CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

DanaBot Malware Resurfaces with New Version 669

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

DanaBot malware has returned with a new variant, version 669, after a six-month hiatus following Operation Endgame. The new version uses Tor domains and backconnect nodes for its command-and-control infrastructure. Researchers have identified cryptocurrency addresses used by threat actors to receive stolen funds. DanaBot, initially a banking trojan, has evolved into a modular information stealer and loader, targeting credentials and cryptocurrency wallet data. Despite law enforcement disruptions, DanaBot remains active, demonstrating the resilience of cybercriminal operations.

Timeline

  1. 12.11.2025 18:34 1 articles · 23h ago

    DanaBot Malware Resurfaces with New Version 669

    DanaBot malware has returned with a new variant, version 669, after a six-month hiatus. The new version uses Tor domains and backconnect nodes for its command-and-control infrastructure. Researchers have identified cryptocurrency addresses used by threat actors to receive stolen funds. Despite law enforcement disruptions, DanaBot remains active, demonstrating the resilience of cybercriminal operations.

    Show sources

Information Snippets