Today, Trend Micro reported that Mustang Panda (Earth Preta) is leveraging MAVInject.exe to bypass ESET antivirus, injecting malware into waitfor.exe to maintain persistence. This TONESHELL backdoor sideloads through OriginLegacyCLI.exe, targets Thailand-based users, and establishes C2 communication via militarytc[.]com.

ESET disputes this as a “bypass,” stating their protections have been in place for years. The real takeaway? Memorizing security policies won’t stop real attackers—understanding how they actually operate will.

APT groups innovate, exploit OS-native tools, and evade detection in ways policy documents can’t prepare you for. We need hands-on defenders who understand malware behavior, not just non-technical compliance checkboxes and certifications which focus on worthless memorization rather than understanding computer and network architecture.

#CyberSecurity #ThreatHunting #RedTeam #APT #MustangPanda #MAVInject #TONESHELL

https://thehackernews.com/2025/02/chinese-hackers-exploit-mavinjectexe-to.html

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

Mustang Panda exploits MAVInject.exe to evade ESET detection, using EA files to sideload TONESHELL backdoor for persistent cyber espionage.

The Hacker News