TechCrunch News 10月29日 14:29
卡巴斯基发现新间谍软件Dante,指向Memento Labs
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

卡巴斯基公司发布报告,披露了一款名为Dante的新型间谍软件,该软件主要针对俄罗斯及周边国家的Windows用户。研究人员指出,Dante间谍软件的开发者是Memento Labs,一家成立于2019年的米兰监控技术公司,该公司由曾收购并接管早期间谍软件制造商Hacking Team的新所有者组建。Memento首席执行官Paolo Lezzi已确认该间谍软件归属Memento,并表示此次暴露源于某政府客户使用了过时且不再支持的Windows间谍软件版本。Memento已要求所有客户停止使用该Windows恶意软件,并计划再次发送通知进行强调。公司目前主要开发移动平台间谍软件,并少量开发零日漏洞利用,但大部分来自外部。卡巴斯基虽未指明幕后政府,但指出攻击者对俄语和当地细微之处的掌握,同时偶尔的失误显示非母语者参与。研究还发现,名为“ForumTroll”的黑客组织使用Dante间谍软件,目标指向俄罗斯的媒体、大学及政府组织,并与俄罗斯政治经济论坛“Primakov Readings”的邀请有关。Memento在Dante间谍软件的开发中,逐步改进了Hacking Team的原始技术,并在代码中留下了“DANTEMARKER”的痕迹。

🕵️‍♂️ **新间谍软件Dante浮现,指向Memento Labs:** 网络安全公司卡巴斯基发现了一款名为Dante的新型间谍软件,据称该软件由Memento Labs开发,主要针对俄罗斯和白俄罗斯的Windows用户。Memento Labs是一家在2019年成立的公司,其前身是曾因泄露事件而备受关注的Hacking Team。

⚠️ **客户使用过时版本导致暴露:** Memento首席执行官Paolo Lezzi证实了Dante间谍软件的归属,并解释称此次暴露是由于其一位政府客户使用了Memento已不再支持的过时Windows间谍软件版本。他表示公司已要求所有客户停止使用该款恶意软件。

💻 **技术演进与Hacking Team渊源:** 卡巴斯基的报告指出,Memento在Dante间谍软件的开发过程中,持续改进了Hacking Team的原始技术,并在软件代码中留下了“DANTEMARKER”的标识,这表明了其与Hacking Team的联系。Hacking Team的间谍软件也曾以意大利历史人物命名。

🎯 **攻击目标与黑客组织:** 卡巴斯基的研究发现,一个名为“ForumTroll”的黑客组织正在使用Dante间谍软件,其攻击目标广泛,包括俄罗斯的媒体、大学以及政府组织,并且与邀请参加俄罗斯政治经济论坛“Primakov Readings”有关。尽管攻击者对俄语和当地文化有深入了解,但偶尔的语言错误也暗示了攻击者可能并非母语使用者。

On Monday, researchers at cybersecurity giant Kaspersky published a report identifying a new spyware called Dante that they say targeted Windows victims in Russia and neighboring Belarus. The researchers said the Dante spyware is made by Memento Labs, a Milan-based surveillance tech maker that was formed in 2019 after a new owner acquired and took over early spyware maker Hacking Team.

Memento chief executive Paolo Lezzi confirmed to TechCrunch that the spyware caught by Kaspersky does indeed belong to Memento.

In a call, Lezzi blamed one of the company’s government customers for exposing Dante, saying the customer used an outdated version of the Windows spyware that will no longer be supported by Memento by the end of this year. 

“Clearly they used an agent that was already dead,” Lezzi told TechCrunch, referring to an “agent” as the technical word for the spyware planted on the target’s computer.

“I thought [the government customer] didn’t even use it anymore,” said Lezzi. 

Lezzi, who said he was not sure which of the company’s customers were caught, added that Memento had already requested that all of its customers stop using the Windows malware. Lezzi said the company had warned customers that Kaspersky had detected Dante spyware infections since December 2024. He added that Memento plans to send a message to all its customers on Wednesday asking them once again to stop using its Windows spyware.

