Advertisement · 728 × 90
#
Hashtag
#Lumma
Advertisement · 728 × 90
Original post on webpronews.com

The Fake Google Security Alert That Can Drain Your Passwords: Inside the ClickFix Cyberattack Sweeping the Web A sophisticated cyberattack campaign uses fake Google security verification pages to t...

#CybersecurityUpdate #ClickFix #attack #fake #Google […]

[Original post on webpronews.com]

0 0 0 0

Once-hobbled #LummaStealer is back with lures that are hard to resist

arstechnica.com/security/2026/02/once-ho...

#malware #Castleloader #Lumma #cybersecurity

0 0 0 0

Once-hobbled Lumma Stealer is back with lures that are hard to resist https://arstechni.ca #castleloader #infostealer #Security #clickfix #malware #Biz&IT #lumma

0 0 0 0
A screenshot of my blog post for the Lumma Stealer infection

A screenshot of my blog post for the Lumma Stealer infection

Traffic from the Lumma Stealer infection filtered in Wireshark.

Traffic from the Lumma Stealer infection filtered in Wireshark.

2026-01-01 (Thursday): #LummaStealer infection with follow-up malware. A #pcap of the infection traffic, the #Lumma #Stealer files, and a list of IOCs are available at www.malware-traffic-analysis.net/2026/01/01/i...

3 1 0 0
Screenshot of my blog post to share information on this Lumma Stealer infection with follow-up malware.

Screenshot of my blog post to share information on this Lumma Stealer infection with follow-up malware.

2025-12-30 (Tuesday): #LummaStealer infection with follow-up malware. A #pcap of the infection traffic, the associated #Lumma with follow-up #malware samples, and some IOCs are available at www.malware-traffic-analysis.net/2025/12/30/i...

7 3 0 0
Video

Blow in and clear blend in a repaired Range Rover Lumma CLR RS.

##iwata ##axalta ##fyp #spraypainting ##spraypainter #lumma ##rangerover

0 0 0 0
Original post on masto.es

Y en un giro de los acontecimientos, un grupo rival (de infostealer presumiblemente) ataca y expone a la luz las identidades y detalles de los miembros de #Lumma, con información tan sensible como datos bancarios o número de pasaporte. Esto se une al compromiso de las cuentas de Telegram del […]

0 0 0 0
Post image

Compromised YouTube Accounts Used to Distribute Infostealer Malware More than 3,000 malicious YouTube videos were used to distribute infostealer malware, according to a new report detailing the ope...

#Cyber #News #Firewall #Daily #infostealer #Lumma […]

[Original post on thecyberexpress.com]

0 0 0 0
Post image

Check Point Research scopre la YouTube Ghost Network: 3.000 video malevoli diffondono malware come Rhadamanthys e Lumma tramite tutorial falsi e crack software.

#CheckPointResearch #GhostNetwork #INFOSTEALER #Lumma #Rhadamanthys #Youtube
www.matricedigitale.it/2025/10/23/y...

0 2 0 0
Preview
Rede ‘Fantasma’ no YouTube: Milhares de vídeos com malware removidos pela Google

Rede ‘Fantasma’ no YouTube: Milhares de vídeos com malware removidos pela Google

#Adobe #criptomoedas #Github #google #Lumma #malware #phishing #Photoshop #Roblox #segurança #servidores #software #tutoriais #youtube

0 2 0 0
Preview
Hackers usam blockchain para distribuir malware que rouba dados em Windows e macOS

Hackers usam blockchain para distribuir malware que rouba dados em Windows e macOS

#armazenamento #ataque #blockchain #browser #detetado #engenhariasocial #google #hackers #javascript #Lumma #macos #malware #payload #proxy #sem #servidor #software #windows #WordPress

1 1 0 0
Elastic's nightMARE Malware Analysis Library

~Elastic~
Elastic details its nightMARE library for malware analysis, demonstrating C2 extraction from Lumma Stealer.
-
IOCs: mocadia. com, mastwin. in, ordinarniyvrach. ru
-
#Lumma #MalwareAnalysis #ThreatIntel

0 0 0 0

#CyberNews

🚨 Arriva anche in Italia l’attacco #ClickFix, che mira a distribuire infostealer #Lumma, con una interessante caratteristica:
▪️ il payload si trova dentro la #blockchain, uno smart contract in mano ai criminali;
Si fa strada tra Wordpress vulnerabili di siti ad alto traffico ⬇️

1 1 0 0
Post image

🚨 #ThreatIntel: Operators of #Lumma Stealer warn that their former contacts (@lummanowork / @lummaseller128) are no longer valid — accounts deleted & usernames hijacked.
#infosec

1 0 0 0
Malicious WhiteCobra VSCode Extensions Deploy Lumma Stealer

Malicious WhiteCobra VSCode Extensions Deploy Lumma Stealer

Researchers uncovered that at least 24 malicious VS Code extensions were published on the Visual Studio Marketplace and Open VSX Registry, delivering Lumma stealer to Windows and macOS machines. Read more: getnews.me/malicious-whitecobra-vsc... #vscode #lumma

1 0 0 0
Post image

WhiteCobra infiltra 24 estensioni VSCode e Cursor con LummaStealer, rubando crypto e segreti. Campagna, caso zak.eth e difese tecniche.

