RegPhantom identified as a sophisticated Windows kernel rootkit that establishes hidden execution pipes from user mode to kernel mode using the Windows registry. The malware allows attackers to execute arbitrary code in kernel mode by sending encrypted XOR commands through a registry entry that the malicious driver intercepts and processes. Its design prioritizes stealth and minimal visibility, enabling it to run code with elevated privileges while masking activity within normal system operations. Technical analysis shows that RegPhantom was active across several samples identified between June and August 2025, indicating ongoing development and maintenance by an attacker likely based in China. The analysis also shows that several samples are signed with valid code signatures from respected Chinese companies, increasing the likelihood of a China-nexus attribution. The shared code characteristics and consistent development timeline point to a well-organized and persistent threat. RegPha