Mustang Panda Deploys Kernel-Mode Rootkit to Conceal TONESHELL Backdoor
Chinese APT uses stolen certificate to sign malicious driver that disables security tools. First documented case of TONESHELL delivered via kernel-mode loader.
Kaspersky researchers have uncovered a new tactic from Mustang Panda: the Chinese state-sponsored group is now deploying a kernel-mode rootkit to hide its TONESHELL backdoor from security tools. The development marks the first time TONESHELL has been delivered through a kernel-level loader, a significant escalation in the group's evasion capabilities.
The campaign targeted government organizations across Myanmar, Thailand, and other Southeast Asian countries starting in early 2025. Mustang Panda—also tracked as HoneyMyte and Bronze President—has long focused on espionage operations against governments and organizations in the Asia-Pacific region.
How the Rootkit Works
The malicious driver, named "ProjectConfiguration.sys," gains kernel-level access to compromised systems. From that privileged position, it can:
- Hide malicious processes and files from user-mode security tools
- Intercept and filter I/O operations before they reach antivirus software
- Disable Microsoft Defender by modifying the WdFilter driver configuration
- Ensure priority over security products by selecting a mini-filter altitude above the antivirus-reserved range
Traditional endpoint security operates largely in user mode. By running at kernel level, the rootkit sits below the visibility of most detection tools. Security software sees what the rootkit allows it to see.
Stolen Certificate Adds Legitimacy
The driver is signed with a digital certificate from Guangzhou Kingteller Technology Co., Ltd., a Chinese company involved in ATM distribution. The certificate was valid from 2012 to 2015, meaning the attackers are using an expired but previously legitimate credential.
Researchers found other unrelated malicious files signed with the same certificate, suggesting it was either stolen or leaked rather than directly obtained by Mustang Panda. Threat actors trading and reusing stolen certificates is common—once a signing key leaks, it becomes a shared resource in underground markets.
Windows treats signed drivers with more trust than unsigned ones. While the expired timestamp limits effectiveness against fully updated systems, organizations running older Windows versions or less strict driver signature enforcement remain vulnerable.
TONESHELL Gets an Upgrade
TONESHELL itself is a backdoor used exclusively by Mustang Panda. Previous versions were delivered through more conventional means—phishing documents, DLL sideloading, and legitimate application hijacking. The kernel-mode delivery represents an evolution.
With the rootkit in place, TONESHELL shellcode executes entirely in memory. No files touch disk after initial deployment. Memory forensics becomes the primary detection method, which many organizations lack the capability to perform routinely.
The backdoor provides standard remote access functionality: command execution, file operations, and data exfiltration. What's changed is visibility. Security teams may not realize TONESHELL is present until network monitoring catches anomalous outbound connections—if they catch them at all.
Detection Challenges
Kernel-mode rootkits create fundamental detection problems. When malware controls what the operating system reports to security tools, those tools can't trust their own observations.
Kaspersky recommends:
- Memory forensics as the primary detection method. The shellcode runs in memory, so that's where evidence exists.
- Network monitoring for command-and-control communications. Even hidden processes need to reach their controllers.
- Boot-time scanning using external media or pre-boot environments where the rootkit isn't active.
- Driver loading audits to identify unexpected kernel-mode components.
Organizations with mature security operations may catch the initial infection before the rootkit deploys. But once it's running, remediation typically requires complete system rebuilds rather than targeted cleanup.
Attribution and Targeting
Kaspersky attributes this campaign to Mustang Panda with high confidence based on TONESHELL usage, infrastructure overlap, and targeting patterns consistent with the group's history.
The focus on Southeast Asian governments fits Mustang Panda's established interests. The group has operated since at least 2012, conducting espionage aligned with Chinese foreign policy objectives. Myanmar and Thailand—both mentioned as targets—are ASEAN members navigating complex relationships with China.
Government organizations in the region should assume they're targets. The sophistication here—kernel-mode rootkits, signed drivers, memory-only payload execution—indicates resources and motivation to maintain persistent access.
Why This Matters
Mustang Panda joining the kernel-rootkit club follows a broader trend. Nation-state groups increasingly adopt techniques that were once the domain of specialized operators. When a mid-tier APT starts shipping signed kernel drivers, the bar for everyone else just dropped.
Defenders relying primarily on endpoint detection and response (EDR) tools should understand their limitations. EDR works well against user-mode threats. Against kernel-level adversaries, it becomes a cat-and-mouse game where the mouse can sometimes turn off the lights.
The stolen certificate angle matters too. Organizations concerned about software supply chain attacks should track certificate usage for their own products. If your signing key shows up on malware, you want to know immediately—not when a security vendor publishes research about someone else using it.
Related Articles
Mustang Panda Upgrades COOLCLIENT With Browser Credential Theft
Chinese APT adds clipboard monitoring, browser stealing, and enhanced plugins to its long-running backdoor. Government entities in Asia remain primary targets.
Jan 29, 2026China's UNC3886 Breached All Four Singapore Telcos
Singapore confirms China-linked APT compromised M1, Singtel, StarHub, and SIMBA using zero-day exploits and rootkits. 11-month Operation Cyber Guardian response disclosed.
Feb 14, 2026Chinese APT Used VMware ESXi Zero-Days to Escape VMs
Huntress researchers discover 'MAESTRO' toolkit exploiting three VMware vulnerabilities. Attackers chained SonicWall VPN access with hypervisor escape to deploy persistent backdoors.
Jan 13, 2026LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call
Scattered Lapsus$ Hunters offers $500-$1,000 to recruit women for IT help desk social engineering attacks. The supergroup combines LAPSUS$, Scattered Spider, and ShinyHunters tactics.
Feb 26, 2026