Threat Database Malware TONESHELL Backdoor

TONESHELL Backdoor

A China-aligned, likely state-sponsored espionage group long tracked by defenders has upgraded its toolkit. Researchers following the cluster (tracked internally as Hive0154) have observed an enhanced backdoor family called TONESHELL and a previously unreported USB-propagating worm dubbed SnakeDisk. The actor has been active since at least 2012 and is being tracked under many industry names, including BASIN, Bronze President, Camaro Dragon, Earth Preta, HoneyMyte, Polaris, RedDelta, Stately Taurus, Twill Typhoon, and the tracking label Hive0154.

TONESHELL — Origin and Prior Use

TONESHELL first appeared in public reporting in November 2022 after a series of intrusions observed between May and October 2022 that affected targets in Myanmar, Australia, the Philippines, Japan, and Taiwan. Historically, operators have launched TONESHELL via DLL side-loading; the malware’s main role in those operations was to fetch and install follow-on payloads from an operator-controlled server.

ATTACK CHAINS & RELATED FAMILIES

Spear-phishing remains the preferred initial access vector: targeted emails drop loaders that then launch families such as PUBLOAD or TONESHELL. PUBLOAD behaves similarly to TONESHELL and has been observed retrieving shellcode from C2 infrastructure using HTTP POST requests. Once the loader runs, subsequent stages are fetched and executed to expand access or persist.

TONESHELL VARIANTS

Researchers have labeled the newly observed builds TONESHELL8 and TONESHELL9. Key changes include:

  • The ability to route C2 traffic through locally configured proxy servers, helping the traffic blend with legitimate enterprise traffic and reducing network-based detection.
  • Support for running two reverse shells concurrently, giving operators redundant interactive access to compromised hosts.
  • In TONESHELL8, inclusion of apparently irrelevant or 'junk' code taken from OpenAI’s ChatGPT web pages embedded into malware functions — a likely technique to hinder static analysis and evade signatures that rely on expected code patterns.

OPERATIONAL IMPACT & IMPLICATIONS

These developments show an emphasis on stealth, resilience, and precision targeting. Geographic execution checks (SnakeDisk), proxy usage, and dual interactive channels increase operator flexibility while complicating detection and response. The insertion of unrelated web-sourced code into binary builds is a deliberate anti-analysis step that can blunt tool-based triage.

Trending

Most Viewed

Loading...