{"id":14034,"date":"2026-04-22T14:38:36","date_gmt":"2026-04-22T14:38:36","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14034"},"modified":"2026-04-22T14:38:36","modified_gmt":"2026-04-22T14:38:36","slug":"mustang-panda-hits-india-and-s-korea-with-up-to-date-lotuslite-backdoor","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14034","title":{"rendered":"Mustang Panda Hits India and S. Korea with Up to date LOTUSLITE Backdoor"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A gaggle of China-linked hackers referred to as <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/tag\/Mustang-Panda\/\" data-type=\"post_tag\" data-id=\"26872\">Mustang Panda<\/a> has expanded its spying efforts to focus on the Indian monetary sector and political circles in South Korea. The Acronis Menace Analysis Unit found the group\u2019s newest exercise after its earlier marketing campaign involving Venezuela-related lures designed to focus on US authorities earlier in 2026.<\/p>\n<h3 id=\"targeting-hdfc-bank-and-diplomacy-experts\" class=\"wp-block-heading\"><strong>Concentrating on HDFC Financial institution and Diplomacy Consultants<\/strong><\/h3>\n<p>The hackers reportedly started this dual-sided marketing campaign in March 2026. In India, they used a file named Request for <code>Assist.chm<\/code> to trick staff within the banking sector. This file contained a pop-up window that talked about HDFC Financial institution Restricted to look official, and when a consumer clicked the file, it triggered a series of occasions that concerned downloading a malicious JavaScript file known as <code>music.js<\/code> from the area <code>cosmosmusiccom<\/code>.<\/p>\n<p>Acronis\u2019 <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.acronis.com\/en\/tru\/posts\/same-packet-different-magic-mustang-panda-hits-indias-banking-sector-and-korea-geopolitics\/\">investigation<\/a>, shared with Hackread.com, revealed that the hackers didn\u2019t cease at help tickets. They even made faux pop-up home windows that regarded like actual <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/hackers-india-hdfc-bank-data-leak\/\" data-type=\"post\" data-id=\"98662\">HDFC Financial institution<\/a> software program. Whereas the employees thought they have been taking a look at a banking app, a brand new model of the <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/chinese-mustang-panda-briefing-spy-diplomat\/\" data-type=\"post\" data-id=\"141160\">LOTUSLITE<\/a> backdoor, known as LOTUSLITE v1.1, was truly spying on the system.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor.png\"><img loading=\"lazy\" decoding=\"async\" width=\"780\" height=\"220\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor.png\" alt=\"\" class=\"wp-image-144227\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor.png 780w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-300x85.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-768x217.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-380x107.png 380w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\"\/><\/a><figcaption class=\"wp-element-caption\">LOTUSLITE variations comparability (Supply: Acronis)<\/figcaption><\/figure>\n<\/div>\n<p>In one other a part of the marketing campaign, the group pretended to be Victor Cha, a former Director for Asian Affairs on the US Nationwide Safety Council. Utilizing a faux Gmail account (<code><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"6d1b040e19021f0e050c5a5d5a2d0a000c0401430e0200\">[email\u00a0protected]<\/a><\/code>) with Mr Cha\u2019s actual picture, they despatched out Google Drive hyperlinks to folders named March 30. Inside have been faux invitation letters crafted to contaminate the computer systems of policy-makers.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-1-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"548\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-1-1.png\" alt=\"\" class=\"wp-image-144229\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-1-1.png 975w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-1-1-300x169.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-1-1-768x432.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-1-1-380x214.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-1-1-800x450.png 800w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\"\/><\/a><figcaption class=\"wp-element-caption\">Assault Chain (Supply: Acronis)<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"same-tricks-new-names\" class=\"wp-block-heading\"><strong>Identical Tips, New Names<\/strong><\/h3>\n<p>The hackers are utilizing a technique known as <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/cgrabber-direct-sys-malware-github-zip-files\/\">DLL sideloading<\/a>. They mainly take a protected file signed by Microsoft (like <code>Microsoft_DNX.exe<\/code>) and put their very own malicious file proper subsequent to it. The pc trusts the Microsoft title, so it lets that contaminated file run with out a second thought.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"718\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-2.png\" alt=\"\" class=\"wp-image-144230\" style=\"aspect-ratio:1.3927803922635402;width:702px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-2.png 1000w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-2-300x215.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-2-768x551.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-2-380x273.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Mustang-Panda-Targets-India-and-Korea-with-Updated-LOTUSLITE-Backdoor-2-800x574.png 800w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\"\/><\/a><figcaption class=\"wp-element-caption\">DLL sideloading right into a signed executable (Supply: Acronis)<\/figcaption><\/figure>\n<\/div>\n<p>In line with researchers, the group is attempting to cover higher. They rotated the interior code marker or \u2018magic worth,\u2019 a selected code used to establish their site visitors, from <code>0x8899AABB to 0xB2EBCFDF<\/code>, and likewise changed a command flag named \u2013DATA with a brand new one known as \u2013ZoneMAX.<\/p>\n<p>Researchers additionally famous that the hackers used a service known as Gleeze to speak with their server at <code>editorgleezecom<\/code>. This is identical infrastructure utilized in earlier assaults, which helped consultants hyperlink the exercise to Mustang Panda.<\/p>\n<p>Regardless that the group tried to replace their strategies, they left behind previous code names like KugouMain and DataImporterMain within the new information. They even left a message within the code mentioning a safety researcher who has been monitoring them. <\/p>\n<p>Nonetheless, they&#8217;re consistently upgrading their impersonating experience and utilizing trusted software program to lure customers, which makes it important for everybody to remain sceptical of any sudden emails or information, even when they give the impression of being official.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="oV6uyS1b6pJb2OxyY78V"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A gaggle of China-linked hackers referred to as Mustang Panda has expanded its spying efforts to focus on the Indian monetary sector and political circles in South Korea. The Acronis Menace Analysis Unit found the group\u2019s newest exercise after its earlier marketing campaign involving Venezuela-related lures designed to focus on US authorities earlier in 2026. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14036,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[558,1017,1516,4716,8772,7698,7699,1536],"class_list":["post-14034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-backdoor","tag-hits","tag-india","tag-korea","tag-lotuslite","tag-mustang","tag-panda","tag-updated"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14034"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14034\/revisions"}],"predecessor-version":[{"id":14035,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14034\/revisions\/14035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14036"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-22 18:01:41 UTC -->