New Delhi, Tuesday, March 31, 2026 – A critical cybersecurity threat has been issued for Indian banking systems following the discovery of a sophisticated new malware strain dubbed “IndusHunter.” The Indian Computer Emergency Response Team (CERT-In) raised the alert level to “critical” earlier today, warning financial institutions to immediately update their security protocols.

Initial reports indicate that IndusHunter is designed to bypass traditional antivirus software by utilizing polymorphic code, which constantly changes its structure to avoid detection. Speaking to News Reporter Live, cybersecurity expert Rohan Sharma explained, “This malware is highly advanced. Its ability to morph makes it significantly harder to identify and neutralize. Banks need to act swiftly.”

IndusHunter: What We Know About the Malware

According to CERT-In, IndusHunter primarily targets vulnerabilities in older ATM systems and core banking software. The malware attempts to steal customer credentials, transaction data, and potentially manipulate account balances. The threat isn't limited to ATMs; IndusHunter can also infiltrate internal bank networks through phishing emails targeting employees. The emails often appear to be legitimate communications from regulatory bodies or internal departments.

Here's a breakdown of IndusHunter's key characteristics:

Comparing IndusHunter to Previous Threats

IndusHunter's sophistication sets it apart from previous malware threats targeting Indian banks. While past attacks, like the “ShadowNet” campaign in 2024, relied on simpler techniques, IndusHunter employs advanced obfuscation and anti-analysis measures. This makes it more challenging to reverse engineer and develop effective countermeasures. Rohan Sharma reportersays, "IndusHunter is a significant leap in sophistication compared to previous threats we've seen targeting the Indian financial sector. The level of coding and the techniques used, signifies a well-funded and highly skilled threat actor."

The table below compares IndusHunter with ShadowNet:

Feature IndusHunter ShadowNet
Code Complexity High (Polymorphic) Low (Static)
Primary Target ATM & Core Banking Systems Customer facing Web portals
Attack Vector Phishing, Exploit Kits SQL Injection, Cross-Site Scripting
Detection Rate Low (Initial) Moderate

Mitigation and Prevention Strategies

CERT-In has issued a detailed advisory outlining mitigation strategies for banks, including:

Banks are urged to share threat intelligence with each other and with CERT-In to facilitate a coordinated response. The Reserve Bank of India (RBI) is also expected to issue additional guidelines to reinforce cybersecurity measures across the banking sector. This week, the RBI is holding meetings with key stakeholders to discuss further steps.

Frequently Asked Questions

What is IndusHunter malware?

IndusHunter is a new, sophisticated malware strain targeting Indian banking systems. It is designed to steal customer credentials, transaction data, and potentially manipulate account balances by exploiting vulnerabilities in ATM systems and core banking software.

How does IndusHunter evade detection?

IndusHunter utilizes polymorphic code, which means it constantly changes its structure. This makes it difficult for traditional antivirus software to identify and neutralize the malware.

What steps are being taken to prevent IndusHunter attacks?

CERT-In has issued an advisory outlining mitigation strategies for banks, including patching vulnerabilities, implementing multi-factor authentication, conducting security audits, training employees, and deploying advanced threat detection systems.