Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
CEO of surveillance software company Memento Labs admits that one of its governmental clients was discovered deploying its malware

CEO of surveillance software company Memento Labs admits that one of its governmental clients was discovered deploying its malware

Bitget-RWA2025/10/29 11:36
By:Bitget-RWA

On Monday, cybersecurity firm Kaspersky released findings on a newly discovered spyware named Dante, which reportedly targeted Windows systems in Russia and neighboring Belarus. According to the researchers, Dante was developed by Memento Labs, a surveillance technology company based in Milan that emerged in 2019 after acquiring the assets of the earlier spyware developer Hacking Team.

Paolo Lezzi, CEO of Memento, confirmed to TechCrunch that the spyware identified by Kaspersky is indeed a product of Memento.

During a phone conversation, Lezzi attributed the exposure of Dante to one of their government clients, stating that the client had deployed an outdated version of the Windows spyware, which Memento plans to discontinue support for by year’s end.

“They were clearly using an agent that was already obsolete,” Lezzi explained to TechCrunch, using “agent” as the technical term for the spyware installed on a victim’s device.

“I actually thought [the government client] had stopped using it,” Lezzi remarked.

Lezzi, who mentioned he was unsure which specific clients were involved, also noted that Memento had already instructed all its clients to cease using the Windows malware. He said the company had warned its customers since December 2024 that Kaspersky had detected Dante infections. Memento intends to remind all clients again on Wednesday to discontinue use of the Windows spyware.

He further stated that Memento now focuses solely on developing spyware for mobile devices. The company also works with zero-day vulnerabilities—security flaws unknown to software vendors that can be exploited to install spyware—though Lezzi said most of these exploits are sourced from external developers.

When contacted by TechCrunch, Kaspersky spokesperson Mai Al Akka declined to specify which government might be behind the spying operation, only stating that it was “an entity capable of utilizing Dante software.”

“This group is notable for its strong command of Russian and familiarity with local context, which Kaspersky has seen in other [state-sponsored] operations. However, occasional mistakes indicate the attackers are not native speakers,” Al Akka told TechCrunch.

Kaspersky’s latest report describes a hacking group it calls “ForumTroll” using Dante spyware to target individuals invited to the Primakov Readings, a Russian political and economic forum. The hackers reportedly attacked a wide array of sectors in Russia, including media, academia, and government agencies.

Kaspersky discovered Dante after detecting a surge of cyberattacks using phishing links that exploited a Chrome browser zero-day vulnerability. Lezzi clarified that Memento was not responsible for developing the Chrome zero-day exploit.

Kaspersky’s report notes that Memento continued to enhance the spyware originally created by Hacking Team until 2022, at which point Dante replaced it.

Lezzi acknowledged that certain features or behaviors in Memento’s Windows spyware may have been inherited from Hacking Team’s earlier products.

A key indicator that the spyware identified by Kaspersky was linked to Memento was the presence of the term “DANTEMARKER” in its code—a direct nod to the Dante name, which Memento had previously revealed at a surveillance technology event, according to Kaspersky.

Similar to Dante, some versions of Hacking Team’s spyware, known as Remote Control System, were named after notable Italian historical figures like Leonardo Da Vinci and Galileo Galilei.

A history of hacks

In 2019, Lezzi acquired Hacking Team and rebranded it as Memento Labs. He told reporters that he paid just one euro for the company, with the intention of starting anew.

“We intend to overhaul everything,” Lezzi told Motherboard after the acquisition in 2019. “We’re beginning from the ground up.”

A year later, Hacking Team’s founder and CEO David Vincenzetti declared the company “dead.”

After acquiring Hacking Team, Lezzi told TechCrunch that only three government clients remained, a significant drop from the more than 40 government customers the company had in 2015. That same year, hacktivist Phineas Fisher breached the company’s servers, stealing around 400 gigabytes of internal emails, contracts, documents, and spyware source code.

Prior to the breach, Hacking Team’s spyware had been used by clients in Ethiopia, Morocco, and the United Arab Emirates to target journalists, critics, and dissidents. Following the leak of internal data by Phineas Fisher, journalists uncovered that a regional government in Mexico used the spyware against local politicians, and that Hacking Team had sold its tools to countries with poor human rights records, such as Bangladesh, Saudi Arabia, and Sudan, among others.

Lezzi declined to disclose the current number of Memento’s clients to TechCrunch, but suggested it is fewer than 100. He also mentioned that only two former Hacking Team employees remain at Memento.

John Scott-Railton, a senior researcher at the University of Toronto’s Citizen Lab who has spent a decade studying spyware misuse, said the emergence of Memento’s spyware demonstrates the ongoing spread of surveillance technology. He added

It also illustrates that even after a company collapses due to a major hack and multiple scandals, a new firm with fresh spyware can still rise from its remains,

“This shows us the importance of maintaining accountability,” Scott-Railton told TechCrunch. “It’s telling that the legacy of such a notorious, compromised, and breached brand continues to persist.”

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

REI’s AI-Gasless Strategy Addresses Expensive and Inefficient Blockchain Issues

- REI Network integrates Spheron and XDGAI, shutting down GXChain on Nov 10, 2025, to focus on AI-native, gasless blockchain infrastructure. - Spheron provides decentralized GPU resources via REI's zero-fee EVM, while XDGAI enables on-chain AI training and multimodal learning through the network. - Strategic shift addresses blockchain's high-cost challenges, with initiatives like GasZero Program and AI Agent Activation Campaign to reduce transaction costs. - Product milestones include gas strategy simulato

Bitget-RWA2025/11/04 10:28
REI’s AI-Gasless Strategy Addresses Expensive and Inefficient Blockchain Issues

Bitcoin Updates: Bitget Introduces Zero-Interest Liquidity, Tackling Altcoin Fluctuations as Whales Influence Market Dynamics

- Bitget launched a zero-interest institutional financing program (Nov 2025–Jan 2026) to boost altcoin liquidity by lowering capital barriers for market makers. - A "Mega Whale" accumulating 1,164 BTC in six hours signals renewed institutional interest in Bitcoin amid altcoin market volatility and fragmented trading depth. - The initiative targets under-served liquidity providers, aligning with industry trends of tailored financing structures to stabilize smaller-cap token markets. - Competitors like OKX a

Bitget-RWA2025/11/04 10:28
Bitcoin Updates: Bitget Introduces Zero-Interest Liquidity, Tackling Altcoin Fluctuations as Whales Influence Market Dynamics

Bitget Addresses Altcoin Liquidity Shortage by Offering Interest-Free Loans

- Bitget launches zero-interest loans for altcoin market makers to boost liquidity in smaller digital assets, effective November 2025–January 2026. - Qualified institutions can borrow up to 2M USDT with 50% reduced trading-volume requirements, targeting professional firms and new clients. - The program addresses fragmented altcoin markets by lowering entry barriers, enabling efficient capital deployment for stable, accessible trading conditions. - Aligning with performance-linked financing trends, Bitget e

Bitget-RWA2025/11/04 10:28
Bitget Addresses Altcoin Liquidity Shortage by Offering Interest-Free Loans

HashKey’s Web3 Push Boosts Hong Kong’s Status as a Regulated Digital Finance Center

- HashKey Group dominated Hong Kong FinTech Week 2025, showcasing Web3 expansion and reinforcing Hong Kong's role as a regulated digital finance hub. - The firm highlighted its Dubai-based MENA exchange, user-friendly HashPass Wallet, and plans for a 2025 Hong Kong Web3 Festival targeting 10,000 attendees. - Aligning with Hong Kong's regulatory strategy, HashKey emphasizes compliance, institutional partnerships, and blockchain education to drive adoption. - Despite short-term crypto market volatility, Hash

Bitget-RWA2025/11/04 10:08
HashKey’s Web3 Push Boosts Hong Kong’s Status as a Regulated Digital Finance Center