Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

US Busts DanaBot Malware Ring Charging 16

May 23, 2025
Reading Time: 3 mins read
in News
SEC Charges Unicoin For Crypto Fraud Scheme

The U.S. Department of Justice (DOJ) announced DanaBot malware’s infrastructure disruption on Thursday. This action was part of the broader international law enforcement effort Operation Endgame. Charges were also unsealed against sixteen individuals for their alleged involvement with DanaBot. They are accused of developing and also deploying this sophisticated malware for cybercrime. The DOJ stated a Russia-based cybercrime organization primarily controlled the DanaBot operations. This malware infected over 300,000 victim computers in countries all around the world. It facilitated widespread fraud and various ransomware attacks causing at least $50 million damages. Two key Russian defendants Aleksandr Stepanov and Artem Kalinkin currently remain at large. Many defendants were identified after they accidentally infected their own systems with DanaBot.

DanaBot is a very multi-functional malware tool much like Emotet TrickBot or QakBot. It can effectively act as an information stealer from many compromised computer systems. It also frequently serves as a delivery vector for other dangerous next-stage malware. This includes delivering various well-known ransomware payloads to already infected victim machines. The Delphi-based modular malware is expertly equipped to siphon sensitive data from computers. It can hijack online banking sessions and steal diverse types of device information. It also steals user Browse histories stored account credentials and valuable virtual currency wallets. DanaBot provides full remote system access logs all keystrokes and can capture video. It operated under a malware-as-a-service (MaaS) scheme leasing access to other cybercriminals. Access costs ranged from $500 to several thousand U.S. dollars per month.

DanaBot has been actively used in the wild by criminals since its debut. It initially started its operations as a banking trojan back in May of 2018. It first targeted victims in European countries like Ukraine Poland Italy and also Germany. Later it significantly expanded its targeting posture to include U.S. and Canadian institutions. A second specialized DanaBot version emerged in January 2021 specifically designed for espionage. This variant targeted many military diplomatic and also various government related entities. These sensitive targets were located primarily in North America and also throughout Europe. DanaBot cleverly employed a layered communications infrastructure for its command and control servers. Its operators adapted to detection efforts and offered users structured pricing and customer support. For years it spread via SEO poisoning and malvertising not just email.

This DanaBot takedown is part of the much larger ongoing Operation Endgame initiative.

Endgame previously targeted other malware families like Lumma Stealer Smokeloader and also TrickBot. The latest phase took down about 300 servers and also 650 domains. Concurrently the DOJ unsealed charges against Rustam Gallyamov the alleged QakBot malware leader. Over $24 million in cryptocurrency was seized from Gallyamov during that separate investigation. Numerous private sector cybersecurity firms provided valuable assistance in the DanaBot takedown effort.

Proofpoint which first identified DanaBot called this disruption a significant win for defenders.

Such law enforcement actions impair malware use and impose considerable costs on threat actors. They may also cause mistrust in the criminal ecosystem making cybercrime less attractive. Continued private and public sector collaboration is absolutely crucial to counter these threats.

Reference:

  • US Dismantles DanaBot Infrastructure Charging Sixteen In $50M Global Fraud
Tags: Cyber NewsCyber News 2025Cyber threatsMay 2025
ADVERTISEMENT

Related Posts

Spain Busts $11.8M Investment Fraud Ring

Spain Busts $11.8M Investment Fraud Ring

July 4, 2025
Ransomware Gang Hunters International Folds

Ransomware Gang Hunters International Folds

July 4, 2025
Interpol Warns of New West Africa Scam Hub

Interpol Warns of New West Africa Scam Hub

July 4, 2025
Spanish Police Arrest High Profile Hackers

Jury Hits Google Over Android Data Use

July 3, 2025
Spanish Police Arrest High Profile Hackers

Germany and Israel Plan Cyber Partnership

July 3, 2025
Spanish Police Arrest High Profile Hackers

Spanish Police Arrest High Profile Hackers

July 3, 2025

Latest Alerts

Google Removes 352 ‘IconAds’ Fraud Apps

Malicious Firefox Add Ons Steal Crypto Keys

Browser Cache Attack Bypasses Web Security

PDFs Deliver QR Codes in Callback Scams

Critical Sudo Flaws Expose Linux Systems

Unkillable Mac Malware From North Korea

Subscribe to our newsletter

    Latest Incidents

    Tech Incubator IdeaLab Discloses Data Breach

    Brazil’s CIEE One Exposes 248,000 Records

    McLaughlin & Stern Discloses Data Breach

    Cyberattack Hits Medtech Firm Surmodics

    Rhysida Ransomware Hits German Charity WHH

    Hacker Accesses Max Financial’s User Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial