Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware

Posted on August 19, 2025August 19, 2025 By CWS

Cybersecurity researchers have uncovered a classy malware marketing campaign exploiting Microsoft Assist Index Recordsdata (.mshi) to ship the infamous PipeMagic backdoor, marking a big evolution within the risk actors’ ways for the reason that malware’s first detection in 2022.

The marketing campaign, which has focused organizations throughout Saudi Arabia and Brazil all through 2025, demonstrates the attackers’ continued refinement of their an infection strategies and persistence mechanisms.

PipeMagic initially emerged in December 2022 throughout a RansomExx ransomware marketing campaign concentrating on industrial corporations in Southeast Asia.

The malware gained prominence when it was later found exploiting CVE-2025-29824, a vulnerability that Microsoft recognized as being actively exploited within the wild throughout their April 2025 patch cycle.

The backdoor’s operators have demonstrated exceptional adaptability, transitioning from exploiting the CVE-2017-0144 vulnerability of their early campaigns to using extra subtle social engineering methods in latest assaults.

Clean display screen of the faux utility (Supply – Securelist)

The newest iteration of PipeMagic has expanded its geographical attain, with Securelist researchers figuring out infections in a number of areas.

The malware maintains its core performance as a flexible backdoor able to working in two distinct modes: as a complete distant entry device and as a community gateway for lateral motion inside compromised infrastructure.

What distinguishes the 2025 marketing campaign is the attackers’ modern use of Microsoft Assist Index Recordsdata as an preliminary an infection vector.

These recordsdata, sometimes containing metadata for Microsoft assist documentation, have been weaponized to hold obfuscated C# code alongside encrypted payloads.

The malicious .mshi recordsdata leverage the professional MSBuild framework for execution, successfully bypassing conventional safety controls which may flag extra standard executable codecs.

Superior An infection Mechanism By means of MSBuild Exploitation

The an infection chain begins when victims execute the malicious metafile.mshi, which accommodates closely obfuscated C# code paired with an intensive hexadecimal string.

Contents of metafile.mshi (Supply – Securelist)

The execution happens by a fastidiously crafted command line sequence:-

c:windowssystem32cmd.exe “/ok c:windowsmicrosoft.netframeworkv4.0.30319msbuild.exe c:w

The embedded C# code performs twin features inside the an infection course of. First, it decrypts the accompanying shellcode utilizing the RC4 stream cipher with a hardcoded 64-character hexadecimal key (4829468622e6b82ff056e3c945dd99c94a1f0264d980774828aadda326b775e5).

Following profitable decryption, the code executes the shellcode by the Home windows API operate EnumDeviceMonitor, using a method that inserts the shellcode pointer into the operate’s third parameter whereas setting the primary two parameters to zero.

The decrypted shellcode accommodates executable code particularly designed for 32-bit Home windows programs. It employs subtle evasion methods, together with export desk parsing and FNV-1a hashing algorithms to dynamically resolve system API addresses, making static evaluation significantly more difficult.

The shellcode finally masses an unencrypted executable embedded inside its personal construction, establishing the PipeMagic backdoor’s presence on the compromised system and enabling communication by its attribute named pipe infrastructure at 127.0.0.1:8082.

Increase your SOC and assist your crew shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Abuse, Actors, Execute, File, Index, Malware, Microsoft, PipeMagic, Threat

Post navigation

Previous Post: DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators
Next Post: Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield

Related Posts

CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure Cyber Security News
Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot Cyber Security News
Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Cyber Security News
Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Cyber Security News
20 Best Inventory Management Tools in 2025 Cyber Security News
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News