ByDavey Winder,

Senior Contributor.

I have a t-shirt that proudly and loudly proclaims that it gets worse before it gets worse. It just got worse for Microsoft users. Hot on the heels of Windows 10, 11 and Server users being urged to update as a zero-day vulnerability in the Windows kernel was confirmed as exploited in the wild, so another series of ongoing attacks has been reported. This time, regarding the dangerous crypto-stealing malware that was thought to be killed off during the still-active joint security agency assault known as Operation Endgame way back in May.

It had been thought by many in the cybersecurity world that the threat posed by the DanaBot malware, a nasty trojan that was being rented out to cybercriminals with the ready cash, had come crashing to a halt in May after Operation Endgame which took down, it was thought, the infrastructure used by the perpetrators. That operation, jointly executed by security agencies across the U.S., U.K., and Europe, involved 20 international arrest warrants being issued alongside the undoubted criminal campaign disruption. But that was then, and this is now.

It would appear that DanaBot is back, with a vengeance. According to cybersecurity researchers at Zscaler, posting to X, “Danabot has resurfaced with version 669 after nearly a 6-month hiatus following the Operation Endgame law enforcement actions in May.”