Skip to content

FBI Takes Down DanaBot Malware, Seizes Servers and Charges 16

The FBI's action against DanaBot marks a significant blow to cybercrime. Victims worldwide can now expect help to remediate infections.

In this image, we can see an advertisement contains robots and some text.
In this image, we can see an advertisement contains robots and some text.

FBI Takes Down DanaBot Malware, Seizes Servers and Charges 16

The FBI has taken significant action against DanaBot, a notorious information-stealing malware. Servers used by its creators to control the malware and store stolen data have been seized. This follows the unsealing of criminal charges against 16 individuals involved in its operation and sale.

DanaBot first appeared in 2018, with its initial version sold until June 2020. A second version emerged in January 2021, used for espionage purposes. The malware, sold on Russian cybercrime forums, specializes in credential theft and banking fraud. It has infected over 300,000 systems worldwide, resulting in estimated losses of over $50 million.

The masterminds behind DanaBot are Aleksandr Stepanov, alias 'JimmBee', and Artem Aleksandrovich Kalinkin, both from Novosibirsk, Russia. Stepanov worked exclusively for Gazprom, while Kalinkin is currently an IT engineer for the same Russian state-owned energy giant. The malware has targeted critical infrastructure, including military, diplomatic, and non-governmental organization computers in several countries.

The U.S. government's action against DanaBot defendants follows Microsoft's disruption of another malware-as-a-service offering, Lumma Stealer. The government is now working with industry partners to notify DanaBot victims and help remediate infections, aiming to mitigate the malware's ongoing threat.

Read also:

Latest