logo
Kaspersky and BI.ZONE report new PipeMagic activity in the GCC and Latin America

Kaspersky and BI.ZONE report new PipeMagic activity in the GCC and Latin America

Biz Bahrain14 hours ago
Kaspersky's Global Research and Analysis Team (GReAT) in collaboration with BI.ZONE Vulnerability Research experts, observed new 2025 activity associated with the PipeMagic backdoor originally discovered in December 2022. The backdoor has expanded its attack geography: initially observed in Asia, and afterwards detected in Saudi Arabia in late 2024. Recent attacks show sustained interest in Saudi organizations, alongside expansion into new regions, notably manufacturing companies in Brazil. The researchers tracked the malware's evolution, identified key changes in the operators' tactics, and conducted a technical analysis of Microsoft vulnerability CVE-2025-29824. This vulnerability was the only one among the 121 patched in April 2025 that was actively exploited in the wild. It was specifically targeted by an exploit integrated into the PipeMagic infection chain. The vulnerability allowed privilege escalation in the operating system due to a flaw in the clfs.sys logging driver. One of the 2025 campaign attacks leveraged a Microsoft Help Index File, which serves two purposes: decrypting and executing shellcode. The shellcode is encrypted using the RC4 stream cipher with a hexadecimal key. Once decrypted, the code is executed via the WinAPI EnumDisplayMonitors function, allowing dynamic resolution of system API addresses through process injection. Researchers also identified updated versions of the PipeMagic loader masquerading as a ChatGPT client. This application resembles the one used in the 2024 attacks on Saudi organizations — sharing the same Tokio and Tauri frameworks, the same libaes library version, and demonstrating similar file structures and behavior. 'The reemergence of PipeMagic confirms that this malware remains active and continues to evolve. The 2024 versions introduced enhancements that improve persistence within victims' infrastructures and facilitate lateral movement within targeted networks,' comments Leonid Bezvershenko, senior security researcher at Kaspersky GReAT. 'In recent years, clfs.sys has become an increasingly popular target for cybercriminals, particularly financially motivated actors. They are leveraging zero-day vulnerabilities in this and other drivers to escalate privileges and conceal post-exploitation activities. To mitigate such threats, we recommend using EDR tools, which enable both early and post-exploitation detection of suspicious behavior,' notes Pavel Blinnikov, Vulnerability Research Lead, BI.ZONE. PipeMagic is a backdoor first discovered by Kaspersky in 2022 during an investigation into a malicious campaign involving RansomExx. Victims at the time included industrial companies in Southeast Asia. The attackers exploited the CVE-2017-0144 vulnerability to gain access to internal infrastructure. The backdoor supports two operational modes — functioning either as a full-featured remote access tool or as a network proxy, enabling execution of a wide range of commands. In October 2024, a new iteration of PipeMagic was observed in attacks against organizations in Saudi Arabia, using a fake ChatGPT agent application as a lure.
Read the full report on Securelist.com.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

emetschek Group and buildingSMART Saudi Arabia Join Forces to Advance Digital Transformation and Open Standards in Saudi Arabia's AEC/O Sector
emetschek Group and buildingSMART Saudi Arabia Join Forces to Advance Digital Transformation and Open Standards in Saudi Arabia's AEC/O Sector

Syyaha

time3 hours ago

  • Syyaha

emetschek Group and buildingSMART Saudi Arabia Join Forces to Advance Digital Transformation and Open Standards in Saudi Arabia's AEC/O Sector

Riyadh, Saudi Arabia – 20 August 2025 – The Nemetschek Group, a global leader in software solutions for the Architecture, Engineering, Construction, and Operations (AEC/O) industry, has entered a strategic partnership with buildingSMART Saudi Arabia, the Kingdom's chapter of buildingSMART International – the global authority spearheading digital transformation in the built asset collaboration is intended to fast-track the adoption of open Building Information Modeling (openBIM) and international digital standards within Saudi Arabia's construction and infrastructure sectors. The initiative aligns closely with the Kingdom's Vision 2030, supporting national goals around innovation, sustainability, and economic this agreement, both organizations plan to work together to facilitate the implementation of openBIM and digital standards in the AEC/O sector and to identify pilot projects for applying Nemetschek's solutions to enhance project efficiency, safety, and cost the collaboration sets forth plans to co-develop and deliver professional certification programs, specialized training workshops, and advanced BIM implementation courses specifically designed for the Saudi market. The partnership will also introduce advisory services focused on ESG-aligned, digitally enabled practices and green building initiatives.'This partnership reflects our commitment to revolutionizing how buildings and infrastructure are designed, constructed, and operated,' said Yves Padrines, CEO of the Nemetschek Group. 'By aligning our digital technologies and open standards expertise with buildingSMART's leadership in the Kingdom, we are laying the foundation for a smarter, more connected, and more sustainable infrastructure landscape.'Supporting Vision 2030 Through Innovation, Sustainability, and CollaborationThe collaboration will champion the widespread adoption of open standards, enabling seamless data exchange and true interoperability across all project stakeholders in Saudi Arabia. By fostering a truly open ecosystem, this partnership will revolutionize the Kingdom's AEC/O market, driving unprecedented levels of efficiency, collaboration, and innovation. This move is a game-changer for Saudi Arabia, empowering a more connected and technologically advanced built environment.'This collaboration aligns seamlessly with Saudi Arabia's Vision 2030 and its bold aspirations for digital innovation and infrastructure development,' said Muayad Simbawa, Managing Director of Nemetschek Arabia. 'Together with buildingSMART Saudi Arabia, we aim to empower the Kingdom's construction ecosystem with the tools, skills, and standards needed to accelerate progress and deliver world-class projects.'For his part, Abdul-Rahman AL-Ghabban, Chairman of buildingSMART Saudi Arabia, said: 'Our partnership with the Nemetschek Group marks a pivotal step towards elevating Saudi Arabia's construction sector to global standards. We are excited to collaborate on advancing open standards and fostering innovation in building practices, creating lasting value for our industry and our nation.' Through this collaboration, Nemetschek Arabia and buildingSMART Saudi Arabia reaffirm their shared commitment to modernizing the Kingdom's AEC/O industry. Together, they aim to unlock greater efficiency, foster innovation, and drive sustainable transformation across Saudi Arabia's urban development and infrastructure ecosystem.

