Microsoft goes rogue while closing support tickets

This is as disgusting at it can ever get for a company. Its neither legal nor in compliance with MS policies. Even worse, will this land as the next under the radar exploit? Why is that repository even accessible even to MS support personnel?

The Microsoft support engineer in this case, ran the following PowerShell command on the customer's Windows PC (URL slightly modified to prevent execution):

irm hxxps://massgrave[.]dev/get | iex
The command establishes a connection to, an unofficial repository of Windows and Office "activator" scripts that may slip under the radar of most antivirus products.


MS Certified Professional Windows 11 Home 22H2 x 64 build 22621.1702 - Windows 10 Pro x 64 version 22H2 / build 19045.3031 / Norton Security Ultra - Norton 360 Deluxe ver. / Opera GX LVL4 (core: 98.0.4759.74) 64 bit-Early Access w/Norton Chrome Extensions