• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Pretend ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft

Admin by Admin
August 19, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Microsoft warns {that a} faux ChatGPT desktop app was used to ship PipeMagic malware, linked to ransomware assaults exploiting a Home windows zero-day.

Cybersecurity researchers at Microsoft found a brand new backdoor referred to as PipeMagic whereas investigating assaults that abused a zero-day flaw in Home windows CLFS (CVE-2025-29824). What makes this backdoor harmful is the way it poses as a authentic open-source ChatGPT desktop utility whereas delivering a framework for working ransomware operations.

PipeMagic depends on a modular design that masses totally different parts as wanted. These modules deal with every part from command-and-control communication to payload execution, all whereas staying hidden by way of encrypted named pipes and in-memory operations. By separating its capabilities this manner, the backdoor makes it far harder for defenders to detect or analyze.

It’s value noting that the ChatGPT Desktop challenge on GitHub talked about by Microsoft (accessible right here) will not be malicious. What occurred is that attackers used a trojanized copy of this app, because it’s open supply, modified with hidden code, to ship the PipeMagic backdoor. The authentic model stays secure, however downloading from unofficial or compromised websites carries the chance of an infection.

“The primary stage of the PipeMagic an infection execution begins with a malicious in-memory dropper disguised because the open-source ChatGPT Desktop Utility challenge. The risk actor makes use of a modified model of the GitHub challenge that features malicious code to decrypt and launch an embedded payload in reminiscence.”

Microsoft

PipeMagic Attributed to Storm-2460

Microsoft attributes PipeMagic to a financially motivated group referred to as Storm-2460. In latest campaigns, the group used it alongside CVE-2025-29824, a privilege escalation vulnerability, to maneuver from preliminary entry to ransomware deployment.

The assaults haven’t been restricted to at least one business or geography, with victims recognized concentrating on monetary and actual property organizations in the USA, Europe, South America, and the Center East.

Researchers analyzing PipeMagic discovered that it manages payloads by way of a set of linked lists that act like inner queues. Some lists maintain modules ready to be executed, others handle community communication, whereas one listing stays unexplained however seems for use dynamically by loaded payloads. This construction permits Storm-2460 to replace or substitute parts on the fly, giving them flexibility with out having to redeploy your entire backdoor.

In line with Microsoft’s lengthy technical weblog publish, the communication layer of PipeMagic is equally refined. As an alternative of connecting on to its command server, the backdoor masses a devoted networking module that establishes a WebSocket-style reference to its operators.

This design retains community site visitors remoted from the remainder of the backdoor, limiting detection alternatives. As soon as a safe channel is energetic, PipeMagic sends detailed system data, together with bot ID, area particulars, course of integrity, and consumer context, earlier than receiving directions on what modules to run or which information to exfiltrate.

Storm-2460 can even insert new modules, replace current ones, collect hashes, enumerate processes, and even rename the backdoor executable for self-deletion. Subsequently, Microsoft has launched detections throughout Microsoft Defender merchandise and is urging organizations to evaluate their safety.

PipeMagic reveals simply how far backdoors have advanced. Through the use of a zero-day exploit with a modular backdoor, Storm-2460 constructed a device that simply bypasses detection. The complete Microsoft evaluation goes deep into its inner buildings and likewise affords mitigation steering.



Tags: appbackdoorChatGPTdeliveringDesktopFakeMicrosoftPipeMagic
Admin

Admin

Next Post
Battlefield 6’s Open Weapon System Is Good

Battlefield 6's Open Weapon System Is Good

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

$13.74M Hack Shuts Down Sanctioned Grinex Change After Intelligence Claims

$13.74M Hack Shuts Down Sanctioned Grinex Change After Intelligence Claims

April 20, 2026
In Different Information: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Analysis

In Different Information: Gladinet Flaw Exploitation, Assaults on ICS Honeypot, ClayRat Spyware and adware

October 11, 2025

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

March 29, 2026
Google Introduces Simula: A Reasoning-First Framework for Producing Controllable, Scalable Artificial Datasets Throughout Specialised AI Domains

Google Introduces Simula: A Reasoning-First Framework for Producing Controllable, Scalable Artificial Datasets Throughout Specialised AI Domains

April 21, 2026
Google DeepMind Introduces Decoupled DiLoCo: An Asynchronous Coaching Structure Reaching 88% Goodput Below Excessive {Hardware} Failure Charges

Google DeepMind Introduces Decoupled DiLoCo: An Asynchronous Coaching Structure Reaching 88% Goodput Below Excessive {Hardware} Failure Charges

April 24, 2026
5 AI Compute Architectures Each Engineer Ought to Know: CPUs, GPUs, TPUs, NPUs, and LPUs In contrast

5 AI Compute Architectures Each Engineer Ought to Know: CPUs, GPUs, TPUs, NPUs, and LPUs In contrast

April 10, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Hugging Face LeRobot Flaw Opens Door to Distant Code Execution Assaults

Hugging Face LeRobot Flaw Opens Door to Distant Code Execution Assaults

April 28, 2026
The AI Expertise Wage Premium

The AI Expertise Wage Premium

April 28, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved