Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

What is Zero Waste? FySelf Unveils the Eco-Friendly Lifestyle Revolution

Guardiola will receive another honor in Manchester. This is from that university

Republican proposal supported by Trump floats $1,000 baby bonds for families

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Mustang Panda is targeting Myanmar with Star Proxy, EDR Bypass and Toneshell updates
Identity

Mustang Panda is targeting Myanmar with Star Proxy, EDR Bypass and Toneshell updates

userBy userApril 17, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Mustang Pandas are targeting Myanmar

China-related threat actors known as Mustang Pandas are attributed to cyberattacks targeting unspecified Myanmar organizations with previously unreported tools, highlighting the ongoing efforts by threat actors to improve the refinement and effectiveness of malware.

This includes an updated version of a known backdoor called Toneshell, a new lateral exercise tool called Starproxy, and an endpoint detection and response (EDR) answer driver with two keyloggers called Paklog, Corklog, and Splatcloak.

“Toneshell, the backdoor used by Mustang Panda, has been updated with changes to the Faketls Command-and-Control (C2) communication protocol and how to create and store client identifiers,” Zscaler Threatlabz ​​researcher Sudeep Sineh said in a two-part analysis.

Also known as Basin, Bronze President, Camaro Dragon, Earth Preta, Honey Mite and Red Delta, Mustang Panda is a threat actor sponsored by states that have been in line with China since at least 2012.

Cybersecurity

It is known to be known for attacks on governments, military groups, minority groups and non-governmental organizations (NGOs) in countries primarily in East Asia, and although not so much in Europe, the group has a history of leveraging DLL sideloading technology to provide Plugx malware.

However, since late 2022, the campaign organized by Mustang Panda has started to frequently deliver a bespoke family of malware called Toneshell, designed to download the next step-by-step payload.

Zscaler said it discovered three new variants of sophisticated malware at different levels –

It acts as a simple reverse shell variant 2 containing the ability to download DLLs from C2, and executes them by injecting DLLs into legitimate processes (svChost.exe) variant 3, by injecting them into variant 3, and executes them by executing them (e.g. download files and create subprocesses that create subprocesses that have been received from remote server via custom TCP-based protocols

The new software associated with Mustang Panda is Starproxy. It was launched via DLL sideload and is designed to utilize the Faketls protocol to proxy traffic and facilitate attacker communication.

“When active, Starproxy allows an attacker to proxy traffic between the infected device and the C2 server. Starproxy accomplishes this by leveraging TCP sockets to communicate with the C2 server via the FAKETLS protocol and encrypting all data exchanged with a custom XOR-based encryption algorithm,” SingH said.

“In addition, the tool uses command line arguments to specify an IP address and port for communication, allowing an attacker to relay data through the compromised machine.”

Star Proxy Activities

Starproxy is believed to be deployed as a post-competitive tool for accessing internal workstations within a network that is not directly exposed to the Internet.

They also identified two new keyloggers, Paklog and Corklog, which are used to monitor keystrokes and clipboard data. The main difference between the two is that the latter stores captured data in an encrypted file using a 48-character RC4 key, and implements a persistence mechanism by creating a service or scheduled task.

Both keyloggers do not have their own data peeling function. This means that it exists only to collect keystroke data and write it to a specific location, and that threat actors use other methods to send it to the infrastructure.

Closing the new addition to Mustang Panda’s malware arsenal is Splatcloak. This is Splatcloak, a Windows kernel driver deployed by Splatdropper, equipped to disable EDR-related routines implemented by Windows Defender and Kaspersky.

“The Mustang Panda demonstrates a calculated approach to achieving your goals,” Singh said. “Continuous updates, new tools, and layered obfuscation extend the operational security of the group and improve the effectiveness of attacks.”

UNC5221 drops new version of BrickStorm targeting Windows

According to the Belgian Cybersecurity Firm Nviso, the disclosure will be made as a China-Nexus Cyber ​​Spionage Cluster named UNC5221 has been linked to the use of a new version of Brickstorm malware in an attack targeting European Windows environments since at least 2022.

Cybersecurity

Brickstorm is the Golang backdoor first documented in connection with zero-day exploitation of Ivanti Connect Secure Zero-Day vulnerabilities (CVE-2023-46805 and CVE-2024-21887) and deployed to Linux Servers running vmware vcenter.

“It supports the ability to set up as a web server, perform file system and directory operations, perform file operations such as upload/download, execute shell commands, and perform relay socks,” Google Mandiant said in April 2024.

The newly identified Windows artifact written in GO provides attackers with file managers and network tunneling capabilities through panels, allowing them to browse file systems, create or delete files, and delete network connections for horizontal movement.

It is also designed to resolve C2 servers via DNS-over-HTTPS (DOH) and avoid network-level defenses such as DNS monitoring, TLS inspection, and geoblocking.

“Windows Sample [..] “Instead, enemies are being observed using the network tunneling feature to achieve similar command execution, using the network tunneling feature in conjunction with valid credentials to exploit well-known protocols such as RDP and SMB.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePutin of Russia, Emil of Qatar discusses Syria and Gaza at Moscow Talks | Syrian War News
Next Article This is all tech companies roll back Dei or are still committed to it – so far
user
  • Website

Related Posts

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

June 9, 2025

Two different botnets exploiting a vulnerability in Wazuh Server to launch a Mirai-based attack

June 9, 2025

Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

June 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

What is Zero Waste? FySelf Unveils the Eco-Friendly Lifestyle Revolution

Guardiola will receive another honor in Manchester. This is from that university

Republican proposal supported by Trump floats $1,000 baby bonds for families

Apple redesigns its operating system with “LiquidGlass” on WWDC 25

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

IONQ acquires nearly $1.1 billion in British quantum startup Oxford Ionics

aixuspeed reports $500,000 in token commitments within the first 72 hours prior to sale

Vantage raises 720 million euros in the first ever euro ABS transaction backed by European data centres

Meta of lectures investing more than $100 billion in Silicon Valley’s top AI startups

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.