Mustang Panda campaigns target Indian banking sector with LotusLite backdoor
Summary
Hide ▲
Show ▼
Chinese state-sponsored APT Mustang Panda (aka TA416, Bronze President, Stately Taurus) has been observed conducting espionage campaigns targeting India’s banking sector, American and Korean policy circles, and financial organizations using a newly identified variant of the LotusLite backdoor. The threat actor leveraged spear-phishing emails mimicking IT help desk issues for Indian targets and a fake Google account impersonating political scientist Victor Cha to deliver a DLL side-loading attack. Persistence was established via Windows Registry, followed by deployment of LotusLite, a backdoor family associated with Mustang Panda, enabling remote shell access, file exfiltration, and other espionage activities. The campaign demonstrates reliance on routine, low-complexity TTPs despite targeting high-value financial infrastructure, with malware disguised as regional banking software (e.g., HDFC Bank) and minor evasion tweaks to LotusLite.
Timeline
-
21.04.2026 15:00 1 articles · 3h ago
Mustang Panda deploys LotusLite backdoor in campaigns against Indian banks and policy circles
A newly identified Mustang Panda campaign utilized spear-phishing lures, DLL side-loading, and a LotusLite backdoor variant to compromise targets in India’s banking sector, US–Korea policy circles, and other financial organizations. The LotusLite variant showed minor evasion improvements and was disguised as regional banking software, while persistence was established via Windows Registry modifications. Attribution to Mustang Panda was supported by shared code, operational patterns, and tooling, indicating ongoing espionage activity with potential focus on financial intelligence and economic policy insights.
Show sources
- Chinese APT Targets Indian Banks, Korean Policy Circles — www.darkreading.com — 21.04.2026 15:00
Information Snippets
-
Mustang Panda targeted Indian banks and financial organizations using a recently observed variant of the LotusLite backdoor, which was disguised to appear as HDFC Bank software.
First reported: 21.04.2026 15:001 source, 1 articleShow sources
- Chinese APT Targets Indian Banks, Korean Policy Circles — www.darkreading.com — 21.04.2026 15:00
-
The campaign involved spear-phishing emails sent to Indian targets, with lures mimicking IT help desk issues, and a fake Google account impersonating Victor Cha used to target US–Korea policy communities.
First reported: 21.04.2026 15:001 source, 1 articleShow sources
- Chinese APT Targets Indian Banks, Korean Policy Circles — www.darkreading.com — 21.04.2026 15:00
-
Victims were tricked into opening a malicious file that triggered a DLL side-loading attack, leading to persistence via Windows Registry and deployment of the LotusLite backdoor.
First reported: 21.04.2026 15:001 source, 1 articleShow sources
- Chinese APT Targets Indian Banks, Korean Policy Circles — www.darkreading.com — 21.04.2026 15:00
-
The LotusLite variant included minor modifications to improve evasion of detection tools but retained core functionality for remote operations such as shell access and file exfiltration.
First reported: 21.04.2026 15:001 source, 1 articleShow sources
- Chinese APT Targets Indian Banks, Korean Policy Circles — www.darkreading.com — 21.04.2026 15:00
-
Security researchers at Acronis attribute the activity to Mustang Panda based on shared code, operational patterns, and tooling overlap with previously observed clusters.
First reported: 21.04.2026 15:001 source, 1 articleShow sources
- Chinese APT Targets Indian Banks, Korean Policy Circles — www.darkreading.com — 21.04.2026 15:00
-
The campaign is assessed as geopolitically motivated espionage rather than financial theft, with potential strategic interest in India’s banking sector for insights into cross-border transactions, government-linked accounts, and economic policy.
First reported: 21.04.2026 15:001 source, 1 articleShow sources
- Chinese APT Targets Indian Banks, Korean Policy Circles — www.darkreading.com — 21.04.2026 15:00