Malicious KMSPico Windows Activator Stealing Users Cryptocurrency Wallets

Users looking to activate Windows without using a digital license or a product key are being targeted by tainted installers to deploy malware ( KMSPico ) designed to plunder credentials and other information in cryptocurrency wallets.

The malware, dubbed “CryptBot,” is an information stealer capable of obtaining credentials for browsers, cryptocurrency wallets, browser cookies, credit cards, and capturing screenshots from the infected systems. Deployed via cracked software, the latest attack involves the malware masquerading as KMSPico.

KMSPico is an unofficial tool that’s used to illicitly activate the full features of pirated copies of software such as Microsoft Windows and Office products without actually owning a license key.

 

KMSPico - Google Search

“The user becomes infected by clicking one of the malicious links and downloading either KMSPico, Cryptbot, or another malware without KMSPico,” Red Canary researcher Tony Lambert said in a report published last week. “The adversaries install KMSPico also, because that is what the victim expects to happen, while simultaneously deploying Cryptbot behind the scenes.”

The American cybersecurity firm said it also observed several IT departments using illegitimate software instead of legitimate Microsoft licenses to activate systems, adding the altered KMSpico installers are distributed via a number of websites that claim to be offering the “official” version of the activator.

Subscribe to our Newsletters!

Get breaking news, free eBooks and upcoming events delivered to your inbox!

Subscribe and get access to a Free Cyber Security Basics Course!

Don’t Stop Here

More To Explore

Critical Log4J Vulnerability

The Apache Software Foundation has released fixes to contain an actively exploited zero-day vulnerability affecting the widely-used Apache Log4j Java-based logging library that could be weaponized to execute