Researchers identify new ToneShell backdoors targeting government agencies


  • Mustang Panda deployed upgraded ToneShell backdoors against Asian government organizations
  • New variant uses signed minifilter driver that enables rootkit-like stealth and Defender manipulation
  • Kaspersky advises memory forensics and IoCs to detect infections in compromised systems

Chinese state-sponsored threat actors known as Mustang Panda have been observed targeting government organizations in various Asian countries with an upgraded version of the ToneShell backdoor.

This is according to cybersecurity researchers Kaspersky, who recently analyzed a malicious file driver they found on computers belonging to government organizations in Myanmar, Thailand and others.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top