Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Posted on November 15, 2025November 15, 2025 By CWS

Lumma Stealer has emerged as a severe menace within the cybercrime world, concentrating on customers by way of faux software program updates and cracked functions.

This information-stealing malware targets the gathering on login particulars, fee card data, and cryptocurrency pockets knowledge from contaminated programs.

The malware spreads primarily by way of phishing emails, malicious commercials, and compromised web sites that trick customers into downloading what seems to be official software program.

What makes Lumma Stealer notably harmful is its means to steal knowledge from a number of net browsers, together with Chrome, Firefox, Edge, and Courageous.

The malware targets saved passwords, autofill data, shopping historical past, and cookies that include session tokens.

As soon as it positive factors entry to a system, it shortly scans for cryptocurrency pockets extensions and electronic mail shoppers to maximise the worth of stolen data.

Development Micro safety researchers recognized that the malware makes use of browser fingerprinting to gather detailed machine data and set up covert communication channels with its command-and-control servers.

The collected knowledge is packaged and despatched to distant servers managed by attackers, who then promote this data on darkish net markets or use it instantly for monetary fraud.

Victims typically stay unaware of the an infection till they discover unauthorized transactions or account compromises.

The malware operates silently within the background, making detection difficult for common customers who lack superior safety instruments.

New Lumma Stealer browser fingerprinting habits (Supply – Development Micro)

Organizations and people face vital dangers from Lumma Stealer infections, together with identification theft, monetary losses, and compromised enterprise accounts.

The malware continues to evolve with new variants showing frequently, making it a persistent menace within the present safety setting.

Browser Fingerprinting Approach

Lumma Stealer employs browser fingerprinting as each an information assortment technique and a communication safety measure.

The malware gathers particular browser attributes equivalent to display screen decision, put in fonts, time zone settings, and language preferences to create a novel machine profile.

This fingerprint helps attackers monitor contaminated machines and ensures that communication with command-and-control servers seems as common net visitors.

The fingerprinting course of additionally permits Lumma Stealer to establish probably the most beneficial targets by analyzing put in browser extensions and saved credentials.

The malware checks for safety software program and digital machine indicators to keep away from detection in evaluation environments, growing its survival price on actual consumer programs.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Collect, Communications, Data, Fingerprinting, Lumma, Server, Stealer, Stealthy

Post navigation

Previous Post: Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover
Next Post: Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report

Related Posts

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls Cyber Security News
Breaking Message Queuing (MSMQ) Functionality Affects IIS Sites Breaking Message Queuing (MSMQ) Functionality Affects IIS Sites Cyber Security News
CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation Cyber Security News
Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Cyber Security News
NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges Cyber Security News
New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ShinyHunters Allegedly Breaches Cisco Data
  • Hotel Booking Scam Targets Guests with Fake Payment Requests
  • CrystalX Malware-as-a-Service on Telegram Exposed
  • Agentic AI Tackles Identity Security Gaps
  • EtherRAT Malware Hides Using Ethereum Blockchain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ShinyHunters Allegedly Breaches Cisco Data
  • Hotel Booking Scam Targets Guests with Fake Payment Requests
  • CrystalX Malware-as-a-Service on Telegram Exposed
  • Agentic AI Tackles Identity Security Gaps
  • EtherRAT Malware Hides Using Ethereum Blockchain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark