Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Kurdish PKK could dissolve and end decades of conflict in Türkiye | News

Millennials raised $2 million for a money-saving app for immigrants

University Trump crackdown tests appeals against international students

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Pipemagic Trojan leverages Windows Zero-Day vulnerabilities to deploy ransomware
Identity

Pipemagic Trojan leverages Windows Zero-Day vulnerabilities to deploy ransomware

userBy userApril 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 9, 2025Ravi LakshmananVulnerability/Ransomware

Windows CLFS is a zero-day vulnerability for deploying ransomware

Microsoft has revealed that a currently patched security flaw affecting Windows Common Log File System (CLFS) has been exploited as a zero-day for ransomware attacks targeting a small number of targets.

“The goals include organizations in the Information Technology (IT) and the US real estate sector, the Venezuela financial sector, the Spanish software company, and the Saudi Arabia retail sector,” Tech Giant said.

The vulnerability in question is CVE-2025-29824. This is a CLF privilege escalation bug that can be exploited to achieve system privileges. Fixed by Redmond as part of the Tuesday update in April 2025.

Microsoft is tracking the activity and post-compromise activities of CVE-2025-29824 based on Monica’s Storm-2460, and threat actors will leverage malware named Pipemagic to provide exploits and ransomware payloads.

Cybersecurity

The exact initial access vector used in the attack is currently unknown. However, threat actors have been observed using the Certutil utility, downloading malware from legitimate third-party sites that they previously compromised to set the payload.

Malware is a malicious MSBuild file containing an encrypted payload and is unpacked to launch Pipemagic, a plugin-based trojan that has been detected in the wild since 2022.

It is worth mentioning here that CVE-2025-29824 is a flaw in the second Windows Zero-Day that will be delivered via Pipemagic after CVE-2025-24983.

Previously, plumbing agents were observed in connection with a Nokoya Warrantomware attack that exploited another CLFS zero-day defect (CVE-2023-28252).

“In some of the other attacks that we attribute to the same actor, before exploiting the major vulnerability in CLFS, we observed that the victim’s machine was infected with a custom modular backdoor named “Pipemagic” that is launched via an MSBuild script.

It is important to note that Windows 11 version 24H2 is not affected by this particular exploitation, as access to certain system information classes within ntquerysysteminformation is usually restricted to users with SedebugPrivilege that can only be obtained by users like administrators.

“Exploits target CLFS kernel driver vulnerabilities,” explained the Microsoft Threat Intelligence team. “Exploits utilize memory corruption and the RTLSetAllbits API to overwrite the exploit process token with the value 0xffffffffff, allowing all privileges of the process and allowing process injection into system processes.”

Cybersecurity

The successful exploitation is followed by threat actors who extract user credentials by dumping LSASS memory and encrypting files on the system with random extensions.

Microsoft said it could not retrieve ransomware samples for analysis, but said that after encryption, the ransom notes contain a TOR domain tied to the ransomexx ransomware family.

“Ransomware threat actors value post-compromise promotions in privileged exploits, which can allow them to escalate initial access, including handoffs from commodity malware distributors to privileged access,” Microsoft said. “They will then use privileged access to the widespread deployment and explosion of ransomware within their environment.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS freezes funds for Cornell in the northwest after pro-Palestinian protests | Israeli-Palestinian conflict news
Next Article Global uranium resources can be fueled by the nuclear energy boom
user
  • Website

Related Posts

Google pays $1.375 billion to Texas for fraudulent tracking and collection of biometric data

May 10, 2025

Germany shuts down more than $1.9 billion in laundry, seizing 34 million euros and 8TB of data using crypto

May 10, 2025

Breaking: EOL system dismantled in the US using 7,000 device proxy botnet IoT

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Kurdish PKK could dissolve and end decades of conflict in Türkiye | News

Millennials raised $2 million for a money-saving app for immigrants

University Trump crackdown tests appeals against international students

“Who suffered the most?”: Kashmir’s fear and fatigue after the ceasefire | India and Pakistan tension news

Trending Posts

Kurdish PKK could dissolve and end decades of conflict in Türkiye | News

May 12, 2025

“Who suffered the most?”: Kashmir’s fear and fatigue after the ceasefire | India and Pakistan tension news

May 12, 2025

We welcome “significant progress” made in customs talks in Geneva | Trade War News

May 11, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Founders and Indie Hackers: Are potential buyers find your product at every stage of their search journey?

Google pays Texas with $1.375 billion in the country’s largest data privacy payment

Former Northvolt CEO Peter Carlson secures funding for the company’s new AI manufacturing startup after bankruptcy

Celsius founder Alex Masski has been sentenced to 12 years in a crypto fraud that was ordered to pay $48 million

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.