Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Lumma Stealer Activity Declines

October 21, 2025
Reading Time: 3 mins read
in News
Lumma Stealer Activity Declines

The Lumma Stealer (LummaC2 Stealer or LummaC2) has been one of the most prolific information-stealing malware offerings since its debut on underground forums in August 2022. Operating as a malware-as-a-service (MaaS), the threat actors behind it maintained high activity levels from June to September of this year, despite an earlier, unsuccessful law enforcement operation that briefly disrupted their infrastructure in May. However, the last month has seen a dramatic drop in activity, marked by a sharp decline in the use of its associated command-and-control (C&C) infrastructure, as noted by security researchers at Trend Micro.

This sudden halt in the operation, which is also tracked as Water Kurita and Storm-2477, coincides directly with an aggressive doxxing campaign aimed at the Lumma Stealer group. Allegedly driven by competing groups within the cybercrime ecosystem, this campaign has publicly unveiled the personal and operational details of several supposed core members. This unprecedented release of sensitive data has led to significant changes in Lumma Stealer’s operational infrastructure and its internal and external communications. The campaign created a website named ‘Lumma Rats’ where it published highly sensitive details for five individuals, including their personal information, social media profiles, financial information, and passwords.

The disclosed information included details like passport numbers, bank account specifics, email addresses, and various online profile links. Two of the five exposed individuals are believed to be the malware’s administrator and developer, while the roles of the remaining three remain undisclosed. Security analysts believe the doxxing campaign was executed by someone with insider knowledge of the operation or through access to compromised accounts or databases. The fallout from the disclosure was immediate and severe: the group’s Telegram account was reportedly compromised, effectively cutting off the threat actors from their customers and directly contributing to the steep drop in the infostealer’s operational activity.

While Trend Micro emphasizes that the accuracy of the doxed information and the actual involvement of the named individuals have not been independently verified, and that the campaign could be motivated by personal or competitive grudges, the impact is undeniable. The swift decline of Lumma Stealer has forced other cybercriminals to seek out alternatives. Two established information stealers, Vidar and StealC, have rapidly emerged as the top replacement options for those who previously relied on the MaaS. This shift also disrupted the Amadey pay-per-install (PPI) service, which was a key distribution mechanism for Lumma Stealer.

This sudden market disruption is expected to have broader implications for the cybercrime landscape. It has already encouraged other MaaS operators to aggressively intensify their marketing efforts to capture the newly available market share. More concerning, Trend Micro warns that this transition might catalyze the development and release of “new, stealthier infostealer variants” as operators attempt to avoid similar security and operational failures, ultimately pushing the threat landscape to evolve.

Reference:

  • Lumma Stealer Operations Drop Following Doxxing Incident
Tags: Cyber NewsCyber News 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

Lumma Stealer Activity Declines

South Korea Targets Online Scam Suspects

October 21, 2025
Lumma Stealer Activity Declines

Myanmar Military Closes Cybercrime Hub

October 21, 2025
Experian Fined For Data Collection

Europol Busts SIMBox Ring Operation

October 20, 2025
Experian Fined For Data Collection

China Claims US Cyberattacks On Time

October 20, 2025
Experian Fined For Data Collection

Experian Fined For Data Collection

October 20, 2025
Five Healthcare Providers Warn Patients

Qilin Ransomware Claims New Victims

October 17, 2025

Latest Alerts

BitLocker May Lock Your Data Silently

North Korea Hackers Use New JS Malware

WatchGuard Devices At Risk Of RCE

TikTok Videos Driving Infostealer Attacks

Chrome Extensions Hijack WhatsApp Web

Google Ads Used To Push Fake Software

Subscribe to our newsletter

    Latest Incidents

    Muji Stops Online Sales After Attack

    Major Telco Confirms Cyber Breach

    Russian Hackers Leak UK MoD Files

    AWS Outage Disrupts Major Services

    Envoy Air Hit By Oracle System Hack

    F5 Breach Hits 262000 BIGIP Systems

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial