HoneyMyte upgraded the CoolClient backdoor in 2025, deploying browser login stealers and advanced data theft scripts. Researchers identified 6 network IoCs and 57 email-related domains linked to this campaign. #HoneyMyte #DataTheft #China
Il codice non mente: i legami segreti tra i gruppi hacker HoneyMyte e Mustang Panda
📌 Link all'articolo : www.redhotcyber.com/post/il-...
#redhotcyber #news #cyberspionaggio #hacking #malware #cybersecurity #minacceinformatica #honeymyte
HoneyMyte hackers upgrade CoolClient malware to steal browser credentials. Government agencies in Asia and Europe targeted. Stay vigilant! #CyberSecurity #HoneyMyte #CoolClient #MalwareAlert Link: thedailytechfeed.com/honeymyte-gr...
HoneyMyte updated CoolClient to sideload via Sang.exe using libngs.dll to decrypt loader.dat and main.dat; supports keylogging, TCP tunneling, plugin staging, and newer variants drop a rootkit (observed in Pakistan/Myanmar). #CoolClient #HoneyMyte #malware https://bit.ly/4t2kYAd
HoneyMyte aka Mustang Panda is using a signed rootkit to drop the #ToneShell backdoor in ongoing attacks, hiding its activity from security tools and giving attackers remote access to system.
Read: hackread.com/honeymyte-mu...
#CyberSecurity #HoneyMyte #MustangPanda #Malware
HoneyMyte APT(又名Mustang Panda、Bronze President)使用内核态RootKit植入TONESHELL后门,攻击亚洲政府系统。
#中国 #恶意软件 #APT #MustangPanda #HoneyMyte
thehackernews.com/2025/12/must...
Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit The threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor. The post Chinese APT Mus...
#Malware #& #Threats #China #APT #HoneyMyte #malware […]
[Original post on securityweek.com]