Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Posted on December 30, 2025December 30, 2025 By CWS

The Chinese language espionage-focused APT Mustang Panda has been utilizing a kernel-mode rootkit in current assaults towards Asian targets, Kaspersky reviews.

Also called Basin, Bronze President, Earth Preta, and Purple Delta, and tracked by Kaspersky as HoneyMyte, Mustang Panda primarily targets authorities and army entities in East Asia and Europe.

In early 2025, US and French authorities tried to wash 1000’s of computer systems that the APT had contaminated with the PlugX RAT.

In April, cybersecurity agency Zscaler detailed Mustang Panda’s use of an up to date ToneShell backdoor, together with a number of new instruments, together with an EDR evasion driver.

Now, Kaspersky says that, in mid-2025, the espionage group was seen utilizing a signed driver file that registers as a mini-filter driver to deploy the ToneShell backdoor towards an Asian goal.

The motive force accommodates two user-mode shellcodes which are executed as separate threads and are designed to guard the driving force’s module and the user-mode course of that the backdoor is injected into.

“To obfuscate the precise conduct of the driving force module, the attackers used dynamic decision of the required API addresses from hash values,” Kaspersky explains.

To guard itself, the driving force registers with the Filter Supervisor and units up a pre-operation callback to examine all operations focusing on itself. If any is detected, it units a flag to disclaim the operation, thus stopping safety instruments from eradicating or quarantining it.Commercial. Scroll to proceed studying.

Moreover, the driving force builds an inventory of registry paths and parameter names, then assigns itself an altitude worth, and displays registry operations to dam these focusing on keys in its protected record.

The chosen altitude, Kaspersky explains, exceeds the vary designated by Microsoft for the FSFilter Anti-Virus Load Order Group.

“Since filters with decrease altitudes sit deeper within the I/O stack, the malicious driver intercepts file operations earlier than respectable low-altitude filters like antivirus elements, permitting it to bypass safety checks,” the cybersecurity agency explains.

The motive force makes use of an identical routine to intercept and block operations focusing on the user-mode processes through which the backdoor has been injected. Nevertheless, it removes the safety for processes after the backdoor has carried out its actions.

Kaspersky noticed the backdoor delivering two user-mode payloads. The primary spawns a svchost course of and injects delay-inducing shellcode into it, whereas the second is the ToneShell backdoor that’s injected into the spawned svchost course of.

“That is the primary time we’ve seen ToneShell delivered by way of a kernel-mode loader, giving it safety from user-mode monitoring and benefiting from the rootkit capabilities of the driving force that hides its exercise from safety instruments,” Kaspersky notes.

Associated: Chinese language APT ‘LongNosedGoblin’ Concentrating on Asian Governments

Associated: Google Sees 5 Chinese language Teams Exploiting React2Shell for Malware Supply

Associated: UK Sanctions Russian and Chinese language Companies Suspected of Being ‘Malign Actors’ in Data Warfare

Associated: US Organizations Warned of Chinese language Malware Used for Lengthy-Time period Persistence

Security Week News Tags:APT, Caught, Chinese, KernelMode, Mustang, Panda, Rootkit

Post navigation

Previous Post: 70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit
Next Post: Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware

Related Posts

Fencing and Pet Company Jewett-Cameron Hit by Ransomware Fencing and Pet Company Jewett-Cameron Hit by Ransomware Security Week News
Chrome 140 Update Patches Sixth Zero-Day of 2025 Chrome 140 Update Patches Sixth Zero-Day of 2025 Security Week News
ForceMemo Campaign Exploits GitHub for Malware Injection ForceMemo Campaign Exploits GitHub for Malware Injection Security Week News
Preemptive Security Urged as Cyber Threats Accelerate Preemptive Security Urged as Cyber Threats Accelerate Security Week News
Hackers Abuse ConnectWise to Hide Malware Hackers Abuse ConnectWise to Hide Malware Security Week News
North Korea’s Fake Recruiters Feed Stolen Data to IT Workers North Korea’s Fake Recruiters Feed Stolen Data to IT Workers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark