CVEDNA

Version AMP - Chargement ultra-rapide

Mustang Panda’s Cyber Espionage: Unveiling the TONESHELL Backdoor

Mustang Panda's Cyber Espionage: Unveiling the TONESHELL Backdoor

The Hacker News, 2025

Mustang Panda, a well-known Chinese hacking group, has recently employed an unprecedented kernel-mode rootkit driver to introduce a new version of backdoor known as TONESHELL. This sophisticated cyber attack occurred in mid-2025 and targeted an unknown entity in Asia.

The Threat

Kaspersky cybersecurity experts identified this new TONESHELL variant during an analysis of recent espionage campaigns carried out by Mustang Panda. The backdoor was designed to infiltrate and maintain long-term control over the target's system, enabling the attackers to exfiltrate sensitive information without detection.

Understanding TONESHELL

The TONESHELL backdoor is notable for its use of a previously unreported kernel-mode rootkit driver. This type of malware operates at the deepest level of the operating system, making it extremely difficult to detect and remove. The rootkit driver allows the attackers to run malicious code with full system privileges, thereby avoiding detection by standard security software.

The Use of a Rootkit

Kernel-mode rootkits operate at the kernel level of an operating system, providing persistent control over the system. They are difficult to detect because they can hide their presence from both the operating system and antivirus software. The fact that Mustang Panda chose this method to deliver TONESHELL highlights their advanced technical capabilities and their commitment to stealth and persistence in their operations.

Impact and Implications

The use of a kernel-mode rootkit by Mustang Panda demonstrates the group's sophistication and resourcefulness. By employing such advanced malware, they can ensure that their attacks remain undetected for extended periods, potentially leading to significant data loss or financial damage for the target organization.

Protecting Against TONESHELL

To protect against such threats, organizations should implement a comprehensive cybersecurity strategy that includes:

Conclusion

The discovery of Mustang Panda's use of a kernel-mode rootkit driver to deliver the TONESHELL backdoor highlights the ongoing threat posed by advanced persistent threats (APT) groups. The sophistication of these attacks underscores the need for robust cybersecurity measures and continuous monitoring to protect against such sophisticated cyber threats.