By Ionut Arghire

The threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor.

The post Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit appeared first on SecurityWeek.

…read more

Source:: securityweek


Print pagePDF pageEmail page

Leave a Reply

You must be logged in to post a comment.