Home Malware Programs Vulnerability Danti

Danti

Posted: March 24, 2020

Danti is a cybercrime group that first surfaced in 2016, and their activity has been relatively low ever since. The group appears to share characteristics, tools, and infrastructure with famous Chinese Advanced Persistent Threat (APT) groups, but cybersecurity experts cannot confirm that the members of Danti are based in China.

The group's activity spread across Nepal, Philippines, Myanmar, Kazakhstan and Uzbekistan. Their targets include, but are not restricted to: government officials, political movements and diplomatic missions. The group has been found to use a wide range of public tools and custom-made backdoors to execute their attacks. It appears that the ultimate goal of their campaigns is to gain illicit access to classified data, so it is secure to assume that cyber espionage is Danti's specialty.

The group's attacks are carried out via spear-phishing emails that contain a corrupted file attachment almost exclusively. During their first campaigns, the group relies on the CVE-2015-2545 vulnerability that enabled EPS image files to execute remote code on an unsecured host – however, it is likely that Danti has expanded its arsenal of vulnerabilities during the past few years.

Companies and organizations are the prime targets of groups like Danti, and they should take the necessary measures to protect their network infrastructure from vicious attacks. This requires the use of up-to-date software and operating systems, as well as relying on the security services offered by top-of-the-shelf anti-virus products.

Related Posts

Loading...