He also said that Memento currently only develops spyware for mobile platforms. The company also develops some zero-days — meaning security flaws in software unknown to the vendor that can be used to deliver spyware — though, the company mostly sources its exploits from outside developers, according to Lezzi. 

Do you have more information about Memento Labs? Or other spyware makers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

When reached by TechCrunch, Kaspersky spokesperson Mai Al Akka would not say which government Kaspersky believes is behind the espionage campaign, but that it was “someone who has been able to use Dante software.”

“The group stands out for its strong command of Russian and knowledge of local nuances, traits that Kaspersky observed in other campaigns linked to this [government-backed] threat. However, occasional errors suggest that the attackers were not native speakers,” Al Akka told TechCrunch.

In its new report, Kaspersky said it found a hacking group using the Dante spyware that it refers to as “ForumTroll,” describing the targeting of people with invites to Russian politics and economics forum Primakov Readings. Kaspersky said the hackers targeted a broad range of industries in Russia, including media outlets, universities, and government organizations. 

Kaspersky’s discovery of Dante came after the Russian cybersecurity firm said it detected a “wave” of cyberattacks with phishing links that were exploiting a zero-day in the Chrome browser. Lezzi said that the Chrome zero-day was not developed by Memento. 

In its report, Kaspersky researchers concluded that Memento “kept improving” the spyware originally developed by Hacking Team until 2022, when the spyware was “replaced by Dante.” 

Lezzi conceded that it is possible that some “aspects” or “behaviors” of Memento’s Windows spyware were left over from spyware developed by Hacking Team.

A telltale sign that the spyware caught by Kaspersky belonged to Memento was that the developers allegedly left the word “DANTEMARKER” in the spyware’s code, a clear reference to the name Dante, which Memento had previously and publicly disclosed at a surveillance tech conference, per Kaspersky. 

Much like Memento’s Dante spyware, some versions of Hacking Team’s spyware, codenamed Remote Control System, were named after historical Italian figures, such as Leonardo Da Vinci and Galileo Galilei.

A history of hacks

In 2019, Lezzi purchased Hacking Team and rebranded it to Memento Labs. According to Lezzi, he paid only one euro for the company and the plan was to start over. 

“We want to change absolutely everything,” the Memento owner told Motherboard after the acquisition in 2019. “We’re starting from scratch.”

A year later, Hacking Team’s CEO and founder David Vincenzetti announced that Hacking Team was “dead.”

When he acquired Hacking Team, Lezzi told TechCrunch that the company only had three government customers remaining, a far cry from the more than 40 government customers that Hacking Team had in 2015. That same year, a hacktivist called Phineas Fisher broke into the startup’s servers and siphoned off some 400 gigabytes of internal emails, contracts, documents, and the source code for its spyware.

Before the hack, Hacking Team’s customers in Ethiopia, Morocco, and the United Arab Emirates were caught targeting journalists, critics, and dissidents using the company’s spyware. Once Phineas Fisher published the company’s internal data online, journalists revealed that a Mexican regional government used Hacking Team’s spyware to target local politicians, and that Hacking Team had sold to countries with human rights abuses, including Bangladesh, Saudi Arabia, and Sudan, among others.

Lezzi declined to tell TechCrunch how many customers Memento currently has, but implied it was fewer than 100 customers. He also said that there are only two current Memento employees left from Hacking Team’s former staff.

The discovery of Memento’s spyware shows that this type of surveillance technology keeps proliferating, according to John Scott-Railton, a senior researcher who has investigated spyware abuses for a decade at the University of Toronto’s Citizen Lab. It also shows

Also that a controversial company can die because of a spectacular hack and several scandals, and yet a new company with brand new spyware can still come out of its ashes, 

“It tells us that we need to keep up the fear of consequences,” Scott-Railton told TechCrunch. “It says a lot that echoes of the most radioactive, embarrassed and hacked brand are still around.”

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Dante Memento Labs Kaspersky Spyware Hacking Team Cybersecurity 间谍软件 网络安全
相关文章