Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    OpenAI adds GPT-4.1 to ChatGPT amid complaints over confusing model lineup

    May 20, 2025

    Texas is pushing a bill to block under-18s from joining social media platforms

    May 20, 2025

    Improving Cash Flow with AI-Driven Financial Forecasting

    May 20, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
    Cyber Security

    Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

    adminBy adminApril 17, 2025No Comments5 Mins Read
    Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates


    Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

    The China-linked menace actor often called Mustang Panda has been attributed to a cyber assault focusing on an unspecified group in Myanmar with beforehand unreported tooling, highlighting continued effort by the menace actors to extend the sophistication and effectiveness of their malware.

    This contains up to date variations of a recognized backdoor referred to as TONESHELL, in addition to a brand new lateral motion device dubbed StarProxy, two keyloggers codenamed PAKLOG, CorKLOG, and an Endpoint Detection and Response (EDR) evasion driver known as SplatCloak.

    “TONESHELL, a backdoor utilized by Mustang Panda, has been up to date with adjustments to its FakeTLS command-and-control (C2) communication protocol in addition to to the strategies for creating and storing consumer identifiers,” Zscaler ThreatLabz researcher Sudeep Singh mentioned in a two-part evaluation.

    Mustang Panda, also called BASIN, Bronze President, Camaro Dragon, Earth Preta, HoneyMyte, and RedDelta, is a China-aligned state-sponsored menace actor energetic since at the very least 2012.

    Cybersecurity

    Recognized for its assaults on governments, navy entities, minority teams, and non-governmental organizations (NGOs) primarily in international locations situated in East Asia, and to a lesser extent in Europe, the group has a historical past of leveraging DLL side-loading methods to ship the PlugX malware.

    Nonetheless, since late 2022, campaigns orchestrated by Mustang Panda have begun to regularly ship a bespoke malware household referred to as TONESHELL, which is designed to obtain next-stage payloads.

    Zscaler mentioned it found three new variants of the malware that include various ranges of sophistication –

    • Variant 1, which acts as a easy reverse shell
    • Variant 2, which incorporates performance to obtain DLLs from the C2 and execute them by injecting the DLL into reputable processes (e.g., svchost.exe)
    • Variant 3, which incorporates performance to obtain information and create a sub-process to execute instructions acquired from a distant server through a customized TCP-based protocol

    A brand new piece of software program related to Mustang Panda is StarProxy, which is launched through DLL side-loading and is designed to make the most of FakeTLS protocol to proxy site visitors and facilitate attacker communications.

    “As soon as energetic, StarProxy permits attackers to proxy site visitors between contaminated units and their C2 servers. StarProxy achieves this by using TCP sockets to speak with the C2 server through the FakeTLS protocol, encrypting all exchanged knowledge with a customized XOR-based encryption algorithm,” Singh mentioned.

    “Moreover, the device makes use of command-line arguments to specify the IP tackle and port for communication, enabling attackers to relay knowledge by way of compromised machines.”

    StarProxy exercise

    It is believed that StarProxy is deployed as a post-compromise device to entry inner workstations inside a community that aren’t instantly uncovered to the web.

    Additionally recognized are two new keyloggers, PAKLOG and CorKLOG, which can be used to observe keystrokes and clipboard knowledge. The first distinction between the 2 is that the latter shops the captured knowledge in an encrypted file utilizing a 48-character RC4 key and implements persistence mechanisms by creating companies or scheduled duties.

    Each the keyloggers lack knowledge exfiltration capabilities of their very own, which means they solely exist to gather the keystroke knowledge and write them to a selected location and that the menace actor makes use of different strategies to transmit them to their infrastructure.

    Capping off the brand new additions to the Mustang Panda’s malware arsenal is SplatCloak, a Home windows kernel driver deployed by SplatDropper that is outfitted to disable EDR-related routines applied by Home windows Defender and Kaspersky, thereby permitting it to fly below the radar.

    “Mustang Panda demonstrates a calculated method to attaining their aims,” Singh mentioned. “Steady updates, new tooling, and layered obfuscation prolongs the group’s operational safety and improves the efficacy of assaults.”

    UNC5221 Drops New Variations of BRICKSTORM Focusing on Home windows

    The disclosure comes because the China-nexus cyber espionage cluster named UNC5221 has been related to make use of of a brand new model of the BRICKSTORM malware in assaults aimed toward Home windows environments in Europe since at the very least 2022, in line with Belgian cybersecurity agency NVISO.

    Cybersecurity

    BRICKSTORM, first documented final 12 months in reference to the zero-day exploitation of Ivanti Join Safe zero-day vulnerabilities (CVE-2023-46805 and CVE-2024-21887) in opposition to the MITRE Company, is a Golang backdoor deployed on Linux servers working VMware vCenter.

    “It helps the power to set itself up as an online server, carry out file system and listing manipulation, carry out file operations equivalent to add/obtain, run shell instructions, and carry out SOCKS relaying,” Google Mandiant mentioned in April 2024. “BRICKSTORM communicates over WebSockets to a hard-coded C2.”

    The newly recognized Home windows artifacts, additionally written in Go, present attackers with file supervisor and community tunneling capabilities by way of a panel, enabling them to browse the file system, create or delete information, and tunnel community connections for lateral motion.

    In addition they resolve C2 servers by way of DNS-over-HTTPS (DoH), and are engineered to evade network-level defenses like DNS monitoring, TLS inspection, and geo-blocking.

    “The Home windows samples [..] aren’t outfitted with command execution capabilities,” NVISO mentioned. “As an alternative, adversaries have been noticed utilizing community tunneling capabilities together with legitimate credentials to abuse well-known protocols equivalent to RDP or SMB, thus attaining comparable command execution.”

    Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.





    Supply hyperlink

    0 Like this
    Bypass EDR Mustang Myanmar Panda StarProxy Targets TONESHELL Updates
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleSilent Mist Change Evaluation – The Sport Slush Pile
    Next Article Get Lifetime 1TB of Cloud Storage for Simply $130

    Related Posts

    Cyber Security

    RVTools hit in supply chain attack to deliver Bumblebee malware

    May 20, 2025
    Cyber Security

    Why CTEM is the Winning Bet for CISOs in 2025

    May 19, 2025
    Cyber Security

    Toll Road Scam: Here’s what to look out for

    May 19, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.