{"id":339,"date":"2025-12-29T10:09:50","date_gmt":"2025-12-29T10:09:50","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/"},"modified":"2025-12-29T10:09:50","modified_gmt":"2025-12-29T10:09:50","slug":"the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/","title":{"rendered":"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<h2 id=\"overview-of-the-attacks\">Overview of the attacks<\/h2>\n<p>In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old, stolen, or leaked digital certificate and registers as a mini-filter driver on infected machines. Its end-goal is to inject a backdoor Trojan into the system processes and provide protection for malicious files, user-mode processes, and registry keys.<\/p>\n<p>Our analysis indicates that the final payload injected by the driver is a new sample of the ToneShell backdoor, which connects to the attacker\u2019s servers and provides a reverse shell, along with other capabilities. The ToneShell backdoor is a tool known to be used exclusively by the HoneyMyte (aka Mustang Panda or Bronze President) APT actor and is often used in cyberespionage campaigns targeting government organizations, particularly in Southeast and East Asia.<\/p>\n<p>The command-and-control servers for the ToneShell backdoor used in this campaign were registered in September 2024 via NameCheap services, and we suspect the attacks themselves to have begun in February 2025. We\u2019ve observed through our telemetry that the new ToneShell backdoor is frequently employed in cyberespionage campaigns against government organizations in Southeast and East Asia, with Myanmar and Thailand being the most heavily targeted.<\/p>\n<p>Notably, nearly all affected victims had previously been infected with other HoneyMyte tools, including the ToneDisk USB worm, PlugX, and older variants of ToneShell. Although the initial access vector remains unclear, it\u2019s suspected that the threat actor leveraged previously compromised machines to deploy the malicious driver.<\/p>\n<h2 id=\"compromised-digital-certificate\">Compromised digital certificate<\/h2>\n<p>The driver file is signed with a digital certificate from <strong>Guangzhou Kingteller Technology Co., Ltd.<\/strong>, with a serial number of <strong>08 01 CC 11 EB 4D 1D 33 1E 3D 54 0C 55 A4 9F 7F<\/strong>. The certificate was valid from August 2012 until 2015.<\/p>\n<p>We found multiple other malicious files signed with the same certificate which didn\u2019t show any connections to the attacks described in this article. Therefore, we believe that other threat actors have been using it to sign their malicious tools as well. The following image shows the details of the certificate.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183618\/honeymyte-kernel1.png\" class=\"magnificImage\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-118592\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183618\/honeymyte-kernel1.png\" alt=\"\" width=\"774\" height=\"498\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183618\/honeymyte-kernel1.png 774w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183618\/honeymyte-kernel1-300x193.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183618\/honeymyte-kernel1-768x494.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183618\/honeymyte-kernel1-544x350.png 544w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183618\/honeymyte-kernel1-740x476.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183618\/honeymyte-kernel1-435x280.png 435w\" sizes=\"(max-width: 774px) 100vw, 774px\"><\/a><\/p>\n<h2 id=\"technical-details-of-the-malicious-driver\">Technical details of the malicious driver<\/h2>\n<p>The filename used for the driver on the victim\u2019s machine is <strong>ProjectConfiguration.sys<\/strong>. The registry key created for the driver\u2019s service uses the same name, <strong>ProjectConfiguration.<\/strong><\/p>\n<p>The malicious driver contains two user-mode shellcodes, which are embedded into the .data section of the driver\u2019s binary file. The shellcodes are executed as separate user-mode threads. The rootkit functionality protects both the driver\u2019s own module and the user-mode processes into which the backdoor code is injected, preventing access by any process on the system.<\/p>\n<h3 id=\"api-resolution\">API resolution<\/h3>\n<p>To obfuscate the actual behavior of the driver module, the attackers used dynamic resolution of the required API addresses from hash values.<\/p>\n<p>The malicious driver first retrieves the base address of the <strong>ntoskrnl.exe<\/strong> and <strong>fltmgr.sys<\/strong> by calling <strong>ZwQuerySystemInformation<\/strong> with the <strong>SystemInformationClass<\/strong> set to <strong>SYSTEM_MODULE_INFORMATION<\/strong>. It then iterates through this system information and searches for the desired DLLs by name, noting the <strong>ImageBaseAddress<\/strong> of each.