Thursday, April 24, 2025
Homecyber securityRansomware Group Actively Exploits Windows CLFS Zero-Day Vulnerability

Ransomware Group Actively Exploits Windows CLFS Zero-Day Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has uncovered a sophisticated ransomware campaign exploiting a zero-day vulnerability in the Windows Common Log File System (CLFS), tracked as CVE-2025-29824.

The vulnerability allows attackers to escalate privileges from a standard user account to SYSTEM level, enabling widespread deployment of ransomware within compromised environments.

Exploitation Details

The exploit, deployed by the threat actor known as Storm-2460, uses the PipeMagic malware to gain initial access.

- Advertisement - Google News

This malware, previously documented by Kaspersky in October 2024, was used in conjunction with a zero-day exploit for a Win32k vulnerability (CVE-2025-24983) observed by ESET in 2023.

The attackers leverage the certutil utility to download a malicious MSBuild file from a compromised legitimate third-party website, which then decrypts and executes PipeMagic via the EnumCalendarInfoA API callback.

Once PipeMagic is deployed, the attackers launch the CLFS exploit in memory from a dllhost.exe process.

The exploit targets a vulnerability in the CLFS kernel driver, using the NtQuerySystemInformation API to leak kernel addresses to user mode.

However, this exploit does not work on Windows 11, version 24H2, due to restricted access to certain System Information Classes.

The exploit then employs memory corruption and the RtlSetAllBits API to overwrite the exploit process’s token, granting all privileges and allowing for process injection into SYSTEM processes.

A notable artifact of this exploitation is the creation of a CLFS BLF file at C:\ProgramData\SkyPDF\PDUDrv.blf.

Ransomware Deployment

Following successful exploitation, the attackers inject a payload into winlogon.exe, which then uses Sysinternals procdump.exe to dump the memory of LSASS, extracting user credentials.

This leads to the deployment of ransomware, encrypting files and appending a random extension.

A ransom note named !READ_ME_REXX2!.txt is dropped, containing two .onion domains linked to the RansomEXX ransomware family.

Microsoft released security updates to address CVE-2025-29824. Customers running Windows 11, version 24H2, are not affected by this exploit.

Microsoft recommends applying these updates promptly and implementing several mitigation strategies:

  • Enable cloud-delivered protection in Microsoft Defender Antivirus or equivalent products to cover rapidly evolving attacker tools.
  • Use device discovery to identify and onboard unmanaged devices to Microsoft Defender for Endpoint.
  • Run Endpoint Detection and Response (EDR) in block mode to remediate malicious artifacts post-breach.
  • Enable investigation and remediation in full automated mode to reduce alert volume and deploy missed updates.

This campaign underscores the importance of timely patching and robust security measures to defend against sophisticated ransomware attacks leveraging zero-day vulnerabilities.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...