KNOWLEDGE is POWER / REAL NEWS is KEY
New York: Tuesday, May 27, 2025
© 2025 U-S-NEWS.COM
Online Readers: 306 (random number)
New York: Tuesday, May 27, 2025
Online: 321 (random number)
Join our "Free Speech Social Platform ONGO247.COM" Click Here
Hooded figure with cybersecurity terms and binary code background

NEWS HEADLINES: DOJ STRIKES HARD—300,000 Devices Compromised Worldwide

🔴 Website 👉 https://u-s-news.com/
Telegram 👉 https://t.me/usnewscom_channel


Russian intelligence appears to have been secretly directing global cybercriminals who infected over 300,000 computers worldwide with the devastating DanaBot malware, causing at least $50 million in damages before the Justice Department finally charged 16 suspects in the operation.

Key Takeaways

  • The US DOJ has charged 16 individuals, including two Russian nationals, for operating the DanaBot malware scheme that infected more than 300,000 computers globally.
  • DanaBot evolved from a banking trojan into a sophisticated threat that targeted military, government, and diplomatic operations, suggesting Russian government involvement.
  • The malware caused at least $50 million in damages by stealing sensitive data including banking credentials and cryptocurrency information.
  • Operation Endgame, a global law enforcement effort involving the FBI, DCIS, and private companies like Amazon and Google, successfully disrupted the malware operation.

Russian Involvement in Global Cyber Criminal Network

The U.S. Department of Justice has announced charges against 16 individuals, including two Russian nationals, for their roles in the global DanaBot malware operation. This sophisticated malware campaign infected more than 300,000 computers worldwide and caused at least $50 million in damages. The criminal network operated what’s known as a Malware-as-a-Service (MaaS) model, essentially renting out access to their powerful hacking tools to less sophisticated cybercriminals, dramatically lowering the barrier to entry for digital theft and espionage.

“Though it is unclear how the collected data was used, we think this direct use of criminal infrastructure for intelligence-gathering activities provides evidence that Scully Spider operators were acting on behalf of Russian government interests.” according to CrowdStrike.

What makes this case particularly alarming is the evidence suggesting direct Russian government involvement. CrowdStrike, a major cybersecurity firm, identified DanaBot as ‘Scully Spider’ and found indications that Russian intelligence agencies were leveraging the criminal network for state-sponsored espionage. The malware originally functioned as a banking trojan designed to steal financial information but evolved into a multifaceted threat capable of harvesting sensitive government and military data.

From Financial Crimes to National Security Threat

DanaBot began its criminal career targeting financial institutions, but investigators discovered a second version specifically engineered to compromise military, government, and diplomatic operations. This dual-purpose functionality allowed the operators to profit from financial theft while simultaneously gathering intelligence that aligned with Russian state interests. The malware’s sophisticated capabilities included hijacking banking sessions, stealing credentials, and extracting cryptocurrency information from victims’ computers.



“It seems like the Russian government had access and was tasking this botnet and using it for espionage purposes. That is like a new level of cooperation and interconnection that I think hasn’t really been publicly disclosed before.” said Adam Meyers.

This case highlights President Trump’s longstanding concerns about cybersecurity threats from foreign adversaries targeting American interests. The involvement of Russian operatives in such a massive cyber campaign underscores the ongoing digital warfare being waged against U.S. infrastructure and interests. While mainstream media outlets have often downplayed these threats, the DanaBot operation demonstrates the very real danger posed by state-sponsored cyber activities against American systems.

Operation Endgame: A Global Response

The takedown of DanaBot required unprecedented international cooperation under an initiative dubbed ‘Operation Endgame.’ Led by the FBI’s Anchorage Field Office and the Defense Criminal Investigative Service (DCIS), the operation involved the seizure of command and control servers across multiple countries. This coordinated effort included collaboration between law enforcement agencies worldwide and private sector companies including Amazon, CrowdStrike, Google, and PayPal.

“The enforcement actions announced today, made possible by enduring law enforcement and industry partnerships across the globe, disrupted a significant cyber threat group, who were profiting from the theft of victim data and the targeting of sensitive networks. The DanaBot malware was a clear threat to the Department of Defense and our partners.” said Special Agent in Charge Kenneth DeChellis of the Department of Defense Office of Inspector General, Defense Criminal Investigative Service (DCIS), Cyber Field Office.

United States Attorney Bill Essayli emphasized the severity of the threat, stating: Pervasive malware like DanaBot harms hundreds of thousands of victims around the world, including sensitive military, diplomatic, and government entities, and causes many millions of dollars in losses. This acknowledgment of the targeting of sensitive government systems reveals how these criminal networks directly threaten national security, not just individual victims or businesses.



Protecting American Digital Infrastructure

The DanaBot case demonstrates the critical importance of robust cybersecurity measures and international cooperation in fighting digital threats. With cybercriminals increasingly serving as proxies for hostile foreign governments, the line between criminal activity and state-sponsored attacks continues to blur. This pattern of using criminal networks as cover for espionage operations provides hostile nations with plausible deniability while still allowing them to gather intelligence and disrupt American systems.

“Today’s announcement represents a significant step forward in the FBI’s ongoing efforts to disrupt and dismantle the cyber-criminal ecosystem that wreaks havoc on global digital security.” stated Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office.

As America faces increasingly sophisticated cyber threats from foreign adversaries, the DOJ’s actions against DanaBot represent an important victory. However, this case also reveals the urgent need for continued vigilance and investment in cybersecurity defenses. With Russia and other hostile nations continuously developing new methods to penetrate American systems, protecting our digital infrastructure must remain a top national security priority for the Trump administration and all government agencies tasked with defending American interests in cyberspace.



Source link



OnGo247
New 100% Free
Social Platform
ONGO247.COM
Give it a spin!
Sign Up Today
OnGo247
New 100% Free
Social Platform
ONGO247.COM
Give it a spin!
Sign Up Today