Mustang Panda Threat Group Uses Signed Kernel Driver to Deploy Malware

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

Researchers have identified a new campaign by the Mustang Panda threat group using signed kernel drivers to deploy malware. By leveraging a legitimate-seeming driver, attackers bypass traditional endpoint protections and maintain persistence on compromised systems. The campaign targets organizations across Asia, with attackers using the technique to execute espionage and data exfiltration operations stealthily.

Who is affected

Enterprises, government agencies, and think tanks in the region are at risk. Systems using vulnerable drivers are particularly exposed, and compromised endpoints can serve as a foothold for broader network access.

Why CISOs should care

Signed drivers are trusted by operating systems, which makes malicious activity harder to detect. CISOs must ensure driver integrity and monitor kernel-level operations to mitigate these risks.

3 practical actions:

  1. Driver validation: Implement strict whitelisting and ensure only verified signed drivers are installed.
  2. Kernel monitoring: Use advanced monitoring to detect unusual kernel activity that may indicate malware.
  3. Threat intelligence updates: Incorporate IoCs for signed driver exploits into detection systems.