Skip to main content

Back to Business: Lumma Stealer Returns with Stealthier Methods

Medium
Published: Wed Jul 23 2025 (07/23/2025, 07:57:59 UTC)
Source: AlienVault OTX General

Description

Lumma Stealer, an information-stealing malware, has resurfaced shortly after its takedown in May 2025. The cybercriminals behind it are now employing more covert tactics and expanding their reach. The malware is being distributed through discreet channels and uses stealthier evasion techniques. Lumma Stealer can steal sensitive data such as credentials and private files, and is marketed as a malware-as-a-service. Users are lured to download it through fake cracked software, deceptive websites, and social media posts. The malware's infrastructure has been diversified, with a shift towards using Russian-based cloud services. Recent campaigns include fake crack downloads, ClickFix campaigns using fake CAPTCHA pages, GitHub repository abuse, and social media promotions.

AI-Powered Analysis

AILast updated: 07/23/2025, 09:33:55 UTC

Technical Analysis

Lumma Stealer is a type of information-stealing malware that has re-emerged shortly after its takedown in May 2025. This malware is designed to covertly harvest sensitive information such as user credentials, private files, and other valuable data from infected systems. The operators behind Lumma Stealer have enhanced its stealth capabilities and diversified its distribution and infrastructure methods to avoid detection and takedown efforts. The malware is distributed primarily through social engineering tactics, including fake cracked software downloads, deceptive websites, social media promotions, and campaigns exploiting fake CAPTCHA pages (ClickFix campaigns). Additionally, the threat actors abuse legitimate platforms such as GitHub repositories to host malicious payloads or facilitate distribution, complicating detection and mitigation efforts. The infrastructure supporting Lumma Stealer has shifted towards Russian-based cloud services, which may provide resilience against takedown attempts and complicate attribution. The malware is marketed as malware-as-a-service (MaaS), allowing a broad range of cybercriminals to deploy it without needing advanced technical skills. The use of multiple evasion techniques, including obfuscation, encrypted communications, and diversified command-and-control (C2) channels, enables the malware to remain undetected for longer periods. The threat actor group associated with Lumma Stealer is identified as Water Kurita. The malware leverages various MITRE ATT&CK techniques such as credential access (T1056.001), command and scripting interpreter (T1059.001), user execution (T1204), and data exfiltration (T1041), among others, highlighting its sophisticated operational capabilities. Although no specific affected software versions are listed, the infection vector primarily targets end users through social engineering and software piracy channels.

Potential Impact

For European organizations, Lumma Stealer poses a significant risk to confidentiality and integrity of sensitive data. The malware’s ability to steal credentials can lead to unauthorized access to corporate networks, financial systems, and personal accounts, potentially resulting in data breaches, financial fraud, and identity theft. The use of fake cracked software and social media as infection vectors means that employees downloading unauthorized software or engaging with deceptive online content are at heightened risk. The stealthy nature of the malware increases the likelihood of prolonged undetected presence within networks, enabling attackers to conduct further reconnaissance or lateral movement. The shift to Russian-based cloud infrastructure for C2 may complicate incident response and attribution for European entities, especially given geopolitical tensions that could affect cooperation with service providers. Additionally, the MaaS model lowers the barrier to entry for cybercriminals, potentially increasing the volume and diversity of attacks targeting European users. Organizations in sectors with high-value data, such as finance, healthcare, and government, are particularly vulnerable to the consequences of credential theft and data exfiltration. The malware’s abuse of legitimate platforms like GitHub also raises concerns about supply chain security and the integrity of software development environments in Europe.

