Dark Mode Light Mode

Microsoft & DOJ Target Prolific Lumma Stealer Malware

Microsoft & DOJ Target Prolific Lumma Stealer Malware Microsoft & DOJ Target Prolific Lumma Stealer Malware

Microsoft, in a significant collaboration with the U.S. Department of Justice (DOJ), has executed a major operation to dismantle the Lumma Stealer malware network, a highly active cybercrime tool. This malware-as-a-service (MaaS) platform has been implicated in extensive digital breaches globally, impacting hundreds of thousands of systems using the Lumma Stealer malware.

The Scope and Takedown of Lumma Stealer

Microsoft reported Lumma Stealer malware compromised over 394,000 Windows systems between March and mid-May 2025. Cybercriminals widely used it for stealing login credentials, financial data, cryptocurrency wallets, and for extortion campaigns. The DOJ confirmed the FBI identified at least 1.7 million instances of LummaC2 data theft.
Under a U.S. court order, Microsoft disabled around 2,300 malicious Lumma domains. Simultaneously, the DOJ seized five key LummaC2 command-and-control domains. International partners like Europol, Japan’s JC3, and various cybersecurity firms including Bitsight, Cloudflare, ESET, Lumen, CleanDNS, and GMO Registry assisted in dismantling its web infrastructure, highlighting a coordinated global effort.

See also  M4 MacBook Air Benchmark Suggests Performance Close to M4 MacBook Pro

Modus Operandi: How Lumma Stealer Functioned

Operational since at least 2022, Lumma (or LummaC2) marketed its info-stealing malware on encrypted forums and Telegram. Designed for ease of use, it often included obfuscation tools to evade antivirus detection. Common distribution methods were spear-phishing emails, counterfeit brand websites, and malicious online ads or “malvertising.”
Researchers note Lumma’s danger in enabling rapid attack scaling. Buyers could customize payloads, track stolen data, and access support via a user panel. Microsoft Threat Intelligence previously linked Lumma to the notorious Octo Tempest gang (also known as “Scattered Spider”). One notable campaign involved spoofing Booking.com to steal financial details. [internal_links]

See also  Nvidia RTX 5090 and 5080 GPUs Face Severe Stock Shortages

The Alleged Architect of Lumma: “Shamel”

Authorities believe the developer behind Lumma, using the alias “Shamel,” operates from Russia. In a 2023 interview, an individual claiming to be Shamel mentioned having 400 active clients. They also reportedly took pride in Lumma’s branding, featuring a dove logo and the slogan: “Making money with us is just as easy.”

A Major Blow, But Not a Final Victory

This takedown significantly hinders Lumma, though experts warn that such malware operations are rarely eliminated completely. However, Microsoft and the DOJ affirm these actions severely disrupt criminal activities by targeting their infrastructure and revenue. Microsoft will use seized domains as sinkholes for intelligence gathering and victim protection.

See also  Beware of SteelFox Trojan: Fake Software Cracks Deliver Cryptojacking and Data Theft

DOJ FBI domain seizure notice displayed after Lumma Stealer malware infrastructure takedownDOJ FBI domain seizure notice displayed after Lumma Stealer malware infrastructure takedown

This collaborative success underscores the critical role of international cooperation and public-private partnerships in combating cybercrime, as emphasized by DOJ officials and the FBI.

The coordinated takedown of the Lumma Stealer network marks a significant victory against cybercrime, showcasing the power of collaborative efforts between government and industry. As Microsoft’s Digital Crimes Unit continues its work, this action sets a precedent for future threat elimination. However, users must remain vigilant: regularly update passwords and be cautious about clicking links from unverified sources to protect themselves.

Add a comment Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *