Introducing Dante Spyware: A New Cyber Threat Targeting Eastern Europe
Security researchers at Kaspersky have recently identified a highly advanced spyware known as Dante spyware, primarily aimed at Windows users in Russia and Belarus. This malicious programme is linked to Memento Labs, a milan-based surveillance technology company founded in 2019 after acquiring teh controversial spyware developer formerly known as Hacking Team.
The transformation from Hacking Team to Memento Labs
Memento Labs rose from the remnants of Hacking Team following it’s acquisition for a nominal sum, with the goal of revamping its operations. While Hacking Team once served over 40 government clients worldwide, only three remained active by the time of takeover. Since then, memento has concentrated on enhancing its surveillance software, culminating in the creation of Dante spyware as an evolution of previous iterations.
Notably, parts of Dante’s codebase retain traces from Hacking Team’s original software. A unique identifier embedded within this malware-“DANTEMARKER”-serves as a clear signature connecting it back to Memento’s heritage.This naming approach continues a tradition were spyware variants are named after prominent Italian past figures.
An Unintended Exposure: How Dante Spyware Was Discovered
The existence of Dante came to light when one government client accidentally deployed an outdated version targeting Windows systems.According to statements from Memento Labs’ leadership, this particular “agent” was deprecated and scheduled for discontinuation by late 2025. Despite warnings issued as late 2024 advising customers against using obsolete versions on Windows platforms, some continued their deployment-leading directly to detection by cybersecurity experts.
Currently, Memento focuses predominantly on espionage tools designed for mobile devices and occasionally develops zero-day exploits-previously unknown vulnerabilities-to support their operations; however, most such exploits are acquired externally rather than developed internally.
The Critical Role of Zero-Day Exploits in Modern Cyber Espionage
Zero-day vulnerabilities represent severe security flaws unknown even to software developers until they are exploited or publicly disclosed. In recent months before discovering Dante spyware, Kaspersky uncovered phishing campaigns exploiting zero-days within popular browsers like Chrome; although these incidents were unrelated directly to Memento’s activities.
The ForumTroll Operation: Targeting Russian Political Forums
Kaspersky analysts connected the use of Dante spyware with an espionage group named “ForumTroll,” wich focused on individuals involved in Russian political discussion forums such as Primakov Readings-a significant event centered around economics and politics debates within Russia. Victims included media outlets,academic institutions,and governmental organizations across Russia.
this campaign demonstrated attackers’ fluency with Russian linguistic nuances but also revealed occasional language errors indicative of non-native speakers-a hallmark frequently enough seen among state-sponsored cyber actors attempting regional infiltration while maintaining plausible deniability.
A troubled Legacy: From Past Breaches to Present-Day Surveillance Challenges
- The Impact of Historical Data Leaks: Prior to rebranding into Memento Labs during 2015-2016,Hacking Team suffered a major breach when hacktivist Phineas Fisher extracted roughly 400 gigabytes containing internal emails and source codes . This leak exposed unethical sales practices involving governments notorious for human rights abuses-including Bangladesh and Saudi Arabia-and revealed targeting strategies against journalists and dissidents across Ethiopia and Morocco among others.
- Memento’s Current Clientele: Although exact numbers remain undisclosed,Memento reportedly serves fewer than one hundred clients today , operating with minimal staff retained from its predecessor company.
- Evolving Threat Landscape: Experts stress that despite public scandals pushing companies like Hacking Team into obscurity,sophisticated surveillance technologies continue advancing under new identities . This persistence highlights ongoing global challenges related to digital privacy violations facilitated through state-backed cyber tools.
Cybersecurity Implications: Strengthening Defense Mechanisms Against Emerging Threats
“The resurgence of advanced spyware under new brands underscores why constant vigilance remains essential,” note cybersecurity professionals tracking global threat developments.
Navigating Increasing Risks Amid Expanding Surveillance Technologies
- Evolving Attack Strategies: As governments adopt more sophisticated spying techniques leveraging mobile platforms alongside traditional desktop malware,detection methods must evolve accordingly .
- User Education: Organizations should emphasize training personnel about phishing dangers associated directly or indirectly with zero-day exploit campaigns targeting widely used applications such as web browsers.
- Collaborative Defense Efforts: Cooperation between private cybersecurity firms & public agencies is vital for timely identification & mitigation against emerging threats posed by groups deploying tools like Dante spyware.




