Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Sam Altman says ChatGPT will soon allow erotica for adult users

At Starbase, SpaceX is doing its own firefighting.

Inaudible sounds may be the next frontier in wildfire defense

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mustang Panda deploys snakedisk usb worms to deliver a Yukkuri backdoor on Thai IPS
Identity

Mustang Panda deploys snakedisk usb worms to deliver a Yukkuri backdoor on Thai IPS

userBy userSeptember 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 15th, 2025Ravi LakshmananMalware/Network Security

It has been observed that the Chinese threat actor known as the Mustang Pandas have called updated versions of the backdoor called Toneshell and previously undocumented USB worms Snakedisk.

“The worm runs only on devices with IP addresses based in Thailand and drops yokai backdoors,” IBM X-Force researchers GoloMühr and Joshua Chung said in an analysis published last week.

Tech Giant’s cybersecurity department tracks the cluster under the name hive0154. It is also widely known as the Basin, Bronze President, Camaro Dragon, Earth Preta, Honey Mite, Polaris, Red Delta, Red Delta and Truille-Y-June. The state-sponsored threat actor is believed to have been active since at least 2012.

Audit and subsequent

Toneshel was first published by Trend Microway in November 2022 as part of a cyberattack targeting Myanmar, Australia, the Philippines, Japan and Taiwan between May and October. The main responsibility typically performed via DLL sideloads is to download the next stage payload to the infected host.

A typical attack chain involves the use of spear phishing emails to drop malware families such as Pubload and Toneshell. Working similar to Toneshell, Pubload can also download shellcode payloads via HTTP POST requests from a command and control (C2) server.

The newly identified toneshell variations by IBM X-Force, named Toneshell 8 and Toneshell 9, support C2 communications through locally configured proxy servers, fuse with enterprise network traffic and promote two active reverse shells in parallel. Additionally, to avoid static detection and resistance analysis, junk code copied from Openai’s ChatGPT website is built into Malware’s functionality.

Also, booted using DLL sideload is a new USB worm called Snakedisk, which overlaps with Tonedisk (aka Wisprider). This is another USB worm framework under the Toneshell family. It mainly detects new and existing USB devices connected to the host and uses them as a means of propagation.

Specifically, click on the malicious payload of the new machine by moving existing files on the USB to a new subdirectory and effectively tricking the victim into setting the name to the volume name or “USB.Exe” of the USB device. When the malware starts, the files are copied to their original location.

A notable aspect of malware is that it is geophilic to run only on public IP addresses geolocated in Thailand. Snakedisk also functions as a conduit for dropping Yokai. This is a backdoor that sets up a reverse shell to run any command. This was an invasion targeting Thai officials, which was previously detailed by Netskope in December 2024.

CIS Build Kit

“Yokai shows overlap with other backdoor families due to HIVE0154, such as Pubload/Pubshell and Toneshell,” IBM said. “These families are obviously separate parts of the malware, but they follow roughly the same structure and use similar techniques to establish a reverse shell on a C2 server.”

The use of Snaikd and Yokai refers to the overly focused subgroups within Mustang Panda in Thailand, while also highlighting the continued evolution and refinement of the arsenal of threat actors.

“HIVE0154 remains a highly capable threat actor with multiple active subclusters and frequent development cycles,” the company concluded. “This group appears to maintain a rather large malware ecosystem that frequently overlaps both malicious code, techniques used during attacks, and targeting.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleApple’s iOS26 with a new liquid glass design is now available to everyone
Next Article The Future of Legal Tech is Here: TwinH’s AI Digital Twin Offers a Glimpse into Smoother Legal Journeys
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Sam Altman says ChatGPT will soon allow erotica for adult users

At Starbase, SpaceX is doing its own firefighting.

Inaudible sounds may be the next frontier in wildfire defense

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.