Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The anatomy of an agency chief client officer

    The biggest SEO lessons in 2025 for publishers

    New Year’s AI surprise: Fal releases its own version of Flux 2 image generator that’s 10x cheaper and 6x more efficient

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025

      Trump signs executive order seeking to ban states from regulating AI companies

      December 13, 2025

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025
    • Business

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025

      Zeroday Cloud hacking event awards $320,0000 for 11 zero days

      December 18, 2025

      Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

      December 18, 2025

      Want to back up your iPhone securely without paying the Apple tax? There’s a hack for that, but it isn’t for everyone… yet

      December 16, 2025
    • Crypto

      3 Meme Coins To Watch In The New Year 2026 Week

      December 30, 2025

      XRP Price Prediction: What To Expect From XRP In 2026?

      December 30, 2025

      Cardano Price to $0.69? Bullish Hints Surface as Breakout Nears

      December 30, 2025

      3 Altcoins That Could Trigger Major Liquidations in Early January

      December 30, 2025

      Whales Add $1.2 Billion in Ethereum (ETH) as Price Tests a Bearish Formation

      December 30, 2025
    • Technology

      The anatomy of an agency chief client officer

      December 30, 2025

      The biggest SEO lessons in 2025 for publishers

      December 30, 2025

      New Year’s AI surprise: Fal releases its own version of Flux 2 image generator that’s 10x cheaper and 6x more efficient

      December 30, 2025

      New framework simplifies the complex landscape of agentic AI

      December 30, 2025

      Inside Microsoft Ignite: How Microsoft and NVIDIA are redefining the AI stack

      December 30, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Chinese state hackers use rootkit to hide ToneShell malware activity
    Technology

    Chinese state hackers use rootkit to hide ToneShell malware activity

    TechAiVerseBy TechAiVerseDecember 30, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Chinese state hackers use rootkit to hide ToneShell malware activity
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Chinese state hackers use rootkit to hide ToneShell malware activity

    A new sample of the ToneShell backdoor, typically seen in Chinese cyberespionage campaigns, has been delivered through a kernel-mode loader in attacks against government organizations.

    The backdoor has been attributed to the Mustang Panda group, also known as HoneyMyte or Bronze President, that usually targets government agencies, NGOs, think tanks, and other high-profile organizations worldwide.

    Security researchers at Kaspersky analyzed a malicious file driver found on computer systems in Asia and discovered that it has been used in campaigns since at least February 2025 against government organizations in Myanmar, Thailand, and other Asian countries.

    Evidence showed that the compromised entities had prior infections with older ToneShell variants, PlugX malware, or the ToneDisk USB worm, also attributed to state-sponsored Chinese hackers.

    New kernel-mode rootkit

    According to Kaspersky, the new ToneShell backdoor was deployed by a mini-filter driver named ProjectConfiguration.sys and signed with a stolen or leaked certificate valid between 2012 and 2015 and issued to Guangzhou Kingteller Technology Co., Ltd.

    Mini-filters are kernel-mode drivers that plug into the Windows file-system I/O stack and can inspect, modify, or block file operations. Security software, encryption tools, and backup utilities typically use them.

    ProjectConfiguration.sys embeds two user-mode shellcodes in its .data section, each executed as a separate user-mode thread to be injected into user-mode processes.

    To evade static analysis, the driver resolves required kernel APIs at runtime by enumerating loaded kernel modules and matching function hashes, rather than importing functions directly.

    It registers as a mini-filter driver and intercepts file-system operations related to deletion and renaming. When such operations target the driver itself, they are blocked by forcing the request to fail.

    The driver also protects its service-related registry keys by registering a registry callback and denying attempts to create or open them. To ensure priority over security products, it selects a mini-filter altitude above the antivirus-reserved range.

    Additionally, the rootkit interferes with Microsoft Defender by modifying the configuration of the WdFilter driver so it is not loaded into the I/O stack.

    To shield injected user-mode payloads, the driver maintains a list of protected process IDs, denies handle access to those processes while the payloads are executing, and removes protection once execution completes.

    “This is the first time we’ve seen ToneShell delivered through a kernel-mode loader, giving it protection from user-mode monitoring and benefiting from the rootkit capabilities of the driver that hides its activity from security tools,” says Kaspersky.

    Latest Mustang Panda attack overview
    Source: Kaspersky

    New ToneShell variant

    The new variant of the ToneShell backdoor that Kaspersky analyzed features changes and stealth enhancements. The malware now uses a new host identification scheme based on a 4-byte host ID market instead of the 16-byte GUID used previously, and also applies network traffic obfuscation with fake TLS headers.

    In terms of the supported remote operations, the backdoor now supports the following commands:

    • 0x1 — Create a temporary file for incoming data
    • 0x2 / 0x3 — Download file
    • 0x4 — Cancel download
    • 0x7 — Establish a remote shell via a pipe
    • 0x8 — Receive operator command
    • 0x9 — Terminate shell
    • 0xA / 0xB — Upload file
    • 0xC — Cancel upload
    • 0xD — Close connection

    Kaspersky advises that memory forensics is key in uncovering ToneShell infections backed by the new kernel-mode injector.

    The researchers have high confidence in attributing the new ToneShell backdoor sample to the Mustang Panda cyberespionage group. They assess that the threat actor has evolved its tactics, techniques, and procedures to gain operational stealth and resilience.

    The cybersecurity company provides in its report a short list of indicators of compromise (IoCs) to help organizations detect Mustang Panda intrusions and defend against them.


    Break down IAM silos like Bitpanda, KnowBe4, and PathAI

    Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

    This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleCoupang to split $1.17 billion among 33.7 million data breach victims
    Next Article 3 Altcoins That Could Trigger Major Liquidations in Early January
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    The anatomy of an agency chief client officer

    December 30, 2025

    The biggest SEO lessons in 2025 for publishers

    December 30, 2025

    New Year’s AI surprise: Fal releases its own version of Flux 2 image generator that’s 10x cheaper and 6x more efficient

    December 30, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025560 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025205 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025109 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 202594 Views
    Don't Miss
    Technology December 30, 2025

    The anatomy of an agency chief client officer

    The anatomy of an agency chief client officer By Sam Bradley  •  December 30, 2025…

    The biggest SEO lessons in 2025 for publishers

    New Year’s AI surprise: Fal releases its own version of Flux 2 image generator that’s 10x cheaper and 6x more efficient

    New framework simplifies the complex landscape of agentic AI

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The anatomy of an agency chief client officer

    December 30, 20250 Views

    The biggest SEO lessons in 2025 for publishers

    December 30, 20250 Views

    New Year’s AI surprise: Fal releases its own version of Flux 2 image generator that’s 10x cheaper and 6x more efficient

    December 30, 20250 Views
    Most Popular

    What to Know and Where to Find Apple Intelligence Summaries on iPhone

    March 12, 20250 Views

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    Senua’s Saga: Hellblade 2 leads BAFTA Game Awards 2025 nominations

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.