PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

4 Min Read
4 Min Read

Microsoft has revealed {that a} now-patched safety flaw impacting the Home windows Frequent Log File System (CLFS) was exploited as a zero-day in ransomware assaults geared toward a small variety of targets.

“The targets embrace organizations within the info expertise (IT) and actual property sectors of the US, the monetary sector in Venezuela, a Spanish software program firm, and the retail sector in Saudi Arabia,” the tech big stated.

The vulnerability in query is CVE-2025-29824, a privilege escalation bug in CLFS that may very well be exploited to realize SYSTEM privileges. It was mounted by Redmond as a part of its Patch Tuesday replace for April 2025.

Microsoft is monitoring the exercise and the post-compromise exploitation of CVE-2025-29824 underneath the moniker Storm-2460, with the menace actors additionally leveraging a malware named PipeMagic to ship the exploit in addition to ransomware payloads.

The precise preliminary entry vector used within the assaults is at the moment not recognized. Nevertheless, the menace actors have been noticed utilizing the certutil utility to obtain malware from a professional third-party website that was beforehand compromised to stage the payloads.

The malware is a malicious MSBuild file that accommodates an encrypted payload, which is then unpacked to launch PipeMagic, a plugin-based trojan that has been detected within the wild since 2022.

It is price mentioning right here that CVE-2025-29824 is the second Home windows zero-day flaw to be delivered through PipeMagic after CVE-2025-24983, a Home windows Win32 Kernel Subsystem privilege escalation bug, which was flagged by ESET and patched by Microsoft final month.

See also  Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Beforehand, PipeMagic was additionally noticed in reference to Nokoyawa ransomware assaults that exploited one other CLFS zero-day flaw (CVE-2023-28252).

“In a number of the different assaults that we attribute to the identical actor, we additionally noticed that, previous to exploiting the CLFS elevation-of-privilege vulnerability, the sufferer’s machines have been contaminated with a customized modular backdoor named ‘PipeMagic’ that will get launched through an MSBuild script,” Kaspersky identified in April 2023.

It is essential to notice that Home windows 11, model 24H2, will not be affected by this particular exploitation, as entry to sure System Info Lessons inside NtQuerySystemInformation is restricted to customers with SeDebugPrivilege, which generally solely admin-like customers can acquire.

“The exploit targets a vulnerability within the CLFS kernel driver,” the Microsoft Menace Intelligence crew defined. “The exploit then makes use of a reminiscence corruption and the RtlSetAllBits API to overwrite the exploit course of’s token with the worth 0xFFFFFFFF, enabling all privileges for the method, which permits for course of injection into SYSTEM processes.”

Profitable exploitation is adopted by the menace actor extracting consumer credentials by dumping the reminiscence of LSASS and encrypting recordsdata on the system with a random extension.

Microsoft stated it was unable to acquire a ransomware pattern for evaluation, however stated that the ransom word dropped after encryption included a TOR area tied to the RansomEXX ransomware household.

“Ransomware menace actors worth post-compromise elevation of privilege exploits as a result of these may allow them to escalate preliminary entry, together with handoffs from commodity malware distributors, into privileged entry,” Microsoft stated. “They then use privileged entry for widespread deployment and detonation of ransomware inside an surroundings.”

See also  Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed

Share This Article
Leave a comment