{"id":669,"date":"2026-04-22T08:50:01","date_gmt":"2026-04-22T08:50:01","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=669"},"modified":"2026-04-22T08:50:01","modified_gmt":"2026-04-22T08:50:01","slug":"mustang-pandas-new-lotuslite-variant-targets-india-banks-south-korea-policy-circles","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=669","title":{"rendered":"Mustang Panda\u2019s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 22, 2026<\/span><\/span><span class=\"p-tags\">Cyber Espionage \/ Malware<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQHPkb7rlS_ueovJaV3s5KxgSQFfHhuZhvW8R8L9wG8j-trZvnmusj4EGvkOPah_XSqgJDLIiRWozv7RtA3o_1VaHYWnaH77PH2kOg2FYkc60uIc6WTf6frjbUp3IwhtB038_wojAl7G5OxcC4aSy5kLF48ssz_3xqLCD7bDbg6_i-RdY8tLvjxlj4Xc0o\/s1700-e365\/indian-banks.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cybersecurity researchers have discovered a new variant of a known malware called <strong>LOTUSLITE<\/strong> that&#8217;s distributed via a theme related to India&#8217;s banking sector.<\/p>\n<p>\u00abThe backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file operations, and session management, indicating a continued espionage-focused capability set rather than financially motivated objectives,\u00bb Acronis researchers Subhajeet Singha and Santiago Pontiroli <a href=\"https:\/\/www.acronis.com\/en\/tru\/posts\/same-packet-different-magic-mustang-panda-hits-indias-banking-sector-and-korea-geopolitics\/\">said<\/a> in an analysis.<\/p>\n<p>The use of LOTUSLITE was previously observed in spear-phishing attacks targeting U.S. government and policy entities using decoys associated with the geopolitical developments between the U.S. and Venezuela. The activity was attributed with medium confidence to a Chinese nation-state group tracked as Mustang Panda.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjeSnuZMsTn46viNI6XBVImY0eE_omV9JpDiEMw4MyRp4OMy7q7NX1C1Nal98_REvwDll7c3zUCB7XaJEiiFPsP5eh0G_T7HABh4PAhuc0R92NED5-MUaTn4lCjLi9o9J21UnWx9JQrU0-MEvooL1P-mdu1EfeFumDu3GopyyS_3YHopnj8c6iqlxisYyLK\/s1700-e365\/chain.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjeSnuZMsTn46viNI6XBVImY0eE_omV9JpDiEMw4MyRp4OMy7q7NX1C1Nal98_REvwDll7c3zUCB7XaJEiiFPsP5eh0G_T7HABh4PAhuc0R92NED5-MUaTn4lCjLi9o9J21UnWx9JQrU0-MEvooL1P-mdu1EfeFumDu3GopyyS_3YHopnj8c6iqlxisYyLK\/s1700-e365\/chain.jpg\" alt=\"\" border=\"0\" data-original-height=\"548\" data-original-width=\"975\"\/><\/a><\/div>\n<p>The latest activity flagged by Acronis involves deploying an evolved version of LOTUSLITE that demonstrates \u00abincremental improvements\u00bb over its predecessor, indicating that the malware is being actively maintained and refined by its operators.<\/p>\n<p>The deviation from the prior attack wave relates to a geographic pivot that focuses mainly on the banking sector of India, while keeping the rest of the operational playbook mostly intact. The starting point of the attack is a Compiled HTML (CHM) file embedding the malicious payloads \u2013 a legitimate executable and a rogue DLL \u2013 along with an HTML page that contains a pop-up which prompts the user to click \u00abYes.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>This step is designed to silently retrieve and execute a JavaScript malware from a remote server (\u00abcosmosmusic[.]com\u00bb), whose primary responsibility is to extract and run the malware contained inside the CHM file using <a href=\"https:\/\/techzone.bitdefender.com\/en\/tech-explainers\/what-is-dll-sideloading.html\">DLL side-loading<\/a>. The DLL (\u00abdnx.onecore.dll\u00bb) is an updated version of LOTUSLITE that communicates with the domain \u00abeditor.gleeze[.]com\u00bb to receive commands and exfiltrate data of interest.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiGQcAv2nc7ZwtvHU_Io-3unyJEpC-eeMDcgI1hWeIfoaQmOCPOYdLNWLG73LxehOJWBHseUd3WC_wEEpSpbuEcCT8vwcOK9pJBB1iirRJd_qQi3RWuBr1EdVfkZCtqbr_mGN-rQq3u8trKBGcCzTSRvOHTjUGUfcII-pbBW_hORi5sq_hqUPlRvhbcnDz-\/s1700-e365\/ssl.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiGQcAv2nc7ZwtvHU_Io-3unyJEpC-eeMDcgI1hWeIfoaQmOCPOYdLNWLG73LxehOJWBHseUd3WC_wEEpSpbuEcCT8vwcOK9pJBB1iirRJd_qQi3RWuBr1EdVfkZCtqbr_mGN-rQq3u8trKBGcCzTSRvOHTjUGUfcII-pbBW_hORi5sq_hqUPlRvhbcnDz-\/s1700-e365\/ssl.jpg\" alt=\"\" border=\"0\" data-original-height=\"718\" data-original-width=\"1000\"\/><\/a><\/div>\n<p>Further analysis of the campaign has uncovered similar artifacts designed to target South Korean entities, specifically individuals within the policy and diplomatic community.<\/p>\n<p>\u00abWe believe that the group had been targeting certain entities belonging to the South Korean and U.S. diplomatic and policy communities, specifically those involved in Korean peninsula affairs, North Korea policy discussions and Indo-Pacific security dialogues,\u00bb Acronis said.<\/p>\n<p>\u00abWhat stands out is the broadening of the group&#8217;s targeting, from U.S. government entities with geopolitical lures, to India&#8217;s banking sector through implants embedded with HDFC Bank references and pop-ups masquerading as legitimate banking software, and now to South Korean and U.S. policy circles through the impersonation of a prominent figure in Korean peninsula diplomacy, delivered via spoofed Gmail accounts and Google Drive staging.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 22, 2026Cyber Espionage \/ Malware Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that&#8217;s distributed via a theme related to India&#8217;s banking sector.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":670,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[641,1345,503,248,1344,1342,1343,728,483,78,664],"class_list":["post-669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-banks","tag-circles","tag-india","tag-korea","tag-lotuslite","tag-mustang","tag-pandas","tag-policy","tag-south","tag-targets","tag-variant"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=669"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/669\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/670"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}