Friday, May 9, 2025
Homecyber securityRussian Hackers Leverages Weaponized Microsoft Key Management Service (KMS) to Hack Windows...

Russian Hackers Leverages Weaponized Microsoft Key Management Service (KMS) to Hack Windows Systems

Published on

SIEM as a Service

Follow Us on Google News

In a calculated cyber-espionage campaign, the Russian state-sponsored hacking group Sandworm (APT44), linked to the GRU (Russia’s Main Intelligence Directorate), has been exploiting pirated Microsoft Key Management Service (KMS) activation tools to target Ukrainian Windows systems.

This operation, active since late 2023, employs trojanized KMS activators and fake Windows updates to deploy malware, including the BACKORDER loader and Dark Crystal Remote Access Trojan (DcRAT), enabling large-scale data theft and espionage.

Malware Infection Chain

The attack begins with a malicious ZIP file, “KMSAuto++x64_v1.8.4.zip,” distributed via torrent platforms frequented by users seeking to bypass Windows licensing restrictions.

- Advertisement - Google News

Once executed, the tool mimics a legitimate Windows activation interface while secretly deploying the BACKORDER loader in the background.

This loader disables Windows Defender using PowerShell commands and employs Living Off the Land Binaries (LOLBINs) to evade detection.

It then downloads DcRAT from attacker-controlled domains, such as “kmsupdate2023[.]com.”

DcRAT enables attackers to exfiltrate sensitive data, including keystrokes, browser credentials, system information, and screenshots.

The malware also establishes persistence by creating scheduled tasks that ensure continued operation across system reboots or logoffs.

The campaign’s end goal is to collect critical intelligence from infected systems, posing significant security risks to individuals, organizations, and Ukraine’s critical infrastructure.

Strategic Exploitation of Pirated Software

Ukraine’s widespread use of unlicensed software estimated at 70% in the public sector has created fertile ground for such attacks.

Economic constraints often compel businesses and government entities to rely on pirated software, inadvertently expanding the attack surface for adversaries like Sandworm.

By embedding malware within widely used tools like KMS activators, Sandworm has successfully infiltrated both personal and institutional networks.

Researchers have strongly attributed this campaign to Sandworm based on overlapping infrastructure, consistent Tactics, Techniques, and Procedures (TTPs), and debug symbols referencing Russian-language build environments.

The group has also been linked to similar campaigns in the past, including phishing attacks targeting Ukraine’s critical infrastructure.

This operation underscores Russia’s broader hybrid warfare strategy, where cyber operations complement physical and economic pressures.

According to the SOC Prime, by targeting Ukraine’s reliance on pirated software, Sandworm not only compromises individual users but also threatens national security and resilience.

To counter such threats, cybersecurity experts recommend avoiding pirated software and implementing robust security measures such as endpoint detection tools and network monitoring systems.

Organizations are also urged to adopt proactive threat detection frameworks like those offered by platforms specializing in collective cyber defense.

The ongoing campaign highlights the evolving tactics of state-sponsored hacking groups like Sandworm and raises concerns about their potential global impact as they refine their methods in targeted regions like Ukraine.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Leverage Multimedia Systems in Stealthy Vishing Attacks

Threat actors have begun exploiting multimedia systems as a pivotal component of their voice...

Hackers Exploit PDF Invoices to Target Windows, Linux, and macOS Systems

A recent discovery by the FortiMail Incident Response team has revealed a highly sophisticated...

Indirect Prompt Injection Exploits LLMs’ Lack of Informational Context

A new wave of cyber threats targeting large language models (LLMs) has emerged, exploiting...

FreeDrain Phishing Attack Targets Users to Steal Financial Login Credentials

PIVOTcon, joint research by Validin and SentinelLABS has exposed FreeDrain, an industrial-scale cryptocurrency phishing...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Leverage Multimedia Systems in Stealthy Vishing Attacks

Threat actors have begun exploiting multimedia systems as a pivotal component of their voice...

Hackers Exploit PDF Invoices to Target Windows, Linux, and macOS Systems

A recent discovery by the FortiMail Incident Response team has revealed a highly sophisticated...

Indirect Prompt Injection Exploits LLMs’ Lack of Informational Context

A new wave of cyber threats targeting large language models (LLMs) has emerged, exploiting...