Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Lumma Stealer Activity Declines

October 21, 2025
Reading Time: 3 mins read
in News
Lumma Stealer Activity Declines

The Lumma Stealer (LummaC2 Stealer or LummaC2) has been one of the most prolific information-stealing malware offerings since its debut on underground forums in August 2022. Operating as a malware-as-a-service (MaaS), the threat actors behind it maintained high activity levels from June to September of this year, despite an earlier, unsuccessful law enforcement operation that briefly disrupted their infrastructure in May. However, the last month has seen a dramatic drop in activity, marked by a sharp decline in the use of its associated command-and-control (C&C) infrastructure, as noted by security researchers at Trend Micro.

This sudden halt in the operation, which is also tracked as Water Kurita and Storm-2477, coincides directly with an aggressive doxxing campaign aimed at the Lumma Stealer group. Allegedly driven by competing groups within the cybercrime ecosystem, this campaign has publicly unveiled the personal and operational details of several supposed core members. This unprecedented release of sensitive data has led to significant changes in Lumma Stealer’s operational infrastructure and its internal and external communications. The campaign created a website named ‘Lumma Rats’ where it published highly sensitive details for five individuals, including their personal information, social media profiles, financial information, and passwords.

The disclosed information included details like passport numbers, bank account specifics, email addresses, and various online profile links. Two of the five exposed individuals are believed to be the malware’s administrator and developer, while the roles of the remaining three remain undisclosed. Security analysts believe the doxxing campaign was executed by someone with insider knowledge of the operation or through access to compromised accounts or databases. The fallout from the disclosure was immediate and severe: the group’s Telegram account was reportedly compromised, effectively cutting off the threat actors from their customers and directly contributing to the steep drop in the infostealer’s operational activity.

While Trend Micro emphasizes that the accuracy of the doxed information and the actual involvement of the named individuals have not been independently verified, and that the campaign could be motivated by personal or competitive grudges, the impact is undeniable. The swift decline of Lumma Stealer has forced other cybercriminals to seek out alternatives. Two established information stealers, Vidar and StealC, have rapidly emerged as the top replacement options for those who previously relied on the MaaS. This shift also disrupted the Amadey pay-per-install (PPI) service, which was a key distribution mechanism for Lumma Stealer.

This sudden market disruption is expected to have broader implications for the cybercrime landscape. It has already encouraged other MaaS operators to aggressively intensify their marketing efforts to capture the newly available market share. More concerning, Trend Micro warns that this transition might catalyze the development and release of “new, stealthier infostealer variants” as operators attempt to avoid similar security and operational failures, ultimately pushing the threat landscape to evolve.

Reference:

  • Lumma Stealer Operations Drop Following Doxxing Incident
Tags: Cyber NewsCyber News 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

Justice Dept Targets Russian Hackers

Polish Police Arrest Hackers With Tools

December 10, 2025
Justice Dept Targets Russian Hackers

Spain Arrests Teen Over Data Theft

December 10, 2025
Justice Dept Targets Russian Hackers

Justice Dept Targets Russian Hackers

December 10, 2025
FBI Warns Of Virtual Kidnapping Scams

EU Fines X 140 Million Over Blue Check

December 8, 2025
FBI Warns Of Virtual Kidnapping Scams

Portugal Revises Cybercrime Law For Researchers

December 8, 2025
FBI Warns Of Virtual Kidnapping Scams

FBI Warns Of Virtual Kidnapping Scams

December 8, 2025

Latest Alerts

Urgent Patches Issued For Major Flaws

Microsoft Fixes Dozens Of Security Flaws

WinRAR Flaw Under Active Attack Now

Sneeit RCE And ICTBroadcast Bug Power Attacks

MuddyWater Uses UDPGangster In Campaign

Android Malware Adds Stronger Data Theft

Subscribe to our newsletter

    Latest Incidents

    Inotiv Reports Ransomware Data Breach

    Cyberattack Hits Leavenworth Services

    Cyber Outage Hits PES Energize Phones

    Honduran Vote System Faces Security Breach

    Petco Confirms Data Exposure Incident

    Hackers Hit Major Russian Logistics Firm

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial