Redazione RHC : 15 September 2025 11:08
IBM X-Force researchers have discovered new operations by the Chinese group Hive0154, better known as Mustang Panda. Experts have documented the simultaneous use of an advanced version of the Toneshell backdoor and a new USB worm called SnakeDisk, which specifically targets devices in Thailand. This approach demonstrates a targeted effort to penetrate even the region’s isolated government networks.
The new version of the malware, dubbed Toneshell9, represents a significant improvement over previous versions, thanks to built-in mechanisms to operate through corporate proxy servers, allowing malicious traffic to masquerade as legitimate network connections.
Toneshell9’s arsenal includes a dual reverse shell for parallel command execution, unique encryption algorithms based on modified random number generators, and code obfuscation techniques using neural network-generated strings.
Dai potere alla tua programmazione con TypeScript funzionaleImpara a scrivere codice modulare, sicuro e scalabile con il nostro corso pratico di Programmazione Funzionale in TypeScript, guidato dall’esperto Pietro Grandi, professionista nello sviluppo del software. In 6 ore e 29 lezioni, esplorerai concetti fondamentali come immutabilità, funzioni pure, higher-order functions e monadi, applicandoli direttamente al mondo reale dello sviluppo software. Il corso è pensato per sviluppatori, team leader e professionisti del software che desiderano migliorare la qualità e la manutenibilità del loro codice. Con esempi pratici, esercizi e la guida esperta di Grandi, acquisirai competenze avanzate per affrontare le sfide moderne dello sviluppo. Approfitta della promo e scrivi subito all'amministrazione e guarda l'anteprima gratuita del corso su academy.redhotcyber.com Contattaci per ulteriori informazioni tramite WhatsApp al 375 593 1011 oppure scrivi a [email protected] ![]()
Se ti piacciono le novità e gli articoli riportati su di Red Hot Cyber, iscriviti immediatamente alla newsletter settimanale per non perdere nessun articolo. La newsletter generalmente viene inviata ai nostri lettori ad inizio settimana, indicativamente di lunedì. |
To maintain its presence On the infected machine, DLL Sideloading is used, and communication with control nodes is masked as TLS 1.2 application data packets. The client’s design allows for the simultaneous management of multiple servers, proxies, and key sets. Of particular note is the ability to read proxy settings from the Windows registry, which indicates deep knowledge of network architectures.
At the same time, IBM specialists have identified a completely new USB worm, SnakeDisk. It activates only when IP addresses in Thailand are detected, which indicates the strategic targeting of the campaign. SnakeDisk’s activities include self-propagation via removable media, hiding legitimate files on flash drives, and installing the Yokai backdoor, previously used in attacks against Thai officials in late 2024.
This method allows attackers to bypass air gaps and penetrate critical systems physically separated from the Internet. The timing of the campaign coincides with the escalation of border conflicts between Thailand and Cambodia in 2025, adding further political context to the attack.
According to analysts, Hive0154 actively uses social engineering techniques: forged documents on behalf of Myanmar’s Ministry of Foreign Affairs were used to distribute infected archives, distributed via Box and Google Drive cloud services. Malicious files downloaded from Singapore and Thailand confirm the targeted spread of attacks in Southeast Asian countries. The group has proprietary bootloaders, backdoors, and USB worm families, which underscores its high level of development.
IBM X-Force emphasizes that Hive0154’s actions fit China’s strategic interests, where Cambodia is a key ally and pressure on Thailand is becoming a tool of regional politics. SnakeDisk’s geographic selectivity demonstrates that it isn’t a mass infection, but rather a targeted reconnaissance and intelligence gathering operation under increasingly volatile conditions.
Experts advise organizations at risk to strengthen their defenses: monitor removable media activity, analyze handshake-free TLS traffic, and carefully inspect documents downloaded from cloud services, even if they appear official. Mustang Panda continues to evolve, and its latest tools demonstrate that the threat to regional states remains serious and growing.