{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifzxsx7lcmpdrz3xukebpqazz325lldjv4kvnbodoktsrl6unsqwy",
"uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mk52iauyamm2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibpirj2xmdp6kl3zwnc4mi3gi3l4mmuyhemveszuikklkeii4zjni"
},
"mimeType": "image/jpeg",
"size": 153768
},
"path": "/mustang-panda-india-s-korea-lotuslite-backdoor/",
"publishedAt": "2026-04-22T13:57:34.000Z",
"site": "https://hackread.com",
"tags": [
"Security",
"Cyber Attacks",
"Malware",
"Acronis",
"backdoor",
"China",
"Cyber Attack",
"Cybersecurity",
"India",
"LOTUSLITE",
"Mustang Panda",
"South Korea"
],
"textContent": "Acronis reveals Mustang Panda is using an updated version of LOTUSLITE backdoor to target Indian banks and Korean diplomats. Learn how this DLL sideloading attack works.",
"title": "Mustang Panda Hits India and S. Korea with Updated LOTUSLITE Backdoor"
}