Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs

Posted on July 19, 2025July 19, 2025 By CWS

The cybersecurity panorama continues to face important threats from refined data stealers, with Lumma rising as one of the crucial prevalent and harmful malware households focusing on each client and enterprise environments.

This malicious software program systematically harvests monumental volumes of delicate information from contaminated machines, together with login credentials, cryptocurrency pockets data, personally identifiable data, session tokens, and multifactor authentication tokens—basically any information saved inside net browsers turns into weak to extraction.

Developed by the risk actor often known as Shamel, additionally working underneath aliases lumma and HellsCoder, this Russian-based malware first surfaced on cybercriminal boards in 2022 and quickly gained market dominance on account of its effectiveness and stealth capabilities.

The malware’s attain is staggering, with Lumma’s devoted market internet hosting over 21,000 listings between April and June 2024, the place stolen information packages referred to as “logs” are bought to the best bidder.

Intel 471 analysts recognized widespread distribution campaigns the place victims are lured by way of searches for pirated software program, with attackers leveraging SEO methods and malicious promoting.

Google search resulting in the obtain of the Lumma infostealer (Supply – Intel471)

The an infection chain sometimes begins when customers seek for cracked purposes utilizing queries reminiscent of “obtain free cracked software program web site:google.com,” main them to compromised Google-hosted websites that finally ship the malware payload.

An infection chains (Supply – Intel471)

Technical An infection Mechanism and Evasion Ways

The malware employs a classy multi-stage deployment course of that begins with customers downloading ZIP archives containing password-protected secondary archives.

Upon extraction, victims encounter a Nullsoft Scriptable Set up System (NSIS) installer, sometimes named setup.exe or set-up.exe, which executes the Lumma payload full of the CypherIT crypter—a device designed to obfuscate malware signatures and evade safety detection.

As soon as energetic, Lumma implements superior evasion methods utilizing respectable Home windows utilities. The malware creates a command.exe occasion that executes closely obfuscated batch scripts, conducting setting reconnaissance by way of Tasklist and Findstr instructions.

This living-off-the-land method searches for energetic safety processes together with Bitdefender, ESET, Fast Heal, and Sophos—instantly terminating execution if detected.

Regardless of legislation enforcement disruption efforts in Might 2025 that seized over 2,300 domains and affected 394,000 contaminated machines globally, Lumma operators shortly restored infrastructure, demonstrating the persistent nature of this risk.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Browsers, Data, InfoStealer, Logs, Lumma, Markets, Selling, Steal, Stored, Underground

Post navigation

Previous Post: CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks
Next Post: New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Related Posts

Malware Defense 101 – Identifying and Removing Modern Threats Cyber Security News
CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks Cyber Security News
Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Cyber Security News
NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks Cyber Security News
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy Cyber Security News
Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT
  • Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
  • Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’
  • How Threat Intelligence Can Save Money and Resources for Businesses
  • Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT
  • Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
  • Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’
  • How Threat Intelligence Can Save Money and Resources for Businesses
  • Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News