Researchers Identify New ToneShell Backdoor Targeting Government Agencies



  • Mustang Panda Deployed Improved ToneShell Backdoors Against Asian Government Organizations
  • The new variant uses a signed minifilter driver, allowing rootkit-like stealth and manipulation of the Defender
  • Kaspersky recommends memory and IoC forensics to detect infections on compromised systems

Chinese state-sponsored threat actors, known as Mustang Panda, have been observed targeting government organizations in several Asian countries with an enhanced version of the ToneShell backdoor.

This is according to cybersecurity researchers Kaspersky, who recently analyzed a malicious file driver they found on computers belonging to government organizations in Myanmar, Thailand and others.



Leave a Comment

Your email address will not be published. Required fields are marked *