Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Lumma Stealer Returns with Scalable Lures

Image © Arstechnica
Security researchers report Lumma Stealer is back at scale, employing ClickFix social-engineering bait and CastleLoader to harvest credentials and sensitive data from Windows hosts.

Security researchers warn that Lumma Stealer is back in large-scale campaigns, reviving its operation with advanced delivery tactics. The resurgence centers on ClickFix, a social-engineering lure, paired with a loader named CastleLoader to install Lumma across infected Windows machines and exfiltrate credentials and files.

Lumma, also known as Lumma Stealer, first surfaced in 2022 on Russian-speaking cybercrime forums. Its cloud-based malware-as-a-service model deployed a sprawling network of domains hosting fake lure sites offering cracked software, pirated media, and other enticements, alongside command-and-control channels. Market data from the period shows premium Lumma variants selling for thousands of dollars, with the FBI later tallying tens of thousands of crime-forum listings by 2024.

In May of the previous year, an international law-enforcement operation disrupted Lumma’s ecosystem by seizing thousands of domains and key infrastructure. Despite that takedown, researchers note the threat has rebuilt its infrastructure rapidly and is spreading again on a global scale, driven by the same social-engineering techniques that have long proven effective.

The recent wave leans heavily on ClickFix, a tactic that instructs victims to copy text from a dubious prompt into a Windows terminal, effectively bypassing user skepticism. Once the user complies, a loader is installed and Lumma — often delivered through CastleLoader’s memory-resident payload — gains access to sensitive data and credential stores on the infected host. Bitdefender researchers described Lumma’s return as a sign that the criminal ecosystem behind the infostealer remains adaptable and resilient.

Defenses against this resurgence include cautious user behavior and robust endpoint protection: avoid engaging with suspicious CAPTCHAs or prompts, keep systems patched, enable strong phishing-awareness training, and deploy security solutions capable of detecting loader activity and data-theft indicators. As Lumma’s operators lean on trusted delivery channels and social-engineering tricks, organizations and individuals must remain vigilant to prevent another scale-up of this data-theft operation.

 

Arstechnica

Notícias relacionadas

Edital do 700 MHz publicado sem alterações
Spacesail autorizado a operar no Brasil
Brisanet registra 30,7 mil novos móveis em janeiro
Ligga vende espectro para Amazônia 5G
CNJ lança API nacional para bens apreendidos
WhatsApp cresce 60% no socorro rodoviário

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento para cookies

Utilizamos cookies para melhorar a sua experiência no nosso site.

Ao utilizar o nosso site, você concorda com o uso de cookies. Saiba mais