Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

Posted on June 27, 2025June 27, 2025 By CWS

Jun 27, 2025Ravie LakshmananVulnerability / Cyber Espionage
A China-linked risk actor generally known as Mustang Panda has been attributed to a brand new cyber espionage marketing campaign directed towards the Tibetan neighborhood.
The spear-phishing assaults leveraged matters associated to Tibet, such because the ninth World Parliamentarians’ Conference on Tibet (WPCT), China’s training coverage within the Tibet Autonomous Area (TAR), and a not too long ago revealed e-book by the 14th Dalai Lama, in line with IBM X-Power.
The cybersecurity division of the expertise firm stated it noticed the marketing campaign earlier this month, with the assaults resulting in the deployment of a identified Mustang Panda malware referred to as PUBLOAD. It is monitoring the risk actor beneath the identify Hive0154.
The assault chains make use of Tibet-themed lures to distribute a malicious archive containing a benign Microsoft Phrase file, together with articles reproduced by Tibetan web sites and photographs from WPCT, into opening an executable that is disguised as a doc.

The executable, as noticed in prior Mustang Panda assaults, leverages DLL side-loading to launch a malicious DLL dubbed Claimloader that is then used to deploy PUBLOAD, a downloader malware that is accountable for contacting a distant server and fetching a next-stage payload dubbed Pubshell.
Pubshell is a “lightweight backdoor facilitating fast entry to the machine through a reverse shell,” safety researchers Golo Mühr and Joshua Chung stated in an evaluation revealed this week.
At this stage, it is value mentioning among the nomenclature variations: IBM has given the identify Claimloader to the customized stager first documented by Cisco Talos in Could 2022 and PUBLOAD to the first-stage shellcode downloader, whereas Pattern Micro identifies each the stager and the downloader as PUBLOAD. Workforce T5, equally, tracks the 2 parts collectively as NoFive.
The event comes weeks after IBM’s exercise which it stated is the work of a Hive0154 sub-cluster focusing on the US, Philippines, Pakistan, and Taiwan from late 2024 to early 2025.
This exercise, like within the case of these focusing on Tibet, makes use of weaponized archives originating from spear-phishing emails to focus on authorities, army, and diplomatic entities.

The digital missives comprise hyperlinks to Google Drive URLs that obtain the booby-trapped ZIP or RAR archives upon clicking, finally ensuing within the deployment of TONESHELL in 2024 and PUBLOAD beginning this 12 months through Claimloader.
TONESHELL, one other oft-used Mustang Panda malware, capabilities equally to Pubshell in that it is also used to create a reverse shell and execute instructions on the compromised host.
“The Pubshell implementation of the reverse shell through nameless pipes is sort of equivalent to TONESHELL,” the researchers stated. “Nonetheless, as an alternative of operating a brand new thread to instantly return any outcomes, Pubshell requires a further command to return command outcomes. It additionally solely helps operating ‘cmd.exe’ as a shell.”

“In a number of methods, Pubload and Pubshell seem like an independently developed ‘lite model’ of TONESHELL, with much less sophistication and clear code overlaps.”
The assaults focused Taiwan have been characterised by means of a USB worm referred to as HIUPAN (aka MISTCLOAK or U2DiskWatch), which is then leveraged to unfold Claimloader and PUBLOAD via USB units.
“Hive0154 stays a extremely succesful risk actor with a number of energetic sub-clusters and frequent growth cycles,” the researchers stated.
“China-aligned teams like Hive0154 will proceed to refine their giant malware arsenal and retain a concentrate on East Asia-based organizations within the non-public and public sectors. Their big range of tooling, frequent growth cycles, and USB worm-based malware distribution highlights them as a classy risk actor.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attack, Malware, Mustang, Pandas, PUBLOAD, Pubshell, TibetSpecific

Post navigation

Previous Post: Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack
Next Post: In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update

Related Posts

Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures The Hacker News
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files The Hacker News
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks The Hacker News
Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials The Hacker News
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages The Hacker News
Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black
  • Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
  • In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update
  • PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack
  • Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black
  • Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
  • In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update
  • PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack
  • Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News