Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • Login
  • Register
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Microsoft: This fake ChatGPT app spreads PipeMagic malware

The malware is attributed to a threat actor known as Storm-2460.

byKerem Gülen
August 20, 2025
in Cybersecurity, News
Home News Cybersecurity

Microsoft has issued a warning regarding a fraudulent ChatGPT desktop application that is spreading online. This application contains the PipeMagic malware, identified as a highly modular framework functioning as both an infostealer and a backdoor.

According to a detailed report by Microsoft, the PipeMagic framework originated on GitHub. The report states, “The first stage of the PipeMagic infection execution begins with a malicious in-memory dropper disguised as the open-source ChatGPT Desktop Application project.” This involves threat actors utilizing a modified version of the GitHub project, which incorporates malicious code designed to decrypt and launch an embedded payload directly into memory.

The malware is attributed to a threat actor known as Storm-2460. Microsoft previously identified Storm-2460 in early April 2025 for exploiting a zero-day vulnerability in the Common Log File System (CVE-2025-29824) to deploy the RansomEXX encryptor. This vulnerability is again being exploited in the PipeMagic campaign. While Microsoft confirmed the continued abuse of CVE-2025-29824, the company did not specify whether the same encryptor was deployed in this instance. The report emphasizes PipeMagic’s evolution from a basic backdoor trojan into a complex malware framework.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The current iteration of PipeMagic is characterized by its modular design, which grants threat actors the ability to dynamically execute payloads, maintain persistent control over compromised systems, and communicate covertly with command-and-control servers. Its capabilities include managing encrypted payload modules within memory, performing privilege escalation, collecting extensive system information, and executing arbitrary code using its linked list architecture.

PipeMagic also facilitates encrypted inter-process communication through named pipes. Furthermore, the malware can self-update by receiving new modules from its command-and-control infrastructure, allowing for continuous refinement and adaptation.

While the number of victims is described as “limited” by Microsoft, specific figures were not disclosed. The observed targets are located in the United States, across Europe, South America, and the Middle East. The industries most frequently targeted include information technology, financial services, and real estate.

To mitigate the threat posed by PipeMagic, Microsoft recommends implementing a layered defense strategy. This includes enabling tamper protection and network protection within Microsoft Defender for Endpoint. Additionally, Microsoft advises running endpoint detection and response in block mode, alongside other security measures.


Featured image credit

Tags: chatgptfeatruedMicrosoft

Related Posts

From starship troopers to Helldivers: The satire of militarism in games

From starship troopers to Helldivers: The satire of militarism in games

September 14, 2025
How Monster Hunter Wilds blends solitude and chaos in its vast landscapes

How Monster Hunter Wilds blends solitude and chaos in its vast landscapes

September 13, 2025
UAE’s new K2 Think AI model jailbroken hours after release via transparent reasoning logs

UAE’s new K2 Think AI model jailbroken hours after release via transparent reasoning logs

September 12, 2025
YouTube Music redesigns its Now Playing screen on Android and iOS

YouTube Music redesigns its Now Playing screen on Android and iOS

September 12, 2025
EU’s Chat Control proposal will scan your WhatsApp and Signal messages if approved

EU’s Chat Control proposal will scan your WhatsApp and Signal messages if approved

September 12, 2025
Apple CarPlay vulnerability leaves vehicles exposed due to slow patch adoption

Apple CarPlay vulnerability leaves vehicles exposed due to slow patch adoption

September 12, 2025

LATEST NEWS

From starship troopers to Helldivers: The satire of militarism in games

How Monster Hunter Wilds blends solitude and chaos in its vast landscapes

UAE’s new K2 Think AI model jailbroken hours after release via transparent reasoning logs

YouTube Music redesigns its Now Playing screen on Android and iOS

EU’s Chat Control proposal will scan your WhatsApp and Signal messages if approved

Apple CarPlay vulnerability leaves vehicles exposed due to slow patch adoption

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

Welcome Back!

Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.