<\/p>\n<p>Once the base addresses of the libraries are obtained, the driver uses a simple hashing algorithm to dynamically resolve the required API addresses from <strong>ntoskrnl.exe<\/strong> and <strong>fltmgr.sys<\/strong>.<\/p>\n<p>The hashing algorithm is shown below. The two variants of the seed value provided in the comment are used in the shellcodes and the final payload of the attack.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183721\/honeymyte-kernel2.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-118593\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183721\/honeymyte-kernel2.png\" alt=\"\" width=\"605\" height=\"195\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183721\/honeymyte-kernel2.png 605w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23183721\/honeymyte-kernel2-300x97.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\"><\/a><\/p>\n<h3 id=\"protection-of-the-driver-file\">Protection of the driver file<\/h3>\n<p>The malicious driver registers itself with the Filter Manager using <strong>FltRegisterFilter<\/strong> and sets up a pre-operation callback. This callback inspects I\/O requests for <strong>IRP_MJ_SET_INFORMATION<\/strong> and triggers a malicious handler when certain <strong>FileInformationClass<\/strong> values are detected. The handler then checks whether the targeted file object is associated with the driver; if it is, it forces the operation to fail by setting <strong>IOStatus<\/strong> to <strong>STATUS_ACCESS_DENIED<\/strong>. The relevant <strong>FileInformationClass<\/strong> values include:<\/p>\n<ul>\n<li>FileRenameInformation<\/li>\n<li>FileDispositionInformation<\/li>\n<li>FileRenameInformationBypassAccessCheck<\/li>\n<li>FileDispositionInformationEx<\/li>\n<li>FileRenameInformationEx<\/li>\n<li>FileRenameInformationExBypassAccessCheck<\/li>\n<\/ul>\n<p>These classes correspond to file-delete and file-rename operations. By monitoring them, the driver prevents itself from being removed or renamed \u2013 actions that security tools might attempt when trying to quarantine it.<\/p>\n<h3 id=\"protection-of-registry-keys\">Protection of registry keys<\/h3>\n<p>The driver also builds a global list of registry paths and parameter names that it intends to protect. This list contains the following entries:<\/p>\n<ul>\n<li><strong>ProjectConfiguration<br \/>\n<\/strong><\/li>\n<li><strong>ProjectConfigurationInstances<br \/>\n<\/strong><\/li>\n<li><strong>ProjectConfiguration Instance<\/strong><\/li>\n<\/ul>\n<p>To guard these keys, the malware sets up a <strong>RegistryCallback<\/strong> routine, registering it through <strong>CmRegisterCallbackEx<\/strong>. To do so, it must assign itself an <em>altitude <\/em>value. Microsoft governs altitude assignments for mini-filters, grouping them into Load Order categories with predefined altitude ranges. A filter driver with a low numerical altitude is loaded into the I\/O stack below filters with higher altitudes. The malware uses a hardcoded starting point of <strong>330024<\/strong> and creates altitude strings in the format <strong>330024.%l<\/strong>, where <em>%l<\/em> ranges from 0 to 10,000.<\/p>\n<p>The malware then begins attempting to register the callback using the first generated altitude. If the registration fails with <strong>STATUS_FLT_INSTANCE_ALTITUDE_COLLISION<\/strong>, meaning the altitude is already taken, it increments the value and retries. It repeats this process until it successfully finds an unused altitude.<\/p>\n<p>The callback monitors four specific registry operations. Whenever one of these operations targets a key from its protected list, it responds with <strong>0xC0000022 (STATUS_ACCESS_DENIED)<\/strong>, blocking the action. The monitored operations are:<\/p>\n<ul>\n<li><strong>RegNtPreCreateKey<br \/>\n<\/strong><\/li>\n<li><strong>RegNtPreOpenKey<br \/>\n<\/strong><\/li>\n<li><strong>RegNtPreCreateKeyEx<br \/>\n<\/strong><\/li>\n<li><strong>RegNtPreOpenKeyEx<\/strong><\/li>\n<\/ul>\n<p>Microsoft designates the <strong>320000\u2013329999<\/strong> altitude range for the <em>FSFilter Anti-Virus<\/em> Load Order Group. The malware\u2019s chosen altitude exceeds this range. Since filters with lower altitudes sit deeper in the I\/O stack, the malicious driver intercepts file operations before legitimate low-altitude filters like antivirus components, allowing it to circumvent security checks.<\/p>\n<p>Finally, the malware tampers with the altitude assigned to <strong>WdFilter<\/strong>, a key Microsoft Defender driver. It locates the registry entry containing the driver\u2019s altitude and changes it to <strong>0<\/strong>, effectively preventing WdFilter from being loaded into the I\/O stack.