Researchers identify new ToneShell backdoor targeting government agencies


  • Mustang Panda deployed enhanced ToneShell backdoors against Asian government organizations
  • New variant uses signed mini-filter driver, enabling rootkit-style stealth and Defender tampering
  • Kaspersky advises memory scanning and IoC to detect infections in compromised systems

Chinese state-sponsored threat actors, known as Mustang Panda, have been observed targeting government organizations in various Asian countries with an enhanced version of the ToneShell backdoor.

This is according to cybersecurity researcher Kaspersky, who recently analyzed a malicious file driver found on computers belonging to government organizations in Myanmar, Thailand and elsewhere.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top