Windows under attack: 0-day vulnerability used by ransomware group
Microsoft released security updates for Windows yesterday and revealed today that the updates include a patch for a 0-day issue that is exploited in the wild.
The vulnerability -- Windows Common Log File System Driver Elevation of Privilege Vulnerability -- is tracked as CVE-2025-29824.
Important information:
- The issue affects most supported server and client versions of Windows, including Windows 10, Windows 11, and Windows Server 2025.
- Microsoft notes that the exploit does not work in Windows 11, version 24H2.
- It is a use-after-free security issue that may be exploited for local elevation attacks.
- The attack does not require user interaction.
- The attacker may gain system privileges upon successful exploitation.
Microsoft notes that it is aware of limited attacks. It mentions targets in the IT and real estate sectors in the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in Saudi Arabia specifically in a special announcement on its security website.
Installation of the update protects systems against exploits. Microsoft's guidance includes an ominous note revealing that the company is delaying the patch for Windows 10 systems. It does not provide an explanation for the delay. Affected users and administrators are asked to monitor the official CVE on Microsoft's MSRC website for updates regarding the rollout of the patch to Windows 10 systems.
Home users may use Windows Update to install the patch immediately on Windows 11. This is done via Settings > Windows Update. Note that a restart of the system is necessary to finalize the installation of the security update.
On the technical side, the vulnerability is found in the Common Log File System (CLFS) kernel driver according to Microsoft. The company says that has not determined the initial attack vector, but discovered "some notable pre-exploitation behaviors by Storm-2460".
Good to known: Storm 2460, which is better known as RansomEXX, is a notorious ransomware group.
Microsoft observed the following behavior in multiple cases:
- The threat actor uses the certutil tool to download a malicious file from a legitimate but compromised third-party website.
- The downloaded file was a malicious MSBuild file.
- The malware in question goes by the name PipeMagic, which has been known since 2023.
- After deployment of the malware, it is exploiting the vulnerability described in this guide for process injection into system processes.
One of the activities of the malware on the user system is the dumping and parsing of LSASS memory to obtain user credentials. Ransomware activity followed on the target systems, notably file encryption and the adding of random extensions.
Closing Words
Microsoft recommends to install the Windows security patches immediately to protect systems from exploit attempts. The delay on Windows 10 is unfortunate, as it means that systems remain vulnerable to attacks until Microsoft releases the patch for the system.
Now You: when do you install updates on your systems? Did you install the April 2025 security updates already?
RECOMMENDED NEWS
Apple is sending Batterygate settlement payments to iPhone users in the U.S
Did Apple send $92.17 to your bank account? It's not a random gift out of generosity, the company i...
Canalys: every PC sold will be an AI PC by 2030
Will every PC sold in 2030 be an AI PC? Analysts at Canalys predict that every PC sold by 2030 will...
YouTube CEO Neal Mohan Unveils Four Strategic Initiatives for 2025
YouTube's CEO, Neal Mohan, has outlined four key strategic initiatives for 2025, focusing on enhanc...
Reddit's New Paywall: Some Subreddits to Require Subscription
Reddit is set to introduce a paywall feature for certain subreddits by the end of 2025, as confirme...
Windows 10 Reclaims Top Spot as Most Popular OS Among Steam Users
Windows 10 has reclaimed its position as the most popular operating system among Steam users, accor...
Google's G icon has been updated with a gradient effect
The Google search app's icon has changed slightly. It no longer uses a solid color pattern, instead...
Comments on "Windows under attack: 0-day vulnerability used by ransomware group" :