DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Kaspersky Discovers PipeMagic Backdoor Exploiting Fake ChatGPT App To Attack Businesses

DigitalCIO Bureau by DigitalCIO Bureau
October 11, 2024
in Tech News
0
Cybercrime AI experimentation in the dark web – new Kaspersky study
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Kaspersky’s Global Research and Analysis Team (GReAT) has recently discovered a new malicious campaign involving the PipeMagic Trojan, which has shifted from targeting entities in Asia to expanding its reach to organizations in Saudi Arabia. The attackers are using a fake ChatGPT application as bait, deploying a backdoor that both extracts sensitive data and enables full remote access to compromised devices. The malware also operates as a gateway, enabling the introduction of additional malware and the launch of further attacks across corporate network.

Kaspersky initially discovered PipeMagic backdoor in 2022, this plugin-based trojan was targeting entities in Asia at that time. The malware is capable of functioning as both a backdoor and a gateway. In September 2024, Kaspersky’s GReAT observed a resurgence of PipeMagic, this time targeting organizations in Saudi Arabia.

This version uses a fake ChatGPT application, built with the Rust programming language. At first glance, it appears legitimate, containing several common Rust libraries used in many other Rust-based applications. However, when executed, the application displays a blank screen with no visible interface and hides a 105,615-byte array of encrypted data which is a malicious payload.

In the second stage, the malware searches for key Windows API functions, by searching the corresponding memory offsets using names hashing algorithm. It then allocates memory, loads the PipeMagic backdoor, adjusts necessary settings, and executes the malware.

One of unique features of PipeMagic is that it generates a 16-byte random array to create a named pipe in the format \\.\pipe\1.<hex string>. It spawns a thread that continuously creates this pipe, reads data from it, and then destroys it. This pipe is used for receiving encoded payloads, stop signals via the default local interface. PipeMagic usually works with multiple plugins downloaded from a command-and-control (C2) server, which, in this case, was hosted on Microsoft Azure.

“Cybercriminals are constantly evolving their strategies to reach more prolific victims and broaden their presence, as demonstrated by the PipeMagic Trojan’s recent expansion from Asia to Saudi Arabia. Given its capabilities, we expect to see an increase in attacks leveraging this backdoor,’ comments Sergey Lozhkin, Principal Security Researcher at Kaspersky’s GReAT.

Tags: Kaspersky
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

NelsonHall Recognizes LTM as a Leader in GenAI & Process Automation for Banking

by DigitalCIO Bureau
March 6, 2026
0
NelsonHall Recognizes LTM as a Leader in GenAI & Process Automation for Banking

LTM, the Business Creativity partner to the world’s largest enterprises, has been recognized as a Leader in the ‘Overall’ market segment in the NelsonHall NEAT Evaluation for GenAI...

Read moreDetails

OptiValue Tek & SFJ Business Solutions Join Hands to Transform Fortune 500 Enterprises

by DigitalCIO Bureau
March 2, 2026
0
OptiValue Tek & SFJ Business Solutions Join Hands to Transform Fortune 500 Enterprises

Partnership aims to build intelligent, resilient, and future-ready enterprise ecosystems worldwide New Delhi – March 2, 2026 — OptiValue Tek has announced a strategic alliance with SFJ Business Solutions, to deliver large-scale enterprise...

Read moreDetails

TCS Expands Strategic Partnership with Zscaler to Redefine Enterprise Workspace Innovation with New AI-powered Solution

by DigitalCIO Bureau
March 2, 2026
0
TCS Expands Strategic Partnership with Zscaler to Redefine Enterprise Workspace Innovation with New AI-powered Solution

TCS Workspace Experience Studio engineered with ZDX (Zscaler Digital Experience) will herald a new era in enterprise digital workspace innovation by integrating zero-trust security, observability, and AI-powered experience...

Read moreDetails

21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

by DigitalCIO Bureau
February 27, 2026
0
21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

TCS sets a new milestone with 146,922 participants, surpassing its 2021 Guinness World Records title to remain the world’s largest coding championship Tata Consultancy Services (TCS) announced the winners...

Read moreDetails

Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

by DigitalCIO Bureau
February 27, 2026
0
Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

Collaboration supports the nation’s “Make in India” initiative and global priority for supply chain diversification Companies’ manufacturing partnership aimed at supporting Indian and global automakers, strengthening supply-chain flexibility...

Read moreDetails
Next Post
Fortinet, Google Cloud Join Hands For SASE PoP Expansion

Fortinet Launches Lacework FortiCNAPP For Enhanced Cloud Security

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Fortinet, Google Cloud Join Hands For SASE PoP Expansion

Cybercriminals are exploiting new industry vulnerabilities 43% faster than 1H 2023

May 20, 2024
Software Engineering Leader Roles to Require Oversight of Generative AI by 2025

Kaspersky Joins UNIDO’s Global Alliance On AI For Industry & Manufacturing

December 6, 2024
AMD Acquires Open-Source AI Software Expert Nod.ai

CERTINA Group acquires MOBOTIX AG from KONICA MINOLTA 

April 4, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?