More

    DanaBot malware returns with a vengeance, targeting Windows devices – here’s how to stay safe



    • DanaBot has resurfaced with version 669 and rebuilt infrastructure after Operation Endgame disruption
    • It features modular payloads, encrypted C2, and supports crypto theft via BTC, ETH, LTC, and TRX
    • Zscaler urges organizations to block new IoCs and update defenses against DanaBot’s return

    DanaBot, the infamous banking trojan disrupted during the recent Operation Endgame efforts has resurfaced, researchers have revealed.

    Cybersecurity researchers Zscaler said they observed DanaBot resurface with version 669, sporting rebuilt infrastructure.


    https://cdn.mos.cms.futurecdn.net/eVgzzXmQMEyvzfYvAaAMrX-1919-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    spot_imgspot_img