LeetAgent: a tool shared by ForumTroll and Dante

Our experts from the Kaspersky Global Research and Analysis Team (GReAT) reconstructed the chain of infection used in attacks by the ForumTroll APT group. During their investigation, they discovered that the tools used by ForumTroll were also used to distribute the commercial malware Dante. Boris Larin gave a detailed presentation on this research at the Security Analyst Summit 2025 conference in Thailand.

What is ForumTroll APT, and how does it operate?

In March, our technologies detected a wave of infections of Russian companies with previously unknown sophisticated malware. The attacks used short-lived web pages that exploited the CVE-2025-2783 zero-day vulnerability in Google Chrome. The attackers sent emails to employees of media, government, educational, and financial institutions in Russia, inviting them to participate in the Primakov Readings scientific and expert forum, which is why the campaign was given the catchy name “Forum Troll” and the group behind it was named ForumTroll. When the link in the email was clicked, the device was infected with malware. The malware used by the attackers was named LeetAgent because it received commands from the control server in Leet modified spellings.

After the initial publication, GReAT experts continued to investigate ForumTroll’s activity. In particular, they found several more attacks by the same group on organizations and individuals in both Russia and Belarus. In addition, while searching for attacks that used LeetAgent, they discovered cases of other, much more sophisticated malware being used.

What is Dante and what does HackingTeam have to do with it?

The malware found had a modular structure, used module encryption with keys unique to each victim, and self-destructed after a certain period of time if no commands from the control server were received. But most interesting of all, our researchers managed to identify it as commercial spyware called Dante, developed by the Italian company Memento Labs – formerly known as Hacking Team.

HackingTeam was one of the pioneers of commercial spyware. But in 2015, the company’s own infrastructure was hacked and a significant portion of its internal documentation – including the source code for its commercial spyware – was published online. After that, the company was sold and renamed Memento Labs.

You can read more about what Dante malware can do, and how our experts figured out that it was indeed Dante in the Securelist blogpost. You can also find the corresponding indicators of compromise there.

How to stay safe

Initially, attacks using LeetAgent were detected using our XDR solution. In addition, details of this research, as well as information about the ForumTroll group and the Dante spyware that we’ll learn in the future, will be available to subscribers of our APT threat data service on the Threat Intelligence Portal.

Kaspersky official blog – ​Read More

DomeWatch Leak Exposed Personal Data of Capitol Hill Applicants

Unsecured House Democrats’ resume bank (DomeWatch) exposed 7,000 records, including PII and “top secret” clearance status, raising identity theft fears.

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More – ​Read More

Claude can integrate with Excel now – plus 7 other new connectors

Here’s how you can access a raft of upgrades intended to boost the chatbot’s financial prowess and access to real-time market information.

Latest news – ​Read More

Best early Black Friday gadget deals 2025: Over a dozen sales out early

Black Friday is still weeks away, but I’ve been searching the web looking for the best gadgets that make great gifts, and I’ve found some cracking deals for you.

Latest news – ​Read More

The most versatile Linux distributions you can install right now – and I’ve tried them all

Looking for a general, all-purpose Linux OS? These are user-friendly, secure, and suitable for both new and experienced users.

Latest news – ​Read More

Chainguard Raises $280 Million in Growth Funding

Chainguard has raised $636 million in the past six months alone for its software supply chain security solutions. 

The post Chainguard Raises $280 Million in Growth Funding appeared first on SecurityWeek.

SecurityWeek – ​Read More

The only antivirus I trust on Linux – and it’s free to use

I don’t often need antivirus on Linux, but when I do, it’s ClamAV.

Latest news – ​Read More

Google Gemini can generate slides and presentations for you now – here’s how

With the Canvas tool, you can devise a slideshow presentation based on your prompt or an uploaded file.

Latest news – ​Read More

Your logins could be among 180M just added to Have I Been Pwned – how to check for free

This is a free service that shows whether your online accounts have likely been ‘pwned,’ or compromised, in a data breach.

Latest news – ​Read More

⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens

Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen accounts to fake job offers, cybercriminals keep finding new ways to exploit both system flaws and human behavior.
Each new breach proves a harsh truth: in cybersecurity, feeling safe can be far more dangerous than being alert.
Here’s how that false sense of security

The Hacker News – ​Read More