<\/p>\n<h3 id=\"protection-of-user-mode-processes\">Protection of user-mode processes<\/h3>\n<p>The malware sets up a list intended to hold protected process IDs (PIDs). It begins with 32 empty slots, which are filled as needed during execution. A status flag is also initialized and set to 1 to indicate that the list starts out empty.<\/p>\n<p>Next, the malware uses <strong>ObRegisterCallbacks<\/strong> to register two callbacks that intercept process-related operations. These callbacks apply to both <strong>OB_OPERATION_HANDLE_CREATE<\/strong> and <strong>OB_OPERATION_HANDLE_DUPLICATE<\/strong>, and both use a malicious pre-operation routine.<\/p>\n<p>This routine checks whether the process involved in the operation has a PID that appears in the protected list. If so, it sets the <strong>DesiredAccess<\/strong> field in the <strong>OperationInformation<\/strong> structure to 0, effectively denying any access to the process.<\/p>\n<p>The malware also registers a callback routine by calling <strong>PsSetCreateProcessNotifyRoutine<\/strong>. These callbacks are triggered during every process creation and deletion on the system. This malware\u2019s callback routine checks whether the parent process ID (PPID) of a process being deleted exists in the protected list; if it does, the malware removes that PPID from the list. This eventually removes the rootkit protection from a process with an injected backdoor, once the backdoor has fulfilled its responsibilities.<\/p>\n<h3 id=\"payload-injection\">Payload injection<\/h3>\n<p>The driver delivers two user-mode payloads.<\/p>\n<p><strong>The first payload<\/strong> spawns an <em>svchost<\/em> process and injects a small delay-inducing shellcode.\u00a0 The PID of this new <em>svchost<\/em> instance is written to a file for later use.<\/p>\n<p><strong>The second payload <\/strong>is the final component \u2013 the ToneShell backdoor \u2013 and is later injected into that same <em>svchost<\/em> process.<\/p>\n<p><strong>Injection workflow:<\/strong><\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-118594\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3.png\" alt=\"\" width=\"955\" height=\"661\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3.png 955w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3-300x208.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3-768x532.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3-506x350.png 506w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3-740x512.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3-405x280.png 405w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/23184107\/honeymyte-kernel3-800x554.png 800w\" sizes=\"auto, (max-width: 955px) 100vw, 955px\"><\/a><\/p>\n<p>The malicious driver searches for a high-privilege target process by iterating through PIDs and checking whether each process exists and runs under <code>SeLocalSystemSid<\/code>. Once it finds one, it customizes the first payload using random event names, file names, and padding bytes, then creates a named event and injects the payload by attaching its current thread to the process, allocating memory, and launching a new thread.<\/p>\n<p>After injection, it waits for the payload to signal the event, reads the PID of the newly created <em>svchost<\/em> process from the generated file, and adds it to its protected process list. It then similarly customizes the second payload (ToneShell) using random event name and random padding bytes, then creates a named event and injects the payload by attaching to the process, allocating memory, and launching a new thread.<\/p>\n<p>Once the ToneShell backdoor finishes execution, it signals the event. The malware then removes the <em>svchost<\/em> PID from the protected list, waits 10 seconds, and attempts to terminate the process.<\/p>\n<h2 id=\"toneshell-backdoor\">ToneShell backdoor<\/h2>\n<p>The final stage of the attack deploys <strong>ToneShell<\/strong>, a backdoor previously linked to operations by the HoneyMyte APT group and discussed in earlier reporting (see <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.toneshell\" target=\"_blank\" rel=\"noopener\">Malpedia<\/a> and <a href=\"https:\/\/attack.mitre.org\/software\/S1239\/\" target=\"_blank\" rel=\"noopener\">MITRE<\/a>). Notably, this is the first time we\u2019ve seen ToneShell delivered through a <strong>kernel-mode loader<\/strong>, giving it protection from user-mode monitoring and benefiting from the rootkit capabilities of the driver that hides its activity from security tools.<\/p>\n<p>Earlier ToneShell variants generated a 16-byte GUID using <code>CoCreateGuid<\/code> and stored it as a host identifier. In contrast, this version checks for a file named <code>C:ProgramDataMicrosoftOneDrive.tlb<\/code>, validating a 4-byte marker inside it. If the file is absent or the marker is invalid, the backdoor derives a new pseudo-random 4-byte identifier using system-specific values (computer name, tick count, and PRNG), then creates the file and writes the marker. This becomes the unique ID for the infected host.