Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Malicious browser extensions will infect 722 users across Latin America since early 2025

Trump officials vow to lift school separation orders

Should the government ban AI-generated humans to stop the collapse of social trust?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Pipemagic Trojan leverages Windows Zero-Day vulnerabilities to deploy ransomware
Identity

Pipemagic Trojan leverages Windows Zero-Day vulnerabilities to deploy ransomware

userBy userApril 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 9, 2025Ravi LakshmananVulnerability/Ransomware

Windows CLFS is a zero-day vulnerability for deploying ransomware

Microsoft has revealed that a currently patched security flaw affecting Windows Common Log File System (CLFS) has been exploited as a zero-day for ransomware attacks targeting a small number of targets.

“The goals include organizations in the Information Technology (IT) and the US real estate sector, the Venezuela financial sector, the Spanish software company, and the Saudi Arabia retail sector,” Tech Giant said.

The vulnerability in question is CVE-2025-29824. This is a CLF privilege escalation bug that can be exploited to achieve system privileges. Fixed by Redmond as part of the Tuesday update in April 2025.

Microsoft is tracking the activity and post-compromise activities of CVE-2025-29824 based on Monica’s Storm-2460, and threat actors will leverage malware named Pipemagic to provide exploits and ransomware payloads.

Cybersecurity

The exact initial access vector used in the attack is currently unknown. However, threat actors have been observed using the Certutil utility, downloading malware from legitimate third-party sites that they previously compromised to set the payload.

Malware is a malicious MSBuild file containing an encrypted payload and is unpacked to launch Pipemagic, a plugin-based trojan that has been detected in the wild since 2022.

It is worth mentioning here that CVE-2025-29824 is a flaw in the second Windows Zero-Day that will be delivered via Pipemagic after CVE-2025-24983.

Previously, plumbing agents were observed in connection with a Nokoya Warrantomware attack that exploited another CLFS zero-day defect (CVE-2023-28252).

“In some of the other attacks that we attribute to the same actor, before exploiting the major vulnerability in CLFS, we observed that the victim’s machine was infected with a custom modular backdoor named “Pipemagic” that is launched via an MSBuild script.

It is important to note that Windows 11 version 24H2 is not affected by this particular exploitation, as access to certain system information classes within ntquerysysteminformation is usually restricted to users with SedebugPrivilege that can only be obtained by users like administrators.

“Exploits target CLFS kernel driver vulnerabilities,” explained the Microsoft Threat Intelligence team. “Exploits utilize memory corruption and the RTLSetAllbits API to overwrite the exploit process token with the value 0xffffffffff, allowing all privileges of the process and allowing process injection into system processes.”

Cybersecurity

The successful exploitation is followed by threat actors who extract user credentials by dumping LSASS memory and encrypting files on the system with random extensions.

Microsoft said it could not retrieve ransomware samples for analysis, but said that after encryption, the ransom notes contain a TOR domain tied to the ransomexx ransomware family.

“Ransomware threat actors value post-compromise promotions in privileged exploits, which can allow them to escalate initial access, including handoffs from commodity malware distributors to privileged access,” Microsoft said. “They will then use privileged access to the widespread deployment and explosion of ransomware within their environment.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS freezes funds for Cornell in the northwest after pro-Palestinian protests | Israeli-Palestinian conflict news
Next Article Global uranium resources can be fueled by the nuclear energy boom
user
  • Website

Related Posts

Malicious browser extensions will infect 722 users across Latin America since early 2025

June 8, 2025

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025

Empower users and protect against Genai data loss

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Malicious browser extensions will infect 722 users across Latin America since early 2025

Trump officials vow to lift school separation orders

Should the government ban AI-generated humans to stop the collapse of social trust?

Lawyers could face “severe” penalties for quotes generated by fake AI, UK courts warn

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Should the government ban AI-generated humans to stop the collapse of social trust?

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.