Italian-made spyware spotted in breaches of Russian, Belarusian systems
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是卡巴斯基发现意大利的Memento Labs开发的间谍软件Dante被用于攻击俄罗斯和白俄罗斯的组织。Memento Labs以前叫Hacking Team,之前因为数据泄露事件被批评过。卡巴斯基在调查ForumTroll黑客活动时发现了这个间谍软件,并提到Dante是首次被用于真实网络攻击。 接下来,我需要提取关键点:Dante被用于攻击俄白组织,Memento Labs的背景,卡巴斯基的发现过程,以及这是Dante首次被使用。 然后,我要把这些信息浓缩成一句话,确保不超过100字。要注意用词简洁明了,直接描述内容。 最后,检查一下是否涵盖了所有重要信息,并且语言流畅自然。 </think> 俄罗斯网络安全公司卡巴斯基发现意大利Memento Labs开发的间谍软件Dante被用于针对俄罗斯和白俄罗斯组织的网络攻击。该软件首次在真实网络攻击中被使用。 2025-10-27 18:16:13 Author: therecord.media(查看原文) 阅读量:9 收藏

A Russian cybersecurity firm said it has found evidence that spyware developed by Italy’s Memento Labs — formerly known as the controversial Hacking Team — was likely used in attacks on organizations in Russia and Belarus.

In a report published Monday, researchers at Kaspersky said they identified the company’s commercial spyware, known as Dante, in multiple attacks linked to a hacking group dubbed ForumTroll.

Kaspersky said there is no evidence of active Dante infections among its customers, and researchers could not determine who commissioned ForumTroll’s operations. It is also unclear how much the attackers might have paid to use the spyware or whether the company was aware of its deployment, the report said.

“Proficiency in Russian and familiarity with local peculiarities are distinctive features of the ForumTroll group, traits that we have also observed in its other campaigns,” the researchers said. “However, mistakes in some of those other cases suggest that the attackers were not native Russian speakers.”

Milan-based Memento Labs did not respond to requests for comment.

The report marks the first documented instance of Dante’s use in real-world cyberattacks since it was unveiled by Memento Labs in 2023 during a closed conference for law enforcement and intelligence agencies, according to researchers.

Kaspersky’s discovery was the byproduct of an investigation into ForumTroll espionage attack in March of this year. The hackers targeted Russian media outlets, universities, research centers, government institutions, and financial organizations with phishing emails disguised as invitations to a well-known Russian scientific and expert forum. 

The attackers sent malicious links that exploited a zero-day vulnerability in Google’s Chrome browser, the researchers said. Kaspersky reported the bug, now tracked as CVE-2025-2783, and Google patched it.

Dante was not used in that campaign, the researchers said, but investigating ForumTroll incidents eventually led Kaspersky to discover the spyware elsewhere.

The most recent ForumTroll campaign included the group’s custom tool, LeetAgent, the researchers said. 

At times, it served as a loader for Dante, which is far more advanced, they said. LeetAgent dates back to at least 2022.

Hacking Team sold intrusion and surveillance tools to government clients worldwide before suffering a massive data leak in 2015. 

The firm was criticized for selling its Remote Control Systems (RCS) spyware to countries with “ongoing serious human rights violations,” according to a report by the digital rights watchdog Citizen Lab. In a 2014 report, Citizen Lab found that RCS was used by at least 20 countries, including Saudi Arabia, Sudan, Mexico, Azerbaijan, Egypt, Hungary, Italy and Kazakhstan.

After the leak, the company was acquired and rebranded as Memento Labs, and it has continued marketing its “intelligence solutions” to law enforcement and intelligence agencies.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/memento-labs-formerly-hacking-team-dante-spyware-russia-kaspersky
如有侵权请联系:admin#unsafe.sh