Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Apple Patches CVE-2025-43300 Zero Day for iOS, iPados and Macos

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Group14 creates $463 million EVS silicon anodes from SK, Porsche and others

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » A Microsoft Windows vulnerability was exploited to deploy Pipemagic Ransomexx malware
Identity

A Microsoft Windows vulnerability was exploited to deploy Pipemagic Ransomexx malware

userBy userAugust 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 18, 2025Ravi LakshmananVulnerability/Cloud Security

Cybersecurity researchers are lifting the lid on the exploitation of security flawed threat actors currently being patched on Microsoft Windows and deploying plumbing malware on Ransomexx ransomware attacks.

The attacks include the exploitation of CVE-2025-29824, a privilege escalation vulnerability that affects Windows Common File System (CLFS), which Microsoft dealt with in April 2025.

Pipemagic was first documented in 2022 as part of a Ransomexx ransomware attack targeting industrial companies in Southeast Asia.

Cybersecurity

These attacks have been found that threat actors will exploit CVE-2017-0144, a Windows SMB remote code execution flaw, to infiltrate the victim’s infrastructure. It has been discovered that the subsequent infection chain observed in Saudi Arabia in October 2024 is leveraging the fake Openai ChatGPT app as bait to provide malware.

This early April, Microsoft was attributable to the exploitation of CVE-2025-29824 and the deployment of plumbing to threat actors tracking it as Storm-2460.

“One of Pipemagic’s unique features is \\.\pipe\1.,to generate a random 16-byte array that is used to create pipes with names formatted like Leonid Bezvershenko, Kirill Korchemny, and Ilya Savelyev. “Then, a thread is launched that tries to create this pipe continuously and then attempts to read data from it, destroying it. This communication method is necessary for the backdoor to send encrypted payloads and notifications.”

Pipemagic is plugin-based modular malware that uses domains hosted by Microsoft Azure cloud providers to stage additional components, with the 2025 attack targeting Saudi Arabia and Brazil, relying on the Microsoft Help Index file (“Metafile.mshi”). The loader unpacks the C# code that decrypts and executes the embedded shellcode.

“The injected shellcode is executable code for a 32-bit Windows system,” the researchers said. “Loads an unencrypted executable that is not embedded in the shellcode itself.”

Kaspersky also discovered that in October 2025, it revealed a Pipemagic Loader artifact poses as a ChatGPT client similar to that seen previously. The sample has been observed to utilize DLL hijacking techniques to run malicious dlls that mimic the Google Chrome Update file (“GoogleUpdate.dll”).

Regardless of the loading method used, it all leads to the deployment of pipe magic backdoors that support various modules –

Exit asynchronous communications module plugin that supports 5 commands, read/write files, finish file operations, or exit all file operation loader modules and insert additional payloads into memory, run the injector module and launch C# executable

Identity Security Risk Assessment

“The repeated detection of Pipemagic in attacks on Saudi organizations and its arrival in Brazil show that malware remains active and attackers continue to develop its functionality,” the researchers said.

“The version detected in 2025 shows improvements to the 2024 version intended to last in the victim system and move laterally within the internal network. In the 2025 attack, the attacker extracted memory from the LSASS process using the procdump tool that was changed to dllhost.exe.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy Paradigm built spreadsheets using AI agents for every cell
Next Article Watch Hurricane Erin reach Category 5 strength in the flames of lightning
user
  • Website

Related Posts

Apple Patches CVE-2025-43300 Zero Day for iOS, iPados and Macos

August 21, 2025

DOM-based extension ClickJacking exposes popular password managers to credentials and data theft

August 20, 2025

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

August 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Apple Patches CVE-2025-43300 Zero Day for iOS, iPados and Macos

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Group14 creates $463 million EVS silicon anodes from SK, Porsche and others

Google, sorry, that pixel event was Klinge Fest

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.