Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Posted on November 15, 2025November 15, 2025 By CWS

Lumma Stealer has emerged as a severe menace within the cybercrime world, concentrating on customers by way of faux software program updates and cracked functions.

This information-stealing malware targets the gathering on login particulars, fee card data, and cryptocurrency pockets knowledge from contaminated programs.

The malware spreads primarily by way of phishing emails, malicious commercials, and compromised web sites that trick customers into downloading what seems to be official software program.

What makes Lumma Stealer notably harmful is its means to steal knowledge from a number of net browsers, together with Chrome, Firefox, Edge, and Courageous.

The malware targets saved passwords, autofill data, shopping historical past, and cookies that include session tokens.

As soon as it positive factors entry to a system, it shortly scans for cryptocurrency pockets extensions and electronic mail shoppers to maximise the worth of stolen data.

Development Micro safety researchers recognized that the malware makes use of browser fingerprinting to gather detailed machine data and set up covert communication channels with its command-and-control servers.

The collected knowledge is packaged and despatched to distant servers managed by attackers, who then promote this data on darkish net markets or use it instantly for monetary fraud.

Victims typically stay unaware of the an infection till they discover unauthorized transactions or account compromises.

The malware operates silently within the background, making detection difficult for common customers who lack superior safety instruments.

New Lumma Stealer browser fingerprinting habits (Supply – Development Micro)

Organizations and people face vital dangers from Lumma Stealer infections, together with identification theft, monetary losses, and compromised enterprise accounts.

The malware continues to evolve with new variants showing frequently, making it a persistent menace within the present safety setting.

Browser Fingerprinting Approach

Lumma Stealer employs browser fingerprinting as each an information assortment technique and a communication safety measure.

The malware gathers particular browser attributes equivalent to display screen decision, put in fonts, time zone settings, and language preferences to create a novel machine profile.

This fingerprint helps attackers monitor contaminated machines and ensures that communication with command-and-control servers seems as common net visitors.

The fingerprinting course of additionally permits Lumma Stealer to establish probably the most beneficial targets by analyzing put in browser extensions and saved credentials.

The malware checks for safety software program and digital machine indicators to keep away from detection in evaluation environments, growing its survival price on actual consumer programs.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Collect, Communications, Data, Fingerprinting, Lumma, Server, Stealer, Stealthy

Post navigation

Previous Post: Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover
Next Post: Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report

Related Posts

Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access Cyber Security News
Alleged Ransomware Attack on Apple’s Second-Largest Manufacturer Luxshare Alleged Ransomware Attack on Apple’s Second-Largest Manufacturer Luxshare Cyber Security News
AI Accelerates Zero-Day Exploits, Increasing Cyber Risks AI Accelerates Zero-Day Exploits, Increasing Cyber Risks Cyber Security News
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Cyber Security News
Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer Cyber Security News
Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark