By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
Computing

Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware

News Room
Last updated: 2025/08/18 at 1:06 PM
News Room Published 18 August 2025
Share
SHARE

Aug 18, 2025Ravie LakshmananVulnerability / Cloud Security

Cybersecurity researchers have lifted the lid on the threat actors’ exploitation of a now-patched security flaw in Microsoft Windows to deploy the PipeMagic malware in RansomExx ransomware attacks.

The attacks involve the exploitation of CVE-2025-29824, a privilege escalation vulnerability impacting the Windows Common Log File System (CLFS) that was addressed by Microsoft in April 2025, Kaspersky and BI.ZONE said in a joint report published today.

PipeMagic was first documented in 2022 as part of RansomExx ransomware attacks targeting industrial companies in Southeast Asia, capable of acting as a full-fledged backdoor providing remote access and executing a wide range of commands on compromised hosts.

Cybersecurity

In those attacks, the threat actors have been found to exploit CVE-2017-0144, a remote code execution flaw in Windows SMB, to infiltrate victim infrastructure. Subsequent infection chains observed in October 2024 in Saudi Arabia were spotted leveraging a fake OpenAI ChatGPT app as bait to deliver the malware.

Earlier this April, Microsoft attributed the exploitation of CVE-2025-29824 and the deployment of PipeMagic to a threat actor it tracks as Storm-2460.

“One unique feature of PipeMagic is that it generates a random 16-byte array used to create a named pipe formatted as: \.pipe1.<hex string>,” researchers Sergey Lozhkin, Leonid Bezvershenko, Kirill Korchemny, and Ilya Savelyev said. “After that, a thread is launched that continuously creates this pipe, attempts to read data from it, and then destroys it. This communication method is necessary for the backdoor to transmit encrypted payloads and notifications.”

PipeMagic is a plugin-based modular malware that uses a domain hosted on the Microsoft Azure cloud provider to stage the additional components, with 2025 attacks aimed at Saudi Arabia and Brazil relying on a Microsoft Help Index file (“metafile.mshi”) as a loader. The loader, in turn, unpacks C# code that decrypts and executes embedded shellcode.

“The injected shellcode is executable code for 32-bit Windows systems,” the researchers said. “It loads an unencrypted executable embedded inside the shellcode itself.”

Kaspersky said it also uncovered PipeMagic loader artifacts masquerading as a ChatGPT client in 2025 that are similar to those previously seen in October 2024. The samples have been observed leveraging DLL hijacking techniques to run a malicious DLL that mimics a Google Chrome update file (“googleupdate.dll”).

Irrespective of the loading method used, it all leads to the deployment of the PipeMagic backdoor that supports various modules –

  • Asynchronous communication module that supports five commands to terminate the plugin, read/write files, terminate a file operation, or terminate all file operations
  • Loader module to inject additional payloads into memory and execute them
  • Injector module to launch a C# executable
Identity Security Risk Assessment

“The repeated detection of PipeMagic in attacks on organizations in Saudi Arabia and its appearance in Brazil indicate that the malware remains active and that the attackers continue to develop its functionality,” the researchers said.

“The versions detected in 2025 show improvements over the 2024 version, aimed at persisting in victim systems and moving laterally within internal networks. In the 2025 attacks, the attackers used the ProcDump tool, renamed to dllhost.exe, to extract memory from the LSASS process.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article From MSNBC to ‘MS NOW’: Legacy of Microsoft’s news experiment echoes in network’s new name
Next Article The Best Free Documentaries You Can Stream Right Now (No Login Required)
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures
Computing
Court rules that the FCC lawfully fined T-Mobile over improper use of location data
News
These Movies Have the Most Underrated Soundtracks of All Time
News
‘The AI recognition software of a store has confused me for a fraud’
News

You Might also Like

Computing

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures

4 Min Read
Computing

Kdenlive 25.08 Preps For Future Hardware Acceleration Features

1 Min Read
Computing

Lynk & Co’s flagship SUV to feature NVIDIA’s next-gen chip in world first · TechNode

1 Min Read
Computing

I Checked My SSD’s Health—Here’s What the Numbers Are Telling Me

9 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?