Mustang Panda Deploys New LOTUSLITE Malware Variant Targeting Indian Banks and South Korean Policy Groups

Cybersecurity analysts have discovered a new variant of the LOTUSLITE malware, associated with the Mustang Panda threat group. This variant is distributed using themes related to the Indian banking sector and targets entities including South Korean policy circles, continuing a pattern of espionage activities.
What happened
Security researchers recently uncovered a new version of LOTUSLITE, a backdoor malware known to be utilized by the Mustang Panda group. This iteration leverages themes linked to India's banking industry as part of its distribution tactics. The malware communicates with its command-and-control infrastructure over HTTPS using dynamic DNS, complicating efforts to track and block its activity. Its functionality supports remote shell access, file operations, and management of multiple sessions, making it capable of persistent espionage operations.
The attacks also reportedly extend to South Korean policy circles, indicating a broader targeting scope aligned with intelligence collection rather than disruptive or financially motivated objectives.
Why it matters
The emergence of this new LOTUSLITE variant marks a continuation of Mustang Panda’s espionage campaigns, focusing on sensitive sectors including banking and governmental policy organizations. The use of dynamic DNS and encrypted communications enhances the malware’s stealth and resilience against traditional network defenses, posing operational challenges for security teams.
Given the geopolitical relevance of the targeted regions, the campaign highlights ongoing cyber espionage risks for institutions engaged in policy and financial sectors. It underscores the importance of vigilance against sophisticated threats designed for long-term data access and intelligence gathering.
What security teams should do
Security teams should prioritize monitoring for unusual HTTPS traffic, particularly linked to dynamic DNS resolutions that may indicate command-and-control communication attempts. Implementing network detection systems capable of identifying backdoor behaviors such as remote shell access and unauthorized file operations can help detect intrusions leveraging this LOTUSLITE variant.
Reviewing exposure related to banking sector themes and policy-related communications, especially within Indian and South Korean networks, could help identify early signs of compromise. Coordination with cyber threat intelligence providers for updated indicators of compromise related to Mustang Panda is advisable.
Key technical details
This LOTUSLITE variant communicates with its control servers using a dynamic DNS-based infrastructure over HTTPS, enhancing evasion capabilities. Its features include remote shell access, which allows attackers to execute commands directly on compromised systems. Additionally, it supports file operations, facilitating exfiltration or deployment of further payloads, and session management to maintain persistent access during espionage activities.
The malware’s distribution leverages social engineering through themes tied to the Indian banking sector, potentially using lure documents or fake web content to infect targets. The emphasis on remote interactivity over encrypted channels is consistent with its espionage-focused objectives rather than destructive attacks.
Affected organizations/products
The campaign primarily affects organizations related to the Indian banking sector and South Korean policy circles. Mustang Panda actors are believed to be behind the deployment of this LOTUSLITE variant targeting these sectors for intelligence collection.
Source attribution
https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html