Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Microsoft Dissects PipeMagic Modular Backdoor

PipeMagic, which poses as a ChatGPT application, is a modular malware framework that provides persistent access and flexibility.

Microsoft has delved into the inner workings of PipeMagic, a modular backdoor used in multiple ransomware attacks since the beginning of this year.

Posing as a legitimate open source ChatGPT Desktop Application, PipeMagic is a sophisticated malware framework that provides attackers with persistent access to the compromised system.

The backdoor uses modules for its various capabilities, such as command-and-control (C&C) communication, and is able to dynamically execute payloads and provide the attackers with granular control over code execution, Microsoft explains.

“By offloading network communication and backdoor tasks to discrete modules, PipeMagic maintains a modular, stealthy, and highly extensible architecture, making detection and analysis significantly challenging,” the company notes.

Attributed to the financially motivated threat actor tracked as Storm-2460, associated with the RansomEXX ransomware, PipeMagic has been used in attacks exploiting a Windows zero-day tracked as CVE-2025-29824, against organizations in the US, Europe, South America, and the Middle East.

“While the impacted organizations remain limited, the use of a zero-day exploit, paired with a sophisticated modular backdoor for ransomware deployment, makes this threat particularly notable,” Microsoft says.

Advertisement. Scroll to continue reading.

As part of the observed attacks, PipeMagic was deployed in memory. Once up and running, the malware received its modules through a named pipe, and stored them in memory using doubly linked lists.

The malware was observed using four doubly linked list structures, three for storing raw payload modules, modules already loaded in memory, and networking modules, and another believed to be leveraged dynamically by loaded payloads.

After the networking module establishes C&C communication, the backdoor collects extensive system information and sends it to the server, and then waits for commands to execute.

Based on the received C&C response, the backdoor can execute core functionality, execute a specific module, send a message to the C&C, shut down the networking module and C&C communication, or invoke all modules with specific arguments.

Backdoor functionality supported by PipeMagic allows it to interact with modules, delete modules and itself, enumerate running processes, and recollect system information.

“As malware continues to evolve and become more sophisticated, we believe that understanding threats such as PipeMagic is essential for building resilient defenses for any organization. By exposing the inner workings of this malware, we also aim to disrupt adversary tooling and increase the operational cost for the threat actor, making it more difficult and expensive for them to sustain their campaigns,” Microsoft notes.

Related: Second Ransomware Group Caught Exploiting Windows Flaw as Zero-Day

Related: Ransomware Groups, Chinese APTs Exploit Recent SAP NetWeaver Flaws

Related: BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats

Related: New FinalDraft Malware Spotted in Espionage Campaign

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.