Updated Toneshell backdoor and novel SnakeDisk USB worm dropped
In mid-2025, China-aligned threat actor Hive0154 deployed new malware variants, including an updated Toneshell backdoor and a novel USB worm called SnakeDisk. Toneshell9 evades detection and supports C2 communication through local proxies. SnakeDisk only executes on devices in Thailand, propagating via USB drives and dropping the Yokai backdoor. The malware shows code overlaps with previous Tonedisk variants. Hive0154 continues to refine its large malware arsenal, targeting organizations worldwide with frequent development cycles. The group uses multiple custom loaders, backdoors, and USB worm families, showcasing advanced capabilities. Defenders should monitor for suspicious network activity, USB drives with hidden components, and implement recommended security measures to mitigate risks from this evolving threat.
AI Analysis
Technical Summary
In mid-2025, the China-aligned advanced persistent threat (APT) group Hive0154 deployed updated malware variants, notably the Toneshell9 backdoor and a novel USB worm named SnakeDisk. Toneshell9 is an evolution of the Toneshell backdoor family, designed to evade detection by leveraging local proxy servers for command and control (C2) communications, thereby complicating network-based detection efforts. This backdoor supports stealthy remote access and persistent control over compromised systems. SnakeDisk is a USB worm that specifically targets devices in Thailand, propagating via removable USB drives. Upon execution, SnakeDisk drops the Yokai backdoor, another sophisticated malware component, enabling further espionage activities. The malware exhibits code overlaps with previous Tonedisk variants, indicating continuous refinement and reuse of proven codebases by Hive0154. The group employs multiple custom loaders, backdoors, and USB worm families, demonstrating advanced capabilities and frequent development cycles to maintain operational effectiveness. The campaign's tactics include lateral movement via USB devices, evasion of detection through proxy-based C2 channels, and deployment of multiple malware families to establish persistent footholds. Indicators of compromise include specific file hashes and IP addresses linked to the malware infrastructure. Defenders are advised to monitor for suspicious network activity, especially proxy communications, and to scrutinize USB devices for hidden or unauthorized components. The threat actor's focus on espionage and use of USB propagation techniques highlight the need for comprehensive endpoint and network security controls.
Potential Impact
For European organizations, the threat poses a medium risk primarily due to the espionage focus and the use of USB worms and backdoors that can facilitate unauthorized access and data exfiltration. Although SnakeDisk currently executes only on devices in Thailand, the updated Toneshell backdoor has global targeting potential, which could impact European entities, especially those with supply chain or business ties to Southeast Asia or China. The use of local proxies for C2 communications complicates detection and may allow attackers to maintain persistence undetected for extended periods. The USB worm vector, while geographically limited for SnakeDisk, underscores the risk of removable media as an infection vector, which remains relevant for European organizations with international operations or employees traveling to affected regions. The espionage nature of Hive0154 suggests targeting of sensitive intellectual property, government, defense, or critical infrastructure sectors. The medium severity reflects the complexity of the malware and its stealth capabilities, balanced against the current limited geographic execution of the USB worm. However, the evolving nature of Hive0154’s arsenal means European organizations should remain vigilant against potential future expansions of this threat.
Mitigation Recommendations
European organizations should implement a layered defense strategy tailored to the specific tactics used by Hive0154. Key measures include: 1) Enforce strict USB device control policies, including disabling autorun features and restricting use of unauthorized removable media. 2) Deploy endpoint detection and response (EDR) solutions capable of detecting anomalous behaviors associated with backdoors and worms, such as unusual proxy usage or hidden file system activity. 3) Monitor network traffic for proxy-based C2 communications, including the use of local proxies and uncommon ports, and implement network segmentation to limit lateral movement. 4) Conduct regular threat hunting exercises focusing on indicators of compromise such as the provided file hashes and IP addresses. 5) Educate employees on the risks of USB devices and implement physical security controls to prevent unauthorized device usage. 6) Maintain up-to-date threat intelligence feeds and integrate them into security monitoring tools to detect emerging Hive0154 activity. 7) Apply strict access controls and multi-factor authentication to limit attacker persistence and privilege escalation. 8) Regularly audit and harden systems against known persistence techniques used by Hive0154, including custom loaders and backdoors. These targeted actions go beyond generic advice by focusing on the specific attack vectors and malware behaviors observed in this campaign.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Belgium, Poland
Indicators of Compromise
- hash: 434fe22d538e74a1e40e58255f844cd2
- hash: 3158a8186a0322d245f0c36e81fd0c432a223159
- hash: 318a1ebc0692d1d012d20d306d6634b196cc387b1f4bc38f97dd437f117c7e20
- hash: bb5bb82e5caf7d4dbbe878b75b23f793a5f3c5ca6dba70d8be447e8c004d26ce
- ip: 118.174.183.89
- ip: 123.253.34.44
- ip: 146.70.29.229
- ip: 188.208.141.196
- domain: www.slickvpn.com
Updated Toneshell backdoor and novel SnakeDisk USB worm dropped
Description
In mid-2025, China-aligned threat actor Hive0154 deployed new malware variants, including an updated Toneshell backdoor and a novel USB worm called SnakeDisk. Toneshell9 evades detection and supports C2 communication through local proxies. SnakeDisk only executes on devices in Thailand, propagating via USB drives and dropping the Yokai backdoor. The malware shows code overlaps with previous Tonedisk variants. Hive0154 continues to refine its large malware arsenal, targeting organizations worldwide with frequent development cycles. The group uses multiple custom loaders, backdoors, and USB worm families, showcasing advanced capabilities. Defenders should monitor for suspicious network activity, USB drives with hidden components, and implement recommended security measures to mitigate risks from this evolving threat.
