Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » FBI and EuroPol break the Lumma malicious malware associated with 10 million infections
Global Security

FBI and EuroPol break the Lumma malicious malware associated with 10 million infections

AdminBy AdminMay 22, 2025No Comments5 Mins Read
Lumma Stealer Malware Network
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Lumma Stealer Mar Sarsware Network

A common surgery performed by global Break (AKA Lummac or Lummac2), grabbing 2300 domains that acted as the basis of command and control (C2) for Windows Command Systems.

“Malicious software like Lummac2 is unfolding for theft of confidential information, such as logging credentials to use millions of victims to make it easier for many crimes, including fake transfers of banks and theft of cryptocurrency,” the US Department of Justice (DOJ) – Note In a statement.

The confiscated infrastructure was used to target millions worldwide via branches and other cyber -centers. The Lumma theft, which has been actively operating since the end of 2022, is estimated, has been used at least 1.7 million cases for theft of information such as browser data, auto -fill information, login credentials and cryptocurrency. The US Federal Bureau of Investigation (FBI) has attributed about 10 million infections Lumma.

The foothills affect five domains that serve as the Lumma Ctaler administrators and pay customers to deploy malicious software, preventing them from breaking computers and stealing information about the victim.

“Between March 16 and May 16, 2025 Microsoft identified more than 394,000 Windows computers worldwide, infected with malicious Lumma software,” Europol – NoteAdding the operation disables the link between the malicious tool and the victims. The agency described Luma as “the most significant threat of infustelir”.

Cybersecurity

Microsoft’s digital crimes department (DCU) in partnership with other ESET, Bitsight, Lumen, Cloudflare, Cleandns and GMO register stated that approximately 2300 malicious domains formed the basis of Lumma infrastructure.

Spread infections malware Lumma Ctyler on Windows devices

“The main developer Lumma is in Russia and goes on the Internet -psycho” Shamy “,” Stephen Masada, Assistant General Lawyer in DCU, – Note. “Shamel Markets Different Service Levels for Lumma via Telegram and other Russian chat forums. Depending on what cybercrime service, they can create their own malware versions, add tools to hide and distribution, as well as track the stolen information through the Internet portal.”

The theft, which is sold as part of the malicious software (MAAS) model, is available on a $ 250 to $ 1,000. The developer also offers a $ 20,000 plan that provides customers to access the source code and the right to sell it to other criminals.

Weekly calculations of new domains C2

“Lower levels include basic filtering and magazine download options, while higher levels offer custom data collection, evasion tools and early access to new features,” ESET – Note. “The most expensive plan emphasizes stealth and adaptation, offering unique assembly generation and decreased detection.”

For many years Lumma has become something with a notorious threat, delivered through Different distribution vectorsincluding all the more popular Clickfix Method. The Windows manufacturer, which tracks the actor threatening for theft called Storm-2477, stated Prometheus.

Lumma C2 selection mechanism

The report published on Wednesday shows that the suspicion of Russian threatening subjects use object objects Tigris, Oracle Cloud Infrastructure (OCI), and Scaleway facilities to place fake pages using the use Clickfix-Parbed in the style of fooling users in boot Theft of a lama.

“The latest company that uses object storage Tigris, storage of OCI facilities and storage of SCALEway objects, relies on earlier methods, introducing new delivery mechanisms aimed at evading and orientation to technically experienced users,” Guyl Dominga, Guy Vael and Timer Agaev. – Note.

Attack stream for Clickfix leading to theft of Lumma using Prometheus TDS

Some of the notable aspects of malware are below –

  • In it used multi -tiered infrastructure C2 consisting of a set of nine frequently changing domains Tier-1, firmly in the configuration of malicious programs and reserve C2 located on steam profiles and telegram
  • Useful loads usually distribution Using networks Pay-PER-INSTALL (PPI) or traffic sellers that deliver installations as a service.
  • Usually theft complete with fake software or hacked versions of popular commercial software, focusing on users seeking to avoid payment of legitimate licenses
  • Operators created Market telegram With the rating system for affiliates for sale stolen data without intermediaries
  • The core binary is embarrassed with expanded protection such as a low -level virtual machine (LLVM Core), smoothing control flow (CFF), exacerbation control flow, individual stack transcript, huge stacks and dead codes, among others, to make static analysis
  • Was more than 21,000 market lists Sales of Lumma Thefts at several cybercriminals from April to June 2024, which is 71.7% compared to April to June 2023.
Cybersecurity

“Infrastructure Distribution Lumma is flexible and adapted,” Microsoft – Note. “Operators constantly clarify their methods, rotate malicious domains, using advertising networks and use legal cloud services to avoid detection and maintenance of promptness. To hide the real C2 servers even more, all C2 servers are hiding behind the proxy.”

“This dynamic structure allows the operators to maximize the success of the companies, while complicating the efforts to trace or dismantle their activities. The growth and resistance of the theft Lumma emphasize the broader evolution of cybercrime and emphasizes the need for layered protection and joint work to counteract threats.”

In an interview with G0NJXA security researcher in January 2025 developer for Lumma – Note They intended to stop operations until next fall. “We have done a lot of work for two years to achieve what we have now,” they said. “We are proud of this. It has become part of our daily life for us, not just work.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025

Chinese hackers operate the shortage of CityWorks Trimble to penetrate the US public networks

May 22, 2025

Unslaw the deficiencies of the Versa concert allow the attackers to avoid the dockery and the compromise host

May 22, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.