Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Global Takedown Hits Lumma InfoStealer

May 22, 2025
Reading Time: 3 mins read
in News
Global Takedown Hits Lumma InfoStealer

Global law enforcement and private firms have disrupted the Lumma information stealer malware. This operation seized 2,300 domains that acted as its command-and-control (C2) backbone. Lumma malware is deployed to steal sensitive information such as user login credentials. This data facilitates crimes including fraudulent bank transfers and also widespread cryptocurrency theft. The confiscated infrastructure had been used to target millions of victims across the world. Lumma Stealer active since late 2022 was used in at least 1.7 million instances. The U.S. Federal Bureau of Investigation (FBI) attributes around 10 million infections to Lumma. Microsoft also identified over 394,000 infected Windows computers globally in recent months. Europol described Lumma as the “world’s most significant infostealer threat” due to its reach.

The recent domain seizure impacts five login panels used by Lumma Stealer’s administrators. This prevents them from deploying malware or stealing further sensitive victim information effectively. Microsoft’s Digital Crimes Unit (DCU) partnered with other cybersecurity companies in this takedown. Partners included ESET BitSight Lumen Cloudflare CleanDNS and also the GMO Registry. The primary developer of Lumma is based in Russia and uses the alias ‘Shamel’. Shamel markets different service tiers for Lumma malware via Telegram and Russian chat forums. This stealer is sold under a malware-as-a-service (MaaS) model on a subscription basis. Subscription costs range from $250 up to $1,000 depending on the service tier. A $20,000 plan even grants customers access to the malware’s valuable source code. Higher tiers offer custom data collection advanced evasion tools and early access to features.

Over the years Lumma has become a somewhat notorious and widespread cybersecurity threat.

It is typically delivered to victims via a variety of different distribution vectors. These methods include the increasingly popular ClickFix malware distribution technique often seen now. Microsoft which tracks the actor as Storm-2477 calls its distribution infrastructure dynamic. It leverages phishing malvertising drive-by downloads and abuse of many trusted online platforms. Recent campaigns used cloud object storage for fake reCAPTCHA pages with ClickFix-style lures. Lumma employs a sophisticated multi-tiered C2 infrastructure consisting of nine frequently changing domains. Its payloads are typically spread using pay-per-install networks or various illicit traffic sellers. The core binary is obfuscated with advanced protection like LLVM core and control flow flattening.

There were over 21,000 market listings selling Lumma Stealer logs in mid-2024.

This represented a significant 71.7% increase from the previous year’s similar period. The operators also created a Telegram marketplace with a rating system for affiliates. Lumma’s distribution infrastructure continually refines its sophisticated techniques to avoid being caught. It frequently rotates malicious domains and exploits ad networks and legitimate cloud services. To further hide real C2 servers they are all hidden behind Cloudflare’s proxy. This dynamic structure enables operators to maximize campaign success while complicating takedown efforts. The developer behind Lumma said in January 2025 they intended to cease operations. They stated they planned to stop their activities by the next fall season. Despite this Lumma’s growth clearly highlights the broader evolution of sophisticated modern cybercrime.

Reference:

  • Global Operation Disrupts Lumma InfoStealer Seizing Its 2300 Key Control Domains
Tags: Cyber NewsCyber News 2025Cyber threatsMay 2025
ADVERTISEMENT

Related Posts

US Seizes $225M In Record Crypto Bust

UK Data Law Risks EU Adequacy Deal

June 20, 2025
US Seizes $225M In Record Crypto Bust

US Seizes $225M In Record Crypto Bust

June 20, 2025
US Seizes $225M In Record Crypto Bust

Argentina Busts Russian Disinformation Ring

June 20, 2025
Iran Slows Internet to Prevent Cyberattacks

Episource data breach affects over 5M patients

June 19, 2025
Iran Slows Internet to Prevent Cyberattacks

Ryuk ransomware’s access enabler extradited

June 19, 2025
Iran Slows Internet to Prevent Cyberattacks

Iran Slows Internet to Prevent Cyberattacks

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial