vulnerabilities in devices to silence critics and undermine human rights.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.74

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Lee Enterprises Ransomware Attack Hits Freelance and Contractor Payments Δ1.73

The Lee Enterprises ransomware attack is affecting the company's ability to pay outside vendors, including freelancers and contractors, as a result of the cyberattack that began on February 3. The attack has resulted in widescale outages and ongoing disruption at dozens of newspapers across the United States, causing delays to print editions and impacting various aspects of the company's operations. Lee Enterprises has confirmed that hackers "encrypted critical applications," including those related to vendor payments.

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks Δ1.73

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.73

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

More Reports Claim 2024 Was the Worst Year for Ransomware Attacks Yet. Δ1.73

2024 has been marked as a record-breaking year for ransomware attacks, with a 65% increase in detected groups and 44 new malware variants contributing to almost a third of undisclosed attacks. The healthcare, government, and education sectors were disproportionately affected, while emerging groups like LockBit and RansomHub accounted for a significant number of incidents, highlighting the growing sophistication of cybercriminals. As organizations face escalating financial and reputational risks, the need for proactive cybersecurity measures has never been more urgent.

Salty Game Dev Comments, Easier Mods Inside Command & Conquer’s Source Code Δ1.73

With the right folks involved, EA can capably preserve and update its classics. The release of the source code has provided a wealth of information for modders and developers, showcasing the ingenuity and quirks of Windows game development from 1995 to 2003. This move paves the way for open-source reimplementations and community-driven projects, ensuring the longevity of beloved classic games.

IBM Wins UK Lawsuit Against LzLabs Over Alleged Theft of Mainframe Technology Δ1.72

IBM has successfully sued Switzerland-based LzLabs and its subsidiary Winsopia over the alleged theft of trade secrets related to IBM's mainframe technology. The High Court ruled in favour of IBM, finding that Winsopia breached its licensed software agreement with IBM in 2013. This decision could have significant implications for intellectual property protection in the tech industry.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.72

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

Microsoft Updates Terms on Data Privacy Amid EU Probe Δ1.72

Microsoft is updating its commercial cloud contracts to improve data protection for European Union institutions, following an investigation by the EU's data watchdog that found previous deals failed to meet EU law. The changes aim to increase Microsoft's data protection responsibilities and provide greater transparency for customers. By implementing these new provisions, Microsoft seeks to enhance trust with public sector and enterprise customers in the region.

Microsoft Hits Back Against UK Competition Lawsuits, Slams AWS and Google Once Again Δ1.72

Microsoft has responded to the CMA’s Provision Decision Report by arguing that British customers haven’t submitted that many complaints. The tech giant has issued a 101-page official response tackling all aspects of the probe, even asserting that the body has overreacted. Microsoft claims that it is being unfairly targeted and accused of preventing its rivals from competing effectively for UK customers.

China’s Government Hacks US Organizations for Financial Gain Δ1.72

The Department of Justice has criminally charged 12 Chinese nationals for their involvement in hacking over 100 US organizations, including the Treasury, with the goal of selling stolen data to China's government and other entities. The hackers used various tactics, including exploiting email inboxes and managing software, to gain access to sensitive information. China's government allegedly paid "handsomely" for the stolen data.

Apple Refuses to Break Encryption, Seeks Reversal of UK Demand for Backdoor Δ1.71

Apple's appeal to the Investigatory Powers Tribunal may set a significant precedent regarding the limits of government overreach into technology companies' operations. The company argues that the UK government's power to issue Technical Capability Notices would compromise user data security and undermine global cooperation against cyber threats. Apple's move is likely to be closely watched by other tech firms facing similar demands for backdoors.

DVD Pirates Face Justice as Feds Crack Down on Online Piracy Δ1.71

A 37-year-old Tennessee man has been arrested for allegedly stealing Blu-rays and DVDs from a manufacturing and distribution company used by major movie studios and sharing them online before the movies' scheduled release dates, resulting in significant financial losses to copyright owners. The alleged DVD thief, Steven Hale, is accused of bypassing encryption that prevents unauthorized copying and selling stolen discs on e-commerce sites, causing an estimated loss of tens of millions of dollars. This arrest marks a growing trend in law enforcement efforts to curb online piracy.

The Rise of Fake Spyware Apps in the Play Store Δ1.71

Google's security measures have been breached by fake spyware apps, which are hidden in plain sight on the Google Play Store. These malicious apps can cause immense damage to users' devices and personal data, including data theft, financial fraud, malware infections, ransomware attacks, and rootkit vulnerabilities. As a result, it is crucial for smartphone users to take precautions to spot these fake spyware apps and protect themselves from potential harm.