Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked Hackers Deploy New TencShell Malware Against Manufacturer

May 15, 2026

Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks

May 15, 2026

Why geopolitical turmoil is a gift for scammers, and how to stay safe

May 15, 2026
Facebook X (Twitter) Instagram
Friday, May 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»China-Linked Hackers Deploy New TencShell Malware Against Manufacturer
News

China-Linked Hackers Deploy New TencShell Malware Against Manufacturer

Team-CWDBy Team-CWDMay 15, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


An undocumented malware implant suspected to be associated with a China-linked actor has been identified by researchers at Cato Networks’ Cyber Threats Research Lab (CTRL).

Their discovery was made when they responded to an intrusion attempt affecting the Indian branch of an unnamed global manufacturing customer with multiple regional sites in April 2026.

While the Cato CTRL team managed to block the intrusion, they also identified suspicious traffic associated with a third-party user connected to the customer environment.

The attack chain used a first-stage dropper, Donut shellcode, a masqueraded .woff web-font resource, memory injection and web-like command-and-control (C2) communication.

The operation aimed to infect the target with a customized Go-based implant derived from the open-source Rshell C2 framework.

Designed for cross-platform offensive security use, the original Rshell framework includes remote command execution, file and process management, terminal access, in-memory payload execution, multiple C2 transports and a model context protocol (MCP) server, used notably for AI agent communications and operations.

The version observed is an undocumented variant of Rshell, customized and repackaged for this operation, with “communication and delivery changes that made it more suitable for the attacker’s campaign,” explained the researchers in a May 13 report in which they shared technical details about the campaign.

Cato CTRL named the implant ‘TencShell’ because it combines shell-style remote-control capabilities with C2 communication that imitates Tencent-like web service paths.

Based on the apparent Rshell lineage, Tencent-themed API impersonation and infrastructure patterns, Cato CTRL suspect the threat actor behind this operation to be based in China or linked to Chinese-backed hacking groups. However, they noted that the evidence is “not sufficient on its own” for attribution.

If successful, TencShell could have granted the attacker comprehensive access to the target environment, including remote command execution, in-memory payload execution, proxying, pivoting, system profiling and a path to deploy additional tooling.

This operation shows that many attackers can now rely on adaptable open source tooling to conduct sophisticated intrusions and often no longer need custom malware development pipelines.

“Rather than building a completely new malware family, the attacker adapted available offensive tooling and attempted to blend the activity into normal enterprise traffic,” noted the researchers.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks
Team-CWD
  • Website

Related Posts

News

Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks

May 15, 2026
News

ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks

May 15, 2026
News

MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

May 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Managing risks to your loved one’s digital estate

April 2, 2026

Find your weak spots before attackers do

November 21, 2025

Here’s how to avoid a ‘second strike’

April 11, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.