meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Pandas with a purpose. [Research Saturday]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 24 May 2025

⏱️ 18 minutes

🧾️ Download transcript

Summary

This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o. The research can be found here: Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:10.4

Worried about cyber attacks?

0:15.0

Cyber care from storm guidance is a comprehensive cyber incident response and resilience service that helps you stay

0:22.3

prepared and protected. A unique onboarding process integrates your team with industry-leading

0:28.2

experts. So if an incident occurs, your response is optimal. Get priority access to deeply experienced

0:35.7

responders, digital investigators, legal and crisis PR experts,

0:40.4

ransom negotiators, trauma counselors, and much more. The best part? 100% of unused response time

0:48.0

can be repurposed for a range of proactive resilience activities. Find out more at Cyber.Care slash Cyberwire.

1:08.7

Hello, everyone, and welcome to the CyberWires Research Saturday.

1:12.1

I'm Dave Bittner, and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities,

1:20.0

solving some of the hard problems and protecting ourselves in a rapidly evolving cyberspace.

1:25.8

Thanks for joining us.

1:33.0

Thank you. in a rapidly evolving cyberspace. Thanks for joining us. Mustang Panda is, as Chinese origin,

1:36.2

traditionally targets government-related entities,

1:40.5

military entities, minority groups,

1:43.5

and NGOs primarily located in East Asia.

1:48.9

That's Deep in Desai, Z-Scaler's chief security officer and EVP of cyber and AI engineering.

1:55.9

Today, we're looking into their recent work on Mustang Panda's latest campaigns.

2:07.6

Thank you. into their recent work on Mustang Panda's latest campaigns. There were a couple instances where we also saw them targeting entities in Europe.

2:14.6

But the research that we will talk about today is where our analysis started with

2:21.9

a couple machines that were targeted in Myanmar region. And then as part of that analysis,

2:29.7

we discovered a lot of new things. Well, let's dig into it together here.

...

Transcript will be available on the free plan in 6 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.