#Cursor #Lumma #LummaStealer #OpenVSX #VSCode #WhiteCobra
www.matricedigitale.it/2025/09/15/w...

0 0 0 0
Post image

August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malware d...

#detection #updates #CryptBot #lumma #phishing #Rhaamanthys #StealC #v2

Origin | Interest | Match

0 0 0 0
Post image

The downloaded file is always named “fix.zip”, which contains “x86_64-w64-ranlib.exe” and “msvcp140.dll”. If the executable is run, it launches #Lumma via “msbuild.exe”.

0 0 1 0
Post image

🚨 Lumma Stealer resurfaces on the dark web.
🕊 Update 30.08:
1️⃣ App-based upload support
2️⃣ Enhanced cleaning for Win10/11 + Cloud
#infosec #threatintel #lumma

1 0 0 0

This first-of-its-kind analysis from @julianferdinand.bsky.social
highlighted a plethora of enabling services used by #Lumma affiliates to conduct their operations, including bulletproof hosting services such as anonrdp, which operates in plain sight.

3 2 1 0

🔎 A day in the life of a #Lumma malware operator... this is a must-read! 💪

3 1 0 0
Screenshot of a Facebook post that linked to a page providing the password-protected 7-zip archive for Lumma Stealer.  The archive is named "NCH Debut Video Capture Software Pro 11.2 Beta Crack full version.7z" in an attempt to disguise it as a software crack.

Screenshot of a Facebook post that linked to a page providing the password-protected 7-zip archive for Lumma Stealer. The archive is named "NCH Debut Video Capture Software Pro 11.2 Beta Crack full version.7z" in an attempt to disguise it as a software crack.

Extracting a malicious Windows executable file that will install Lumma Stealer from the password-protected 7-zip archive.  The extracted file is named "NCH Debut Video Capture Software Pro 11.2 Beta Crack full version.exe" in an attempt to disguise it as a software crack.

Extracting a malicious Windows executable file that will install Lumma Stealer from the password-protected 7-zip archive. The extracted file is named "NCH Debut Video Capture Software Pro 11.2 Beta Crack full version.exe" in an attempt to disguise it as a software crack.

Traffic from the Lumma Stealer infection after running "NCH Debut Video Capture Software Pro 11.2 Beta Crack full version.exe" on a vulnerable Windows host.  Note the unusual DNS query for iUlWkftUnbTjqPSDLGsNPpSG.iUlWkftUnbTjqPSDLGsNPpSG that happened before the HTTPS Lumma Stealer C2 traffic to secrequ[.]top.

Traffic from the Lumma Stealer infection after running "NCH Debut Video Capture Software Pro 11.2 Beta Crack full version.exe" on a vulnerable Windows host. Note the unusual DNS query for iUlWkftUnbTjqPSDLGsNPpSG.iUlWkftUnbTjqPSDLGsNPpSG that happened before the HTTPS Lumma Stealer C2 traffic to secrequ[.]top.

Files seen from the Lumma Stealer infection in the user's AppData\Local\Temp directory.  The .a3x file for Lumma Stealer wasn't on the disk when I conducted forensic analysis on the infected host.  Note that the file names and file extension (.midi) will be different if I try the same type of infection run again tomorrow.

Files seen from the Lumma Stealer infection in the user's AppData\Local\Temp directory. The .a3x file for Lumma Stealer wasn't on the disk when I conducted forensic analysis on the infected host. Note that the file names and file extension (.midi) will be different if I try the same type of infection run again tomorrow.

2025-08-13 (Wednesday): #LummaStealer infection. The associated #malware, artifacts, a #pcap of the #Lumma Stealer traffic, and indicators of compromise are available at www.malware-traffic-analysis.net/2025/08/13/i...

5 2 0 0

2025-08-01 (Friday): Some info on a #LummaStealer example I found today:

github.com/malware-traf...

#Lumma

1 2 1 0
Post image

Seems like quite some internal systems were infected by InfoStealers.
Quite the irony given the fact that #infostealer like #Lumma, #RedLine, #Raccoon, #Vidar are russion developed and operated #CybercrimeAsaService platforms.

0 0 0 0

#BREAKING #ESETresearch can confirm the news of #Lumma Stealer's revival. ESET telemetry and botnet tracking show that operators are rebuilding their infrastructure, with their renewed activity reaching similar levels to those before the #disruption in May 2025. 1/6

5 5 1 1
Awakari App

Lumma Stealer Malware Returns After Takedown Attempt The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s infrastructure. The post Lumm...

#Malware #& #Threats #Lumma #Stealer #malware #Resurge #return #takedown

Origin | Interest | Match

0 0 0 0
Preview
Lumma infostealer malware returns after law enforcement disruption The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May, which resulted in the seizure of 2,300 domains and parts of its infrastructure.

Lumma infostealer malware returns after law enforcement disruption The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May, which resulted in the seizure of... @cosmicmeta.ai #Lumma

https://u2m.io/uQpyZtnD

0 0 0 0