Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

Data breach at government tech giant Conduent balloon affects millions more Americans

Eleven Lab CEO: Voice is the next interface for AI

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mustang Panda uses signed kernel-mode rootkit to load TONESHELL backdoor
Identity

Mustang Panda uses signed kernel-mode rootkit to load TONESHELL backdoor

userBy userDecember 30, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 30, 2026Ravi LakshmananMalware/Cyber ​​Espionage

A Chinese hacker group known as Mustang Panda utilized a previously undocumented kernel-mode rootkit driver to deliver a new variant of a backdoor called TONESHELL in a cyberattack detected targeting unspecified organizations in Asia in mid-2025.

The findings, published by Kaspersky Lab, observed new backdoor variants in cyberespionage operations by hacker groups targeting government agencies in Southeast and East Asia, primarily Myanmar and Thailand.

“The driver files are signed with outdated, stolen or leaked digital certificates and are registered as mini-filter drivers on infected machines,” the Russian cybersecurity firm said. “Their end goal is to inject a backdoor Trojan into system processes to protect malicious files, user-mode processes, and registry keys.”

The final payload deployed as part of the attack is TONESHELL, an implant with reverse shell and downloader functionality that fetches the next stage of malware onto the compromised host. Use of TONESHELL is believed to be by Mustang Panda since at least late 2022.

As of September 2025, this threat actor was associated with attacks targeting businesses in Thailand with TONESHELL and a USB worm named TONEDISK (also known as WispRider) that used removable devices as a distribution vector for a backdoor called Yokai.

The command and control (C2) infrastructure used for TONESHELL is said to have been built in September 2024, but there are indications that the campaign itself did not begin until February 2025. The exact initial access route used in the attack is not clear. The attackers are suspected of exploiting previously compromised machines to deploy malicious drivers.

cyber security

The driver file (“ProjectConfiguration.sys”) is signed with a digital certificate from Guangzhou Kingteller Technology Co., Ltd, a Chinese company involved in the sales and provisioning of automated teller machines (ATMs). The certificate was valid from August 2012 to 2015.

Given the existence of other unrelated malicious artifacts signed with the same digital certificate, we assess that the attacker likely leveraged a leaked or stolen certificate to accomplish their goals. The malicious driver includes two user-mode shellcodes embedded in the .data section of the binary. These run as separate user-mode threads.

“The rootkit functionality protects both the driver’s own modules and the user-mode process where the backdoor code is injected, preventing access by any process on the system,” Kaspersky said.

The driver has the following set of features:

Dynamically resolves the required kernel API at runtime using a hashing algorithm that matches the required API address. Monitors file deletion and file renaming operations to ensure that the file itself is not deleted or renamed. Reject attempts to create or open registry keys that match the protected list by setting the RegistryCallback routine and ensuring it runs at altitude 330024 or higher. WdFilter.sys, the Microsoft Defender driver, and change this to zero (default value is 328010). This prevents it from being loaded onto the I/O stack. Suspends process-related operations and denies access if the action targets a process in the list of running protected process IDs. Once the execution is complete, remove rootkit protection for those processes.

“Microsoft specifies the advanced range for the FSFilter Anti-Virus Load Order Group to be 320000 to 329999,” Kaspersky explained. “The altitude chosen by the malware exceeds this range. Low-altitude filters sit deep in the I/O stack, allowing malicious drivers to intercept file operations and bypass security checks before legitimate low-altitude filters, such as antivirus components.”

The driver is ultimately designed to drop two user-mode payloads, one of which spawns an “svchost.exe” process and injects shellcode that causes a small delay. The second payload is a TONESHELL backdoor that is injected into the same “svchost.exe” process.

Once launched, the backdoor establishes a connection with a C2 server (‘avocadomechanism’).[.]com” or “port reference”[.]com”) over TCP to port 443 and use the communication channel to receive commands that allow you to:

Create temporary file for incoming data (0x1) Download file (0x2 / 0x3) Cancel download (0x4) Establish remote shell via pipe (0x7) Receive operator command (0x8) Exit shell (0x9) Upload file (0xA / 0xB) Cancel upload (0xC), close connection (0xD)

cyber security

This development marks the first time that TONSHELL is delivered through a kernel-mode loader, effectively hiding its activities from security tools. Our findings indicate that this driver is the latest addition to a larger and evolving set of tools that Mustang Panda uses to maintain persistence and hide backdoors.

Because shellcode runs entirely in memory, memory forensics is key to analyzing new TONESHELL infections, Kaspersky said, noting that detection of injected shellcode is a key indicator of the presence of a backdoor on a compromised host.

“HoneyMyte’s 2025 operations will see a significant evolution in deploying ToneShell using kernel-mode injectors, improving both stealth and resiliency,” the company concludes.

“To further hide its activity, the driver first deploys a small user-mode component that handles the final injection step. It also uses multiple obfuscation techniques, callback routines, and notification mechanisms to hide API usage, track process and registry activity, and ultimately strengthen backdoor defenses.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMeta acquired Manus, the AI ​​startup everyone was talking about.
Next Article The year AI moves from experimentation to execution
user
  • Website

Related Posts

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

February 5, 2026

Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

February 5, 2026

Buyer’s Guide to AI Usage Control

February 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

Data breach at government tech giant Conduent balloon affects millions more Americans

Eleven Lab CEO: Voice is the next interface for AI

Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.