Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mustang Panda deploys snakedisk usb worms to deliver a Yukkuri backdoor on Thai IPS
Identity

Mustang Panda deploys snakedisk usb worms to deliver a Yukkuri backdoor on Thai IPS

userBy userSeptember 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 15th, 2025Ravi LakshmananMalware/Network Security

It has been observed that the Chinese threat actor known as the Mustang Pandas have called updated versions of the backdoor called Toneshell and previously undocumented USB worms Snakedisk.

“The worm runs only on devices with IP addresses based in Thailand and drops yokai backdoors,” IBM X-Force researchers GoloMühr and Joshua Chung said in an analysis published last week.

Tech Giant’s cybersecurity department tracks the cluster under the name hive0154. It is also widely known as the Basin, Bronze President, Camaro Dragon, Earth Preta, Honey Mite, Polaris, Red Delta, Red Delta and Truille-Y-June. The state-sponsored threat actor is believed to have been active since at least 2012.

Audit and subsequent

Toneshel was first published by Trend Microway in November 2022 as part of a cyberattack targeting Myanmar, Australia, the Philippines, Japan and Taiwan between May and October. The main responsibility typically performed via DLL sideloads is to download the next stage payload to the infected host.

A typical attack chain involves the use of spear phishing emails to drop malware families such as Pubload and Toneshell. Working similar to Toneshell, Pubload can also download shellcode payloads via HTTP POST requests from a command and control (C2) server.

The newly identified toneshell variations by IBM X-Force, named Toneshell 8 and Toneshell 9, support C2 communications through locally configured proxy servers, fuse with enterprise network traffic and promote two active reverse shells in parallel. Additionally, to avoid static detection and resistance analysis, junk code copied from Openai’s ChatGPT website is built into Malware’s functionality.

Also, booted using DLL sideload is a new USB worm called Snakedisk, which overlaps with Tonedisk (aka Wisprider). This is another USB worm framework under the Toneshell family. It mainly detects new and existing USB devices connected to the host and uses them as a means of propagation.

Specifically, click on the malicious payload of the new machine by moving existing files on the USB to a new subdirectory and effectively tricking the victim into setting the name to the volume name or “USB.Exe” of the USB device. When the malware starts, the files are copied to their original location.

A notable aspect of malware is that it is geophilic to run only on public IP addresses geolocated in Thailand. Snakedisk also functions as a conduit for dropping Yokai. This is a backdoor that sets up a reverse shell to run any command. This was an invasion targeting Thai officials, which was previously detailed by Netskope in December 2024.

CIS Build Kit

“Yokai shows overlap with other backdoor families due to HIVE0154, such as Pubload/Pubshell and Toneshell,” IBM said. “These families are obviously separate parts of the malware, but they follow roughly the same structure and use similar techniques to establish a reverse shell on a C2 server.”

The use of Snaikd and Yokai refers to the overly focused subgroups within Mustang Panda in Thailand, while also highlighting the continued evolution and refinement of the arsenal of threat actors.

“HIVE0154 remains a highly capable threat actor with multiple active subclusters and frequent development cycles,” the company concluded. “This group appears to maintain a rather large malware ecosystem that frequently overlaps both malicious code, techniques used during attacks, and targeting.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleApple’s iOS26 with a new liquid glass design is now available to everyone
Next Article The Future of Legal Tech is Here: TwinH’s AI Digital Twin Offers a Glimpse into Smoother Legal Journeys
user
  • Website

Related Posts

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026

Experts detect Pakistan-linked cyber attack targeting Indian government agencies

January 27, 2026

ClickFix attack spreads using fake CAPTCHAs, Microsoft Scripts, and trusted web services

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Android smartphones are getting more anti-theft features

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.