Microsoft has officially stopped supporting Windows 10, marking a major change for millions of users worldwide. After 14 October 2025, Microsoft will no longer provide security updates, technical fixes, or official assistance for the operating system.
While computers running Windows 10 will still function, they will gradually become more exposed to cyber risks. Without new security patches, these systems could be more vulnerable to malware, data breaches, and other online attacks.
Who Will Be Affected
Windows remains the world’s most widely used operating system, powering over 1.4 billion devices globally. According to Statcounter, around 43 percent of those devices were still using Windows 10 as of July 2025.
In the United Kingdom, consumer group Which? estimated that around 21 million users continue to rely on Windows 10. A recent survey found that about a quarter of them intend to keep using the old version despite the end of official support, while roughly one in seven are planning to purchase new computers.
Consumer advocates have voiced concerns that ending Windows 10 support will lead to unnecessary hardware waste and higher expenses. Nathan Proctor, senior director at the U.S. Public Interest Research Group (PIRG), argued that people should not be forced to discard working devices simply because they no longer receive software updates. He stated that consumers “deserve technology that lasts.”
What Are the Options for Users
Microsoft has provided two main paths for personal users. Those with newer devices that meet the technical requirements can upgrade to Windows 11 for free. However, many older computers do not meet those standards and cannot install the newer operating system.
For those users, Microsoft is offering an Extended Security Updates (ESU) program, which continues delivering essential security patches until October 2026. The ESU program does not include technical support or feature improvements.
Individuals in the European Economic Area can access ESU for free after registering with Microsoft. Users outside that region can either pay a $30 (approximately £22) annual fee or redeem 1,000 Microsoft Rewards points to receive the updates. Businesses and commercial organizations face higher costs, paying around $61 per device.
What’s at Stake
Microsoft has kept Windows 10 active since its release in 2015, providing regular updates and new features for nearly a decade. The decision to end support means that new vulnerabilities will no longer be fixed, putting unpatched systems at greater risk.
The company warns that organizations running outdated systems may also face compliance challenges under data protection and cybersecurity regulations. Additionally, software developers may stop updating their applications for Windows 10, causing reduced compatibility or performance issues in the future.
Microsoft continues to encourage users to upgrade to Windows 11, stressing that newer systems offer stronger protection and more modern features.
A group of hackers has created a tool that allows people to activate Microsoft Windows and Office software without needing an official license. This method, described as a major breakthrough in software piracy, completely bypasses Microsoft's security system. Surprisingly, Microsoft has not taken any action against it so far.
A New Way to Unlock Microsoft Software
The hacker group, known as Massgrave, has been making activation tools for years. Their latest update, called Microsoft Activation Scripts (MAS) 3.0, introduces a powerful new method called TSforge Activation. This technique enables users to unlock different versions of Windows and Office permanently, even if they do not have a valid license.
One of its most prominent features is that it allows Windows 10 users to continue receiving updates beyond the official support cutoff in October 2025. This makes it especially useful for those who want to keep using older systems without paying for Microsoft’s extended support.
MAS was first launched in 2024 as an open-source project meant to remove Microsoft’s digital restrictions. The latest update improves its features, fixes previous issues, and enhances its ability to bypass security checks. Massgrave claims that TSforge Activation is one of the most advanced tools they have ever created.
How Does TSforge Activation Work?
Microsoft uses a system called the Software Protection Platform (SPP) to control software licensing. This system ensures that only users with valid product keys can access all the features of Windows and Office. It relies on two main files:
1. Data.dat (Physical Store) – This file contains essential activation details.
2. Tokens.dat (Token Store) – This file helps verify whether a product key is legitimate.
The TSforge Activation method tricks Microsoft’s security system by injecting false data into these files. This makes the system believe that an invalid product key is genuine, allowing users to activate their software for free.
The activation method works on:
Additionally, users can unlock premium features meant for business licenses, such as Microsoft’s Extended Security Updates (ESU) program. This allows older Windows versions to continue receiving security updates beyond their expiration dates.
