A multi-stage stealer attack uses compromised legitimate sites to show fake CAPTCHA prompts, tricking users into running clipboard-pasted PowerShell commands delivering in-memory payloads via Donut shellcode. #ClickFix #CryptoHijack #LummaStealer
Microsoft uncovers a new ClickFix campaign exploiting Windows Terminal to deploy Lumma Stealer malware. Stay vigilant and avoid executing unsolicited commands. #CyberSecurity #ClickFix #LummaStealer Link: thedailytechfeed.com/microsoft-un...
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer reconbee.com/microsoft-re...
#microsoft #clickfixcampaign #clickfix #windows #lummastealer #malware #cyberattacks
Cybercriminals are using fake CAPTCHA prompts to deploy LummaStealer malware. Stay alert and follow best practices to protect your data. #CyberSecurity #MalwareAlert #LummaStealer Link: thedailytechfeed.com/cybercrimina...
📰 Infeksi LummaStealer Melonjak, Didistribusikan Lewat CastleLoader dan Teknik ClickFix
👉 Baca artikel lengkap di sini: ahmandonk.com/2026/02/13/lummastealer-...
#castleloader #clickfix #infostealer #keamanan #siber #lummastealer #malware #phishing
Once-hobbled #LummaStealer is back with lures that are hard to resist
arstechnica.com/security/2026/02/once-ho...
#malware #Castleloader #Lumma #cybersecurity
Lumma Stealer 가짜 캡차 구별하고 정보 유출 막는 5가지 방법
https://bit.ly/3Mr7eOS
#LummaStealer #루마스틸러 #클릭픽스 #해킹예방 #정보보안 #악성코드제거 #개인정보보호
Informationsdiebstahl mit Lumma-Stealer wieder aktiv
@Bitdefender_DE #BitdefenderLabs #Cybersecurity #Cybersicherheit #Informationsdiebstahl #LummaStealer #Malware #MalwareasaService @Bitdefender
netzpalaver.de/2026/...
Screenshot showing Google search results for a cracked version of ArcGIS where I specify site:drive.google.com. The results shown here all lead to PDF files hosted on Google Drive, and these PDF files contains links that lead to malware.
Here's an example of one of these PDF files hosted on Google Drive with a link that leads to malware.
Here's the page that pushes a password-protected 7-zip archive that contains an inflated EXE padded with null bytes. This EXE is for Lumma Stealer malware.
Lumma Stealer traffic generated by the extracted malware. This is filtered in Wireshark to focus on the Lumma Stealer C2 traffic.
2026-02-01 (Sunday): It's easy enough to find #LummaStealer malware samples.
Just do a Google search for cracked versions of popular software and specify site:drive.google.com.
Details on today's haul at github.com/malware-traf...
Dutch Police Arrest AVCheck Operator
Read More: buff.ly/VFU27iT
#OperationEndgame #AVCheck #MalwareAsAService #CybercrimeInfrastructure #Infostealers #LawEnforcement #ThreatDisruption #LummaStealer #CybercrimeOps
A screenshot of my blog post for the Lumma Stealer infection
Traffic from the Lumma Stealer infection filtered in Wireshark.
2026-01-01 (Thursday): #LummaStealer infection with follow-up malware. A #pcap of the infection traffic, the #Lumma #Stealer files, and a list of IOCs are available at www.malware-traffic-analysis.net/2026/01/01/i...
Screenshot of my blog post to share information on this Lumma Stealer infection with follow-up malware.
2025-12-30 (Tuesday): #LummaStealer infection with follow-up malware. A #pcap of the infection traffic, the associated #Lumma with follow-up #malware samples, and some IOCs are available at www.malware-traffic-analysis.net/2025/12/30/i...
Malicious Software Compromises 26000 Devices Across New Zealand #CredentialTheft #LummaStealer #malware
Beware of Lumma Stealer malware exploiting browser fingerprinting to steal sensitive data. Stay vigilant and protect your systems. #CyberSecurity #MalwareAlert #LummaStealer Link: thedailytechfeed.com/lumma-steale...
Lumma Stealer evolve con fingerprinting adattivo e injection browser per evasione e furto credenziali.
#browser #LummaStealer #TrendMicro
www.matricedigitale.it/2025/11/15/l...
