Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lumma Stealer Malware Returns After Takedown Attempt

Posted on July 23, 2025July 23, 2025 By CWS

The Lumma Stealer has returned after Microsoft and legislation enforcement induced vital disruption to its infrastructure, Development Micro reported on Tuesday.

Microsoft and legislation enforcement companies in a number of nations introduced in Could that they’d taken down and blocked 2,300 malicious domains that had “shaped the spine of the Lumma Stealer infrastructure”.

As well as, authorities managed to take management of the Lumma management panel, disrupting a crucial element of {the marketplace} used to purchase and promote entry to the malware. The connections between contaminated gadgets and the malware’s servers had been reduce off, stopping communication and information exfiltration. 

Lumma, which within the two months main as much as its takedown had contaminated almost 400,000 Home windows PCs worldwide, permits cybercriminals to steal private info, credentials, and monetary information from compromised methods.

Shortly after the legislation enforcement operation was introduced, the primary developer of the Lumma malware issued an announcement confirming that hundreds of domains had been seized.

The developer additionally mentioned information on servers had been erased, and a phishing web page was deployed to gather the IPs of the malware’s customers. Regulation enforcement additionally tried to achieve entry to customers’ webcams, probably in an effort to establish them.

The malware’s developer suspected that legislation enforcement had exploited a zero-day vulnerability to hack a server, however famous that the bodily machine couldn’t be seized resulting from it being situated in a rustic the place authorities don’t have entry.

Information collected by Development Micro confirmed that the cybercriminals rapidly began restoring the infrastructure, with a whole bunch of latest command and management (C&C) URLs noticed within the weeks after the takedown. Commercial. Scroll to proceed studying.

A number of vital adjustments have been noticed by the safety agency following the malware’s resurgence. 

By way of community infrastructure adjustments, Lumma Stealer is now relying much less on Cloudflare companies to obfuscate its domains. Some domains nonetheless use Cloudflare, however many at the moment are utilizing different service suppliers — together with ones based mostly in Russia — that might not be as prepared to work with legislation enforcement. 

As well as, Development Micro famous that the malware is being distributed by way of “extra discreet channels” within the post-disruption campaigns.

In current campaigns the Lumma malware has been distributed through web sites providing faux software program cracks, serial key mills, and free software program. Compromised web sites set as much as leverage the ClickFix technique have additionally been used for malware distribution.

The cybercriminals have additionally created GitHub accounts that serve the malware below the guise of recreation cheats. Social media posts on YouTube and Fb — in lots of instances providing software program cracks — have additionally been used for distribution.

“The power of Lumma Stealer’s operators to regroup and innovate poses a continued threat to organizations and people worldwide,” Development Micro mentioned. “This emphasizes the necessity for ongoing vigilance, proactive menace intelligence, and sustained collaboration between legislation enforcement and the cybersecurity group. With out this, even probably the most vital takedowns may solely provide momentary aid from evolving cyber threats.”

Associated: Iranian APT Targets Android Customers With New Variants of DCHSpy Spy ware

Associated: Google Sues Operators of 10-Million-Gadget Badbox 2.0 Botnet

Associated: Risk Actors Use SVG Smuggling for Browser-Native Redirection

Security Week News Tags:Attempt, Lumma, Malware, Returns, Stealer, Takedown

Post navigation

Previous Post: Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages
Next Post: High-Severity Flaws Patched in Chrome, Firefox

Related Posts

OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking Security Week News
Printer Company Procolored Served Infected Software for Months Security Week News
MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats  Security Week News
New Vulnerabilities Expose Millions of Brother Printers to Hacking Security Week News
GRC Firm Vanta Raises $150 Million at $4.15 Billion Valuation Security Week News
From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News