The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor
Overview
Kaspersky has reported on a new campaign from the HoneyMyte APT group, also known as Mustang Panda or Bronze President, which has evolved to use a sophisticated kernel-mode rootkit. This rootkit is designed to deploy and secure a backdoor known as ToneShell, which allows attackers to maintain persistent access to compromised systems. The implications of this development are significant, as it enhances the group’s ability to infiltrate networks and evade detection. Organizations need to be vigilant against these advanced tactics to protect sensitive data and maintain system integrity. This campaign highlights the ongoing threats posed by state-sponsored hacking groups and the need for robust cybersecurity measures.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Kernel-mode rootkit, ToneShell backdoor, potentially various operating systems affected by the rootkit.
- Action Required: Organizations should implement advanced endpoint detection and response solutions, regularly update their systems, and conduct thorough security audits to detect and mitigate such threats.
- Timeline: Disclosed on 2025
Original Article Summary
Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor.
Impact
Kernel-mode rootkit, ToneShell backdoor, potentially various operating systems affected by the rootkit.
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Disclosed on 2025
Remediation
Organizations should implement advanced endpoint detection and response solutions, regularly update their systems, and conduct thorough security audits to detect and mitigate such threats.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to APT, Kaspersky.