{"id":479684,"date":"2025-12-30T09:04:14","date_gmt":"2025-12-30T09:04:14","guid":{"rendered":"https:\/\/www.europesays.com\/us\/479684\/"},"modified":"2025-12-30T09:04:14","modified_gmt":"2025-12-30T09:04:14","slug":"chinese-state-hackers-use-rootkit-to-hide-toneshell-malware-activity","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/479684\/","title":{"rendered":"Chinese state hackers use rootkit to hide ToneShell malware activity"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"Chinese state hackers use rootkit to hide ToneShell malware activity\" height=\"900\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/12\/Panda_Bear_Storm.jpg\" width=\"1600\"\/><\/p>\n<p>A new sample of the ToneShell backdoor, typically seen in Chinese cyberespionage campaigns, has been delivered through a kernel-mode loader in attacks against government organizations.<\/p>\n<p>The backdoor has been attributed to the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-abuse-microsoft-app-v-tool-to-evade-antivirus\/\" target=\"_blank\" rel=\"nofollow noopener\">Mustang Panda group<\/a>, also known as\u00a0HoneyMyte or Bronze President, that usually targets\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-use-google-drive-to-drop-malware-on-govt-networks\/\" target=\"_blank\" rel=\"nofollow noopener\">government agencies<\/a>, NGOs, think tanks, and other high-profile organizations\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-use-new-custom-backdoor-to-evade-detection\/\" target=\"_blank\" rel=\"nofollow noopener\">worldwide<\/a>.<\/p>\n<p>Security researchers at Kaspersky analyzed a malicious file driver found on computer systems in Asia and discovered that it has been used in campaigns since at least February 2025 against government organizations in\u00a0Myanmar, Thailand, and other Asian countries.<\/p>\n<p> <a href=\"https:\/\/www.adaptivesecurity.com\/lp\/nb\/free-phishing-test?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2025_12_Linkedin_Social_NA_Brand_Awareness_Teachers_funding&amp;utm_id=701Rd00000ZoWjjIAF%2F&amp;utm_content=970_250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/12\/as-Free-Phishing-970x250.jpg\" alt=\"Wiz\" style=\"margin-top: 0px;\"\/><\/a><\/p>\n<p>Evidence showed that\u00a0the compromised entities had prior infections with older ToneShell variants, PlugX malware, or the ToneDisk USB worm, also attributed to state-sponsored Chinese hackers.<\/p>\n<p>New kernel-mode rootkit<\/p>\n<p>According to Kaspersky, the new ToneShell backdoor was deployed by a mini-filter driver named ProjectConfiguration.sys and signed\u00a0with a stolen or leaked certificate valid between 2012 and 2015 and issued to Guangzhou Kingteller Technology Co., Ltd.<\/p>\n<p>Mini-filters are kernel-mode drivers that plug into the Windows file-system I\/O stack and can inspect, modify, or block file operations. Security software, encryption tools, and backup utilities\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/Windows-hardware\/drivers\/ifs\/about-file-system-filter-drivers\" target=\"_blank\" rel=\"nofollow noopener\">typically use<\/a>\u00a0them.<\/p>\n<p>ProjectConfiguration.sys embeds two user-mode shellcodes in its .data section, each executed as a separate user-mode thread to be injected into user-mode processes.<\/p>\n<p>To evade static analysis, the driver resolves required kernel APIs at runtime by enumerating loaded kernel modules and matching function hashes, rather than importing functions directly.<\/p>\n<p>It registers as a mini-filter driver and intercepts file-system operations related to deletion and renaming. When such operations target the driver itself, they are blocked by forcing the request to fail.<\/p>\n<p>The driver also protects its service-related registry keys by registering a registry callback and denying attempts to create or open them. To ensure priority over security products, it selects a mini-filter altitude above the antivirus-reserved range.<\/p>\n<p>Additionally, the rootkit interferes with Microsoft Defender by modifying the configuration of the WdFilter driver so it is not loaded into the I\/O stack.<\/p>\n<p>To shield injected user-mode payloads, the driver maintains a list of protected process IDs, denies handle access to those processes while the payloads are executing, and removes protection once execution completes.