The group behind the Lumma infostealer has slowed activity after a coordinated doxing campaign from rival gangs
www.trendmicro.com/en_us/resear...
www.trendmicro.com/en_us/resear...
October 19, 2025 at 3:02 PM
Everybody can reply
3 reposts
13 likes
-CryLock couple profile
-Zendesk email bomb attacks
-20 ASNs responsible for most brute-force badness
-Lumma operators get doxxed
-APT35 linked to Shuhada base in Tehran
-AMD RDSEED vulnerability
-Dolby 0-click vuln
-ConnectWise security update
-SimpleHelp RCE
-Companies are getting deputy CISOs
-Zendesk email bomb attacks
-20 ASNs responsible for most brute-force badness
-Lumma operators get doxxed
-APT35 linked to Shuhada base in Tehran
-AMD RDSEED vulnerability
-Dolby 0-click vuln
-ConnectWise security update
-SimpleHelp RCE
-Companies are getting deputy CISOs
October 20, 2025 at 7:54 AM
Everybody can reply
2 reposts
9 likes
Normally when we hear about a malware operation being disrupted, it's because it has been shut down by the cops. But in the case of Lumma Stealer, it appears to have been sabotaged by other cybercriminals.
Read more on the Fortra blog: www.fortra.com/blog/cybercr...
Read more on the Fortra blog: www.fortra.com/blog/cybercr...
Cyber-criminals Turn on Each Other: The Story of Lumma Stealer's Collapse
A malware-as-a-service operation used to steal passwords and sensitive data has been sabotaged by other cyber-criminals.
www.fortra.com
October 22, 2025 at 5:12 PM
Everybody can reply
3 reposts
8 likes
2025-09-03 (Wednesday): #Kongtuke fake CAPTCHA page leads to #ClickFix style script for #LummaStealer
A #pcap of the infection traffic, the associated malware, and IOCs are at www.malware-traffic-analysis.net/2025/09/03/i...
A #pcap of the infection traffic, the associated malware, and IOCs are at www.malware-traffic-analysis.net/2025/09/03/i...
September 3, 2025 at 6:13 PM
Everybody can reply
4 reposts
6 likes
9/ Beyond #StarkIndustries, demand for TAE services is on the rise. Our recent Lumma report and others highlight this trend, which Insikt Group tracks through malicious infrastructure detection and our unique Network Intelligence. www.recordedfuture.com/research/beh...
Behind the Curtain: How Lumma Affiliates Operate
Explore a groundbreaking investigation into Lumma affiliates: uncover their tools, tactics, scams, and integration in the cybercriminal ecosystem. Essential reading for defenders.
www.recordedfuture.com
August 27, 2025 at 2:25 PM
Everybody can reply
2 likes
The investigation revealed previously undocumented tools and demonstrated that Lumma affiliates frequently operate multiple schemes simultaneously🕵️♂️
www.recordedfuture.com/research/beh...
#infosec #cybersecurity #malware #threatintel #dfir
www.recordedfuture.com/research/beh...
#infosec #cybersecurity #malware #threatintel #dfir
Behind the Curtain: How Lumma Affiliates Operate
Explore a groundbreaking investigation into Lumma affiliates: uncover their tools, tactics, scams, and integration in the cybercriminal ecosystem. Essential reading for defenders.
www.recordedfuture.com
August 22, 2025 at 10:37 AM
Everybody can reply
3 reposts
5 likes
Microsoft Threat Intelligence and Microsoft Defender Experts analyse the ClickFix social engineering technique. Campaigns target thousands of enterprise and consumer devices daily and attempt to deliver infostealers like Lumma. www.microsoft.com/en-us/securi...
August 22, 2025 at 10:08 AM
Everybody can reply
2 likes
🚨 Netskope Threat Labs observed a new malware campaign using fake CAPTCHAs to deliver Lumma Stealer.
Get the details on the latest campaign and the evasion techniques targeting Windows users worldwide. www.netskope.com/blog/lumma-s...
Get the details on the latest campaign and the evasion techniques targeting Windows users worldwide. www.netskope.com/blog/lumma-s...
Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection
Summary In January, Netskope Threat Labs observed a new malware campaign using fake CAPTCHAs to deliver Lumma Stealer. Lumma is a malware that works in
www.netskope.com
January 23, 2025 at 5:22 PM
Everybody can reply
1 likes
Lumma InfoStealer Spread via Weaponized PDFs Targeting Educational Institutions A recent cybersec...
https://cyberpress.org/lumma-infostealer-spread-via-weaponized-pdfs/
#Cyber #security/hashtag/Security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Security #newsef="/hashtag/News" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#News #Cybersecurity #Malware #Cyber #Security #Cyber #security #news
Event Attributes
https://cyberpress.org/lumma-infostealer-spread-via-weaponized-pdfs/
#Cyber #security/hashtag/Security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Security #newsef="/hashtag/News" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#News #Cybersecurity #Malware #Cyber #Security #Cyber #security #news
Event Attributes
February 18, 2025 at 6:41 PM
Everybody can reply
Dear YouTubers, keep an eye out still for fake agreements.
I'm doing my part in reporting the code-signing certificates on signed malware.
Low detection Lumma Stealer: www.virustotal.com/gui/file/24a...
bazaar.abuse.ch/sample/24a26...
I'm doing my part in reporting the code-signing certificates on signed malware.
