Massgrave hackers group has recently announced a breakthrough in their development – a method that allows for the bypassing of Windows and Office licenses protection. This new technique promises to permanently activate “almost any version” of these programs, including both client and server versions, as well as security updates like Extended Security Updates (ESU) and Microsoft Customer Specific Volume License Keys (CSVLK).
Prior to this development, users were required to enter keys or undergo automatic activation processes for Windows and Office products. Critics of the method argue that it does not entail the installation of third-party files nor necessitate any changes to system data, making the activation process much simpler. To back up their claims, the authors have even shared a screenshot showcasing a fully activated version of Windows with ESU.
The supported products for this new activation method include Windows 7, Windows 8 and 8.1, various server versions of Windows, as well as additional features and security updates. A notable feature of this hacking technique is its ability to include Extended Security Updates for Windows 10, which are set to take effect in October 2025.
Hackers have pointed out that traditional activation methods such as HWID and KMS have been utilized for years – HWID since 2018 and KMS for over 17 years. However, these methods did not guarantee continuous activation for all versions. The newly developed method, as claimed by the hackers, effectively bypasses these limitations and expands the scope of support.
Looking ahead, hackers are planning to release their tool to the public in the coming months. If experts’ assessments are accurate, this could pose a significant challenge for Microsoft. The company’s response to this development remains uncertain, but the efficacy of its licensed protection has undoubtedly been called into question by the discovery of this new activation method.