<\/p>\n<p>&#8220;This is the first time we\u2019ve seen ToneShell delivered through a kernel-mode loader, giving it protection from user-mode monitoring and benefiting from the rootkit capabilities of the driver that hides its activity from security tools,&#8221;\u00a0<a href=\"https:\/\/securelist.com\/honeymyte-kernel-mode-rootkit\/118590\/\" target=\"_blank\" rel=\"nofollow noopener\">says Kaspersky<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Attack overview\" height=\"600\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/12\/honeymyte-kernel3.jpg\" width=\"897\"\/><strong>Latest Mustang Panda attack overview<\/strong><br \/>Source: Kaspersky<\/p>\n<p>\u00a0<\/p>\n<p>New ToneShell variant<\/p>\n<p>The new variant of the ToneShell backdoor that Kaspersky analyzed features changes and stealth enhancements.\u00a0The malware now uses a new host identification scheme based on a 4-byte host ID market instead of the 16-byte GUID used previously, and also applies network traffic obfuscation with fake TLS headers.<\/p>\n<p>In terms of the supported remote operations, the backdoor now supports the following commands:<\/p>\n<ul>\n<li>0x1 \u2014 Create a temporary file for incoming data<\/li>\n<p>&#13;<\/p>\n<li>0x2 \/ 0x3 \u2014 Download file<\/li>\n<p>&#13;<\/p>\n<li>0x4 \u2014 Cancel download<\/li>\n<p>&#13;<\/p>\n<li>0x7 \u2014 Establish a remote shell via a pipe<\/li>\n<p>&#13;<\/p>\n<li>0x8 \u2014 Receive operator command<\/li>\n<p>&#13;<\/p>\n<li>0x9 \u2014 Terminate shell<\/li>\n<p>&#13;<\/p>\n<li>0xA \/ 0xB \u2014 Upload file<\/li>\n<p>&#13;<\/p>\n<li>0xC \u2014 Cancel upload<\/li>\n<p>&#13;<\/p>\n<li>0xD \u2014 Close connection<\/li>\n<p>&#13;\n<\/ul>\n<p>Kaspersky advises that memory forensics is key in uncovering ToneShell infections backed by the new kernel-mode injector.<\/p>\n<p>The researchers have high confidence in attributing the new ToneShell backdoor sample to the Mustang Panda cyberespionage group. They assess that the\u00a0threat actor has evolved its tactics, techniques, and procedures to gain operational stealth and resilience.<\/p>\n<p>The cybersecurity company provides in its report a short list of indicators of compromise (IoCs) to help organizations detect Mustang Panda intrusions and defend against them.<\/p>\n<p>        <a href=\"https:\/\/www.tines.com\/access\/guide\/unlocking-it-agility-with-automation-and-orchestration-iam\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=dec-in-article-banner\" target=\"_blank\" rel=\"noopener sponsored\"><br \/>\n            <img decoding=\"async\" alt=\"tines\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/12\/tines-keyhole.jpg\" class=\"b-lazy\"\/><\/a><\/p>\n<p>Broken IAM isn&#8217;t just an IT problem &#8211; the impact ripples across your whole business.<\/p>\n<p>This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what &#8220;good&#8221; IAM looks like, and a simple checklist for building a scalable strategy.<\/p>\n<p>        <a href=\"https:\/\/www.tines.com\/access\/guide\/unlocking-it-agility-with-automation-and-orchestration-iam\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=dec-in-article-banner\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"A new sample of the ToneShell backdoor, typically seen in Chinese cyberespionage campaigns, has been delivered through a&hellip;\n","protected":false},"author":3,"featured_media":479685,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[158,67,132,68],"class_list":{"0":"post-479684","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-technology","9":"tag-united-states","10":"tag-unitedstates","11":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115807720232336508","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/479684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=479684"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/479684\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/479685"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=479684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=479684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=479684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}