Users looking to activate Windows without using a digital license or a product key are being targeted by tainted installers to deploy malware ( KMSPico ) designed to plunder credentials and other information in cryptocurrency wallets.
The malware, dubbed “CryptBot,” is an information stealer capable of obtaining credentials for browsers, cryptocurrency wallets, browser cookies, credit cards, and capturing screenshots from the infected systems. Deployed via cracked software, the latest attack involves the malware masquerading as KMSPico.
KMSPico is an unofficial tool that’s used to illicitly activate the full features of pirated copies of software such as Microsoft Windows and Office products without actually owning a license key.
KMSPico - Google Search
“The user becomes infected by clicking one of the malicious links and downloading either KMSPico, Cryptbot, or another malware without KMSPico,” Red Canary researcher Tony Lambert said in a report published last week. “The adversaries install KMSPico also, because that is what the victim expects to happen, while simultaneously deploying Cryptbot behind the scenes.”
The American cybersecurity firm said it also observed several IT departments using illegitimate software instead of legitimate Microsoft licenses to activate systems, adding the altered KMSpico installers are distributed via a number of websites that claim to be offering the “official” version of the activator.
Did you find out?
We have started to offer information security & outsourcing services. Learn more HERE.
Do you have a small business? Get a security assessment for free! Contact Us now for more details.
If you find it interesting, you can read:
- Hack Tutorial #1: Free Hacking Tools for Ethical Hackers
- Hack Tutorial #2: List of HTTP status codes
- Hack Tutorial #3: Recover, Move or Hack WhatsApp account using WhatsDumpExtractor
- Hack Tutorial #4: List of Common Ports in networking
- Hack Tutorial #5: Free Cyber Security Basics Course
- The 15 biggest data breaches of the 21st century
- Security Guide: Keeping Your Business Safe Online and Offline 2021
- Cybersecurity Statistics for 2021
- Step by Step Tutorial – How To Perform A Network Security Vulnerability Assessment
- Vulnerability Management Process: Scanning, Prioritizing, and Remediating