← All briefs
critical September 14, 2025

Exploitation of CLFS Zero-Day Leads to Ransomware Activity

Source report →

CVE‐2025‐29824 is a critical zero-day vulnerability in the Windows Common Log File System (CLFS) kernel driver. Under the category of threat details, this flaw enables local privilege escalation from a standard user account to SYSTEM. The vulnerability is currently being exploited in the wild by a financially motivated threat actor known to deploy ransomware, as described in the referenced blog. In terms of tactics observed, the threat group Storm‐2460 often begins the initial compromise using tools like certutil to download a malicious MSBuild file from a compromised third-party site. This file contains an encrypted malware payload called PipeMagic, which triggers the CLFS exploit in memory via dllhost.exe. Once exploitation is successful, the attacker uses procdump to extract credentials. Although Microsoft detected ransomware activity on affected systems, they were unable to obtain a ransomware sample for further analysis. The exploitation of this zero-day vulnerability represents a significant threat to Windows environments, as it allows attackers to gain the highest level of system privileges necessary for deploying ransomware and causing maximum damage to target organizations.

SHA256 FILE HASH 1
f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6f6
FILE NAME 1
PipeMagic.dll
DOMAIN 1
compromised-third-party-site.com
IP ADDRESS 1
45.147.229.177

Detections

Additional detection ideas (7)
  • Monitor for installation or execution of remote access tools not approved in your environment
  • Detect mass file encryption patterns — high-frequency file writes with entropy changes
  • Alert on credential dumping via LSASS access, SAM registry reads, or DCSync
  • Monitor public-facing services for exploitation patterns — unusual POST bodies, deserialization payloads
  • Flag suspicious PowerShell execution — encoded commands, download cradles, or AMSI bypass
  • Flag heavily obfuscated scripts or binaries with high entropy content
  • Monitor for large outbound data transfers to web services such as MEGA, Dropbox, or cloud storage APIs