Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

US Treasury Sanctions DPRK IT-Worker Scheme reveals $600,000 crypto transfers and more than $1 million profits

EPA data shows millions exposed to PFA in drinking water

Fire Form PFA: Transition to a world that does not include PFAS

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware
Identity

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

userBy userJuly 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 9, 2025Ravi LakshmananMalware/Cyberspy

Threat leaders suspected of ties with India have been observed targeting the European Foreign Office using malware that can harvest sensitive data from compromised hosts.

This activity stems from a highly persistent threat (APT) group called the DONOT team, also known as the APT-C-35, Mint Tempest, Origami Elephant, Sector02, and Viceroy Tiger, by the Trellix Advanced Research Center. It has been rated as active since 2016.

“Donot Apt is known for using custom built Windows malware, including backdoors such as Yty and Gedit. It is often delivered via spear phishing emails and malicious documents,” said Trellix researchers Aniket Choukde, Aparna Aripirala, Alisha Kadam, Akhil Reddy, Pham Duy Phuc and Alex Lanstein.

Cybersecurity

“This threat group is usually aimed at government agencies, the Ministry of Foreign Affairs, defence organizations, particularly organizations from South Asia and Europe.”

The attack chain is launched with a phishing email intended for recipients to click on the Google Drive link to trigger a download of the RAR archive. This paves the way for the deployment of malware called LoptikMod.

The messages for each TRELLIX come from their Gmail address and are impersonated as defense personnel. This uses a subject line that refers to Italian defence visits to Dhaka, Bangladesh.

“Emails will show attention to detail to improve legitimacy in order to properly display special characters such as “é” in “aitthre” using HTML format in UTF-8 encoding,” noted in the dismantling of the infection sequence.

RAR archives distributed via email contain malicious executables that mimic PDF documents. This causes the execution of the Loptikmod remote access trojan, allowing you to establish host persistence through scheduled tasks, send system information, receive commands, download additional modules, and add data.

It also employs anti-VM technology and ASCII obfuscation to interfere with execution in virtual environments and avoid analysis, making it more difficult to determine the purpose of the tool. Furthermore, this attack ensures that only one instance of malware is running actively on the compromised system to avoid potential interference.

Cybersecurity

Trellix says the Command and Control (C2) server used in the campaign is currently inactive. This means that the infrastructure was temporarily disabled, stopped working, or threat actors have moved to a completely different server.

The inactive state of the C2 server means that it is currently impossible to determine the exact set of commands sent to the infected endpoint and the type of data sent in response.

“Their operations are characterized by sustained surveillance, data exfoliation and long-term access, suggesting a strong cyberspy motivation,” the researchers said. “While historically it focused on South Asia, this incident targeting the South Asian embassy in Europe shows a clear expansion of their interests in European diplomatic communication and intelligence.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow to protect your mobile number from SIM swap attacks
Next Article Samsung launches Z Fold7 and Z Flip7 and adds a cheap Z Flip7 Fe ​​to its collapsible lineup
user
  • Website

Related Posts

US Treasury Sanctions DPRK IT-Worker Scheme reveals $600,000 crypto transfers and more than $1 million profits

August 28, 2025

Storm-0501 exploits Entra ID to remove and delete Azure data in hybrid cloud attacks

August 27, 2025

Someone created the first AI-powered ransomware using Openai’s GPT-oss:20B model

August 27, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

US Treasury Sanctions DPRK IT-Worker Scheme reveals $600,000 crypto transfers and more than $1 million profits

EPA data shows millions exposed to PFA in drinking water

Fire Form PFA: Transition to a world that does not include PFAS

Nvidia reports record sales as the AI ​​boom continues

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.