Mitigation Recommendations

European organizations should implement targeted measures beyond generic advice to mitigate Lumma Stealer risks. First, enforce strict policies against the use of unauthorized or cracked software, combined with user education campaigns highlighting the risks of downloading software from untrusted sources and engaging with suspicious social media content. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying stealthy malware behaviors, including credential dumping and unusual network communications, especially those involving cloud services based in high-risk jurisdictions. Monitor and restrict outbound traffic to known malicious or suspicious domains and cloud services, with particular attention to Russian-based infrastructure. Implement multi-factor authentication (MFA) across all critical systems to reduce the impact of credential theft. Regularly audit and harden GitHub repositories and other development platforms to prevent abuse by threat actors, including enforcing repository access controls and scanning for malicious code. Conduct phishing simulations and awareness training focused on recognizing deceptive CAPTCHA pages and social engineering tactics used in ClickFix campaigns. Establish robust incident response plans that include procedures for rapid containment and forensic analysis of infections involving MaaS malware. Finally, collaborate with European cybersecurity information sharing organizations to stay updated on emerging indicators of compromise and threat actor tactics related to Lumma Stealer.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/25/g/lumma-stealer-returns.html"]
Adversary
Water Kurita
Pulse Id
688096076e36d7d6fea700fa
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainnarrathfpt.top
domainsqgzl.xyz
domainurarfx.xyz
domaincbakk.xyz
domaincexpxg.xyz
domaincitellcagt.top
domaindiecam.top
domaindkkig.xyz
domaindzyzb.xyz
domainescczlv.top
domainfiuylj.top
domainkorxddl.top
domainlnofi.xyz
domainlocalixbiw.top
domainlodib.xyz
domainnbcsfar.xyz
domainplapwf.top
domainreckdp.pics
domainryxpq.xyz
domainsoftwarescr.info
domainstochalyqp.xyz
domainswenku.xyz
domaintrsuv.xyz
domainycvduc.xyz

Hash

ValueDescriptionCopy
hash74b167589a4538bfed6dce17038b0cca
hash8411fff2a95c11777a401b380727a5ff
hash1cb620ea7a2c0dfb9d3779f0b2732b2a877fbc1f
hash53974feb0513c224f89ad012c4213e862fa0f55f
hash5a6acd95d8e321faee3bd97511f3545f6e75f7fd
hashe326762359914743e5d9e3e8320e5be2182b1c0c
hashedcf430af107ef18bcc3ed435791e1345a77031f
hashf0cad047feaffa05295b82fb36cf111fbf0662e6
hashf445555717a928a5e029dbf87b7a002e3d03b4c3
hash388f910e662f69c7ab6fcf5e938ba813cf92c7794e5c3a6ad29c2d9276921ed3
hash64f6c0c0fd736c4a82f545aadc7a1c49d4cea77b14f4b526ef9da56a606eeb3d
hashfa8be0ce6f177965a5cd2db80e57c49fb31083bd4ddcb052def24cfbf48d65b5

Url

ValueDescriptionCopy
urlhttp://cbakk.xyz/ajng-
urlhttp://cexpxg.xyz/airq-
urlhttp://citellcagt.top/gjtu-
urlhttp://diecam.top/laur-
urlhttp://dkkig.xyz/xjau-
urlhttp://dzyzb.xyz/anby-
urlhttp://escczlv.top/bufi-
urlhttp://korxddl.top/qidz-
urlhttp://lnofi.xyz/qoei-
urlhttp://localixbiw.top/zlpa-
urlhttp://lodib.xyz/towq-
urlhttp://narrathfpt.top/tekq-
urlhttp://nbcsfar.xyz/tpxz-
urlhttp://plapwf.top/agnb-
urlhttp://reckdp.pics/xiar-
urlhttp://ryxpq.xyz/tpaz-
urlhttp://sqgzl.xyz/taoa-
urlhttp://stochalyqp.xyz/alfp-
urlhttp://swenku.xyz/gaok-
urlhttp://trsuv.xyz/gait-
urlhttp://urarfx.xyz/twox-
urlhttp://ycvduc.xyz/trie-
urlhttps://softwarescr.info/dl
urlhttps://ui3.fit/WeX.ini
urlhttps://vfy2.help

Threat ID: 6880a8b8ad5a09ad002324cd

Added to database: 7/23/2025, 9:17:44 AM

Last enriched: 7/23/2025, 9:33:55 AM

Last updated: 7/23/2025, 1:59:07 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats