Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
Hackers exploit Windows zero-day to spread ransomware

Hackers exploit Windows zero-day to spread ransomware

by Tekmono Editorial Team
10/04/2025
in News
Share on FacebookShare on Twitter

Cybercriminals are exploiting a newly discovered zero-day vulnerability in the Windows Common Log File System (CLFS) to deploy ransomware, according to a report by Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC).

The vulnerability, tracked as CVE-2025-29824, is a “use-after-free” bug in the CLFS driver that allows attackers to gain higher system privileges after already compromising a computer system. This post-compromise escalation vulnerability has been given a high severity score of 7.8 out of 10. The exploitation of this flaw enables threat actors to elevate their privileges locally, which is particularly valuable for ransomware operators as it allows them to spread ransomware more effectively within an organization’s environment.

Microsoft notes that ransomware threat actors value post-compromise elevation of privilege exploits because these enable them to escalate initial access into privileged access. They then use this privileged access for the widespread deployment and detonation of ransomware within an environment. The vulnerability is being actively exploited by a cybercriminal group identified as Storm-2460.

Related Reads

Qualcomm Unveils X105 5G Modem for AI Era

X Lifts Ban on Crypto Paid Promotions

Huawei Launches U6GHz Products for 5G-Advanced Networks

Users Profit $1 Million on Iran Strike Bets

Storm-2460 is using the vulnerability to deploy PipeMagic, a backdoor trojan that facilitates the subsequent deployment of ransomware. In the observed attacks, the ransomware deployed is RansomEXX, a variant that is not particularly popular or well-known. The attacks have targeted a small number of organizations, primarily in the IT, finance, and retail sectors, across the United States, Venezuela, Spain, and Saudi Arabia.

Microsoft publicly disclosed the security advisory regarding this vulnerability on April 8. The company strongly recommends that organizations prioritize applying security updates for elevation of privilege vulnerabilities to add a layer of defense against ransomware attacks if threat actors are able to gain an initial foothold. The exploitation of this vulnerability follows a pattern where ransomware groups value any method that helps escalate their access from initial infection to deeper, more privileged system control, making defenses against such exploits critical.

ShareTweet

You Might Be Interested

Qualcomm Unveils X105 5G Modem for AI Era
News

Qualcomm Unveils X105 5G Modem for AI Era

02/03/2026
X Lifts Ban on Crypto Paid Promotions
News

X Lifts Ban on Crypto Paid Promotions

02/03/2026
Huawei Launches U6GHz Products for 5G-Advanced Networks
News

Huawei Launches U6GHz Products for 5G-Advanced Networks

02/03/2026
Users Profit  Million on Iran Strike Bets
News

Users Profit $1 Million on Iran Strike Bets

02/03/2026
Please login to join discussion

Recent Posts

  • Qualcomm Unveils X105 5G Modem for AI Era
  • X Lifts Ban on Crypto Paid Promotions
  • Huawei Launches U6GHz Products for 5G-Advanced Networks
  • Users Profit $1 Million on Iran Strike Bets
  • Critical “ClawJacked” Flaw Exposes OpenClaw AI Platforms

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals