Exploitation of CLFS zero-day leads to ransomware activity

April 9, 2025, 8:40 p.m.

Description

A zero-day elevation of privilege vulnerability in Windows Common Log File System (CLFS) has been exploited against targets in IT, real estate, finance, software, and retail sectors across multiple countries. The exploit, deployed by PipeMagic malware and attributed to Storm-2460, enables privilege escalation and ransomware deployment. The vulnerability, CVE-2025-29824, was patched on April 8, 2025. The attack involves downloading malicious MSBuild files, using PipeMagic, and exploiting CLFS to inject payloads into system processes. Post-exploitation activities include credential theft and ransomware deployment, with similarities to RansomEXX. Microsoft recommends immediate patching and provides mitigation strategies, detection methods, and hunting queries to counter this threat.

Date

  • Created: April 9, 2025, 5:43 p.m.
  • Published: April 9, 2025, 5:43 p.m.
  • Modified: April 9, 2025, 8:40 p.m.

Attack Patterns

  • PipeMagic
  • RansomEXX
  • Storm-2460

Additional Informations

  • Real Estate
  • Information Technology
  • Retail
  • Finance
  • Venezuela, Bolivarian Republic of
  • Saudi Arabia
  • Spain
  • United States of America