Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware

Posted on July 9, 2025July 9, 2025 By CWS

Jul 09, 2025Ravie LakshmananMalware / Cyber Espionage
A risk actor with suspected ties to India has been noticed focusing on a European international affairs ministry with malware able to harvesting delicate knowledge from compromised hosts.
The exercise has been attributed by Trellix Superior Analysis Heart to a sophisticated persistent risk (APT) group referred to as DoNot Crew, which is often known as APT-C-35, Mint Tempest, Origami Elephant, SECTOR02, and Viceroy Tiger. It has been assessed to be lively since 2016.
“DoNot APT is thought for utilizing custom-built Home windows malware, together with backdoors like YTY and GEdit, typically delivered by way of spear-phishing emails or malicious paperwork,” Trellix researchers Aniket Choukde, Aparna Aripirala, Alisha Kadam, Akhil Reddy, Pham Duy Phuc, and Alex Lanstein stated.

“This risk group usually targets authorities entities, international ministries, protection organizations, and NGOs particularly these in South Asia and Europe.”
The assault chain commences with phishing emails that intention to trick recipients into clicking on a Google Drive hyperlink to set off the obtain of a RAR archive, which then paves the best way for the deployment of a malware dubbed LoptikMod, which is completely put to make use of by the group way back to 2018.
The messages, per Trellix, originate from a Gmail handle and impersonate protection officers, with a topic line that references an Italian Protection Attaché’s go to to Dhaka, Bangladesh.
“The e-mail used HTML formatting with UTF-8 encoding to correctly show particular characters like ‘é’ in ‘Attaché,’ demonstrating consideration to element to extend legitimacy,” Trellix famous in its deconstruction of the an infection sequence.

The RAR archive distributed through the emails comprises a malicious executable that mimics a PDF doc, opening which causes the execution of the LoptikMod distant entry trojan that may set up persistence on the host through scheduled duties and hook up with a distant server to ship system data, obtain additional instructions, obtain extra modules, and exfiltrate knowledge.
It additionally employs anti-VM methods and ASCII obfuscation to hinder execution in digital environments and evade evaluation, thereby making it much more difficult to find out the device’s function. Moreover, the assault makes certain that just one occasion of the malware is actively working on the compromised system to keep away from potential interference.

Trellix stated the command-and-control (C2) server used within the marketing campaign is at the moment inactive, which means the infrastructure has been both briefly disabled or not practical, or that the risk actors have moved to a very totally different server.
The inactive state of the C2 server additionally signifies that it is at the moment not possible to find out the precise set of instructions which can be transmitted to contaminated endpoints and the sorts of knowledge which can be despatched again as responses.
“Their operations are marked by persistent surveillance, knowledge exfiltration, and long-term entry, suggesting a robust cyber espionage motive,” the researchers stated. “Whereas traditionally targeted on South Asia, this incident focusing on South Asian embassies in Europe, signifies a transparent growth of their pursuits in direction of European diplomatic communications and intelligence.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:APT, DoNot, European, Expands, Foreign, LoptikMod, Malware, Ministries, Operations, Targets

Post navigation

Previous Post: Splunk Address Third-Party Packages Vulnerabilities in SOAR Versions
Next Post: VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack

Related Posts

Infostealer Targets OpenClaw AI, Exposes Security Flaws Infostealer Targets OpenClaw AI, Exposes Security Flaws The Hacker News
Security Tools Alone Don’t Protect You — Control Effectiveness Does Security Tools Alone Don’t Protect You — Control Effectiveness Does The Hacker News
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks The Hacker News
FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE The Hacker News
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware The Hacker News
Google Reports Exploitation of Qualcomm Android Vulnerability Google Reports Exploitation of Qualcomm Android Vulnerability The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark