Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Posted on November 15, 2025November 15, 2025 By CWS

Lumma Stealer has emerged as a severe menace within the cybercrime world, concentrating on customers by way of faux software program updates and cracked functions.

This information-stealing malware targets the gathering on login particulars, fee card data, and cryptocurrency pockets knowledge from contaminated programs.

The malware spreads primarily by way of phishing emails, malicious commercials, and compromised web sites that trick customers into downloading what seems to be official software program.

What makes Lumma Stealer notably harmful is its means to steal knowledge from a number of net browsers, together with Chrome, Firefox, Edge, and Courageous.

The malware targets saved passwords, autofill data, shopping historical past, and cookies that include session tokens.

As soon as it positive factors entry to a system, it shortly scans for cryptocurrency pockets extensions and electronic mail shoppers to maximise the worth of stolen data.

Development Micro safety researchers recognized that the malware makes use of browser fingerprinting to gather detailed machine data and set up covert communication channels with its command-and-control servers.

The collected knowledge is packaged and despatched to distant servers managed by attackers, who then promote this data on darkish net markets or use it instantly for monetary fraud.

Victims typically stay unaware of the an infection till they discover unauthorized transactions or account compromises.

The malware operates silently within the background, making detection difficult for common customers who lack superior safety instruments.

New Lumma Stealer browser fingerprinting habits (Supply – Development Micro)

Organizations and people face vital dangers from Lumma Stealer infections, together with identification theft, monetary losses, and compromised enterprise accounts.

The malware continues to evolve with new variants showing frequently, making it a persistent menace within the present safety setting.

Browser Fingerprinting Approach

Lumma Stealer employs browser fingerprinting as each an information assortment technique and a communication safety measure.

The malware gathers particular browser attributes equivalent to display screen decision, put in fonts, time zone settings, and language preferences to create a novel machine profile.

This fingerprint helps attackers monitor contaminated machines and ensures that communication with command-and-control servers seems as common net visitors.

The fingerprinting course of additionally permits Lumma Stealer to establish probably the most beneficial targets by analyzing put in browser extensions and saved credentials.

The malware checks for safety software program and digital machine indicators to keep away from detection in evaluation environments, growing its survival price on actual consumer programs.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Collect, Communications, Data, Fingerprinting, Lumma, Server, Stealer, Stealthy

Post navigation

Previous Post: Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover
Next Post: Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report

Related Posts

Threat Actors Pioneering a New Operational Model That Combines Digital and Physical Threats Threat Actors Pioneering a New Operational Model That Combines Digital and Physical Threats Cyber Security News
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data Cyber Security News
New Critical n8n Vulnerability Allow Attackers to Execute Arbitrary Commands New Critical n8n Vulnerability Allow Attackers to Execute Arbitrary Commands Cyber Security News
Critical React Router Vulnerability Let Attackers Access or Modify Server Files Critical React Router Vulnerability Let Attackers Access or Modify Server Files Cyber Security News
EV Charging Provider Confirm Data Breach EV Charging Provider Confirm Data Breach Cyber Security News
10 Best AI penetration Testing Companies in 2025 10 Best AI penetration Testing Companies in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News