Technophile NewsTechnophile News
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
What's On

Honor 400, Honor 400 Pro With Snapdragon SoCs, 200-Megapixel Main Camera Launched: Price, Specifications

23 May 2025

WhatsApp Rolls Out Voice Chat Feature for All Group Chats With End-to-End Encryption

23 May 2025

Save With Top Canon Coupons for May 2025

23 May 2025

Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials

23 May 2025

Esoteric Programming Languages Are Fun—Until They Kill the Joke

22 May 2025
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact Us
Friday, May 23
Facebook X (Twitter) Instagram YouTube
Technophile NewsTechnophile News
Demo
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
Technophile NewsTechnophile News
Home » Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying
News

Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

By News Room22 May 20253 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Tumblr Reddit WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Email

The hacker ecosystem in Russia, more than perhaps anywhere else in the world, has long blurred the lines between cybercrime, state-sponsored cyberwarfare, and espionage. Now an indictment of a group of Russian nationals and the takedown of their sprawling botnet offers the clearest example in years of how a single malware operation allegedly enabled hacking operations as varied as ransomware, wartime cyberattacks in Ukraine, and spying against foreign governments.

The US Department of Justice today announced criminal charges today against 16 individuals law enforcement authorities have linked to a malware operation known as DanaBot, which according to a complaint infected at least 300,000 machines around the world. The DOJ’s announcement of the charges describes the group as “Russia-based,” and names two of the suspects, Aleksandr Stepanov and Artem Aleksandrovich Kalinkin, as living in Novosibirsk, Russia. Five other suspects are named in the indictment, while another nine are identified only by their pseudonyms. In addition to those charges, the Justice Department says the Defense Criminal Investigative Service—a criminal investigation arm of the Department of Defense—carried out seizures of DanaBot infrastructure around the world, including in the US.

Aside from alleging how DanaBot was used in for-profit criminal hacking, the indictment also describes a second variant of the malware that it says was used in espionage against military, government, and NGO targets. “Pervasive malware like DanaBot harms hundreds of thousands of victims around the world, including sensitive military, diplomatic, and government entities, and causes many millions of dollars in losses,” US Attorney Bill Essayli wrote in a statement.

Since 2018, DanaBot has infected millions of computers around the world, initially as a banking trojan designed to steal directly from those PCs’ owners with modular features designed for credit card and cryptocurrency theft. Because its creators allegedly sold it in an “affiliate” model that made it available to other hacker groups for $3,000 to $4,000 a month, however, it was soon used as a tool to install different forms of malware in a broad array of operations, including ransomware. Its targets, too, quickly spread from initial victims in Ukraine, Poland, Italy, Germany, Austria, and Australia to US and Canadian financial institutions, according to an analysis of the operation by cybersecurity firm Crowdstrike.

At one point in 2021, according to Crowdstrike, Danabot was used in a software supply chain attack that hid the malware in a javascript coding tool called NPM with millions of weekly downloads. Crowdstrike found victims of that compromised tool across the financial services, transportation, technology, and media industries.

That scale and the wide variety of its criminal uses made DanaBot “a juggernaut of the e-crime landscape,” according to Selena Larson, a staff threat researcher at cybersecurity firm Proofpoint.

More uniquely, though, DanaBot has also been used at times for hacking campaigns that appear to be state-sponsored or linked to Russian government agency interests. In 2019 and 2020, it was used to target a handful of Western government officials in apparent espionage operations, according to the DOJ’s indictment. According to Proofpoint, the malware in those instances was delivered in phishing messages that impersonated the Organization for Security and Cooperation in Europe and a Kazakhstan government entity.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related News

Save With Top Canon Coupons for May 2025

23 May 2025

Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials

23 May 2025

Esoteric Programming Languages Are Fun—Until They Kill the Joke

22 May 2025

Pro-AI, pro-pollution, pro-surveillance: what to know about Trump’s budget

22 May 2025

Politico’s Newsroom Is Starting a Legal Battle With Management Over AI

22 May 2025

What in the world are Jony Ive and Sam Altman building?

22 May 2025
Top Articles

How to Buy Ethical and Eco-Friendly Electronics

22 April 202531 Views

Honor Power Smartphone Set to Launch on April 15; Tipped to Get 7,800mAh Battery

8 April 202517 Views

The Best Cooling Sheets for Hot Sleepers

30 March 202516 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss

Pro-AI, pro-pollution, pro-surveillance: what to know about Trump’s budget

22 May 2025

The “One Big Beautiful Bill Act” that House Republicans narrowly passed early Thursday would strip…

Politico’s Newsroom Is Starting a Legal Battle With Management Over AI

22 May 2025

What in the world are Jony Ive and Sam Altman building?

22 May 2025

Kesha Wants to ‘Smash’ the Music Industry With a New LinkedIn-Style App

22 May 2025
Technophile News
Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Technophile News. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.