Chinese state hackers use rootkit to hide ToneShell malware activity

A new sample of the ToneShell backdoor, typically seen in Chinese cyberespionage campaigns, has been delivered through a kernel-mode loader in attacks against government organizations.

BleepingComputer

HoneyMyte aka Mustang Panda is using a signed rootkit to drop the #ToneShell backdoor in ongoing attacks, hiding its activity from security tools and giving attackers remote access to system.

Read: https://hackread.com/honeymyte-mustang-panda-toneshell-backdoor/

#CyberSecurity #HoneyMyte #MustangPanda #Malware

HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Attacks

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

📢 ToneShell livré via un chargeur en mode noyau contre des organismes gouvernementaux
📝 **Source :** Bill Toulas
**Média :** *BleepingComputer*
**Date :** 29 décembre 202...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-30-toneshell-livre-via-un-chargeur-en-mode-noyau-contre-des-organismes-gouvernementaux/
🌐 source : https://www.bleepingcomputer.com/news/security/chinese-state-hackers-use-rootkit-to-hide-toneshell-malware-activity/
#ToneShell #backdoor #Cyberveille
The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor
#HoneyMyte #ToneShell
https://securelist.com/honeymyte-kernel-mode-rootkit/118590/
The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor

Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor.

Kaspersky
Hive0154, aka Mustang Panda, drops updated Toneshell backdoor and novel SnakeDisk USB worm
#Hive0154 #ToneShell #Yokai #SnakeDisk
https://www.ibm.com/think/x-force/hive0154-drops-updated-toneshell-backdoor
Hive0154, aka Mustang Panda, drops updated Toneshell backdoor and novel SnakeDisk USB worm

Hive0154 wreaks havoc on Singapore and Thailand using a new Toneshell backdoor and SnakeDisk USB worm.

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence

Since its first appearance earlier this year, the ToneShell backdoor has demonstrated a remarkable capacity for adaptation, toyed with by the Mustang Panda group to maintain an enduring foothold in targeted environments. This latest variant, discovered in early September, arrives concealed within sideloaded DLLs alongside legitimate executables. Delivered via compressed archives purporting to contain innocuous […]

Cyber Security News
"Infrastructure risks have also been prominent, w/vulnerabilities in ASUS routers & critical ICS devices from Schneider Electric & Yokogawa exposing sectors like #energy & manufacturing to..." digitalfrontierpartners.com.au/news/latest-... RU #APT29 Android #NFC China #UNC5221 #SNOWLIGHT #TONESHELL

Latest Sophisticated Attacks a...
Bluesky

Bluesky Social

Today, Trend Micro reported that Mustang Panda (Earth Preta) is leveraging MAVInject.exe to bypass ESET antivirus, injecting malware into waitfor.exe to maintain persistence. This TONESHELL backdoor sideloads through OriginLegacyCLI.exe, targets Thailand-based users, and establishes C2 communication via militarytc[.]com.

ESET disputes this as a “bypass,” stating their protections have been in place for years. The real takeaway? Memorizing security policies won’t stop real attackers—understanding how they actually operate will.

APT groups innovate, exploit OS-native tools, and evade detection in ways policy documents can’t prepare you for. We need hands-on defenders who understand malware behavior, not just non-technical compliance checkboxes and certifications which focus on worthless memorization rather than understanding computer and network architecture.

#CyberSecurity #ThreatHunting #RedTeam #APT #MustangPanda #MAVInject #TONESHELL

https://thehackernews.com/2025/02/chinese-hackers-exploit-mavinjectexe-to.html

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

Mustang Panda exploits MAVInject.exe to evade ESET detection, using EA files to sideload TONESHELL backdoor for persistent cyber espionage.

The Hacker News
Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European Entities

A China-linked nation-state hacking group is using decoys related to the ongoing Russian-Ukrainian war to attack facilities in Europe and the Asia-Pac

The Hacker News