Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Scale Up Europe Fund boosts technology leadership across the continent

NHS launches AI tool to speed up prostate cancer diagnosis

10 npm packages discovered stealing developer credentials on Windows, macOS, and Linux

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CEO of spyware maker Memento Labs admits one of his government customers was caught using the company’s malware
Startups

CEO of spyware maker Memento Labs admits one of his government customers was caught using the company’s malware

userBy userOctober 29, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

On Monday, researchers at cybersecurity giant Kaspersky Lab released a report identifying a new piece of spyware called Dante that they say is targeting Windows victims in Russia and neighboring Belarus. Dante spyware is made by Milan-based surveillance technology maker Memento Labs, which was founded in 2019 after earlier spyware maker Hacking Team was acquired and taken over by new owners, researchers said.

Memento CEO Paolo Lezzi confirmed to TechCrunch that the spyware captured by Kaspersky was indeed Memento’s.

In the call, Lezzi accused one of his company’s government customers of exposing Dante, saying that the customer was using an older version of Windows spyware that will no longer be supported by Memento by the end of this year.

“Obviously they used an agent that was no longer working,” Rezzi told TechCrunch, citing “agent” as a technical term for spyware that was placed on the target’s computer.

“I thought [the government customer] I didn’t use it anymore,” Retzi said.

Lezzi said he did not know which of the company’s customers were caught, adding that Memento has already asked all customers to stop using Windows malware. Lezzi said the company had been warning customers that Kaspersky had detected Dante spyware infections starting in December 2024. Memento also added that it plans to send a message to all customers on Wednesday asking them to stop using Windows spyware again.

He also said that Memento currently only develops spyware for mobile platforms. Lezzi said the company also develops zero-days (a security flaw in software unknown to the vendor that can be used to distribute spyware), but its exploits are primarily sourced from outside developers.

inquiry

Do you have more information about Memento Labs? Or another spyware maker? You can contact Lorenzo Franceschi-Bicchierai securely from any non-work device on Signal (+1 917 257 1382) or on Telegram, Keybase and Wire @lorenzofb, or email.

In an interview with TechCrunch, Kaspersky spokesperson Mai Al Akka declined to say which government Kaspersky believes was behind the espionage operation, but said it was “someone who was able to use the Dante software.”

“This group stands out for its strong command of the Russian language and knowledge of local nuances, characteristics that Kaspersky has observed in other campaigns related to this.” [government-backed] threat. However, occasional errors suggest that the attacker was not a native speaker,” Al Akka told TechCrunch.

Kaspersky Lab has announced in a new report that it has discovered a group of hackers using Dante spyware, which it calls ForumTroll, and is targeting people with invitations to Primakov Readings, a Russian political and economic forum. Kaspersky said the hackers targeted a wide range of Russian industries, including news organizations, universities and government agencies.

Kaspersky Lab’s discovery of Dante came after the Russian cybersecurity firm announced it had detected a “wave” of cyberattacks with phishing links exploiting a zero-day in the Chrome browser. Lezzi said the Chrome zero-day was not developed by Memento.

In their report, Kaspersky researchers concluded that Memento “continued to improve” the spyware originally developed by Hacking Team until 2022, after which the spyware “was replaced by Dante.”

Lezzi acknowledged that some “aspects” or “behaviors” of Memento’s Windows spyware may be left over from spyware developed by Hacking Team.

A clear sign that the spyware Kaspersky captured belonged to Memento is that the developers are said to have left the word “DANTEMARKER” in the spyware’s code, an apparent reference to the name Dante, which Kaspersky said Memento had previously announced at a surveillance technology conference.

Similar to Memento’s Dante spyware, some versions of Hacking Team’s spyware (codenamed Remote Control System) are named after Italian historical figures, such as Leonardo da Vinci and Galileo Galilei.

history of hacking

In 2019, Lezzi acquired Hacking Team and rebranded it to Memento Labs. Rezzi said he paid the company just 1 euro and started over.

“We want to change absolutely everything,” Memento’s owner told Motherboard after the 2019 acquisition. “We’re starting from zero.”

A year later, Hacking Team CEO and founder David Vincenzetti announced that Hacking Team was “dead.”

At the time of Hacking Team’s acquisition, Rezzi told TechCrunch that the company only had three government customers left, a far cry from the more than 40 government customers Hacking Team had in 2015. That same year, a hacktivist known as Phineas Fisher broke into the company’s servers and siphoned off about 400 gigabytes of internal emails, contracts, documents, and spyware source code.

The hack comes after Hacking Team customers in Ethiopia, Morocco, and the United Arab Emirates were caught using the company’s spyware to target journalists, critics, and dissidents. After Phineas Fisher published the company’s internal data online, journalists revealed that Mexican local governments were using Hacking Team’s spyware to target local politicians and selling Hacking Team to countries where human rights abuses occurred, including Bangladesh, Saudi Arabia and Sudan.

Lezzi declined to tell TechCrunch how many customers Memento currently has, but hinted that it has fewer than 100 customers. He also said that only two of Hacking Team’s former staff remain current Memento employees.

John Scott-Railton, a senior researcher at the University of Toronto’s Citizen Research Institute who has studied spyware abuse for a decade, said the Memento spyware discovery shows that this type of surveillance technology continues to proliferate. It also shows

It’s also true that while a controversial company may disappear due to an epic hack or some scandal, a new company with brand new spyware can still rise from the ashes.

“This tells us that we need to maintain fear of the consequences,” Scott-Railton told TechCrunch. “It says a lot that the echoes of the most radioactive, shamed and hacked brands still exist.”


Source link

#Aceleradoras #CapitalRiesgo #EcosistemaStartup #Emprendimiento #InnovaciónEmpresarial #Startups
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTata Motors admits it has fixed a security flaw that exposed company and customer data
Next Article Active exploit hits Dassault and XWiki — confirms critical flaw CISA is under attack
user
  • Website

Related Posts

Tata Motors admits it has fixed a security flaw that exposed company and customer data

October 29, 2025

The five Startup Battlefield finalists at TechCrunch Disrupt 2025 are:

October 29, 2025

Super Teacher is developing an AI tutor for elementary schools — see us at Disrupt 2025

October 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Scale Up Europe Fund boosts technology leadership across the continent

NHS launches AI tool to speed up prostate cancer diagnosis

10 npm packages discovered stealing developer credentials on Windows, macOS, and Linux

Active exploit hits Dassault and XWiki — confirms critical flaw CISA is under attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.