The magical comeback: new PipeMagic activity in Saudi Arabia and Brazil

The magical comeback: new PipeMagic activity in Saudi Arabia and Brazil

Kaspersky and BI.ZONE experts have investigated the PipeMagic backdoor. Kaspersky identified changes in the operators’ tactics. BI.ZONE conducted a technical analysis of the vulnerability exploited in the wild
August 19, 2025

The backdoor was initially observed in Asia in December 2022 and then detected in Saudi Arabia in late 2024. In 2025, Kaspersky’s Global Research and Analysis Team (GReAT) and our specialists identified new activity associated with the malware.

Recent attacks show sustained interest in Saudi organizations, alongside expansion into new regions, notably Brazil. The researchers tracked the backdoor’s evolution, identified key changes in the adversaries’ tactics, and conducted a technical analysis of CVE‑2025‑29824. This vulnerability was the only one among the 121 patched in April 2025 that was actively exploited by attackers.

By exploiting the vulnerability that stems from a flaw in the logging driver, threat actors were able to escalate their Windows privileges to the local administrator level. This allowed them to steal user credentials and encrypt files within a compromised system.

The researchers also identified updated versions of the PipeMagic loader masquerading as a ChatGPT client. This malware resembles the one used in 2024 attacks on Saudi organizations.

The reemergence of PipeMagic confirms that this malware remains active and continues to evolve. The 2024 versions introduced enhancements that improve persistence within victims’ infrastructures and facilitate lateral movement within targeted networks.
Leonid Bezvershenko
Senior Security Researcher, Kaspersky GReAT
In recent years, clfs.sys has become an increasingly popular target for cybercriminals, particularly financially motivated actors. They are leveraging zero‑day vulnerabilities in this and other drivers to escalate privileges and conceal post‑exploitation activities. To mitigate such threats, we recommend using EDR tools, which enable both early and post‑exploitation detection of suspicious behavior.
Pavel Blinnikov
Vulnerability Research Lead, BI.ZONE

Read the full report on Medium.

BI.ZONE EDR is an advanced endpoint threat detection and response solution. It allows for early stage detection and provides the tools for active manual and automatic response.