<\/p>\n<p>The samples we have analyzed contact two command-and-control servers:<\/p>\n<ul>\n<li><strong>avocadomechanism[.]com<br \/>\n<\/strong><\/li>\n<li><strong>potherbreference[.]com<\/strong><\/li>\n<\/ul>\n<p>ToneShell communicates with its C2 over raw TCP on port 443 while disguising traffic using <strong>fake TLS headers<\/strong>. This version imitates the first bytes of a TLS 1.3 record (<code>0x17 0x03 0x04<\/code>) instead of the TLS 1.2 pattern used previously. After this three-byte marker, each packet contains a size field and an encrypted payload.<\/p>\n<p><strong>Packet layout:<\/strong><\/p>\n<ul>\n<li><strong>Header (3 bytes):<\/strong> Fake TLS marker<\/li>\n<li><strong>Size (2 bytes):<\/strong> Payload length<\/li>\n<li><strong>Payload:<\/strong> Encrypted with a rolling XOR key<\/li>\n<\/ul>\n<p>The backdoor supports a set of remote operations, including file upload\/download, remote shell functionality, and session control. The command set includes:<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Command ID<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td>0x1<\/td>\n<td>Create temporary file for incoming data<\/td>\n<\/tr>\n<tr>\n<td>0x2 \/ 0x3<\/td>\n<td>Download file<\/td>\n<\/tr>\n<tr>\n<td>0x4<\/td>\n<td>Cancel download<\/td>\n<\/tr>\n<tr>\n<td>0x7<\/td>\n<td>Establish remote shell via pipe<\/td>\n<\/tr>\n<tr>\n<td>0x8<\/td>\n<td>Receive operator command<\/td>\n<\/tr>\n<tr>\n<td>0x9<\/td>\n<td>Terminate shell<\/td>\n<\/tr>\n<tr>\n<td>0xA \/ 0xB<\/td>\n<td>Upload file<\/td>\n<\/tr>\n<tr>\n<td>0xC<\/td>\n<td>Cancel upload<\/td>\n<\/tr>\n<tr>\n<td>0xD<\/td>\n<td>Close connection<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>We assess with high confidence that the activity described in this report is linked to the <strong>HoneyMyte<\/strong> threat actor. This conclusion is supported by the use of the <strong>ToneShell<\/strong> backdoor as the final-stage payload, as well as the presence of additional tools long associated with HoneyMyte \u2013 such as <strong>PlugX<\/strong>, and the <strong>ToneDisk<\/strong> USB worm \u2013 on the impacted systems.<\/p>\n<p>HoneyMyte\u2019s 2025 operations show a noticeable evolution toward using <strong>kernel-mode injectors<\/strong> to deploy ToneShell, improving both stealth and resilience. In this campaign, we observed a new ToneShell variant delivered through a kernel-mode driver that carries and injects the backdoor directly from its embedded payload. To further conceal its activity, the driver first deploys a small user-mode component that handles the final injection step. It also uses multiple obfuscation techniques, callback routines, and notification mechanisms to hide its API usage and track process and registry activity, ultimately strengthening the backdoor\u2019s defenses.<\/p>\n<p>Because the shellcode executes entirely in memory, <strong>memory forensics<\/strong> becomes essential for uncovering and analyzing this intrusion. Detecting the injected shellcode is a key indicator of ToneShell\u2019s presence on compromised hosts.<\/p>\n<h2 id=\"recommendations\">Recommendations<\/h2>\n<p>To protect themselves against this threat, organizations should:<\/p>\n<ul>\n<li>Implement robust network security measures, such as firewalls and intrusion detection systems.<\/li>\n<li>Use advanced threat detection tools, such as <a href=\"https:\/\/www.kaspersky.com\/next-edr-optimum?icid=gl_sl_next-optimum-lnk_sm-team_628197826b0e018e\" target=\"_blank\" rel=\"noopener\">endpoint detection and response (EDR) solutions<\/a>.<\/li>\n<li>Provide regular security awareness training to employees.<\/li>\n<li>Conduct regular security audits and vulnerability assessments to identify and remediate potential vulnerabilities.<\/li>\n<li>Consider implementing <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/unified-monitoring-and-analysis-platform?icid=gl_sl_siem-lnk_sm-team_5a87b4ccb345a8ba\" target=\"_blank\" rel=\"noopener\">a security information and event management (SIEM) system<\/a> to monitor and analyze security-related data.<\/li>\n<\/ul>\n<p>By following these recommendations, organizations can reduce their risk of being compromised by the HoneyMyte APT group and other similar threats.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p><em>More indicators of compromise, as well as any updates to these, are available to the customers of our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence?icid=gl_sl_post-ti_sm-team_338ad9481e2ccc25\" target=\"_blank\" rel=\"noopener\">APT intelligence reporting service<\/a>. If you are interested, please contact <a href=\"mailto:intelreports@kaspersky.com\" target=\"_blank\" rel=\"noopener\">intelreports@kaspersky.com<\/a>.