Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

TC starts all stages in Boston, six days until the end of savings up to $475

Samsung launches Z Fold7 and Z Flip7 and adds a cheap Z Flip7 Fe ​​to its collapsible lineup

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware
Identity

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

userBy userJuly 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 9, 2025Ravi LakshmananMalware/Cyberspy

Threat leaders suspected of ties with India have been observed targeting the European Foreign Office using malware that can harvest sensitive data from compromised hosts.

This activity stems from a highly persistent threat (APT) group called the DONOT team, also known as the APT-C-35, Mint Tempest, Origami Elephant, Sector02, and Viceroy Tiger, by the Trellix Advanced Research Center. It has been rated as active since 2016.

“Donot Apt is known for using custom built Windows malware, including backdoors such as Yty and Gedit. It is often delivered via spear phishing emails and malicious documents,” said Trellix researchers Aniket Choukde, Aparna Aripirala, Alisha Kadam, Akhil Reddy, Pham Duy Phuc and Alex Lanstein.

Cybersecurity

“This threat group is usually aimed at government agencies, the Ministry of Foreign Affairs, defence organizations, particularly organizations from South Asia and Europe.”

The attack chain is launched with a phishing email intended for recipients to click on the Google Drive link to trigger a download of the RAR archive. This paves the way for the deployment of malware called LoptikMod.

The messages for each TRELLIX come from their Gmail address and are impersonated as defense personnel. This uses a subject line that refers to Italian defence visits to Dhaka, Bangladesh.

“Emails will show attention to detail to improve legitimacy in order to properly display special characters such as “é” in “aitthre” using HTML format in UTF-8 encoding,” noted in the dismantling of the infection sequence.

RAR archives distributed via email contain malicious executables that mimic PDF documents. This causes the execution of the Loptikmod remote access trojan, allowing you to establish host persistence through scheduled tasks, send system information, receive commands, download additional modules, and add data.

It also employs anti-VM technology and ASCII obfuscation to interfere with execution in virtual environments and avoid analysis, making it more difficult to determine the purpose of the tool. Furthermore, this attack ensures that only one instance of malware is running actively on the compromised system to avoid potential interference.

Cybersecurity

Trellix says the Command and Control (C2) server used in the campaign is currently inactive. This means that the infrastructure was temporarily disabled, stopped working, or threat actors have moved to a completely different server.

The inactive state of the C2 server means that it is currently impossible to determine the exact set of commands sent to the infected endpoint and the type of data sent in response.

“Their operations are characterized by sustained surveillance, data exfoliation and long-term access, suggesting a strong cyberspy motivation,” the researchers said. “While historically it focused on South Asia, this incident targeting the South Asian embassy in Europe shows a clear expansion of their interests in European diplomatic communication and intelligence.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow to protect your mobile number from SIM swap attacks
Next Article Samsung launches Z Fold7 and Z Flip7 and adds a cheap Z Flip7 Fe ​​to its collapsible lineup
user
  • Website

Related Posts

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

July 9, 2025

North Korea Andariel Hacker Behind US Sanctions Fraudulent IT Worker Scheme

July 9, 2025

How to automate ticket creation, device identification, and threat triage with tines

July 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

TC starts all stages in Boston, six days until the end of savings up to $475

Samsung launches Z Fold7 and Z Flip7 and adds a cheap Z Flip7 Fe ​​to its collapsible lineup

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.