Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Pricing Choices and Useful Scope

    January 25, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Assaults – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra
    AI Ethics & Regulation

    HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Assaults – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    Declan MurphyBy Declan MurphyDecember 30, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Assaults – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    In a significant discovery, cybersecurity researchers at Kaspersky Securelist have discovered a brand new espionage exercise concentrating on authorities workplaces throughout Southeast and East Asia. The marketing campaign, which probably started in February 2025, makes use of a rootkit to cover deep inside a pc’s core, making it invisible to straightforward safety instruments.

    Kaspersky hyperlinks the assault to a bunch referred to as HoneyMyte (aka Bronze President or Mustang Panda). In keeping with their evaluation, the hackers are particularly concentrating on Myanmar and Thailand utilizing a malicious driver file named ProjectConfiguration.sys.

    Bypassing the Digital Guard

    As we all know it, most antivirus applications scan for suspicious recordsdata on the floor. Nonetheless, they fail to establish this assault as a result of the driving force registers as a mini-filter, a software that sits deep within the system’s site visitors management.

    To look reputable, the hackers used a stolen digital certificates from Guangzhou Kingteller Know-how (Serial: 08 01 CC 11 EB 4D 1D 33 1E 3D 54 0C 55 A4 9F 7F), which, though expired in 2015 however nonetheless helps the malware bypass inside warnings.

    Supply: Kaspersky Securelist

    To additional disguise its tracks, the driving force makes use of dynamic decision, a method that scrambles its inside code so safety software program can’t simply perceive what it’s doing. Additional probing revealed the driving force is extremely cussed. If an antivirus tries to delete or rename it, the driving force merely blocks the motion. It even “blinds” Microsoft Defender by tampering with its “altitude” settings. This mainly permits the malware to sit down “under” the antivirus within the system, intercepting instructions earlier than the safety software program even sees them, the weblog submit explains.

    The ToneShell Backdoor

    The final word purpose of this intrusion is to drop a spy software referred to as the ToneShell backdoor, which acts as a secret gateway for hackers to steal recordsdata, obtain information, or run distant instructions.

    A noteworthy discovering is that the group registered their management servers (avocadomechanism.com and potherbreference.com) by way of NameCheap again in September 2024, months earlier than the precise assaults started.

    “That is the primary time we’ve seen ToneShell delivered via a kernel-mode loader,” researchers famous, explaining that it provides the spy software a excessive degree of safety from being caught.

    In the course of the assault, the driving force delivers two payloads: first, it creates a “host” course of (svchost) to behave as a decoy, after which it injects the ToneShell backdoor into that course of. To maintain their communication secret, ToneShell makes use of a Faux TLS trick, mimicking the markers of safe TLS 1.3 site visitors.

    ToneShell Backdoor Injection Course of (Supply: Kaspersky Securelist)

    Apparently, most victims have been already contaminated with older HoneyMyte instruments just like the ToneDisk USB worm or PlugX. As a result of the malware runs totally within the pc’s reminiscence and makes use of shellcodes to guard its personal processes, it is vitally arduous to detect. Due to this fact, Kaspersky researchers advocate deep reminiscence audits and cautious monitoring of community site visitors to catch these pretend connections.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026

    Multi-Stage Phishing Marketing campaign Targets Russia with Amnesia RAT and Ransomware

    January 25, 2026
    Top Posts

    Pricing Choices and Useful Scope

    January 25, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Pricing Choices and Useful Scope

    By Amelia Harper JonesJanuary 25, 2026

    SweetAI is offered as a chatbot designed for customers in search of interplay that doesn’t…

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.