<\/em><\/p>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/36f121046192b7cac3e4bec491e8f1b5\/?icid=gl_sl_opentip-lnk_sm-team_2f21116593645012&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">36f121046192b7cac3e4bec491e8f1b5<\/a> \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 AppvVStram_.sys<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/fe091e41ba6450bcf6a61a2023fe6c83\/?icid=gl_sl_opentip-lnk_sm-team_b9f09c6122773a05&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">fe091e41ba6450bcf6a61a2023fe6c83<\/a> \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 AppvVStram_.sys<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/abe44ad128f765c14d895ee1c8bad777\/?icid=gl_sl_opentip-lnk_sm-team_ccf444b8f1bf5fcf&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">abe44ad128f765c14d895ee1c8bad777<\/a> \u00a0\u00a0\u00a0\u00a0\u00a0 ProjectConfiguration.sys<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/avocadomechanism.com\/?icid=gl_sl_opentip-lnk_sm-team_d251c621e262c78f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">avocadomechanism[.]com<\/a> \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ToneShell C2<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/potherbreference.com\/?icid=gl_sl_opentip-lnk_sm-team_6ea9d67d83d87f09&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">potherbreference[.]com<\/a> \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ToneShell C2<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview of the attacks In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old, stolen, or leaked digital certificate and registers as a mini-filter driver on infected machines. Its end-goal is to inject a backdoor Trojan into the system processes and provide protection for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[251,256,247,270,90,248,332,99,232,331,249],"tags":[91],"class_list":["post-339","post","type-post","status-publish","format-standard","hentry","category-apt","category-apt-targeted-attacks","category-apt-reports","category-backdoor","category-cybersecurity","category-great-research","category-honeymyte","category-malware","category-malware-descriptions","category-rootkits","category-targeted-attacks","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Overview of the attacks In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old, stolen, or leaked digital certificate and registers as a mini-filter driver on infected machines. Its end-goal is to inject a backdoor Trojan into the system processes and provide protection for [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-29T10:09:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor\",\"datePublished\":\"2025-12-29T10:09:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/\"},\"wordCount\":2012,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"APT\",\"APT (Targeted attacks)\",\"APT reports\",\"Backdoor\",\"Cybersecurity\",\"GReAT research\",\"HoneyMyte\",\"Malware\",\"Malware descriptions\",\"Rootkits\",\"Targeted attacks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/\",\"name\":\"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png\",\"datePublished\":\"2025-12-29T10:09:50+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/","og_locale":"en_US","og_type":"article","og_title":"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor - Imperative Business Ventures Limited","og_description":"Overview of the attacks In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old, stolen, or leaked digital certificate and registers as a mini-filter driver on infected machines. Its end-goal is to inject a backdoor Trojan into the system processes and provide protection for [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2025-12-29T10:09:50+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor","datePublished":"2025-12-29T10:09:50+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/"},"wordCount":2012,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png","keywords":["Cybersecurity"],"articleSection":["APT","APT (Targeted attacks)","APT reports","Backdoor","Cybersecurity","GReAT research","HoneyMyte","Malware","Malware descriptions","Rootkits","Targeted attacks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/","url":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/","name":"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png","datePublished":"2025-12-29T10:09:50+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/24125431\/SL-HoneyMyte-featured-02-990x400.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/29\/the-honeymyte-apt-evolves-with-a-kernel-mode-rootkit-and-a-toneshell-backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=339"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/339\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}