Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs

Posted on July 19, 2025July 19, 2025 By CWS

The cybersecurity panorama continues to face important threats from refined data stealers, with Lumma rising as one of the crucial prevalent and harmful malware households focusing on each client and enterprise environments.

This malicious software program systematically harvests monumental volumes of delicate information from contaminated machines, together with login credentials, cryptocurrency pockets data, personally identifiable data, session tokens, and multifactor authentication tokens—basically any information saved inside net browsers turns into weak to extraction.

Developed by the risk actor often known as Shamel, additionally working underneath aliases lumma and HellsCoder, this Russian-based malware first surfaced on cybercriminal boards in 2022 and quickly gained market dominance on account of its effectiveness and stealth capabilities.

The malware’s attain is staggering, with Lumma’s devoted market internet hosting over 21,000 listings between April and June 2024, the place stolen information packages referred to as “logs” are bought to the best bidder.

Intel 471 analysts recognized widespread distribution campaigns the place victims are lured by way of searches for pirated software program, with attackers leveraging SEO methods and malicious promoting.

Google search resulting in the obtain of the Lumma infostealer (Supply – Intel471)

The an infection chain sometimes begins when customers seek for cracked purposes utilizing queries reminiscent of “obtain free cracked software program web site:google.com,” main them to compromised Google-hosted websites that finally ship the malware payload.

An infection chains (Supply – Intel471)

Technical An infection Mechanism and Evasion Ways

The malware employs a classy multi-stage deployment course of that begins with customers downloading ZIP archives containing password-protected secondary archives.

Upon extraction, victims encounter a Nullsoft Scriptable Set up System (NSIS) installer, sometimes named setup.exe or set-up.exe, which executes the Lumma payload full of the CypherIT crypter—a device designed to obfuscate malware signatures and evade safety detection.

As soon as energetic, Lumma implements superior evasion methods utilizing respectable Home windows utilities. The malware creates a command.exe occasion that executes closely obfuscated batch scripts, conducting setting reconnaissance by way of Tasklist and Findstr instructions.

This living-off-the-land method searches for energetic safety processes together with Bitdefender, ESET, Fast Heal, and Sophos—instantly terminating execution if detected.

Regardless of legislation enforcement disruption efforts in Might 2025 that seized over 2,300 domains and affected 394,000 contaminated machines globally, Lumma operators shortly restored infrastructure, demonstrating the persistent nature of this risk.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Browsers, Data, InfoStealer, Logs, Lumma, Markets, Selling, Steal, Stored, Underground

Post navigation

Previous Post: CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks
Next Post: New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Related Posts

New Malware Attack Leverages YouTube Channels and Discord to Harvest Credentials from Computer Cyber Security News
Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year Cyber Security News
AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic Cyber Security News
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Cyber Security News
Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Cyber Security News
New Report Uncover That Chinese Hackers Attempted To Compromise SentinelOne’s Own Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
  • Tycoon Phishing Kit Employs New Technique to Hide Malicious Links
  • Apple Seeks Researchers for 2026 iPhone Security Program
  • Bridgestone Confirms Cyberattack Impacts Manufacturing Facilities
  • NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
  • Tycoon Phishing Kit Employs New Technique to Hide Malicious Links
  • Apple Seeks Researchers for 2026 iPhone Security Program
  • Bridgestone Confirms Cyberattack Impacts Manufacturing Facilities
  • NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News