Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Microsoft software. Show all posts

Hackers Release Powerful Tool to Unlock Microsoft Software for Free

 



A group of hackers has created a tool that allows people to activate Microsoft Windows and Office software without needing an official license. This method, described as a major breakthrough in software piracy, completely bypasses Microsoft's security system. Surprisingly, Microsoft has not taken any action against it so far.  


A New Way to Unlock Microsoft Software  

The hacker group, known as Massgrave, has been making activation tools for years. Their latest update, called Microsoft Activation Scripts (MAS) 3.0, introduces a powerful new method called TSforge Activation. This technique enables users to unlock different versions of Windows and Office permanently, even if they do not have a valid license.  

One of its most prominent features is that it allows Windows 10 users to continue receiving updates beyond the official support cutoff in October 2025. This makes it especially useful for those who want to keep using older systems without paying for Microsoft’s extended support.  

MAS was first launched in 2024 as an open-source project meant to remove Microsoft’s digital restrictions. The latest update improves its features, fixes previous issues, and enhances its ability to bypass security checks. Massgrave claims that TSforge Activation is one of the most advanced tools they have ever created.  


How Does TSforge Activation Work?  

Microsoft uses a system called the Software Protection Platform (SPP) to control software licensing. This system ensures that only users with valid product keys can access all the features of Windows and Office. It relies on two main files:  

1. Data.dat (Physical Store) – This file contains essential activation details.  

2. Tokens.dat (Token Store) – This file helps verify whether a product key is legitimate.  

The TSforge Activation method tricks Microsoft’s security system by injecting false data into these files. This makes the system believe that an invalid product key is genuine, allowing users to activate their software for free.  

The activation method works on:  

  • Windows 7, 8, 10, and 11  
  • Windows Server editions from 2008 R2 to 2025  
  • Microsoft Office versions from 2013 to 2024  

Additionally, users can unlock premium features meant for business licenses, such as Microsoft’s Extended Security Updates (ESU) program. This allows older Windows versions to continue receiving security updates beyond their expiration dates.  


Microsoft’s Reaction and Ethical Concerns 

Massgrave acknowledges that Microsoft has improved its security over time. They admit that the Software Protection Platform is much stronger than the old systems used in Windows XP. However, they argue that their project is not truly piracy because it is an open-source tool available on GitHub, a platform owned by Microsoft.  

Despite this, using activation tools without a legal license is against Microsoft’s terms of service. While the company has not taken action against this tool yet, using such software carries risks. In some cases, companies or individuals who distribute or use illegal activation methods can face legal consequences.  

Interestingly, Massgrave does not charge for its tool, stating that they do not believe in making money from piracy. However, they continue to develop new ways to bypass Microsoft’s security, raising questions about software ownership and digital rights.  

The release of TSforge Activation underlines the ongoing conflict between software developers and digital piracy. While Microsoft strengthens its security, hackers find new ways to bypass restrictions. Users should carefully consider the legal and ethical risks before using unauthorized activation methods.

HP Enterprise Reveals Hack Conducted by State-backed Russian Hackers


Hewlett Packard (HP) enterprise reported on Wednesday that alleged state-backed Russian hackers have attacked its cloud-based email system and stolen security and employees’ data.

In a Security and Exchange filing, the IT product provider noted that the attack occurred on January 12. They suspect that Russia’s foreign intelligence service ‘Cozy Bear’ was behind the attack.

“Based on our investigation, we now believe that the threat actor accessed and exfiltrated data beginning in May 2023 from a small percentage of HPE mailboxes belonging to individuals in our cybersecurity, go-to-market, business segments, and other functions,” HPE, which is based in Spring, Texas, said in the filing.

HP’s spokesperson, Adam R. Bauer, was contacted through his email, however, he did not make it clear who exactly informed HPE of the breach. “We’re not sharing that information at this time,” Bauer noted the compromised email boxes were running Microsoft software.

In the filing, HPE said the intrusion was “likely related to earlier activity by this threat actor, of which we were notified in June 2023, involving unauthorized access to and exfiltration of a limited number of SharePoint files.” SharePoint is a component of Microsoft's Office 365 suite, which also contains word processing, spreadsheet, and email tools.

SharePoint is part of Microsoft’s 365 suite, formerly known as Office, which includes email, word-processing and spreadsheet apps.

HPE is unable to say whether the network compromise was connected to the intrusion that Microsoft revealed last week, since "we do not have the details of the incident Microsoft disclosed," according to Bauer.

Also, he did not specify where the affected employee, whose accounts the hackers had access to, belonged in the company’s hierarchy. 

According to the sources, “The total scope of mailboxes and emails accessed remains under investigation.” 

As per the report, HPE has ascertained that the intrusion has not had any significant effect on the company's financial stability or operations. Both announcements coincide with the implementation one month ago of a new rule by the U.S. Securities and Exchange Commission requiring publicly traded corporations to report security breaches that may hurt their operations. Unless they are granted a national security waiver, they have four days to comply with this.