Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Lumma Stealer Returns with Scalable Lures

Image © Arstechnica
Security researchers report Lumma Stealer is back at scale, employing ClickFix social-engineering bait and CastleLoader to harvest credentials and sensitive data from Windows hosts.

Security researchers warn that Lumma Stealer is back in large-scale campaigns, reviving its operation with advanced delivery tactics. The resurgence centers on ClickFix, a social-engineering lure, paired with a loader named CastleLoader to install Lumma across infected Windows machines and exfiltrate credentials and files.

Lumma, also known as Lumma Stealer, first surfaced in 2022 on Russian-speaking cybercrime forums. Its cloud-based malware-as-a-service model deployed a sprawling network of domains hosting fake lure sites offering cracked software, pirated media, and other enticements, alongside command-and-control channels. Market data from the period shows premium Lumma variants selling for thousands of dollars, with the FBI later tallying tens of thousands of crime-forum listings by 2024.

In May of the previous year, an international law-enforcement operation disrupted Lumma’s ecosystem by seizing thousands of domains and key infrastructure. Despite that takedown, researchers note the threat has rebuilt its infrastructure rapidly and is spreading again on a global scale, driven by the same social-engineering techniques that have long proven effective.

The recent wave leans heavily on ClickFix, a tactic that instructs victims to copy text from a dubious prompt into a Windows terminal, effectively bypassing user skepticism. Once the user complies, a loader is installed and Lumma — often delivered through CastleLoader’s memory-resident payload — gains access to sensitive data and credential stores on the infected host. Bitdefender researchers described Lumma’s return as a sign that the criminal ecosystem behind the infostealer remains adaptable and resilient.

Defenses against this resurgence include cautious user behavior and robust endpoint protection: avoid engaging with suspicious CAPTCHAs or prompts, keep systems patched, enable strong phishing-awareness training, and deploy security solutions capable of detecting loader activity and data-theft indicators. As Lumma’s operators lean on trusted delivery channels and social-engineering tricks, organizations and individuals must remain vigilant to prevent another scale-up of this data-theft operation.

 

Arstechnica

Related News

Wi-Fi 7 Rollouts by Sparklight and Spectrum
Blue Stream Fiber Leadership Promoted for Growth
OpenAI Debuts Fast Codex-Spark on Cerebras
FCC Clears Amazon Leo for 4,500 More Satellites
Comcast Indiana BEAD Project Delivers Big Results
Gemini cloned via 100k prompts, Google says

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more