Hackers Claim New Tool Can Unlock Windows And Office For Free - 1

Image by Alexander Andrews, from Unsplash

Hackers Claim New Tool Can Unlock Windows And Office For Free

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

A group of hackers has released an updated version of a tool designed to bypass Microsoft’s Windows activation system, claiming it can unlock nearly every version of Windows and Office.

In a Rush? Here are the Quick Facts!

  • Hackers released a tool to bypass Microsoft’s Windows and Office activation system.
  • The tool, TSforge, manipulates activation data to insert fake activation records.
  • Windows doesn’t recheck activation data once marked as activated.

The group, known as Massgrave, announced the new feature, called TSforge, as part of their Microsoft Activation Scripts (MAS) project. According to their blog post,

TSforge is one of the most powerful activation exploits they have ever developed, allowing users to bypass Microsoft’s built-in security protections.

Microsoft requires users to activate their copies of Windows using a product key or by connecting to a server that verifies the software is genuine. This system, called the Software Protection Platform (SPP), has been in place for almost two decades.

Over the years, hackers have found ways to trick the system, but Microsoft has consistently updated its security to block these methods.

Massgrave claims that TSforge directly manipulates Windows’ activation data. Their research revealed that Windows stores activation information in hidden files and registry keys, which tell the system whether a copy is legitimate.

By understanding how this data is saved and validated, the hackers say they found a way to insert fake activation records that Windows accepts as genuine.

One of the key breakthroughs, according to the blog post, was discovering that once Windows marks a system as activated, it does not check the activation data again. This allowed the hackers to develop a method that inserts fake activation records into the system, bypassing Microsoft’s checks entirely.

If true, this exploit could allow users to activate Windows and Office without paying for a license, potentially leading to widespread piracy. Microsoft has not yet responded to the claims, but in the past, the company has issued security updates to close similar loopholes.

Experts warn that using such tools carries risks. Unauthorized activation methods often involve modifying system files, which can make a computer vulnerable to malware.

Additionally, pirated software may not receive security updates from Microsoft, putting users at risk of cyberattacks.

While Massgrave frames their work as a technical achievement, software piracy remains illegal in most countries. If Microsoft confirms the exploit, they will likely take steps to block it in future updates.

Hackers Selling Stolen Military And Defense Contractor Credentials For $10 - 2

Image by Kevin Ku, from Unsplash

Hackers Selling Stolen Military And Defense Contractor Credentials For $10

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

A new report by cybersecurity firm Hudson Rock reveals a troubling security breach affecting the U.S. military, federal agencies, and top defense contractors, including Lockheed Martin, Boeing, and Honeywell.

In a Rush? Here are the Quick Facts!

  • Malware steals VPN access, email logins, and multi-factor authentication session cookies.
  • 398 Honeywell employees were infected, exposing internal systems and third-party credentials.
  • U.S. Navy personnel had their login details stolen, risking military system breaches.

The report claims that employees in these organizations have been infected with “infostealer” malware, which collects login credentials, email access, and other sensitive data.

Unlike traditional cyberattacks that involve hacking into networks, infostealer malware waits for a user to unknowingly download an infected file—often a game mod, pirated software, or a malicious email attachment.

Once installed, the malware collects login details, browsing history, and stored passwords. Cybercriminals then sell this stolen data for as little as $10 per compromised computer on underground markets, as detailed in the report.

Among the stolen information are credentials for VPNs, government email accounts, and classified procurement systems. Even multi-factor authentication (MFA) can be bypassed using stolen session cookies, allowing hackers to gain unauthorized access to secure systems.

The report highlights that employees at some of the most critical U.S. defense companies have been affected. One case study shows that 398 Honeywell employees had their credentials leaked, exposing internal portals and software tools. Additionally, 472 third-party accounts connected to Microsoft, Cisco, and SAP were also compromised.

Beyond the private sector, the U.S. Army and Navy have also been targeted, with at least 30 Navy personnel having their login credentials and browsing history stolen. Even the FBI and Government Accountability Office (GAO) have been impacted, raising concerns about national security risks.

Hudson Rock warns that these breaches don’t just affect the individual companies involved. Many organizations work together in the defense industry, meaning a security breach in one company can expose its entire network of partners, suppliers, and government agencies.

While cybersecurity measures exist to monitor and detect such breaches, experts stress the importance of prevention.

The researchers say that companies and government agencies must enforce stronger cybersecurity practices, including stricter download policies, improved employee training, and enhanced malware detection tools.