Low detection Lumma Stealer: www.virustotal.com/gui/file/24a...
bazaar.abuse.ch/sample/24a26...
January 11, 2025 at 10:58 AM
Everybody can reply
2 likes
📌 Microsoft identifies complex malvertising attack distributing Lumma and other infostealers, infecting 1 million Windows users. Campaign uses GitHub to host malware. #CyberSecurity #Malware https://tinyurl.com/2dmvg9gh
Microsoft Identifies Complex Malvertising Campaign Affecting 1 Million Windows Users
Microsoft has identified a complex attack chain based on malvertising that has distributed Lumma and other infostealers to enterprise and consumer PC users. This campaign has infected 1 million Windows users. The campaign uses GitHub to host the malware and is considered a persistent threat. The impacts include the theft of sensitive information and the compromise of systems. This campaign is likely not the last of its kind.
tinyurl.com
March 11, 2025 at 7:20 PM
Everybody can reply
September 24, 2024 at 1:31 AM
Everybody can reply
1 likes
https://www.heise.de/news/Fast-400-000-PCs-infiziert-Microsoft-und-Europol-zerschlagen-Lumma-Malware-10393145.html?wt_mc=rss.red.ho.ho.atom.beitrag.beitrag
Result Details
Fast 400.000 PCs infiziert: Microsoft und Europol zerschlagen Lumma-Malware
Tausende Domains, Steam-Profile und Telegram-Kanäle nutzten die Malware-Betreiber – das ist vorerst vorbei. Europol lobt die Zusammenarbeit mit Microsoft.
www.heise.de
May 22, 2025 at 2:23 PM
Everybody can reply
SentinelOne's Mary Braden Murphy shows how ClickFix weaponizes verification fatigue to deliver RATs & infostealers. Tricking victims into infecting themselves this way has proven very effective,with threat actors increasingly adding the technique to their playbook www.sentinelone.com/blog/how-cli...
May 23, 2025 at 9:38 AM
Everybody can reply
Très grosse victoire pour Microsoft et Europol, qui font tomber Lumma Stealer, le malware favori des pirates.
www.clubic.com/actualite-56...
www.clubic.com/actualite-56...
Très grosse victoire pour Microsoft et Europol, qui font tomber Lumma Stealer, le malware favori des pirates
Microsoft et Europol ont uni leurs forces pour démanteler Lumma Stealer, le redoutable logiciel malveillant. Une victoire majeure pour la cybersécurité mondiale, et un coup dur pour les cybercriminels...
www.clubic.com
May 22, 2025 at 5:20 AM
Everybody can reply
4 reposts
4 likes
Lumma Stealer、偽CAPTCHAを使ったClickFix手法で拡散 | Codebook|Security News https://codebook.machinarecord.com/threatreport/38484/
April 23, 2025 at 8:03 AM
Everybody can reply
The latest update for #Tanium includes "CTI Roundup: Katz Stealer, Lumma, NailaoLocker" and "CTI Roundup: BlackSuit, AsyncRAT, HazyBeacon".
#cybersecurity #EndpointProtection #EndpointSecurity https://opsmtrs.com/3DH5Ks9
#cybersecurity #EndpointProtection #EndpointSecurity https://opsmtrs.com/3DH5Ks9
Tanium
Empowering the world’s largest organizations to manage and protect their mission-critical networks.
opsmtrs.com
August 4, 2025 at 4:29 AM
Everybody can reply
~Trendmicro~
A doxxing campaign against alleged Lumma Stealer (Water Kurita) operators has caused a sharp decline in activity, with customers migrating to alternatives like Vidar and StealC.
-
IOCs: (None identified)
-
...
A doxxing campaign against alleged Lumma Stealer (Water Kurita) operators has caused a sharp decline in activity, with customers migrating to alternatives like Vidar and StealC.
-
IOCs: (None identified)
-
...
Lumma Stealer Doxxing Leads to Decline
www.trendmicro.com
October 16, 2025 at 12:34 PM
Everybody can reply
January 27, 2025 at 8:38 AM
Everybody can reply
New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC)…
Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC)…
New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025. A notable aspect of the stealer malware is the use of a technique called dead drop
shoebhakim.com
February 24, 2025 at 6:26 PM
Everybody can reply
Netskope Threat Labs is tracking a new malware campaign that uses fake CAPTCHAs, multiple new websites employing malvertising, and multiple new payloads and evasion techniques to target Windows users worldwide with the infamous Lumma Stealer www.netskope.com/blog/lumma-s...
Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection
Summary In January, Netskope Threat Labs observed a new malware campaign using fake CAPTCHAs to deliver Lumma Stealer. Lumma is a malware that works in
www.netskope.com
January 27, 2025 at 11:19 AM
Everybody can reply
1 likes
Lumma Karima
An Era of political Resistance
An Era of political Resistance
December 19, 2024 at 8:49 PM
Everybody can reply
1 likes
Awesome to see Leandro's Lumma Stealer research highlighted in @forbes.com today www.forbes.com/sites/daveyw...
Don’t Complete The CAPTCHA Test—New Windows Password Theft Warning
Security experts have warned Windows users of a new data-stealing campaign that uses a dangerous CAPTCHA test to bypass security measures, grab your password, and more.
www.forbes.com
January 27, 2025 at 7:38 PM
Everybody can reply