Threat actors linked to China have been observed using an updated version of the COOLCLIENT backdoor in cyber espionage campaigns primarily targeting government entities. Security researchers at Kaspersky documented significant capability upgrades including clipboard monitoring, browser credential theft, and integration with kernel-mode rootkits.

Threat actor profile

AttributeDetails
Primary nameMustang Panda
Also tracked asEarth Preta, Fireant, HoneyMyte, Bronze President, Polaris, Twill Typhoon, Basin, Red Delta, Hive0154, Stately Taurus, Camaro Dragon
AttributionChinese state-sponsored
Active since2012
Primary targetsGovernment, diplomatic, defense
Geographic focusSoutheast Asia, Europe, North America

Recent assessment

Taiwan’s National Security Bureau ranked Mustang Panda among the most prolific and high-volume threats targeting its critical infrastructure, reflecting the group’s sustained operational tempo.

COOLCLIENT evolution

The updated COOLCLIENT variant represents a significant capability upgrade from previous versions.

New capabilities

FeatureDescription
Clipboard monitoringCaptures clipboard content in real-time
Active window trackingMonitors which applications user interacts with
HTTP proxy credential sniffingExtracts credentials from proxy authentication via packet inspection
Browser data theftDedicated modules for Chrome, Edge, Chromium browsers

Core functionality

CapabilityImplementation
System reconnaissanceComputer name, OS version, RAM, network info, driver details
File operationsEnumeration, exfiltration, manipulation
Credential harvestingMultiple sources including browsers and proxy auth
Screenshot capturePeriodic and on-demand
Encrypted C2Multiple fallback mechanisms

Persistence mechanisms

COOLCLIENT establishes persistence through multiple redundant methods:

  • Registry modifications (Run keys)
  • Scheduled task creation
  • Windows service installation
  • Startup folder placement

The multi-layered approach ensures the backdoor survives reboots and partial remediation attempts.

Browser stealer modules

Kaspersky documented three distinct infostealer variants deployed alongside COOLCLIENT:

VariantTargetCapability
Variant AGoogle ChromeLogin data extraction
Variant BMicrosoft EdgeLogin data extraction
Variant CAny Chromium-based browserUniversal credential theft

The browser stealers extract:

  • Saved passwords
  • Session cookies
  • Autofill data
  • Payment card information
  • Browsing history

Kernel-mode rootkit integration

In a significant escalation, Kaspersky observed Mustang Panda deploying ToneShell backdoor through a kernel-mode loader:

“This is the first time we’ve seen ToneShell delivered through a kernel-mode loader, giving it protection from user-mode monitoring and benefiting from the rootkit capabilities of the driver that hides its activity from security tools.”

Rootkit capabilities

CapabilityEffect
Process hidingConceals malicious processes from task manager
File hidingHides malware files from directory listings
Network hidingConceals C2 connections from monitoring tools
Hook evasionBypasses user-mode security hooks

The kernel-mode approach significantly increases detection difficulty and persistence.

Full toolkit

Mustang Panda employs a diverse malware arsenal:

ToolTypePurpose
COOLCLIENTBackdoorPrimary C2, data collection
ToneShellBackdoorAlternative C2, stealth operations
PlugXRATLong-standing espionage tool
QreverseBackdoorReverse shell capabilities
TonediskUSB wormAir-gapped network propagation
SnakeDiskUSB wormRemovable media spreading

Campaign targeting

Primary targets

SectorExamples
GovernmentMinistries, departments, agencies
DiplomaticEmbassies, consulates, missions
PolicyThink tanks, research institutes
DefenseContractors, suppliers, military

Geographic focus

RegionTargeting Intensity
MyanmarHeavy
ThailandHeavy
TaiwanHeavy
MongoliaHigh
MalaysiaHigh
RussiaModerate
PakistanModerate
Southeast Asia (general)High
EuropeModerate
North AmericaModerate

Kaspersky observed updated COOLCLIENT versions deployed against government entities in Myanmar, Mongolia, Malaysia, Russia, and Pakistan during 2025-2026.

