Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Posted on November 15, 2025November 15, 2025 By CWS

Lumma Stealer has emerged as a severe menace within the cybercrime world, concentrating on customers by way of faux software program updates and cracked functions.

This information-stealing malware targets the gathering on login particulars, fee card data, and cryptocurrency pockets knowledge from contaminated programs.

The malware spreads primarily by way of phishing emails, malicious commercials, and compromised web sites that trick customers into downloading what seems to be official software program.

What makes Lumma Stealer notably harmful is its means to steal knowledge from a number of net browsers, together with Chrome, Firefox, Edge, and Courageous.

The malware targets saved passwords, autofill data, shopping historical past, and cookies that include session tokens.

As soon as it positive factors entry to a system, it shortly scans for cryptocurrency pockets extensions and electronic mail shoppers to maximise the worth of stolen data.

Development Micro safety researchers recognized that the malware makes use of browser fingerprinting to gather detailed machine data and set up covert communication channels with its command-and-control servers.

The collected knowledge is packaged and despatched to distant servers managed by attackers, who then promote this data on darkish net markets or use it instantly for monetary fraud.

Victims typically stay unaware of the an infection till they discover unauthorized transactions or account compromises.

The malware operates silently within the background, making detection difficult for common customers who lack superior safety instruments.

New Lumma Stealer browser fingerprinting habits (Supply – Development Micro)

Organizations and people face vital dangers from Lumma Stealer infections, together with identification theft, monetary losses, and compromised enterprise accounts.

The malware continues to evolve with new variants showing frequently, making it a persistent menace within the present safety setting.

Browser Fingerprinting Approach

Lumma Stealer employs browser fingerprinting as each an information assortment technique and a communication safety measure.

The malware gathers particular browser attributes equivalent to display screen decision, put in fonts, time zone settings, and language preferences to create a novel machine profile.

This fingerprint helps attackers monitor contaminated machines and ensures that communication with command-and-control servers seems as common net visitors.

The fingerprinting course of additionally permits Lumma Stealer to establish probably the most beneficial targets by analyzing put in browser extensions and saved credentials.

The malware checks for safety software program and digital machine indicators to keep away from detection in evaluation environments, growing its survival price on actual consumer programs.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Collect, Communications, Data, Fingerprinting, Lumma, Server, Stealer, Stealthy

Post navigation

Previous Post: Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover
Next Post: Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report

Related Posts

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer Cyber Security News
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes Cyber Security News
Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Cyber Security News
VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News
New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies Cyber Security News
CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report
  • Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications
  • Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover
  • Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability
  • Beware of Phishing Emails as Spam Filter Alerts Steal Your Email Logins in a Blink

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report
  • Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications
  • Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover
  • Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability
  • Beware of Phishing Emails as Spam Filter Alerts Steal Your Email Logins in a Blink

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News