Mustang Panda Deploys Updated LOTUSLITE Backdoor Against Indian Banking Sector and South Korean Policy Targets

Share
Mustang Panda Deploys Updated LOTUSLITE Backdoor Against Indian Banking Sector and South Korean Policy Targets

Acronis researchers have identified a new variant of the LOTUSLITE backdoor being deployed by Mustang Panda in campaigns targeting India's banking sector and South Korean policy communities. The updated malware demonstrates incremental refinements over its predecessor, confirming active maintenance by the Chinese nation-state group as it broadens its geographic and sectoral targeting.

LOTUSLITE was previously observed in spear-phishing campaigns against US government and policy entities using geopolitical lures related to US-Venezuela relations, attributed with medium confidence to Mustang Panda. The latest wave marks a significant geographic pivot — the operational playbook remains largely intact, but the target set has expanded considerably.

The India-focused campaign uses Compiled HTML (CHM) files embedding a legitimate executable alongside a rogue DLL, packaged with an HTML page that presents a pop-up prompting the user to click "Yes." This triggers the silent retrieval and execution of JavaScript malware from cosmosmusic[.]com, which extracts and runs the embedded payload via DLL side-loading. The sideloaded DLL (dnx.onecore.dll) is the updated LOTUSLITE variant, communicating with editor.gleeze[.]com over HTTPS to receive commands and exfiltrate data. The lures specifically reference HDFC Bank, with pop-ups masquerading as legitimate banking software to increase credibility.

A parallel campaign targets individuals within South Korean and US diplomatic and policy communities — specifically those involved in Korean peninsula affairs, North Korea policy discussions, and Indo-Pacific security dialogues. These attacks impersonate a prominent figure in Korean peninsula diplomacy, delivered via spoofed Gmail accounts with payloads staged on Google Drive.

The backdoor itself maintains its espionage-focused capability set: remote shell access, file operations, and session management over HTTPS using dynamic DNS-based C2 infrastructure. The use of dynamic DNS for command-and-control makes infrastructure tracking more difficult and allows rapid domain rotation without changing the underlying server.

The broadening target set is the significant takeaway. Mustang Panda has moved from a narrow focus on US government entities to a multi-front campaign spanning Indian financial institutions, South Korean diplomatic circles, and US policy communities — all within the same operational framework and malware family.

Defensive Guidance:

Organizations in the Indian banking sector and entities involved in Korean peninsula or Indo-Pacific policy should be on heightened alert for spear-phishing delivering CHM file attachments. Block execution of CHM files from email where possible, and monitor for DLL side-loading activity involving dnx.onecore.dll. Block the identified C2 domains cosmosmusic[.]com and editor.gleeze[.]com at the network perimeter. Flag emails from spoofed Gmail accounts that reference Korean peninsula diplomacy or banking software updates, particularly those linking to Google Drive-hosted payloads. Review endpoint telemetry for HTTPS connections to dynamic DNS services from unexpected processes.

Read more

Microsoft Defender Zero-Day Exploited in the Wild — BlueHammer Attack Chain Extracts SAM Hashes and Kills Defender via Race Condition

Microsoft Defender Zero-Day Exploited in the Wild — BlueHammer Attack Chain Extracts SAM Hashes and Kills Defender via Race Condition

A privilege escalation vulnerability in Microsoft Defender is under active exploitation using publicly available proof-of-concept code, with Huntress confirming attacks began on April 10 — four days before Microsoft released a patch. CISA added the flaw to its Known Exploited Vulnerabilities catalog on Wednesday, setting a May 6 federal patching deadline.

By Zero Day Wire
Microsoft Issues Emergency Patch for Critical ASP.NET Core Flaw Allowing SYSTEM Privilege Escalation via Forged Auth Cookies

Microsoft Issues Emergency Patch for Critical ASP.NET Core Flaw Allowing SYSTEM Privilege Escalation via Forged Auth Cookies

Microsoft has pushed an emergency out-of-band security update to address CVE-2026-40372, a critical privilege escalation vulnerability in ASP.NET Core's Data Protection cryptographic APIs that allows unauthenticated attackers to forge authentication cookies and gain SYSTEM-level access on affected systems. The flaw originated from a regression introduced in the

By Zero Day Wire