Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New LOTUSLITE Variant Targets Indian Banks and South Korean Policy

New LOTUSLITE Variant Targets Indian Banks and South Korean Policy

Posted on April 22, 2026 By CWS

Cybersecurity experts have recently identified a new variant of the LOTUSLITE malware that is targeting India’s banking sector and South Korea’s policy circles. This updated version, uncovered by Acronis researchers Subhajeet Singha and Santiago Pontiroli, underscores a shift towards espionage rather than financial theft, employing a command-and-control server over HTTPS for remote operations.

Targeting India’s Banking Sector

The evolution of LOTUSLITE marks a strategic focus on India’s banking industry. The attack initiates with a Compiled HTML (CHM) file that includes malicious payloads, a legitimate executable, and an HTML page prompting user interaction. When activated, this setup facilitates the download and execution of JavaScript malware from a remote server, designed to exploit DLL side-loading techniques.

By embedding references to HDFC Bank, the attackers aim to deceive users into granting access to sensitive information, maintaining the core espionage tactics of LOTUSLITE. The malware’s ability to communicate with a domain for command reception and data extraction highlights the sophistication of its operators.

Expanding Reach to South Korea

The campaign’s scope extends beyond India, impacting South Korean policy entities, particularly those involved in North Korea and Indo-Pacific security matters. The use of impersonation tactics through spoofed Gmail accounts and Google Drive underscores the operators’ adaptability in targeting different geopolitical interests.

This broadening of targets from the U.S. government to new regions indicates Mustang Panda’s strategic realignment. By maintaining their core methodologies while adjusting their geographical focus, the group continues to pose significant threats to national security interests.

Implications and Future Outlook

As the operators of LOTUSLITE refine their malware, its implications for affected regions grow more concerning. The targeting of high-stakes sectors like banking and policy-making suggests a persistent threat with potential for significant impact. Vigilance and enhanced cybersecurity measures are essential for mitigating these risks.

Looking ahead, organizations in the affected areas must remain alert to evolving threats and adapt their defenses accordingly. Ongoing analysis of such campaigns will be crucial in uncovering and countering the tactics employed by groups like Mustang Panda.

The Hacker News Tags:Acronis, banking sector, cyber espionage, Cybersecurity, India, LOTUSLITE, Malware, Mustang Panda, policy circles, South Korea

Post navigation

Previous Post: Critical Vulnerability in CrowdStrike LogScale Exposed
Next Post: Oracle’s April 2026 Update Fixes 481 Security Flaws

Related Posts

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign The Hacker News
AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns The Hacker News
LLM-Crafted SVG Files Outsmart Email Security LLM-Crafted SVG Files Outsmart Email Security The Hacker News
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm The Hacker News
Why It Needs a Modern Approach Why It Needs a Modern Approach The Hacker News
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Antigravity Faces Security Threats Amid Growing Use
  • Critical Flaw in Terrarium Sandbox Allows Code Execution
  • Critical Flaws in Atlassian Bamboo Demand Urgent Patching
  • Oracle’s April 2026 Update Fixes 481 Security Flaws
  • New LOTUSLITE Variant Targets Indian Banks and South Korean Policy

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Antigravity Faces Security Threats Amid Growing Use
  • Critical Flaw in Terrarium Sandbox Allows Code Execution
  • Critical Flaws in Atlassian Bamboo Demand Urgent Patching
  • Oracle’s April 2026 Update Fixes 481 Security Flaws
  • New LOTUSLITE Variant Targets Indian Banks and South Korean Policy

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark