Mustang Panda Threat Group Uses Signed Kernel Driver to Deploy Malware

Related

FTC: Americans Lost Over $2.1 Billion to Social Media Scams in 2025

What happened The Federal Trade Commission has reported that Americans...

Canada Arrests Three for Operating SMS Blaster Device in Toronto

What happened Canadian authorities have arrested three men for operating...

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

What happened Microsoft has revised its advisory for CVE-2026-32202, a...

Medtronic Confirms Breach After Hackers Claim 9 Million Records Theft

What happened Medical device manufacturer Medtronic has confirmed that hackers...

Share

What happened

Researchers have identified a new campaign by the Mustang Panda threat group using signed kernel drivers to deploy malware. By leveraging a legitimate-seeming driver, attackers bypass traditional endpoint protections and maintain persistence on compromised systems. The campaign targets organizations across Asia, with attackers using the technique to execute espionage and data exfiltration operations stealthily.

Who is affected

Enterprises, government agencies, and think tanks in the region are at risk. Systems using vulnerable drivers are particularly exposed, and compromised endpoints can serve as a foothold for broader network access.

Why CISOs should care

Signed drivers are trusted by operating systems, which makes malicious activity harder to detect. CISOs must ensure driver integrity and monitor kernel-level operations to mitigate these risks.

3 practical actions:

  1. Driver validation: Implement strict whitelisting and ensure only verified signed drivers are installed.
  2. Kernel monitoring: Use advanced monitoring to detect unusual kernel activity that may indicate malware.
  3. Threat intelligence updates: Incorporate IoCs for signed driver exploits into detection systems.
e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts