Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

US Busts DanaBot Malware Ring Charging 16

May 23, 2025
Reading Time: 3 mins read
in News
SEC Charges Unicoin For Crypto Fraud Scheme

The U.S. Department of Justice (DOJ) announced DanaBot malware’s infrastructure disruption on Thursday. This action was part of the broader international law enforcement effort Operation Endgame. Charges were also unsealed against sixteen individuals for their alleged involvement with DanaBot. They are accused of developing and also deploying this sophisticated malware for cybercrime. The DOJ stated a Russia-based cybercrime organization primarily controlled the DanaBot operations. This malware infected over 300,000 victim computers in countries all around the world. It facilitated widespread fraud and various ransomware attacks causing at least $50 million damages. Two key Russian defendants Aleksandr Stepanov and Artem Kalinkin currently remain at large. Many defendants were identified after they accidentally infected their own systems with DanaBot.

DanaBot is a very multi-functional malware tool much like Emotet TrickBot or QakBot. It can effectively act as an information stealer from many compromised computer systems. It also frequently serves as a delivery vector for other dangerous next-stage malware. This includes delivering various well-known ransomware payloads to already infected victim machines. The Delphi-based modular malware is expertly equipped to siphon sensitive data from computers. It can hijack online banking sessions and steal diverse types of device information. It also steals user Browse histories stored account credentials and valuable virtual currency wallets. DanaBot provides full remote system access logs all keystrokes and can capture video. It operated under a malware-as-a-service (MaaS) scheme leasing access to other cybercriminals. Access costs ranged from $500 to several thousand U.S. dollars per month.

DanaBot has been actively used in the wild by criminals since its debut. It initially started its operations as a banking trojan back in May of 2018. It first targeted victims in European countries like Ukraine Poland Italy and also Germany. Later it significantly expanded its targeting posture to include U.S. and Canadian institutions. A second specialized DanaBot version emerged in January 2021 specifically designed for espionage. This variant targeted many military diplomatic and also various government related entities. These sensitive targets were located primarily in North America and also throughout Europe. DanaBot cleverly employed a layered communications infrastructure for its command and control servers. Its operators adapted to detection efforts and offered users structured pricing and customer support. For years it spread via SEO poisoning and malvertising not just email.

This DanaBot takedown is part of the much larger ongoing Operation Endgame initiative.

Endgame previously targeted other malware families like Lumma Stealer Smokeloader and also TrickBot. The latest phase took down about 300 servers and also 650 domains. Concurrently the DOJ unsealed charges against Rustam Gallyamov the alleged QakBot malware leader. Over $24 million in cryptocurrency was seized from Gallyamov during that separate investigation. Numerous private sector cybersecurity firms provided valuable assistance in the DanaBot takedown effort.

Proofpoint which first identified DanaBot called this disruption a significant win for defenders.

Such law enforcement actions impair malware use and impose considerable costs on threat actors. They may also cause mistrust in the criminal ecosystem making cybercrime less attractive. Continued private and public sector collaboration is absolutely crucial to counter these threats.

Reference:

  • US Dismantles DanaBot Infrastructure Charging Sixteen In $50M Global Fraud
Tags: Cyber NewsCyber News 2025Cyber threatsMay 2025
ADVERTISEMENT

Related Posts

US Seizes $225M In Record Crypto Bust

UK Data Law Risks EU Adequacy Deal

June 20, 2025
US Seizes $225M In Record Crypto Bust

US Seizes $225M In Record Crypto Bust

June 20, 2025
US Seizes $225M In Record Crypto Bust

Argentina Busts Russian Disinformation Ring

June 20, 2025
Iran Slows Internet to Prevent Cyberattacks

Episource data breach affects over 5M patients

June 19, 2025
Iran Slows Internet to Prevent Cyberattacks

Ryuk ransomware’s access enabler extradited

June 19, 2025
Iran Slows Internet to Prevent Cyberattacks

Iran Slows Internet to Prevent Cyberattacks

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial