By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware
Computing

PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

News Room
Last updated: 2025/04/09 at 5:32 AM
News Room Published 9 April 2025
Share
SHARE

Apr 09, 2025Ravie LakshmananVulnerability / Ransomware

Microsoft has revealed that a now-patched security flaw impacting the Windows Common Log File System (CLFS) was exploited as a zero-day in ransomware attacks aimed at a small number of targets.

“The targets include organizations in the information technology (IT) and real estate sectors of the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in Saudi Arabia,” the tech giant said.

The vulnerability in question is CVE-2025-29824, a privilege escalation bug in CLFS that could be exploited to achieve SYSTEM privileges. It was fixed by Redmond as part of its Patch Tuesday update for April 2025.

Microsoft is tracking the activity and the post-compromise exploitation of CVE-2025-29824 under the moniker Storm-2460, with the threat actors also leveraging a malware named PipeMagic to deliver the exploit as well as ransomware payloads.

Cybersecurity

The exact initial access vector used in the attacks is currently not known. However, the threat actors have been observed using the certutil utility to download malware from a legitimate third-party site that was previously compromised to stage the payloads.

The malware is a malicious MSBuild file that contains an encrypted payload, which is then unpacked to launch PipeMagic, a plugin-based trojan that has been detected in the wild since 2022.

It’s worth mentioning here that CVE-2025-29824 is the second Windows zero-day flaw to be delivered via PipeMagic after CVE-2025-24983, a Windows Win32 Kernel Subsystem privilege escalation bug, which was flagged by ESET and patched by Microsoft last month.

Previously, PipeMagic was also observed in connection with Nokoyawa ransomware attacks that exploited another CLFS zero-day flaw (CVE-2023-28252).

“In some of the other attacks that we attribute to the same actor, we also observed that, prior to exploiting the CLFS elevation-of-privilege vulnerability, the victim’s machines were infected with a custom modular backdoor named ‘PipeMagic’ that gets launched via an MSBuild script,” Kaspersky pointed out in April 2023.

It’s crucial to note that Windows 11, version 24H2, is not affected by this specific exploitation, as access to certain System Information Classes within NtQuerySystemInformation is restricted to users with SeDebugPrivilege, which typically only admin-like users can obtain.

“The exploit targets a vulnerability in the CLFS kernel driver,” the Microsoft Threat Intelligence team explained. “The exploit then utilizes a memory corruption and the RtlSetAllBits API to overwrite the exploit process’s token with the value 0xFFFFFFFF, enabling all privileges for the process, which allows for process injection into SYSTEM processes.”

Cybersecurity

Successful exploitation is followed by the threat actor extracting user credentials by dumping the memory of LSASS and encrypting files on the system with a random extension.

Microsoft said it was unable to obtain a ransomware sample for analysis, but said that the ransom note dropped after encryption included a TOR domain tied to the RansomEXX ransomware family.

“Ransomware threat actors value post-compromise elevation of privilege exploits because these could enable them to escalate initial access, including handoffs from commodity malware distributors, into privileged access,” Microsoft said. “They then use privileged access for widespread deployment and detonation of ransomware within an environment.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Framework delays Laptop 12 orders in the US over tariffs
Next Article Smartphones and laptops sold on Amazon recalled over ‘risk of explosion’
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Intel Enables Wildcat Lake Display & Experimental Flip Queue For Linux 6.17 Graphics
Computing
WIN! Tickets to the Amateur Photographer Festival of Documentary Photography | Stuff
Gadget
Sky TV perks saving you £390 a year with free cinema trips & £20 movie voucher
News
Mecha BREAK launches globally, but faces player criticism · TechNode
Computing

You Might also Like

Computing

Intel Enables Wildcat Lake Display & Experimental Flip Queue For Linux 6.17 Graphics

3 Min Read
Computing

Mecha BREAK launches globally, but faces player criticism · TechNode

4 Min Read
Computing

South Africans ditch cash and cards for digital payments

6 Min Read
Computing

Exploring UGC creators: 10 strategies for success

13 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?