DanaBot malware operators exposed via C2 bug added in 2022

DanaBot malware operators exposed via C2 bug added in 2022

A recent law enforcement operation dismantled DanaBot, a malware-as-a-service platform involved in banking fraud, credential theft, and DDoS attacks. The operation was made possible by exploiting the DanaBleed vulnerability, which revealed sensitive information about the threat actors and infrastructure. #DanaBot #DanaBleed #OperationEndgame

Keypoints

  • The DanaBleed vulnerability was introduced in June 2022 in DanaBot version 2380.
  • A memory leak in the C2 protocol allowed researchers to access sensitive internal data of DanaBot.
  • Exposure through DanaBleed included threat actor details, infrastructure data, victim credentials, and cryptographic keys.
  • Law enforcement seized C2 servers, domains, and cryptocurrency, effectively neutralizing DanaBot for the time being.
  • The threat actors, based in Russia, were merely indicted, but their infrastructure was disrupted and trust diminished.

Read More: https://www.bleepingcomputer.com/news/security/danabot-malware-operators-exposed-via-c2-bug-added-in-2022/