Mustang Panda Threat Group Uses Signed Kernel Driver to Deploy Malware

Related

Fake LastPass Support Email Threads Attempt to Steal Vault Master Passwords

What happened A phishing campaign targeting LastPass users uses fake...

CISOs to Watch in Maryland’s Information Technology Industry

Maryland’s information technology sector includes consulting firms, cybersecurity providers,...

CISOs to Watch in Maryland’s Government Administration

Government agencies manage vast amounts of sensitive information and...

Cybersecurity Leaders to Watch in Maryland’s Financial Services Industry

Maryland’s financial services sector includes lending platforms, investment firms,...

Share

What happened

Researchers have identified a new campaign by the Mustang Panda threat group using signed kernel drivers to deploy malware. By leveraging a legitimate-seeming driver, attackers bypass traditional endpoint protections and maintain persistence on compromised systems. The campaign targets organizations across Asia, with attackers using the technique to execute espionage and data exfiltration operations stealthily.

Who is affected

Enterprises, government agencies, and think tanks in the region are at risk. Systems using vulnerable drivers are particularly exposed, and compromised endpoints can serve as a foothold for broader network access.

Why CISOs should care

Signed drivers are trusted by operating systems, which makes malicious activity harder to detect. CISOs must ensure driver integrity and monitor kernel-level operations to mitigate these risks.

3 practical actions:

  1. Driver validation: Implement strict whitelisting and ensure only verified signed drivers are installed.
  2. Kernel monitoring: Use advanced monitoring to detect unusual kernel activity that may indicate malware.
  3. Threat intelligence updates: Incorporate IoCs for signed driver exploits into detection systems.