Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Pubload and Pubshell malware used in Mustang Panda’s Tibet-specific attacks
Identity

Pubload and Pubshell malware used in Mustang Panda’s Tibet-specific attacks

userBy userJune 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 27, 2025Ravi LakshmananVulnerability/Cyberspy

The Chinese-related threat actor known as the Mustang Panda is attributed to a new cyber-espionage action directed against the Tibetan community.

According to IBM X-Force, topics related to Tibet have been leveraged, such as the 9th World Parliament’s Treaty of Tibet (WPCT), China’s Education Policy (TAR) in the Tibetan Autonomous Region (TAR), and recently published books.

The tech company’s cybersecurity division observed the campaign earlier this month, saying the attacks would lead to the deployment of known Mustang Panda malware called Pubload. Tracking a threat actor under the name hive0154.

The attack chain uses Tibetan-themed lures to distribute malicious archives containing benign Microsoft files, and opens executables that disguise articles recreated by Tibetan websites and WPCT photos as documents.

Cybersecurity

As observed in previous Mustang Panda attacks, the executable leverages the sideload of the DLL to launch a malicious DLL dubbed billing loader. This is used to deploy Pubload, the downloader malware responsible for contacting the remote server and getting Pubshell that injects the payload for the next stage.

Pubshell said “a lightweight backdoor that promotes immediate access to machines via reverse shells,” security researchers Golo Mühr and Joshua Chung said in an analysis published this week.

At this stage it is worth mentioning some of the differences in nomenclature. IBM will specify a billing loader for a custom stager first documented by Cisco Talos in May 2022, and Trend Micro will identify both the stager and the download as a Pubload. Similarly, Team T5 tracks the two components together as NoFive.

The development comes weeks after IBM’s activities that have been described as a job in the HIVE0154 subcluster targeting the US, the Philippines, Pakistan and Taiwan from late 2024 to early 2025.

The activity utilizes weaponized archives derived from spear phishing emails to target government, military and diplomatic groups, as if they were targeted in Tibet.

Digital Missives includes a link to the Google Drive URL that downloads Booby-Trapped Zip or RAR archives on click, and ultimately, in 2024 Toneshell and Pubload deployments will be deployed via the billing loader.

Another frequently used Mustang Panda malware, Toneshell, works similarly to PubShell. This is also used to create a reverse shell of compromised hosts and run commands.

“The implementation of a reverse shell pub shell through anonymous pipe is roughly the same as a toneshell,” the researchers said. “However, instead of running a new thread to return the results immediately, PubShell requires additional commands to return the command results. It also supports only running “cmd.exe” as a shell. ”

Cybersecurity

“In some respects, Pubload and Pubshell are independently developed “Lite versions” of Toneshell, with fewer overlaps of sophisticated clear codes. ”

The attack targeting Taiwan is characterized by the use of a USB worm called Hiupan (aka Mistcloak or U2DiskWatch), which will then be utilized to expand billing loaders and publishing via USB devices.

“HIVE0154 remains a highly capable threat actor with multiple active subclusters and frequent development cycles,” the researchers said.

“China Alliance groups like HIVE0154 continue to improve their large malware arsenals and focus on private and public sector East Asia-based organizations. Their wide range of tools, frequent development cycles, and USB Worm-based malware distribution highlight them as sophisticated threat actors.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBerkeley approves the “middle housing” ordinance
Next Article TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025
user
  • Website

Related Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025

Over 100 VS Code extensions expose developers to hidden supply chain risks

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Group chats added to Threads as Messaging rolls out to the EU

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.