DoNot Disturb: Indian APT Group’s Malware Mischief Hits European Ministries!

DoNot Team, also known as APT-C-35 or Mint Tempest, is an advanced persistent threat actor targeting European foreign affairs ministries with malware. They use sneaky spear-phishing emails and malware like LoptikMod to spy and steal data. Their operations suggest a strong focus on cyber espionage, now expanding into Europe.

Pro Dashboard

Hot Take:

Looks like the DoNot Team is really living up to their name by not stopping their cyber mischief. These digital pranksters from India have set their sights on Europe, and it seems they’ve swapped out the curry for some spaghetti with their latest Italian Defense Attaché-themed ruse. With such a detailed phishing scheme, they could give any catfish a run for their money. But don’t worry, the Trellix team is serving justice on a silver platter with a side of malware analysis!

Key Points:

  • DoNot Team (aka APT-C-35) is targeting European foreign affairs using malware.
  • Malicious tools include backdoors like YTY and GEdit, delivered via spear-phishing.
  • Phishing emails impersonate defense officials with fake Google Drive links.
  • LoptikMod malware is used for data exfiltration and evades virtual environment analysis.
  • Command-and-control server currently inactive, limiting current threat analysis.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?