DoNot APT Strikes Again: European Diplomacy Meets Cyber Espionage Comedy
The DoNot APT group has widened its horizons by launching a spear-phishing attack on a European foreign affairs ministry. Trellix reveals how the group used LoptikMod malware and cunning tactics that would make a spy novelist proud. This cyber espionage campaign is a wake-up call for global diplomacy.

Hot Take:
When hackers start crashing your European diplomatic party, you know it’s time to tighten the guest list. The DoNot APT group’s European escapade is a not-so-subtle reminder that cyber espionage knows no borders. Who knew international relations could be so… clickbait?
Key Points:
- DoNot APT group, linked to India, targets a European foreign affairs ministry.
- The attack used sophisticated spear-phishing techniques involving Google Drive links.
- Malicious emails impersonated European defense officials discussing a visit to Bangladesh.
- The campaign deployed LoptikMod malware, active since 2018, for data theft.
- Organisations are urged to beef up cybersecurity measures against such threats.
Already a member? Log in here