DanaBot malware returns with a vengeance, targeting Windows devices – here’s how to stay safe



  • DanaBot has resurfaced with version 669 and rebuilt infrastructure after Operation Endgame disruption
  • It features modular payloads, encrypted C2, and supports crypto theft via BTC, ETH, LTC, and TRX
  • Zscaler urges organizations to block new IoCs and update defenses against DanaBot’s return

DanaBot, the infamous banking trojan disrupted during the recent Operation Endgame efforts has resurfaced, researchers have revealed.

Cybersecurity researchers Zscaler said they observed DanaBot resurface with version 669, sporting rebuilt infrastructure.


https://cdn.mos.cms.futurecdn.net/eVgzzXmQMEyvzfYvAaAMrX-1919-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img