~Trendmicro~
Lumma Stealer malware has resurged, adding browser fingerprinting to its C2 tactics for improved evasion and targeting.
-
IOCs: pabuloa. asia, jamelik. asia
-
#InfoStealer #LummaStealer #ThreatIntel
Y en un giro de los acontecimientos, un grupo rival (de infostealer presumiblemente) ataca y expone a la luz las identidades y detalles de los miembros de #Lumma, con información tan sensible como datos bancarios o número de pasaporte. Esto se une al compromiso de las cuentas de Telegram del […]
Rival hackers have doxxed the alleged operators behind #LummaStealer, one of the biggest data-theft malware services. The leaks have caused internal chaos and slowed its growth.
Read: hackread.com/rival-hacker...
#CyberSecurity #Malware #InfoStealers #InfoSec #CyberCrime
Il doxxing di Water Kurita ha destabilizzato Lumma Stealer, riducendo le operazioni e trasformando il mercato malware underground.
#doxxing #INFOSTEALER #LummaStealer #malware #WaterKurita
www.matricedigitale.it/2025/10/16/w...
TA585 usa MonsterV2 per attacchi mirati contro aziende finanziarie, controllando l’intera catena d’infezione con RAT, stealer e loader avanzati.
#ClickFix #LummaStealer #MonsterV2 #Proofpoint #Rhadamanthys #TA585
www.matricedigitale.it/2025/10/14/t...
Screenshot of the page from my website with the post for this information.
Example of path to download the initial 7-zip archive for the malware.
Page with the download for the initial 7-zip archive.
Traffic from the possible Rhadamanthys malware, filtered in Wireshark.
2025-10-01 (Wed) I've posted #malware samples and a #pcap of the post-infection traffic from an infection by possible #Rhadamanthys malware at www.malware-traffic-analysis.net/2025/10/01/i...
This is from a file disguised as a cracked version of software, and I usually see #LummaStealer from this.
Screesnhot of the page from my blog with the traffic, malware files, and indicators of compromise for this Lumma Stealer infection.
Downloading the initial zip archive for this malware.
Extracting the malware EXE from the nested archive files.
Traffic from an infection filtered in Wireshark.
2025-09-24 (Wednesday): #LummaStealer infection with follow-up malware, possibly #Ghostsocks or #GoBackdoor. A #pcap of the infection traffic, malware samples, and list of indicators available at www.malware-traffic-analysis.net/2025/09/24/i...
'Beyond Signatures: Detecting Lumma Stealer with an ML-Powered Sandbox'
www.netskope.com/blog/beyond-...
#CyberSecurity #LummaStealer #InfoStealers #MachineLearning #ML #Malware
Cybercriminals Hide Malware in Trusted Tools and File Formats, HP Wolf Security Warns #HPWolfSecurityreport2025 #Livingoffthelandattacks #LummaStealer
WhiteCobra infiltra 24 estensioni VSCode e Cursor con LummaStealer, rubando crypto e segreti. Campagna, caso zak.eth e difese tecniche.
#Cursor #Lumma #LummaStealer #OpenVSX #VSCode #WhiteCobra
www.matricedigitale.it/2025/09/15/w...
Settimana 6-12 settembre: in Italia Lumma Stealer domina, 532 IoC condivisi, truffa spoofing sventata a Cuneo. Focus finance e PA.
#CERTAgID #LummaStealer #phishing #PoliziadiStato #spoofing
www.matricedigitale.it/2025/09/13/l...
🚨 New #LummaStealer update (10.09) :
1️⃣ Bulk Google token recovery (Corporate plan)
2️⃣ Improved single Google token recovery (Professional plan)
3️⃣ Enhanced cleaning for Win10/11 + Cloud
#infosec #threatintel #DarkWeb
Check out the infrastructure movement of this #LummaStealer domain over the last 30 days... 👀
• 14 unique IP addresses
• 9 Unique ASN's
• Mix of bulletproof hosting providers and "regular" cloud providers
• IPs are typically linked to dozens of domains at a time
Threat actors continue to abuse GitHub to deliver malware, this time: #LummaStealer. We identified GitHub notification emails that kick off the attack chain. Messages are sent when the threat actor, using an actor-controlled account, comments on existing GitHub issues. 🧵