#dcis

2025-07-11

In May 2025, #ESET participated in operations that largely disrupted the infrastructure of two notorious infostealers: #LummaStealer and #Danabot.
As part of the Lumma Stealer disruption effort, carried out in conjunction with Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry, ESET supplied technical analysis and statistical information.
Danabot was targeted by the #FBI and #DCIS, alongside #OperationEndgame led by #Europol and #Eurojust. ESET participated together with several other companies. We provided the analysis of the malware’s backend infrastructure and identified its C&C servers.
Before these takedowns, both infostealers were on the rise: in H1 2025, Lumma Stealer detections grew by 21%, while Danabot’s numbers increased by more than 50%.
For a time, Lumma Stealer was the primary payload of HTML/FakeCaptcha trojan, used in the #ClickFix social engineering attacks that we also cover in this issue of the #ESETThreatReport. In recent months, we have seen Danabot being delivered via ClickFix as well.
For more details on these two operations and on the ClickFix attacks, read the latest #ESETThreatReport: welivesecurity.com/en/eset-res

Joe BuddyJoebuddy
2025-06-23

From Navigating the Unknown to Building a Movement: My DCIS Cancer Journey - dcisunderstood.org/from-naviga

2025-05-22

The #FBI and #DCIS disrupted #Danabot. #ESET was one of several companies that cooperated in this effort. welivesecurity.com/en/eset-res
#ESETresearch has been involved in this operation since 2018. Our contribution included providing technical analyses of the malware and its backend infrastructure, as well as identifying Danabot’s C&C servers. Danabot is a #MaaS #infostealer that has also been seen pushing additional malware – even #ransomware, such as #LockBit, #Buran, and #Crisis – to compromised systems.
We have analyzed Danabot campaigns all around the world and found a substantial number of distinct samples of the malware, as well as identified more than 1,000 C&Cs.
This infostealer is frequently promoted on underground forums. The affiliates are offered an administration panel application, a backconnect tool for real-time control of bots, and a proxy server application that relays the communication between the bots and the C&C server.
IoCs are available in our GitHub repo. You can expect updates with more details in the coming days. github.com/eset/malware-ioc/tr

(((Cindy Weinstein)))CindyWeinstein@zirk.us
2024-08-19

Danielle Fishel shares her #DCIS diagnosis and reminds women not to put off their mammogram!

huffpost.com/entry/danielle-fi

(((Cindy Weinstein)))cindyweinstein@mastodon.world
2024-08-19

Thank you Danielle Fishel for sharing your #DCIS diagnosis. Don't put off your mammogram.

huffpost.com/entry/danielle-fi

Scientific Frontlinesflorg
2022-11-19

A team of mapping a atlas for ductal carcinoma in situ () has made a major advance toward distinguishing whether the early pre-cancers in the will develop into invasive or remain stable.

sflorg.com/2022/11/med11192201

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst