Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Pubload and Pubshell malware used in Mustang Panda’s Tibet-specific attacks
Identity

Pubload and Pubshell malware used in Mustang Panda’s Tibet-specific attacks

userBy userJune 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 27, 2025Ravi LakshmananVulnerability/Cyberspy

The Chinese-related threat actor known as the Mustang Panda is attributed to a new cyber-espionage action directed against the Tibetan community.

According to IBM X-Force, topics related to Tibet have been leveraged, such as the 9th World Parliament’s Treaty of Tibet (WPCT), China’s Education Policy (TAR) in the Tibetan Autonomous Region (TAR), and recently published books.

The tech company’s cybersecurity division observed the campaign earlier this month, saying the attacks would lead to the deployment of known Mustang Panda malware called Pubload. Tracking a threat actor under the name hive0154.

The attack chain uses Tibetan-themed lures to distribute malicious archives containing benign Microsoft files, and opens executables that disguise articles recreated by Tibetan websites and WPCT photos as documents.

Cybersecurity

As observed in previous Mustang Panda attacks, the executable leverages the sideload of the DLL to launch a malicious DLL dubbed billing loader. This is used to deploy Pubload, the downloader malware responsible for contacting the remote server and getting Pubshell that injects the payload for the next stage.

Pubshell said “a lightweight backdoor that promotes immediate access to machines via reverse shells,” security researchers Golo Mühr and Joshua Chung said in an analysis published this week.

At this stage it is worth mentioning some of the differences in nomenclature. IBM will specify a billing loader for a custom stager first documented by Cisco Talos in May 2022, and Trend Micro will identify both the stager and the download as a Pubload. Similarly, Team T5 tracks the two components together as NoFive.

The development comes weeks after IBM’s activities that have been described as a job in the HIVE0154 subcluster targeting the US, the Philippines, Pakistan and Taiwan from late 2024 to early 2025.

The activity utilizes weaponized archives derived from spear phishing emails to target government, military and diplomatic groups, as if they were targeted in Tibet.

Digital Missives includes a link to the Google Drive URL that downloads Booby-Trapped Zip or RAR archives on click, and ultimately, in 2024 Toneshell and Pubload deployments will be deployed via the billing loader.

Another frequently used Mustang Panda malware, Toneshell, works similarly to PubShell. This is also used to create a reverse shell of compromised hosts and run commands.

“The implementation of a reverse shell pub shell through anonymous pipe is roughly the same as a toneshell,” the researchers said. “However, instead of running a new thread to return the results immediately, PubShell requires additional commands to return the command results. It also supports only running “cmd.exe” as a shell. ”

Cybersecurity

“In some respects, Pubload and Pubshell are independently developed “Lite versions” of Toneshell, with fewer overlaps of sophisticated clear codes. ”

The attack targeting Taiwan is characterized by the use of a USB worm called Hiupan (aka Mistcloak or U2DiskWatch), which will then be utilized to expand billing loaders and publishing via USB devices.

“HIVE0154 remains a highly capable threat actor with multiple active subclusters and frequent development cycles,” the researchers said.

“China Alliance groups like HIVE0154 continue to improve their large malware arsenals and focus on private and public sector East Asia-based organizations. Their wide range of tools, frequent development cycles, and USB Worm-based malware distribution highlight them as sophisticated threat actors.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBerkeley approves the “middle housing” ordinance
Next Article TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.