Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Posted on December 30, 2025December 30, 2025 By CWS

The Chinese language espionage-focused APT Mustang Panda has been utilizing a kernel-mode rootkit in current assaults towards Asian targets, Kaspersky reviews.

Also called Basin, Bronze President, Earth Preta, and Purple Delta, and tracked by Kaspersky as HoneyMyte, Mustang Panda primarily targets authorities and army entities in East Asia and Europe.

In early 2025, US and French authorities tried to wash 1000’s of computer systems that the APT had contaminated with the PlugX RAT.

In April, cybersecurity agency Zscaler detailed Mustang Panda’s use of an up to date ToneShell backdoor, together with a number of new instruments, together with an EDR evasion driver.

Now, Kaspersky says that, in mid-2025, the espionage group was seen utilizing a signed driver file that registers as a mini-filter driver to deploy the ToneShell backdoor towards an Asian goal.

The motive force accommodates two user-mode shellcodes which are executed as separate threads and are designed to guard the driving force’s module and the user-mode course of that the backdoor is injected into.

“To obfuscate the precise conduct of the driving force module, the attackers used dynamic decision of the required API addresses from hash values,” Kaspersky explains.

To guard itself, the driving force registers with the Filter Supervisor and units up a pre-operation callback to examine all operations focusing on itself. If any is detected, it units a flag to disclaim the operation, thus stopping safety instruments from eradicating or quarantining it.Commercial. Scroll to proceed studying.

Moreover, the driving force builds an inventory of registry paths and parameter names, then assigns itself an altitude worth, and displays registry operations to dam these focusing on keys in its protected record.

The chosen altitude, Kaspersky explains, exceeds the vary designated by Microsoft for the FSFilter Anti-Virus Load Order Group.

“Since filters with decrease altitudes sit deeper within the I/O stack, the malicious driver intercepts file operations earlier than respectable low-altitude filters like antivirus elements, permitting it to bypass safety checks,” the cybersecurity agency explains.

The motive force makes use of an identical routine to intercept and block operations focusing on the user-mode processes through which the backdoor has been injected. Nevertheless, it removes the safety for processes after the backdoor has carried out its actions.

Kaspersky noticed the backdoor delivering two user-mode payloads. The primary spawns a svchost course of and injects delay-inducing shellcode into it, whereas the second is the ToneShell backdoor that’s injected into the spawned svchost course of.

“That is the primary time we’ve seen ToneShell delivered by way of a kernel-mode loader, giving it safety from user-mode monitoring and benefiting from the rootkit capabilities of the driving force that hides its exercise from safety instruments,” Kaspersky notes.

Associated: Chinese language APT ‘LongNosedGoblin’ Concentrating on Asian Governments

Associated: Google Sees 5 Chinese language Teams Exploiting React2Shell for Malware Supply

Associated: UK Sanctions Russian and Chinese language Companies Suspected of Being ‘Malign Actors’ in Data Warfare

Associated: US Organizations Warned of Chinese language Malware Used for Lengthy-Time period Persistence

Security Week News Tags:APT, Caught, Chinese, KernelMode, Mustang, Panda, Rootkit

Post navigation

Previous Post: 70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit
Next Post: Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware

Related Posts

Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations Security Week News
Widespread Exploitation of XWiki Vulnerability Observed Security Week News
New ‘Broadside’ Botnet Poses Risk to Shipping Companies Security Week News
Canadian Airline WestJet Says Hackers Stole Customer Data Security Week News
Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks Security Week News
Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025
  • Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code
  • Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
  • Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit
  • 70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025
  • Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code
  • Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
  • Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit
  • 70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark