Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

Posted on September 8, 2025September 8, 2025 By CWS

Safety researchers first noticed LunaLock in early September 2025, a complicated ransomware pressure focusing on unbiased illustrators and digital artists.

Leveraging compromised credentials and social engineering, the group behind LunaLock has zeroed in on a distinct segment market—Artists & Purchasers—the place freelance creators change customized commissions.

Preliminary intrusion concerned spear-phishing campaigns disguised as royalty notifications, engaging victims to obtain trojanized ‘bill’ attachments.

As soon as executed, the payload establishes a foothold and begins reconnaissance of artwork belongings and consumer databases, all whereas making ready for speedy encryption.

VenariX analysts recognized LunaLock’s multi-stage deployment after correlating uncommon outbound HTTP requests from artist workstations with the timing of mass file encryption.

Their telemetry revealed that the malware extracts consumer tokens from Microsoft Groups and Slack purchasers, permitting lateral motion throughout shared design repositories and mission administration platforms.

Victims report encrypted supply PSD and AI information with a novel “.lunalock” extension appended to filenames, accompanied by a ransom word demanding cost in Monero.

Ransom web page (Supply – X)

The ransomware’s influence extends past information encryption: stolen paintings is exfiltrated to a distant command-and-control server earlier than victims obtain decryption keys, creating twin leverage.

Publicly disclosed samples present a modular structure that includes plugins for community propagation, credential theft, and evasion of endpoint detection techniques.

A notable innovation is the combination of a minified JavaScript module that disables Home windows Defender real-time scanning processes by injecting into the Service Management Supervisor.

An infection Mechanism

A deep dive into LunaLock’s an infection mechanism uncovers a customized loader that dynamically resolves Win32 API calls to evade static evaluation.

Upon execution, the loader parses its personal PE header to find the IAT and reconstruct API names utilizing an XOR-based obfuscation key. As soon as the resolve operate is in place, the primary payload is mapped into reminiscence with out ever touching the disk:

// Dynamic API decision snippet
BYTE obfName[] = {0x5F,0x23,0xA7,0x19}; // XOR key
for (DWORD i = 0; i

Following decision, LunaLock establishes persistence by making a hidden Scheduled Job named “SysUpdate,” guaranteeing execution at each reboot.

The loader then indicators the C2 server by way of HTTPS, confirming profitable deployment earlier than initiating AES-256 encryption throughout mapped community drives.

Increase your SOC and assist your staff shield your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Artists, Attacking, Data, Encrypt, LunaLock, Ransomware, Steal

Post navigation

Previous Post: PromptLock Only PoC, but AI-Powered Ransomware Is Real
Next Post: Venezuela’s Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies

Related Posts

vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads Cyber Security News
Critical RCE Flaw in n8n Poses Security Threat Critical RCE Flaw in n8n Poses Security Threat Cyber Security News
Freedom Mobile Data Breach Exposes Personal Information of Customers Freedom Mobile Data Breach Exposes Personal Information of Customers Cyber Security News
Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain Cyber Security News
Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild Cyber Security News
MongoDB Servers at Critical Risk MongoDB Servers at Critical Risk Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News