Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Dissects PipeMagic Modular Backdoor

Microsoft Dissects PipeMagic Modular Backdoor

Posted on August 19, 2025August 19, 2025 By CWS

Microsoft has delved into the internal workings of PipeMagic, a modular backdoor utilized in a number of ransomware assaults for the reason that starting of this 12 months.

Posing as a authentic open supply ChatGPT Desktop Software, PipeMagic is a complicated malware framework that gives attackers with persistent entry to the compromised system.

The backdoor makes use of modules for its varied capabilities, akin to command-and-control (C&C) communication, and is ready to dynamically execute payloads and supply the attackers with granular management over code execution, Microsoft explains.

“By offloading community communication and backdoor duties to discrete modules, PipeMagic maintains a modular, stealthy, and extremely extensible structure, making detection and evaluation considerably difficult,” the corporate notes.

Attributed to the financially motivated risk actor tracked as Storm-2460, related to the RansomEXX ransomware, PipeMagic has been utilized in assaults exploiting a Home windows zero-day tracked as CVE-2025-29824, towards organizations within the US, Europe, South America, and the Center East.

“Whereas the impacted organizations stay restricted, using a zero-day exploit, paired with a complicated modular backdoor for ransomware deployment, makes this risk notably notable,” Microsoft says.

As a part of the noticed assaults, PipeMagic was deployed in reminiscence. As soon as up and working, the malware obtained its modules via a named pipe, and saved them in reminiscence utilizing doubly linked lists.

The malware was noticed utilizing 4 doubly linked listing constructions, three for storing uncooked payload modules, modules already loaded in reminiscence, and networking modules, and one other believed to be leveraged dynamically by loaded payloads.Commercial. Scroll to proceed studying.

After the networking module establishes C&C communication, the backdoor collects in depth system info and sends it to the server, after which waits for instructions to execute.

Primarily based on the obtained C&C response, the backdoor can execute core performance, execute a selected module, ship a message to the C&C, shut down the networking module and C&C communication, or invoke all modules with particular arguments.

Backdoor performance supported by PipeMagic permits it to work together with modules, delete modules and itself, enumerate working processes, and recollect system info.

“As malware continues to evolve and grow to be extra subtle, we imagine that understanding threats akin to PipeMagic is important for constructing resilient defenses for any group. By exposing the internal workings of this malware, we additionally intention to disrupt adversary tooling and enhance the operational value for the risk actor, making it harder and costly for them to maintain their campaigns,” Microsoft notes.

Associated: Second Ransomware Group Caught Exploiting Home windows Flaw as Zero-Day

Associated: Ransomware Teams, Chinese language APTs Exploit Current SAP NetWeaver Flaws

Associated: BadCam: New BadUSB Assault Turns Linux Webcams Into Persistent Threats

Associated: New FinalDraft Malware Noticed in Espionage Marketing campaign

Security Week News Tags:Backdoor, Dissects, Microsoft, Modular, PipeMagic

Post navigation

Previous Post: New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers
Next Post: North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware

Related Posts

SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM Security Week News
From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth Security Week News
Workday Data Breach Bears Signs of Widespread Salesforce Hack Workday Data Breach Bears Signs of Widespread Salesforce Hack Security Week News
Root Evidence Launches With .5 Million in Seed Funding Root Evidence Launches With $12.5 Million in Seed Funding Security Week News
ConnectWise Discloses Suspected State-Sponsored Hack ConnectWise Discloses Suspected State-Sponsored Hack Security Week News
Cybersecurity M&A Roundup: 40 Deals Announced in September 2025 Cybersecurity M&A Roundup: 40 Deals Announced in September 2025 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News