Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Posted on November 15, 2025November 15, 2025 By CWS

Lumma Stealer has emerged as a severe menace within the cybercrime world, concentrating on customers by way of faux software program updates and cracked functions.

This information-stealing malware targets the gathering on login particulars, fee card data, and cryptocurrency pockets knowledge from contaminated programs.

The malware spreads primarily by way of phishing emails, malicious commercials, and compromised web sites that trick customers into downloading what seems to be official software program.

What makes Lumma Stealer notably harmful is its means to steal knowledge from a number of net browsers, together with Chrome, Firefox, Edge, and Courageous.

The malware targets saved passwords, autofill data, shopping historical past, and cookies that include session tokens.

As soon as it positive factors entry to a system, it shortly scans for cryptocurrency pockets extensions and electronic mail shoppers to maximise the worth of stolen data.

Development Micro safety researchers recognized that the malware makes use of browser fingerprinting to gather detailed machine data and set up covert communication channels with its command-and-control servers.

The collected knowledge is packaged and despatched to distant servers managed by attackers, who then promote this data on darkish net markets or use it instantly for monetary fraud.

Victims typically stay unaware of the an infection till they discover unauthorized transactions or account compromises.

The malware operates silently within the background, making detection difficult for common customers who lack superior safety instruments.

New Lumma Stealer browser fingerprinting habits (Supply – Development Micro)

Organizations and people face vital dangers from Lumma Stealer infections, together with identification theft, monetary losses, and compromised enterprise accounts.

The malware continues to evolve with new variants showing frequently, making it a persistent menace within the present safety setting.

Browser Fingerprinting Approach

Lumma Stealer employs browser fingerprinting as each an information assortment technique and a communication safety measure.

The malware gathers particular browser attributes equivalent to display screen decision, put in fonts, time zone settings, and language preferences to create a novel machine profile.

This fingerprint helps attackers monitor contaminated machines and ensures that communication with command-and-control servers seems as common net visitors.

The fingerprinting course of additionally permits Lumma Stealer to establish probably the most beneficial targets by analyzing put in browser extensions and saved credentials.

The malware checks for safety software program and digital machine indicators to keep away from detection in evaluation environments, growing its survival price on actual consumer programs.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Collect, Communications, Data, Fingerprinting, Lumma, Server, Stealer, Stealthy

Post navigation

Previous Post: Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover
Next Post: Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report

Related Posts

PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution Cyber Security News
Microsoft Patch Tuesday June 2025 Cyber Security News
AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID Cyber Security News
1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files Cyber Security News
macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC Cyber Security News
Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark