Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files

Posted on July 23, 2025July 23, 2025 By CWS

The transient lull following Could’s multinational takedown of the Lumma Stealer infrastructure proved misleading.

Inside weeks, telemetry once more lit up with contemporary command-and-control (C2) beacons, revealing that the information-stealing malware had swapped overt market promotion for quieter channels whereas increasing its sufferer base.

In its new incarnation, Lumma is most frequently packaged inside counterfeit installers for sought-after software program, luring customers who seek for “cracks,” “keygens,” or recreation cheats into downloading the Trojan as a substitute of the promised free software.

Pattern web site the place Lumma might be downloaded (Supply – Trendmicro)

As soon as a sufferer lands on certainly one of these fraudulent portals, JavaScript silently redirects the browser by way of a visitors distribution system that fingerprints the host.

If {hardware}, locale, and safety controls look worthwhile, the positioning serves a password-protected ZIP containing an innocuous-looking executable or PowerShell script engineered to bootstrap Lumma Stealer, all whereas evading informal inspection.

Pattern Micro researchers famous that June and July telemetry confirmed a rebound to pre-takedown volumes of focused accounts, underlining each the malware’s resilience and the dimensions of customers nonetheless attempting to find pirated apps.

Pattern Micro analysts additionally recognized a parallel push on GitHub and social platforms: routinely generated repositories promote “HWID spoofers” or “Photoshop 2025 full crack,” but the one launch asset is the Lumma payload.

Mechanically generated repository with Lumma file ‘TempSpoofer.exe’ (Supply – Trendmicro)

YouTube movies and Fb posts amplify these hyperlinks, instructing viewers to disable antivirus earlier than set up—a social-engineering contact that additional stacks the percentages in attackers’ favor.

The results are extreme, as they as soon as executed, Lumma harvests browser cookies, crypto-wallet recordsdata, and cloud-storage session tokens, then exfiltrates them through an encrypted C2 channel.

Company accounts protected by multifactor authentication usually are not immune; stolen cookies usually bypass login prompts, giving intruders instant entry to electronic mail, collaboration portals, or source-code repositories.

An infection Mechanism: Reminiscence-Solely Payload Supply

The present campaigns favor a file-less method that frustrates endpoint detection logic tuned to disk artefacts.

In ClickFix-style drives, compromised web sites swap their regular content material for a bogus CAPTCHA web page.

Victims are informed to press Win + R and run a single-line PowerShell command, unwittingly spawning an in-memory loader that performs an XOR decrypt of an embedded .NET meeting—Lumma itself—then calls its entry level with out ever touching the filesystem.

Script Executed by the Clickfix marketing campaign (Supply – Trendmicro)

A condensed excerpt illustrates the core routine:-

$xorKey = [Convert]::FromBase64String(“Q0YwbG5IaUY4YmpEdw==”)
$enc = 0x0E,0x10,0xA0,0x6C,0x60,0x48,0x69,0x46
$buf = New-Object byte[] $enc.Size
for ($i=0;$i -lt $enc.Size;$i++){
$buf[$i] = $enc[$i] -bxor $xorKey[$i % $xorKey.Length]
}
[Reflection.Assembly]::Load($buf).EntryPoint.Invoke($null,@())

As a result of no executable is dropped, conventional anti-virus scanners that depend on hash-based signatures not often set off.

Community inspection fares little higher: C2 domains rotate by way of lesser-known Russian internet hosting suppliers equivalent to Selectel, sidestepping earlier Cloudflare takedown vectors whereas nonetheless having fun with TLS camouflage.

In the end, Lumma’s resurgence exhibits that supply-chain model malvertising and memory-resident loaders can preserve a MaaS operation alive even after sweeping infrastructure seizures.

Safety groups should mix person schooling about pirated software program with behavioral telemetry that flags suspicious child-process creation and outbound TLS beacons to unfamiliar domains in the event that they hope to shut the window that Lumma Stealer so deftly exploits.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Cracked, Credentials, Fake, Files, Login, Lumma, Private, Software, Stealer, Steals

Post navigation

Previous Post: Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
Next Post: How to Recognize Fake Reviews and Scams

Related Posts

Windows BitLocker Bypass Vulnerability Let Attackers Bypass Security Feature Cyber Security News
Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Cyber Security News
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News
CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits Cyber Security News
Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News