Recent campaign timeline

  • September 2024: C2 server registration via NameCheap
  • February 2025: Suspected campaign initiation
  • January 2026: Updated COOLCLIENT variants observed

Attack chain

Initial access

Spear-phishing emails containing:

  • Malicious document attachments
  • Weaponized archives
  • Lure content relevant to target’s role

DLL sideloading technique

COOLCLIENT operators deploy the malware via DLL sideloading by abusing signed binaries from legitimate software vendors:

Abused softwareVendorPurpose
BitdefenderSecurity softwareTrusted executable
VLC Media PlayerVideoLANMedia player binary
Ulead PhotoImpactCorelImage editor
Sangfor productsChinese IT vendorEnterprise software

Kaspersky noted attacks deploying COOLCLIENT via legitimate software from Sangfor, a Chinese company specializing in cybersecurity, cloud computing, and IT infrastructure products.

Execution

  1. User opens malicious attachment
  2. Document macro or exploit triggers payload
  3. COOLCLIENT dropper executes
  4. Multi-stage loading from encrypted .DAT files
  5. Persistence established
  6. C2 communication initiated

Post-compromise

  • System reconnaissance
  • Credential harvesting
  • Browser data theft
  • File enumeration and exfiltration
  • Lateral movement preparation

Detection indicators

Network indicators

TypeIndicator
C2 domainsCheck threat intelligence feeds for current IOCs
Traffic patternsEncrypted traffic to unexpected destinations
DNS queriesQueries to known Mustang Panda infrastructure
Proxy authUnusual proxy authentication attempts

Host indicators

TypeIndicator
Scheduled tasksSuspicious task names and execution paths
ServicesUnknown services with system-level privileges
RegistryRun key modifications in HKCU/HKLM
ProcessesUnusual parent-child relationships
DriversUnsigned or suspicious kernel drivers

Defensive recommendations

Immediate actions

ControlImplementation
Block IOCsIntegrate Mustang Panda indicators into security tools
Macro restrictionsDisable macros from internet-sourced documents
Application whitelistingPrevent unauthorized executable execution
EDR deploymentBehavioral detection for COOLCLIENT patterns

Detection priorities

  1. Kernel driver loading — Alert on unsigned driver installation
  2. Clipboard access — Monitor for unusual clipboard monitoring
  3. Browser credential access — Detect credential store access from non-browser processes
  4. Scheduled task creation — Review new scheduled tasks for legitimacy
  5. Encrypted outbound traffic — Analyze traffic to unusual destinations

Long-term hardening

ControlPurpose
Network segmentationLimit lateral movement
Privileged access managementReduce credential exposure
Email securityBlock malicious attachments
User trainingSpear-phishing awareness
Threat intelligenceStay current on Mustang Panda TTPs

Context

Mustang Panda’s investment in kernel-mode capabilities and browser credential theft reflects the increasing sophistication of Chinese APT operations. The group’s sustained focus on government and diplomatic targets across Southeast Asia aligns with Chinese strategic interests in the region.

The combination of COOLCLIENT’s comprehensive data collection, ToneShell’s stealthy kernel-mode delivery, and USB worms for air-gapped networks demonstrates a mature operational capability designed to compromise even well-defended targets.

COOLCLIENT history

COOLCLIENT has been associated with Mustang Panda since 2022:

PeriodActivity
2022First documented deployment alongside PlugX
2023Secondary backdoor role with LuminousMoth
2024Continued use in government targeting
2025Major capability upgrades (browser theft, clipboard)
2026Kernel-mode rootkit integration observed

The malware’s evolution from basic backdoor to comprehensive espionage platform reflects Mustang Panda’s continued investment in tooling.

Technical details: persistence

COOLCLIENT uses encrypted .DAT files in a multi-stage execution process and achieves persistence through multiple methods:

MethodImplementation
Registry modificationsRun keys in HKCU/HKLM
Windows servicesNew service installation
Scheduled tasksRecurring execution
Startup folderDirect placement
UAC bypassPrivilege escalation techniques

The multi-layered persistence approach ensures survival across reboots and partial remediation attempts.

Organizations in targeted sectors should assume they are of interest to Mustang Panda and implement defenses accordingly. The group’s prolific activity—recognized even by Taiwan’s NSB as a top threat—means encounters are likely for organizations with any connection to Chinese strategic interests.