У нас вы можете посмотреть бесплатно Mustang Panda's TONESHELL: The New Cyber Espionage Threat Explained или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
What youll learn: In this video, we delve into the recent cyber espionage activities of the Chinese hacking group Mustang Panda, focusing on their use of a sophisticated kernel-mode rootkit to deploy a new backdoor known as TONESHELL. We will explore the implications of this threat, the timeline of events, and what organizations can do to safeguard against such attacks. In December 2026, cybersecurity firm Kaspersky revealed that Mustang Panda, also known as HoneyMyte, has been utilizing a previously undocumented kernel-mode rootkit driver to deliver a new variant of their backdoor, TONESHELL. This revelation is significant as it highlights an evolution in tactics employed by this group, particularly in their cyber espionage campaigns targeting government organizations in Southeast and East Asia, especially in Myanmar and Thailand. The kernel-mode rootkit, identified as ProjectConfiguration.sys, is signed with a digital certificate from a Chinese company, Guangzhou Kingteller Technology Co., Ltd, which raises concerns about the security of digital certificates and their potential misuse. The rootkit is designed to inject the TONESHELL backdoor into system processes, allowing it to evade detection by traditional security measures. This backdoor not only establishes a command-and-control communication channel but also enables the attackers to execute a range of malicious commands remotely. The TONESHELL backdoor is particularly concerning due to its ability to conceal its activities from security tools. It employs advanced techniques such as dynamic resolution of kernel APIs, monitoring file operations to prevent its removal, and manipulating system processes to maintain persistence. As a result, detecting this backdoor requires advanced memory forensics, emphasizing the need for organizations to enhance their cybersecurity measures. As we analyze the implications of this incident, it becomes clear that organizations must take proactive steps to safeguard their systems. This includes monitoring for unusual network activity, implementing robust endpoint protection solutions, and ensuring that all digital certificates are regularly audited and validated. In conclusion, the emergence of TONESHELL and the tactics employed by Mustang Panda serve as a stark reminder of the evolving nature of cyber threats. Organizations must remain vigilant and adapt their security strategies to counter these sophisticated attacks. By understanding the techniques used by threat actors, organizations can better prepare themselves against potential breaches in the future. This video uses AI-generated narration.