Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs

Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs

Posted on July 19, 2025July 19, 2025 By CWS

The cybersecurity panorama continues to face important threats from refined data stealers, with Lumma rising as one of the crucial prevalent and harmful malware households focusing on each client and enterprise environments.

This malicious software program systematically harvests monumental volumes of delicate information from contaminated machines, together with login credentials, cryptocurrency pockets data, personally identifiable data, session tokens, and multifactor authentication tokens—basically any information saved inside net browsers turns into weak to extraction.

Developed by the risk actor often known as Shamel, additionally working underneath aliases lumma and HellsCoder, this Russian-based malware first surfaced on cybercriminal boards in 2022 and quickly gained market dominance on account of its effectiveness and stealth capabilities.

The malware’s attain is staggering, with Lumma’s devoted market internet hosting over 21,000 listings between April and June 2024, the place stolen information packages referred to as “logs” are bought to the best bidder.

Intel 471 analysts recognized widespread distribution campaigns the place victims are lured by way of searches for pirated software program, with attackers leveraging SEO methods and malicious promoting.

Google search resulting in the obtain of the Lumma infostealer (Supply – Intel471)

The an infection chain sometimes begins when customers seek for cracked purposes utilizing queries reminiscent of “obtain free cracked software program web site:google.com,” main them to compromised Google-hosted websites that finally ship the malware payload.

An infection chains (Supply – Intel471)

Technical An infection Mechanism and Evasion Ways

The malware employs a classy multi-stage deployment course of that begins with customers downloading ZIP archives containing password-protected secondary archives.

Upon extraction, victims encounter a Nullsoft Scriptable Set up System (NSIS) installer, sometimes named setup.exe or set-up.exe, which executes the Lumma payload full of the CypherIT crypter—a device designed to obfuscate malware signatures and evade safety detection.

As soon as energetic, Lumma implements superior evasion methods utilizing respectable Home windows utilities. The malware creates a command.exe occasion that executes closely obfuscated batch scripts, conducting setting reconnaissance by way of Tasklist and Findstr instructions.

This living-off-the-land method searches for energetic safety processes together with Bitdefender, ESET, Fast Heal, and Sophos—instantly terminating execution if detected.

Regardless of legislation enforcement disruption efforts in Might 2025 that seized over 2,300 domains and affected 394,000 contaminated machines globally, Lumma operators shortly restored infrastructure, demonstrating the persistent nature of this risk.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Browsers, Data, InfoStealer, Logs, Lumma, Markets, Selling, Steal, Stored, Underground

Post navigation

Previous Post: CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks
Next Post: New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Related Posts

Netwrix Password Manager Vulnerability Allows Authenticated Remote Code Execution Netwrix Password Manager Vulnerability Allows Authenticated Remote Code Execution Cyber Security News
Netflix Acquires Warner Bros. Studios and HBO in Landmark .7 Billion Megadeal Netflix Acquires Warner Bros. Studios and HBO in Landmark $82.7 Billion Megadeal Cyber Security News
NX Build Tool Hacked with Malware That Checks for Claude or Gemini to Find Wallets and Secrets NX Build Tool Hacked with Malware That Checks for Claude or Gemini to Find Wallets and Secrets Cyber Security News
G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload Cyber Security News
Firefox 148 Debuts Sanitizer API to Curb XSS Threat Firefox 148 Debuts Sanitizer API to Curb XSS Threat Cyber Security News
Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark