Threat Advisory

Mustang Panda APT Breaching Banking Sectors with LOTUSLITE Malware

Threat: Malicious Campaign
Threat Actor Name: Mustang Panda
Threat Actor Type: State-Sponsored
Targeted Region: India, South Korea, U.S.
Alias: G0129, Temp.Hex, Tantalum, HoneyMyte, PKPLUG, Stately Taurus, TA416, Bronze President, Earth Preta, Camaro Dragon, UAC-0084, Red Lich
Threat Actor Region: China
Targeted Sector: Technology & IT, Finance & Banking, Government & Defense
Criticality: High
[subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

A cyber espionage campaign attributed to Mustang Panda has been observed targeting financial institutions in India alongside policy and geopolitical circles associated with South Korea and the United States. The activity is linked to a state-aligned threat actor known for long-running intelligence operations. The campaign reflects a continued focus on strategic information gathering rather than financial disruption, with emphasis on sectors that provide visibility into economic activity, government-linked financial flows, and regional geopolitical developments.[/subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

A cyber espionage campaign attributed to Mustang Panda has been observed targeting financial institutions in India alongside policy and geopolitical circles associated with South Korea and the United States. The activity is linked to a state-aligned threat actor known for long-running intelligence operations. The campaign reflects a continued focus on strategic information gathering rather than financial disruption, with emphasis on sectors that provide visibility into economic activity, government-linked financial flows, and regional geopolitical developments.[emaillocker id="1283"]

The intrusion chain primarily begins with spear-phishing emails impersonating IT support or trusted professional communications to lure victims into executing malicious files. Once opened, the attack leverages DLL side-loading techniques to execute a loader that deploys a variant of a known backdoor framework used by the threat actor. Persistence is achieved through registry modifications, allowing sustained access to compromised systems. The malware family involved enables remote command execution, file exfiltration, and system reconnaissance. In some instances, the malicious payload is disguised as legitimate banking software to improve credibility and evade detection. Additionally, impersonated online identities were used to enhance targeting credibility and expand reach into diplomatic and policy-focused individuals.

It demonstrates a clear expansion of geopolitical cyber espionage activity, moving beyond traditional government targets to include financial institutions and policy communities of strategic interest. The use of updated malware variants, adaptive delivery mechanisms, and region-specific thematic lures underscores a sustained operational focus on intelligence gathering rather than financial gain. This evolving threat underscores the need for enhanced detection of DLL sideloading techniques, improved email security controls, and continuous monitoring of command-and-control infrastructure associated with advanced persistent threat operations.

 

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial Access T1566.001 Phishing Spearphishing Attachment
T1190 Exploit Public-Facing Application -
Execution T1204.002 User Execution Malicious File
T1059.003 Command and Scripting Interpreter Windows Command Shell
Persistence T1547.001 Boot or Logon Autostart Execution Registry Run Keys / Startup Folder
Defense Evasion T1027.002 Obfuscated Files or Information Software Packing
Collection T1005 Data from Local System -
Command and Control T1071.001 Application Layer Protocol Web Protocols
T1573.002 Encrypted Channel Asymmetric Cryptography
Exfiltration T1041 Exfiltration Over C2 Channel -

 

REFERENCES:

The following reports contain further technical details:

https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html

https://www.acronis.com/en/tru/posts/same-packet-different-magic-mustang-panda-hits-indias-banking-sector-and-korea-geopolitics/

[/emaillocker]
crossmenu