The HoneyMyte APT now protects malware with a kernel-mode rootkit
In mid-2025, a malicious driver file was discovered on Asian computer systems, signed with a compromised digital certificate. This driver injects a backdoor Trojan and protects malicious files, processes, and registry keys. The final payload is a new variant of the ToneShell backdoor, associated with the HoneyMyte APT group. The attacks, which began in February 2025, primarily target government organizations in Southeast and East Asia, especially Myanmar and Thailand. The malware uses various techniques to evade detection, including API obfuscation, process protection, and registry key protection. The ToneShell backdoor communicates with command-and-control servers using fake TLS headers and supports remote operations such as file transfer and shell access.
AI Analysis
Technical Summary
In mid-2025, security researchers discovered a malicious driver file on computer systems in Asia, signed with a compromised digital certificate to evade trust mechanisms. This driver operates at the kernel level, providing the HoneyMyte APT group with deep system control by injecting a backdoor Trojan, specifically a new variant of the ToneShell backdoor. The kernel-mode rootkit protects malicious files, processes, and registry keys from detection and removal by security software. The malware employs multiple evasion techniques, including API obfuscation to hinder analysis, process protection to prevent termination, and registry key protection to maintain persistence. ToneShell communicates with its command-and-control infrastructure using fake TLS headers, disguising its network traffic as legitimate encrypted communications. The backdoor supports remote operations such as file transfers and shell access, enabling attackers to execute arbitrary commands and exfiltrate data. The attacks have been ongoing since February 2025, focusing on government organizations in Southeast and East Asia, particularly Myanmar and Thailand. Indicators of compromise include specific file hashes and malicious domains. Although no CVE or known exploits in the wild have been reported, the advanced nature of the rootkit and the stealthy communication methods indicate a well-resourced and capable adversary. The medium severity rating reflects the targeted scope and complexity of the attack rather than widespread impact.
Potential Impact
For European organizations, the direct impact is currently limited due to the geographic focus on Southeast and East Asia. However, the advanced kernel-mode rootkit and stealth techniques used by HoneyMyte demonstrate capabilities that could be adapted or expanded to other regions, including Europe. Government agencies, critical infrastructure, and organizations with strategic ties to Asia or involved in geopolitical matters may become targets. The rootkit’s ability to evade detection and maintain persistence at the kernel level could lead to prolonged unauthorized access, data exfiltration, espionage, and disruption of critical services. The use of compromised digital certificates undermines trust in software supply chains, potentially affecting European entities relying on similar certificates or software vendors. The stealthy communication using fake TLS headers complicates network detection, increasing the risk of unnoticed infiltration. Overall, the threat poses a medium risk to European organizations, particularly those in government, defense, or sectors with geopolitical relevance.
Mitigation Recommendations
European organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting kernel-mode rootkits and anomalous driver behavior. Employ strict code signing policies and monitor for the use of compromised or unexpected digital certificates. Conduct regular integrity checks on critical system files, drivers, and registry keys to detect unauthorized modifications. Network monitoring should include deep packet inspection and anomaly detection to identify suspicious TLS traffic patterns, such as fake TLS headers used by ToneShell. Implement strict network segmentation and least privilege principles to limit lateral movement if a system is compromised. Maintain up-to-date threat intelligence feeds to recognize indicators of compromise related to HoneyMyte, including known file hashes and malicious domains. Conduct regular security awareness training focused on targeted phishing or social engineering tactics that may deliver such malware. Finally, establish incident response plans that include kernel-level malware removal procedures and forensic analysis capabilities.
Affected Countries
United Kingdom, Germany, France, Italy, Poland, Netherlands
Indicators of Compromise
- hash: 36f121046192b7cac3e4bec491e8f1b5
- hash: abe44ad128f765c14d895ee1c8bad777
- hash: fe091e41ba6450bcf6a61a2023fe6c83
- domain: avocadomechanism.com
- domain: potherbreference.com
The HoneyMyte APT now protects malware with a kernel-mode rootkit
Description
In mid-2025, a malicious driver file was discovered on Asian computer systems, signed with a compromised digital certificate. This driver injects a backdoor Trojan and protects malicious files, processes, and registry keys. The final payload is a new variant of the ToneShell backdoor, associated with the HoneyMyte APT group. The attacks, which began in February 2025, primarily target government organizations in Southeast and East Asia, especially Myanmar and Thailand. The malware uses various techniques to evade detection, including API obfuscation, process protection, and registry key protection. The ToneShell backdoor communicates with command-and-control servers using fake TLS headers and supports remote operations such as file transfer and shell access.
AI-Powered Analysis
Technical Analysis
In mid-2025, security researchers discovered a malicious driver file on computer systems in Asia, signed with a compromised digital certificate to evade trust mechanisms. This driver operates at the kernel level, providing the HoneyMyte APT group with deep system control by injecting a backdoor Trojan, specifically a new variant of the ToneShell backdoor. The kernel-mode rootkit protects malicious files, processes, and registry keys from detection and removal by security software. The malware employs multiple evasion techniques, including API obfuscation to hinder analysis, process protection to prevent termination, and registry key protection to maintain persistence. ToneShell communicates with its command-and-control infrastructure using fake TLS headers, disguising its network traffic as legitimate encrypted communications. The backdoor supports remote operations such as file transfers and shell access, enabling attackers to execute arbitrary commands and exfiltrate data. The attacks have been ongoing since February 2025, focusing on government organizations in Southeast and East Asia, particularly Myanmar and Thailand. Indicators of compromise include specific file hashes and malicious domains. Although no CVE or known exploits in the wild have been reported, the advanced nature of the rootkit and the stealthy communication methods indicate a well-resourced and capable adversary. The medium severity rating reflects the targeted scope and complexity of the attack rather than widespread impact.
Potential Impact
For European organizations, the direct impact is currently limited due to the geographic focus on Southeast and East Asia. However, the advanced kernel-mode rootkit and stealth techniques used by HoneyMyte demonstrate capabilities that could be adapted or expanded to other regions, including Europe. Government agencies, critical infrastructure, and organizations with strategic ties to Asia or involved in geopolitical matters may become targets. The rootkit’s ability to evade detection and maintain persistence at the kernel level could lead to prolonged unauthorized access, data exfiltration, espionage, and disruption of critical services. The use of compromised digital certificates undermines trust in software supply chains, potentially affecting European entities relying on similar certificates or software vendors. The stealthy communication using fake TLS headers complicates network detection, increasing the risk of unnoticed infiltration. Overall, the threat poses a medium risk to European organizations, particularly those in government, defense, or sectors with geopolitical relevance.
Mitigation Recommendations
European organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting kernel-mode rootkits and anomalous driver behavior. Employ strict code signing policies and monitor for the use of compromised or unexpected digital certificates. Conduct regular integrity checks on critical system files, drivers, and registry keys to detect unauthorized modifications. Network monitoring should include deep packet inspection and anomaly detection to identify suspicious TLS traffic patterns, such as fake TLS headers used by ToneShell. Implement strict network segmentation and least privilege principles to limit lateral movement if a system is compromised. Maintain up-to-date threat intelligence feeds to recognize indicators of compromise related to HoneyMyte, including known file hashes and malicious domains. Conduct regular security awareness training focused on targeted phishing or social engineering tactics that may deliver such malware. Finally, establish incident response plans that include kernel-level malware removal procedures and forensic analysis capabilities.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/honeymyte-kernel-mode-rootkit/118590/"]
- Adversary
- HoneyMyte
- Pulse Id
- 69528092ee9eed9c6d16d25d
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash36f121046192b7cac3e4bec491e8f1b5 | — | |
hashabe44ad128f765c14d895ee1c8bad777 | — | |
hashfe091e41ba6450bcf6a61a2023fe6c83 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainavocadomechanism.com | — | |
domainpotherbreference.com | — |
Threat ID: 69544fc0db813ff03e2ae70c
Added to database: 12/30/2025, 10:18:40 PM
Last enriched: 12/30/2025, 10:19:22 PM
Last updated: 2/7/2026, 12:39:12 AM
Views: 225
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-06
MediumThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.