Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Posted on December 30, 2025December 30, 2025 By CWS

The Chinese language espionage-focused APT Mustang Panda has been utilizing a kernel-mode rootkit in current assaults towards Asian targets, Kaspersky reviews.

Also called Basin, Bronze President, Earth Preta, and Purple Delta, and tracked by Kaspersky as HoneyMyte, Mustang Panda primarily targets authorities and army entities in East Asia and Europe.

In early 2025, US and French authorities tried to wash 1000’s of computer systems that the APT had contaminated with the PlugX RAT.

In April, cybersecurity agency Zscaler detailed Mustang Panda’s use of an up to date ToneShell backdoor, together with a number of new instruments, together with an EDR evasion driver.

Now, Kaspersky says that, in mid-2025, the espionage group was seen utilizing a signed driver file that registers as a mini-filter driver to deploy the ToneShell backdoor towards an Asian goal.

The motive force accommodates two user-mode shellcodes which are executed as separate threads and are designed to guard the driving force’s module and the user-mode course of that the backdoor is injected into.

“To obfuscate the precise conduct of the driving force module, the attackers used dynamic decision of the required API addresses from hash values,” Kaspersky explains.

To guard itself, the driving force registers with the Filter Supervisor and units up a pre-operation callback to examine all operations focusing on itself. If any is detected, it units a flag to disclaim the operation, thus stopping safety instruments from eradicating or quarantining it.Commercial. Scroll to proceed studying.

Moreover, the driving force builds an inventory of registry paths and parameter names, then assigns itself an altitude worth, and displays registry operations to dam these focusing on keys in its protected record.

The chosen altitude, Kaspersky explains, exceeds the vary designated by Microsoft for the FSFilter Anti-Virus Load Order Group.

“Since filters with decrease altitudes sit deeper within the I/O stack, the malicious driver intercepts file operations earlier than respectable low-altitude filters like antivirus elements, permitting it to bypass safety checks,” the cybersecurity agency explains.

The motive force makes use of an identical routine to intercept and block operations focusing on the user-mode processes through which the backdoor has been injected. Nevertheless, it removes the safety for processes after the backdoor has carried out its actions.

Kaspersky noticed the backdoor delivering two user-mode payloads. The primary spawns a svchost course of and injects delay-inducing shellcode into it, whereas the second is the ToneShell backdoor that’s injected into the spawned svchost course of.

“That is the primary time we’ve seen ToneShell delivered by way of a kernel-mode loader, giving it safety from user-mode monitoring and benefiting from the rootkit capabilities of the driving force that hides its exercise from safety instruments,” Kaspersky notes.

Associated: Chinese language APT ‘LongNosedGoblin’ Concentrating on Asian Governments

Associated: Google Sees 5 Chinese language Teams Exploiting React2Shell for Malware Supply

Associated: UK Sanctions Russian and Chinese language Companies Suspected of Being ‘Malign Actors’ in Data Warfare

Associated: US Organizations Warned of Chinese language Malware Used for Lengthy-Time period Persistence

Security Week News Tags:APT, Caught, Chinese, KernelMode, Mustang, Panda, Rootkit

Post navigation

Previous Post: 70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit
Next Post: Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware

Related Posts

TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks Security Week News
Critical King Addons Vulnerability Exploited to Hack WordPress Sites Critical King Addons Vulnerability Exploited to Hack WordPress Sites Security Week News
Microsoft Patches Over 100 Vulnerabilities Microsoft Patches Over 100 Vulnerabilities Security Week News
Exposed Docker APIs Likely Exploited to Build Botnet Exposed Docker APIs Likely Exploited to Build Botnet Security Week News
CISA Warns of Exploited Flaw in Asus Update Tool CISA Warns of Exploited Flaw in Asus Update Tool Security Week News
Ongoing Campaign Uses 60 NPM Packages to Steal Data Ongoing Campaign Uses 60 NPM Packages to Steal Data Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News