#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

38 C
Dubai
Friday, August 22, 2025
HomeWorldwideMiddle EastPipeMagic Resurfaces: Kaspersky and BI.ZONE Report New Backdoor Activity in GCC and...

PipeMagic Resurfaces: Kaspersky and BI.ZONE Report New Backdoor Activity in GCC and Latin America

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

On 19 August 2025, Kaspersky and BI.ZONE disclosed the reemergence of the PipeMagic backdoor, a malware strain first identified in 2022. The campaign, initially limited to Asia, has now spread to Saudi Arabia and Brazil, exploiting a new Microsoft zero-day (CVE-2025-29824). The findings underscore the persistence of state-aligned and financially motivated attackers targeting critical infrastructure across multiple regions.

PipeMagic was first discovered by Kaspersky GReAT in December 2022 during investigations into a RansomExx campaign against industrial firms in Southeast Asia. Attackers used CVE-2017-0144 (EternalBlue) to infiltrate networks, with PipeMagic deployed as a backdoor capable of operating as both a remote access trojan (RAT) and a network proxy【source】.

Middle East Activity in 2024

In October 2024, PipeMagic reappeared in Saudi Arabia, delivered via a fake ChatGPT agent application. That variant used the Tokio and Tauri frameworks, the libaes library, and employed new persistence mechanisms to evade detection【source】.

2025 Campaign: GCC and Latin America in Focus

Exploiting CVE-2025-29824

According to Kaspersky and BI.ZONE, the April 2025 Microsoft Patch Tuesday included 121 fixes, but only one was confirmed as exploited in the wild: CVE-2025-29824, a privilege escalation bug in the clfs.sys logging driver. PipeMagic operators integrated an exploit for this flaw directly into their infection chain, enabling post-exploitation concealment and system takeover.

Technical Innovations

  • Use of a Microsoft Help Index file to decrypt and execute shellcode.
  • RC4 encryption with a hex key, decrypted and executed via EnumDisplayMonitors API.
  • Loader variants masquerading as a ChatGPT client, echoing Saudi incidents in 2024.

These refinements allowed PipeMagic to bypass defenses and achieve persistence within enterprise networks.

Regional Targets

  • Saudi Arabia (late 2024 – 2025): Ongoing attacks against local organizations, with an emphasis on industrial and critical infrastructure sectors.
  • Brazil (2025): Expansion into manufacturing firms, indicating a shift toward Latin American industrial targets.

Expert Commentary

“The reemergence of PipeMagic confirms that this malware remains active and continues to evolve. The 2024 versions introduced enhancements that improve persistence within victims’ infrastructures and facilitate lateral movement within targeted networks,”
Leonid Bezvershenko, Senior Security Researcher, Kaspersky GReAT (19 August 2025).

“In recent years, clfs.sys has become an increasingly popular target for cybercriminals, particularly financially motivated actors. They are leveraging zero-day vulnerabilities in this and other drivers to escalate privileges and conceal post-exploitation activities. To mitigate such threats, we recommend using EDR tools for early and post-exploitation detection,”
Pavel Blinnikov, Vulnerability Research Lead, BI.ZONE (19 August 2025).

MEA Perspective

Saudi Arabia’s continued targeting highlights the region’s attractiveness to attackers. As the Kingdom accelerates Vision 2030 digital transformation initiatives, adversaries are exploiting cybersecurity gaps in manufacturing and energy sectors. Regional regulators such as Saudi Arabia’s National Cybersecurity Authority (NCA) have repeatedly urged organizations to adopt stricter controls for OT/ICS networks, but the PipeMagic incidents reveal persistent challenges in patching and detection.

MITRE ATT&CK Mapping (Observed TTPs)

TacticTechniqueExample from PipeMagic
Initial AccessT1566Malicious Help Index file execution
ExecutionT1059.003PowerShell injection through WinAPI
PersistenceT1547Fake ChatGPT loader with persistence features
Privilege EscalationT1068CVE-2025-29824 (clfs.sys)
Defense EvasionT1027RC4 encryption of payloads
Command & ControlT1090Proxy functionality of PipeMagic backdoor
ImpactT1490Lateral movement and infrastructure disruption

Actionable Takeaways for Defenders

  1. Apply April 2025 Microsoft patches, prioritizing CVE-2025-29824 across Windows systems.
  2. Deploy EDR/XDR solutions to detect privilege escalation and lateral movement attempts.
  3. Audit installed applications to identify rogue or trojanized apps (e.g., fake ChatGPT clients).
  4. Segment OT/ICS and IT networks to reduce lateral spread of malware.
  5. Harden driver-level defenses, monitoring for unusual clfs.sys interactions.
  6. Block suspicious binaries masquerading as Help Index files.
  7. Train employees on social engineering threats that enable initial compromise (awareness training).
  8. Conduct proactive threat hunting for indicators tied to PipeMagic campaigns.
  9. Share IOCs with trusted threat intelligence networks for cross-sector defense.
  10. Simulate attack scenarios to test organizational resilience against privilege escalation exploits.

Conclusion

The PipeMagic comeback is a stark reminder that sophisticated backdoors evolve across years and regions. From its origins in Asia to recent campaigns in Saudi Arabia and Brazil, the malware demonstrates the attackers’ adaptability and persistence. With CVE-2025-29824 actively exploited, defenders must treat privilege escalation in drivers as a frontline risk. Proactive patching, cross-network segmentation, and EDR adoption are now critical to stop the next wave before it spreads deeper into global infrastructure.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here