Loading...

10 Feb 2026 02:10

Tech & Start Up The Latest

Kaspersky uncovers PipeMagic backdoor attacks businesses in Saudi Arabia through fake ChatGPT application

Deploying a backdoor that both extracts sensitive data and enables full remote access to compromised devices

Kaspersky’s Global Research and Analysis Team (GReAT) has recently discovered a new malicious campaign involving the PipeMagic Trojan, which has shifted from targeting entities in Asia to expanding its reach to organizations in Saudi Arabia.

The attackers are using a fake ChatGPT application as bait, deploying a backdoor that both extracts sensitive data and enables full remote access to compromised devices. The malware also operates as a gateway, enabling the introduction of additional malware and the launch of further attacks across corporate network.

Kaspersky initially discovered PipeMagic backdoor in 2022, this plugin-based trojan was targeting entities in Asia at that time. The malware is capable of functioning as both a backdoor and a gateway. In September 2024, Kaspersky’s GReAT observed a resurgence of PipeMagic, this time targeting organizations in Saudi Arabia.

This version uses a fake ChatGPT application, built with the Rust programming language. At first glance, it appears legitimate, containing several common Rust libraries used in many other Rust-based applications. However, when executed, the application displays a blank screen with no visible interface and hides a 105,615-byte array of encrypted data which is a malicious payload.

In the second stage, the malware searches for key Windows API functions, by searching the corresponding memory offsets using names hashing algorithm. It then allocates memory, loads the PipeMagic backdoor, adjusts necessary settings, and executes the malware.

One of unique features of PipeMagic is that it generates a 16-byte random array to create a named pipe in the format \\.\pipe\1.<hex string>. It spawns a thread that continuously creates this pipe, reads data from it, and then destroys it. This pipe is used for receiving encoded payloads, stop signals via the default local interface. PipeMagic usually works with multiple plugins downloaded from a command-and-control (C2) server, which, in this case, was hosted on Microsoft Azure.

“Cybercriminals are constantly evolving their strategies to reach more prolific victims and broaden their presence, as demonstrated by the PipeMagic Trojan’s recent expansion from Asia to Saudi Arabia. Given its capabilities, we expect to see an increase in attacks leveraging this backdoor,’ comments Sergey Lozhkin, Principal Security Researcher at Kaspersky’s GReAT.

In order to avoid falling victim to a targeted attack by a known or unknown threat actor, Kaspersky researchers recommend implementing the following measures:

Be cautious when downloading software from the internet, especially if it’s from a third-party website. Always try to download software from the official website of the company or service that you are using.

Provide your SOC team with access to the latest threat intelligence (TI). Kaspersky Threat Intelligence is a single point of access for the company’s TI, providing it with cyberattack data and insights gathered by Kaspersky spanning over 20 years.

Upskill your cybersecurity team to tackle the latest targeted threats with Kaspersky online training developed by GReAT experts.

For endpoint level detection, investigation, and timely remediation of incidents, implement EDR solutions such as Kaspersky Next.

In addition to adopting essential endpoint protection, implement a corporate-grade security solution that detects advanced threats on the network level at an early stage, such as Kaspersky Anti Targeted Attack Platform.

As many targeted attacks start with phishing or other social engineering techniques, introduce security awareness training and teach practical skills to your team.

To gain exclusive insights into the latest APT campaigns and emerging trends in the threat landscape, register for the Security Analyst Summit here.

(Visited 62 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandtaktik jitu mahjong wild 2 terjadi sesuai kerangka rtp live yang dipakai duta76 sicbo gates of olympusalur permainan mahjong ways 2 pgsoft terbaca melalui kerangka rtp live baccarat duta76 sweet bonanzamahjong wins 3 pragmatic blackjack menampilkan urutan hasil menang duta76 berdasarkan rtp live starlight princessinformasi dasar mengenai rtp live perihoki sebagai indikator di mahjong ways 2 pgsoft roulette wild west goldalur mudah bermain mahjong wind 3 pragmatic blackjack terbentuk berdasarkan pola rtp live perihok aztec gemsgambaran informatif tentang mahjong wild deluxe dalam konteks game perihoki sicbo digital gates of olympuspendekatan analitis rtp live sebagai indikator pergeseran momentum perihoki mahjong ways 2 pgsoft baccarat starlight princesspola rtp live jitu perihoki mengarahkan pemain menjalani mahjong wins 3 pragmatic blackjack dengan terukur sweet bonanzapendekatan riset terkini pola spin auto serta keberuntungan berulang pada mahjong ways pgsoft roulette wild bounty hunter duta76mengenal mahjong wins 3 pragmatic blackjack melalui penjelasan mekanisme alur duta76 sbobet88 paling jitue3 model evaluasi rtp dalam menyusun perencanaan kemenangane3 pendekatan analitis rtp dalam optimalisasi peluang menange3 pendekatan sistematis analisis rtp untuk optimalisasi targete3 perancangan target menang mahjong ways 2 melaluie3 permainan mahjong ways 2 terasa terkendali scattere3 pola terkendali mahjong ways 2 terinspirasi fokuse3 respons psikologi pengguna terhadap transisi pola dane3 ritme seimbang mahjong ways 2 jadi kodee3 ritme stabil mahjong ways 2 dan mentalaws analitis risiko momentum mahjongaws daya tarik ritme mahjongaws ketahanan saldo konsistensi mahjongaws lifestyle santai mahjong winsaws mahjong ways algoritma popularitasaws observasi perilaku mesin mahjongaws perubahan pola mahjong remoteaws ritme sesi bigwin mahjongaws sinkronisasi strategi kartu mahjongaws sistem server ai mahjongaws studi teknis grid mahjongaws tren pola rtp mahjongaws tren spin manual mahjongaws trik viral spin manualaws volatilitas olympus 1000 zeusrahasia konsistensi sesi metode ketahanan saldo mahjong ways 2kontrol intensitas putaran 6 juta mahjong wild seimbangteknik profesional ritme mekanik mahjong ways hiburan onlineelevasi hiburan mahjong wins 3 dampak finansial bertahaphindari keputusan emosional target 4 juta mahjong ways 2 pgsoftsorotan media indikator sistem 32 juta viralevaluasi dampak pengabaian indikator balikan hiburan digitaltransisi strategi cerdas fokus indikator stabil game onlinekonsistensi hasil mahjong wins skema putaran terstrukturanalisis indikator balikan game populer patokan pemain profesionalstudi perbandingan efisiensi bermain fokus arena digitalbedah media nasional pola bermain hasil 12 jutacara membaca kondisi arena hiburan aktivitas hariankronologi mahjong ways 2 fluktuasi indikator starlight princesskorelasi indikator balikan pola bermain 28 juta mediae3 ritme stabil mahjong ways 2 menjadi sinyalcara pakai strategi pemain mahjong wild 2 sicbo dibentuk dari pemahaman rtp live duta76 gates of olympusrtp live pgsoft menjadi acuan strategi di permainan mahjong ways 2 baccarat duta76 starlight princesspanduan logis membaca arah kemenangan mahjong wins 3 pragmatic blackjack optimal duta76 sweet bonanzalangkah sistematis mengidentifikasi indikator menang mahjong wways 2 pgsoft roulette dini perihoki tanpa bermain lama wild west goldoptimalisasi alur putaran dengan target kemenangan pada tahap awal mahjong wins 3 pragmatic sabung ayam sv388 perihoki Top