Article Details
Scrape Timestamp (UTC): 2025-11-12 16:43:04.450
Original Article Text
Click to Toggle View
DanaBot malware is back to infecting Windows after 6-month break. The DanaBot malware has returned with a new version observed in attacks, six-months after law enforcement's Operation Endgame disrupted its activity in May. According to security researchers at Zscaler ThreatLabz, there is a new variant of DanaBot, version 669, that has a command-and-control (C2) infrastructure using Tor domains (.onion) and “backconnect” nodes. Zscaler also identified and listed several cryptocurrency addresses that threat actors are using to receive stolen funds, in BTC, ETH, LTC, and TRX. DanaBot was first disclosed by Proofpoint researchers as a Delphi-based banking trojan delivered via email and malvertising. It operated under a malware-as-a-service (MaaS) model, being rented to cybercriminals for a subscription fee. In the years that followed, the malware evolved into a modular information stealer and loader, targeting credentials and cryptocurrency wallet data stored in web browsers. The malware was used in numerous campaigns, some of which were large-scale, and reappeared occasionally from 2021 onward, remaining a steady threat to internet users. In May this year, an international law enforcement effort codenamed ‘Operation Endgame’ disrupted Danabot’s infrastructure and announced indictments and seizures, which significantly degraded its operations. However, according to Zscaler, Danabot is again active, with a rebuilt infrastructure. While the Danabot operation was down, many initial access brokers (IAB) pivoted to other malware. DanaBot resurfacing shows that cybercriminals are resilient in their activity as long as there is a financial incentive, despite a multi-month disruption, especially when core operators aren’t arrested. Typical initial access methods observed in DanaBot infections include malicious emails (via links or attachments), SEO poisoning, and malvertising campaigns, some of which led to ransomware. Organizations can defend against DanaBot attacks by adding to their blocklists the new indicators of compromise (IoCs) from Zscaler and by updating their security tools. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.
Daily Brief Summary
DanaBot, a banking trojan, has re-emerged with a new version after a six-month hiatus following law enforcement disruption.
The latest variant, version 669, utilizes Tor domains and “backconnect” nodes for command-and-control infrastructure.
Zscaler ThreatLabz identified cryptocurrency addresses linked to DanaBot for receiving stolen funds in multiple cryptocurrencies.
Initially disclosed by Proofpoint, DanaBot has evolved into a modular information stealer targeting credentials and cryptocurrency wallets.
Despite Operation Endgame's success in degrading DanaBot's operations, the malware's infrastructure has been rebuilt.
DanaBot infections typically occur through malicious emails, SEO poisoning, and malvertising, sometimes leading to ransomware.
Organizations are advised to update blocklists with new indicators of compromise and enhance security tools to mitigate DanaBot threats.