AI-Powered Analysis
Technical Analysis
In mid-2025, the China-aligned advanced persistent threat (APT) group Hive0154 deployed updated malware variants, notably the Toneshell9 backdoor and a novel USB worm named SnakeDisk. Toneshell9 is an evolution of the Toneshell backdoor family, designed to evade detection by leveraging local proxy servers for command and control (C2) communications, thereby complicating network-based detection efforts. This backdoor supports stealthy remote access and persistent control over compromised systems. SnakeDisk is a USB worm that specifically targets devices in Thailand, propagating via removable USB drives. Upon execution, SnakeDisk drops the Yokai backdoor, another sophisticated malware component, enabling further espionage activities. The malware exhibits code overlaps with previous Tonedisk variants, indicating continuous refinement and reuse of proven codebases by Hive0154. The group employs multiple custom loaders, backdoors, and USB worm families, demonstrating advanced capabilities and frequent development cycles to maintain operational effectiveness. The campaign's tactics include lateral movement via USB devices, evasion of detection through proxy-based C2 channels, and deployment of multiple malware families to establish persistent footholds. Indicators of compromise include specific file hashes and IP addresses linked to the malware infrastructure. Defenders are advised to monitor for suspicious network activity, especially proxy communications, and to scrutinize USB devices for hidden or unauthorized components. The threat actor's focus on espionage and use of USB propagation techniques highlight the need for comprehensive endpoint and network security controls.
Potential Impact
For European organizations, the threat poses a medium risk primarily due to the espionage focus and the use of USB worms and backdoors that can facilitate unauthorized access and data exfiltration. Although SnakeDisk currently executes only on devices in Thailand, the updated Toneshell backdoor has global targeting potential, which could impact European entities, especially those with supply chain or business ties to Southeast Asia or China. The use of local proxies for C2 communications complicates detection and may allow attackers to maintain persistence undetected for extended periods. The USB worm vector, while geographically limited for SnakeDisk, underscores the risk of removable media as an infection vector, which remains relevant for European organizations with international operations or employees traveling to affected regions. The espionage nature of Hive0154 suggests targeting of sensitive intellectual property, government, defense, or critical infrastructure sectors. The medium severity reflects the complexity of the malware and its stealth capabilities, balanced against the current limited geographic execution of the USB worm. However, the evolving nature of Hive0154’s arsenal means European organizations should remain vigilant against potential future expansions of this threat.
Mitigation Recommendations
European organizations should implement a layered defense strategy tailored to the specific tactics used by Hive0154. Key measures include: 1) Enforce strict USB device control policies, including disabling autorun features and restricting use of unauthorized removable media. 2) Deploy endpoint detection and response (EDR) solutions capable of detecting anomalous behaviors associated with backdoors and worms, such as unusual proxy usage or hidden file system activity. 3) Monitor network traffic for proxy-based C2 communications, including the use of local proxies and uncommon ports, and implement network segmentation to limit lateral movement. 4) Conduct regular threat hunting exercises focusing on indicators of compromise such as the provided file hashes and IP addresses. 5) Educate employees on the risks of USB devices and implement physical security controls to prevent unauthorized device usage. 6) Maintain up-to-date threat intelligence feeds and integrate them into security monitoring tools to detect emerging Hive0154 activity. 7) Apply strict access controls and multi-factor authentication to limit attacker persistence and privilege escalation. 8) Regularly audit and harden systems against known persistence techniques used by Hive0154, including custom loaders and backdoors. These targeted actions go beyond generic advice by focusing on the specific attack vectors and malware behaviors observed in this campaign.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.ibm.com/think/x-force/hive0154-drops-updated-toneshell-backdoor"]
- Adversary
- Hive0154
- Pulse Id
- 68c32568c1f6fad2db3a2d3a
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash434fe22d538e74a1e40e58255f844cd2 | — | |
hash3158a8186a0322d245f0c36e81fd0c432a223159 | — | |
hash318a1ebc0692d1d012d20d306d6634b196cc387b1f4bc38f97dd437f117c7e20 | — | |
hashbb5bb82e5caf7d4dbbe878b75b23f793a5f3c5ca6dba70d8be447e8c004d26ce | — |
Ip
Value | Description | Copy |
---|---|---|
ip118.174.183.89 | — | |
ip123.253.34.44 | — | |
ip146.70.29.229 | — | |
ip188.208.141.196 | — |
Domain
Value | Description | Copy |
---|---|---|
domainwww.slickvpn.com | — |
Threat ID: 68c32a3a563d4c3db06004b1
Added to database: 9/11/2025, 7:59:54 PM
Last enriched: 9/11/2025, 8:18:53 PM
Last updated: 9/11/2025, 8:18:53 PM
Views: 2
Related Threats
Massive IPTV Piracy Network Uncovered
MediumMalware Campaign Leverages SVGs, Email Attachments, and CDNs to Drop XWorm and Remcos via BAT Scripts
MediumUK Rail Operator LNER Confirms Cyber Attack Exposing Passenger Data
MediumEggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company
MediumTechnical Analysis of kkRAT
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.