Microsoft’s Reaction and Ethical Concerns
Massgrave acknowledges that Microsoft has improved its security over time. They admit that the Software Protection Platform is much stronger than the old systems used in Windows XP. However, they argue that their project is not truly piracy because it is an open-source tool available on GitHub, a platform owned by Microsoft.
Despite this, using activation tools without a legal license is against Microsoft’s terms of service. While the company has not taken action against this tool yet, using such software carries risks. In some cases, companies or individuals who distribute or use illegal activation methods can face legal consequences.
Interestingly, Massgrave does not charge for its tool, stating that they do not believe in making money from piracy. However, they continue to develop new ways to bypass Microsoft’s security, raising questions about software ownership and digital rights.
The release of TSforge Activation underlines the ongoing conflict between software developers and digital piracy. While Microsoft strengthens its security, hackers find new ways to bypass restrictions. Users should carefully consider the legal and ethical risks before using unauthorized activation methods.
DLL hijacking is an attack method used by threat actors to take advantage of the way Windows loads dynamic link libraries (DLLs).
During the launch of a Windows executable, it will look for any DLL dependencies present in the Windows search path. The program would instead load a malicious DLL and infect the computer if a threat actor creates a malicious DLL with the same name as one of the program's necessary DLLs and retained it in the same folder as the executable.
QBot, also known as Qakbot, is a Windows malware that was initially a banking trojan but later emerged as a full-featured malware dropper. The malware is also utilized by renowned ransomware gangs like Black Basta, Egregor, and Prolock in order to gain initial access to corporate networks.
In July, security researcher ProxyLife found that threat actors were using the Windows 7 Calculator's DLL hijacking vulnerability, in order to spread the QBot malware.
Meanwhile this week, ProxyLife reported that the threat actors have switched to utilizing a DLL hijacking flaw in the Windows10 Control Panel executable, namely control.exe.
Abusing the Windows Control Panel:
In a phishing campaign witnessed by ProxyLife, the hackers used stolen reply- chain emails to distribute an HTML file attachment, which downloads a password-protected ZIP archive consisting an ISO file inside.
The HTML file, named similar to 'RNP_[number]_[number].html, displays an image personating Google Drive and a password for a ZIP archive that is downloaded automatically. This ZIP archive consists of an ISO disk image that, when double-clicked will automatically be displayed in a new drive letter in Windows10 and later.
This ISO file contains a Windows Shortcut (.LNK) file, a ‘control.exe’ (Windows 10 Control Panel) executable, and two DLL files named edputil.dll (used for DLL hijack) and msoffice32.dll (QBot malware).
The Windows shortcut (.LNK) included in the ISO uses an icon that attempts to make it look like a genuine folder.
The shortcut, however, opens the Windows 10 Control Panel executable, control.exe, which is kept in the ISO file, when a user tries to open this fabricated folder.
The genuine edputil.dll DLL, which is placed in the C:WindowsSystem32 folder, will automatically be loaded when control.exe is opened. It does not, however, look for the DLL in specific folders and will load any DLL with the same name that is put in the same folder as the program control.exe.
As the hackers are bundling a malicious edputil.dil DLL in the same folder as control.exe, instead the fraudulent DLL will be loaded by the users. Once the malicious edputil.dll DLL is loaded, it infects the device with the QBot malware (msoffice32.dll) using the regsvr32.exe msoffice32.dll command.
Security software may not recognize QBot as malicious if it is installed using a trustworthy tool, such as the Windows 10 Control Panel, allowing the malware to avoid detection.
QBot will now covertly run in the background, accessing and stealing emails to use them later for the phishing attacks and install additional payloads like Brute Ratel or Cobalt Strike, that are post-exploitations toolkits that hackers use to acquire remote access to corporate networks. This remote access further leads to corporate data theft and ransomware attacks.