Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Recently Disrupted DanaBot Leaked Valuable Data for 3 Years

Posted on June 11, 2025June 11, 2025 By CWS

Previous to the current takedown effort focusing on the DanaBot botnet, cybersecurity researchers exploited a vulnerability within the risk’s command and management (C&C) servers to acquire worthwhile info.

The DanaBot malware-as-a-service platform has been round since 2018. Its operators have offered entry to different cybercriminals, who leveraged it for stealing info, and in some instances DDoS assaults. 

The DanaBot botnet, which ensnared over 300,000 gadgets and precipitated greater than $50 million in damages, was focused in a global regulation enforcement operation in Could. A whole lot of servers and domains have been seized and over a dozen people have been charged. 

Following the regulation enforcement operation, it got here to gentle that DanaBot C&C servers have been impacted by a vulnerability that precipitated a reminiscence leak. The flaw, which existed between June 2022 and early 2025, has been dubbed DanaBleed by safety agency Zscaler attributable to its similarity with the infamous Heartbleed vulnerability.

DanaBleed is expounded to the customized binary C&C protocol utilized by DanaBot. A change launched in June 2022 precipitated the C&C server to leak course of reminiscence snippets in responses to contaminated gadgets.

“The reminiscence leak allowed as much as 1,792 bytes per C&C server response to be uncovered. The content material of the leaked knowledge was arbitrary and trusted the code being executed and the info being manipulated within the C&C server course of at a given time,” Zscaler defined.

Regardless of these limitations, the safety agency’s researchers managed to acquire what they described as “significant insights into DanaBot” from the reminiscence leaks collected over a interval of practically three years.

The researchers extracted worthwhile insights into DanaBot infrastructure and processes, in addition to the risk actors behind the botnet. Commercial. Scroll to proceed studying.

The leaked knowledge included risk actor usernames and IP addresses, backend C&C server IPs and domains, malware an infection and exfiltration statistics, malware model updates, and personal cryptographic keys. The leaks additionally contained sufferer knowledge, corresponding to IPs, credentials, and exfiltrated knowledge. 

“The leaked info revealed every part from backend server knowledge, debugging logs, SQL statements, and cryptographic key materials to delicate sufferer knowledge and components of the C2 server’s net interface,” Zscaler mentioned.

DanaBot was severely disrupted by the current regulation enforcement motion, however Zscaler believes it’s too quickly to find out the long-term influence on the botnet. 

Associated: Mirai Botnets Exploiting Wazuh Safety Platform Vulnerability

Associated: Chinese language Espionage Crews Circle SentinelOne in Yr-Lengthy Reconnaissance Marketing campaign

Associated: Damaging ‘PathWiper’ Concentrating on Ukraine’s Important Infrastructure

Security Week News Tags:DanaBot, Data, Disrupted, Leaked, Valuable, Years

Post navigation

Previous Post: Cyera Raises $540 Million to Expand AI-Powered Data Security Platform
Next Post: 40,000 Security Cameras Exposed to Remote Hacking

Related Posts

Microsoft 365 Direct Send Abused for Phishing Security Week News
Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices Security Week News
Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment Security Week News
Company and Personal Data Compromised in Recent Insight Partners Hack  Security Week News
Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Security Week News
Companies Warned of Commvault Vulnerability Exploitation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Review Privacy Policies Efficiently
  • Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media
  • CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability
  • Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
  • Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Review Privacy Policies Efficiently
  • Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media
  • CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability
  • Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
  • Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News