Kaspersky and BI.ZONE report new PipeMagic activity in the GCC and Latin America
Kaspersky and BI.ZONE report new PipeMagic activity in the GCC and Latin America

Biz Bahrain

time14 hours ago

  • Biz Bahrain

Kaspersky and BI.ZONE report new PipeMagic activity in the GCC and Latin America

Kaspersky's Global Research and Analysis Team (GReAT) in collaboration with Vulnerability Research experts, observed new 2025 activity associated with the PipeMagic backdoor originally discovered in December 2022. The backdoor has expanded its attack geography: initially observed in Asia, and afterwards detected in Saudi Arabia in late 2024. Recent attacks show sustained interest in Saudi organizations, alongside expansion into new regions, notably manufacturing companies in Brazil. The researchers tracked the malware's evolution, identified key changes in the operators' tactics, and conducted a technical analysis of Microsoft vulnerability CVE-2025-29824. This vulnerability was the only one among the 121 patched in April 2025 that was actively exploited in the wild. It was specifically targeted by an exploit integrated into the PipeMagic infection chain. The vulnerability allowed privilege escalation in the operating system due to a flaw in the logging driver. One of the 2025 campaign attacks leveraged a Microsoft Help Index File, which serves two purposes: decrypting and executing shellcode. The shellcode is encrypted using the RC4 stream cipher with a hexadecimal key. Once decrypted, the code is executed via the WinAPI EnumDisplayMonitors function, allowing dynamic resolution of system API addresses through process injection. Researchers also identified updated versions of the PipeMagic loader masquerading as a ChatGPT client. This application resembles the one used in the 2024 attacks on Saudi organizations — sharing the same Tokio and Tauri frameworks, the same libaes library version, and demonstrating similar file structures and behavior. 'The reemergence of PipeMagic confirms that this malware remains active and continues to evolve. The 2024 versions introduced enhancements that improve persistence within victims' infrastructures and facilitate lateral movement within targeted networks,' comments Leonid Bezvershenko, senior security researcher at Kaspersky GReAT. 'In recent years, has become an increasingly popular target for cybercriminals, particularly financially motivated actors. They are leveraging zero-day vulnerabilities in this and other drivers to escalate privileges and conceal post-exploitation activities. To mitigate such threats, we recommend using EDR tools, which enable both early and post-exploitation detection of suspicious behavior,' notes Pavel Blinnikov, Vulnerability Research Lead, PipeMagic is a backdoor first discovered by Kaspersky in 2022 during an investigation into a malicious campaign involving RansomExx. Victims at the time included industrial companies in Southeast Asia. The attackers exploited the CVE-2017-0144 vulnerability to gain access to internal infrastructure. The backdoor supports two operational modes — functioning either as a full-featured remote access tool or as a network proxy, enabling execution of a wide range of commands. In October 2024, a new iteration of PipeMagic was observed in attacks against organizations in Saudi Arabia, using a fake ChatGPT agent application as a lure. Read the full report on

Saudi Arabia: Riyadh To Host 3rd World Defense Show In February 2026
Saudi Arabia: Riyadh To Host 3rd World Defense Show In February 2026

Gulf Insider

timea day ago

  • Gulf Insider

Saudi Arabia: Riyadh To Host 3rd World Defense Show In February 2026

Under the patronage of Custodian of the Two Holy Mosques King Salman, the General Authority for Military Industries (GAMI) will host the third edition of the World Defense Show (WDS) in Riyadh in February 2026. On behalf of the King, Minister of Defense and GAMI Vice Chairman Prince Khalid bin Salman will open the grand global event, scheduled to take place from February 8 to 12. The World Defense Show embodies the Kingdom's visionary leadership, serving as a future-focused, domain-driven international event designed to be the gold standard for global defense exhibitions. It receives full support from all relevant ministries, authorities, and companies, with participation from strategic entities in both the Saudi public and private sectors. GAMI Governor Ahmad Al-Ohali expressed his gratitude to King Salman and Crown Prince, Prime Minister and Chairman of GAMI Mohammed bin Salman for their generous patronage and unwavering support for the military industries sector. 'The royal patronage is an extension of the leadership's unwavering support to localizing 50 percent of military expenditure in line with the Kingdom's Vision 2030. This commitment to innovation and cooperation exemplifies our dedication to fostering global partnerships, leveraging our strategic location, and harnessing the Kingdom's industrial capabilities. Together, we are shaping the future of defense, ensuring stability and growth for our nation,' he said. World Defense Show CEO Andrew Pearcey said: 'The 2026 edition will build on the collaboration between government and industry to create a unique environment where the global defense supply chain can meet, share ideas, and do business. Through expanded venue capacity, cutting-edge content, and a strong focus on technology transfer and talent development, WDS 2026 will serve as a global catalyst—bringing together leaders, innovators, and emerging talent to chart the path for the defense industry's future.' WDS is expanding its 2026 edition with a fourth exhibition hall, increasing its total exhibition space by 58 percent compared to the inaugural event. The venue is designed to the highest international standards, which will enhance cooperation, partnership building, and the overall visitor experience.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store