Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

The HoneyMyte APT now protects malware with a kernel-mode rootkit

0
Medium
Published: Mon Dec 29 2025 (12/29/2025, 13:22:26 UTC)
Source: AlienVault OTX General

Description

In mid-2025, a malicious driver file was discovered on Asian computer systems, signed with a compromised digital certificate. This driver injects a backdoor Trojan and protects malicious files, processes, and registry keys. The final payload is a new variant of the ToneShell backdoor, associated with the HoneyMyte APT group. The attacks, which began in February 2025, primarily target government organizations in Southeast and East Asia, especially Myanmar and Thailand. The malware uses various techniques to evade detection, including API obfuscation, process protection, and registry key protection. The ToneShell backdoor communicates with command-and-control servers using fake TLS headers and supports remote operations such as file transfer and shell access.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:19:22 UTC

Technical Analysis

In mid-2025, security researchers discovered a malicious driver file on computer systems in Asia, signed with a compromised digital certificate to evade trust mechanisms. This driver operates at the kernel level, providing the HoneyMyte APT group with deep system control by injecting a backdoor Trojan, specifically a new variant of the ToneShell backdoor. The kernel-mode rootkit protects malicious files, processes, and registry keys from detection and removal by security software. The malware employs multiple evasion techniques, including API obfuscation to hinder analysis, process protection to prevent termination, and registry key protection to maintain persistence. ToneShell communicates with its command-and-control infrastructure using fake TLS headers, disguising its network traffic as legitimate encrypted communications. The backdoor supports remote operations such as file transfers and shell access, enabling attackers to execute arbitrary commands and exfiltrate data. The attacks have been ongoing since February 2025, focusing on government organizations in Southeast and East Asia, particularly Myanmar and Thailand. Indicators of compromise include specific file hashes and malicious domains. Although no CVE or known exploits in the wild have been reported, the advanced nature of the rootkit and the stealthy communication methods indicate a well-resourced and capable adversary. The medium severity rating reflects the targeted scope and complexity of the attack rather than widespread impact.

Potential Impact

For European organizations, the direct impact is currently limited due to the geographic focus on Southeast and East Asia. However, the advanced kernel-mode rootkit and stealth techniques used by HoneyMyte demonstrate capabilities that could be adapted or expanded to other regions, including Europe. Government agencies, critical infrastructure, and organizations with strategic ties to Asia or involved in geopolitical matters may become targets. The rootkit’s ability to evade detection and maintain persistence at the kernel level could lead to prolonged unauthorized access, data exfiltration, espionage, and disruption of critical services. The use of compromised digital certificates undermines trust in software supply chains, potentially affecting European entities relying on similar certificates or software vendors. The stealthy communication using fake TLS headers complicates network detection, increasing the risk of unnoticed infiltration. Overall, the threat poses a medium risk to European organizations, particularly those in government, defense, or sectors with geopolitical relevance.

Mitigation Recommendations

European organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting kernel-mode rootkits and anomalous driver behavior. Employ strict code signing policies and monitor for the use of compromised or unexpected digital certificates. Conduct regular integrity checks on critical system files, drivers, and registry keys to detect unauthorized modifications. Network monitoring should include deep packet inspection and anomaly detection to identify suspicious TLS traffic patterns, such as fake TLS headers used by ToneShell. Implement strict network segmentation and least privilege principles to limit lateral movement if a system is compromised. Maintain up-to-date threat intelligence feeds to recognize indicators of compromise related to HoneyMyte, including known file hashes and malicious domains. Conduct regular security awareness training focused on targeted phishing or social engineering tactics that may deliver such malware. Finally, establish incident response plans that include kernel-level malware removal procedures and forensic analysis capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/honeymyte-kernel-mode-rootkit/118590/"]
Adversary
HoneyMyte
Pulse Id
69528092ee9eed9c6d16d25d
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash36f121046192b7cac3e4bec491e8f1b5
hashabe44ad128f765c14d895ee1c8bad777
hashfe091e41ba6450bcf6a61a2023fe6c83

Domain

ValueDescriptionCopy
domainavocadomechanism.com
domainpotherbreference.com

Threat ID: 69544fc0db813ff03e2ae70c

Added to database: 12/30/2025, 10:18:40 PM

Last enriched: 12/30/2025, 10:19:22 PM

Last updated: 2/7/2026, 3:00:04 PM

Views: 226

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats