Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
好的,用户让我总结一篇关于网络间谍活动和恶意软件的文章,控制在100字以内,不需要特定的开头。首先,我需要快速浏览文章内容,抓住关键点。 文章提到发现了LOTUSLITE的新变种,通过印度银行业主题传播。研究人员指出,该恶意软件通过HTTPS与动态DNS服务器通信,支持远程shell访问和文件操作,主要用于间谍活动而非财务动机。之前攻击目标是美国政府和政策实体,现在转向印度银行和韩国、美国的外交圈。 接下来,我需要将这些信息浓缩到100字以内。要突出新变种、传播方式、攻击目标的变化以及间谍活动的性质。同时保持语言简洁明了。 可能会遗漏一些技术细节,比如具体的恶意软件组件或攻击步骤,但用户只需要摘要,所以不需要详细描述。确保涵盖主要攻击目标的变化和间谍活动的重点。 最后检查字数是否符合要求,并确保没有使用禁止的开头词。这样就能提供一个准确且简洁的总结。 </think> 研究人员发现新型恶意软件LOTUSLITE变种通过伪装成印度银行业主题传播,主要针对印度银行、韩国及美国外交圈实施网络间谍活动。该恶意软件支持远程控制和数据窃取功能,表明其以情报收集为目的而非财务获利。 2026-4-22 07:58:0 Author: thehackernews.com(查看原文) 阅读量:14 收藏

Cyber Espionage / Malware

Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that's distributed via a theme related to India's banking sector.

"The backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file operations, and session management, indicating a continued espionage-focused capability set rather than financially motivated objectives," Acronis researchers Subhajeet Singha and Santiago Pontiroli said in an analysis.

The use of LOTUSLITE was previously observed in spear-phishing attacks targeting U.S. government and policy entities using decoys associated with the geopolitical developments between the U.S. and Venezuela. The activity was attributed with medium confidence to a Chinese nation-state group tracked as Mustang Panda.

The latest activity flagged by Acronis involves deploying an evolved version of LOTUSLITE that demonstrates "incremental improvements" over its predecessor, indicating that the malware is being actively maintained and refined by its operators.

The deviation from the prior attack wave relates to a geographic pivot that focuses mainly on the banking sector of India, while keeping the rest of the operational playbook mostly intact. The starting point of the attack is a Compiled HTML (CHM) file embedding the malicious payloads – a legitimate executable and a rogue DLL – along with an HTML page that contains a pop-up which prompts the user to click "Yes."

This step is designed to silently retrieve and execute a JavaScript malware from a remote server ("cosmosmusic[.]com"), whose primary responsibility is to extract and run the malware contained inside the CHM file using DLL side-loading. The DLL ("dnx.onecore.dll") is an updated version of LOTUSLITE that communicates with the domain "editor.gleeze[.]com" to receive commands and exfiltrate data of interest.

Further analysis of the campaign has uncovered similar artifacts designed to target South Korean entities, specifically individuals within the policy and diplomatic community.

"We believe that the group had been targeting certain entities belonging to the South Korean and U.S. diplomatic and policy communities, specifically those involved in Korean peninsula affairs, North Korea policy discussions and Indo-Pacific security dialogues," Acronis said.

"What stands out is the broadening of the group's targeting, from U.S. government entities with geopolitical lures, to India's banking sector through implants embedded with HDFC Bank references and pop-ups masquerading as legitimate banking software, and now to South Korean and U.S. policy circles through the impersonation of a prominent figure in Korean peninsula diplomacy, delivered via spoofed Gmail accounts and Google Drive staging."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html
如有侵权请联系:admin#unsafe.sh