Back to Business: Lumma Stealer Returns with Stealthier Methods
Lumma Stealer, an information-stealing malware, has resurfaced shortly after its takedown in May 2025. The cybercriminals behind it are now employing more covert tactics and expanding their reach. The malware is being distributed through discreet channels and uses stealthier evasion techniques. Lumma Stealer can steal sensitive data such as credentials and private files, and is marketed as a malware-as-a-service. Users are lured to download it through fake cracked software, deceptive websites, and social media posts. The malware's infrastructure has been diversified, with a shift towards using Russian-based cloud services. Recent campaigns include fake crack downloads, ClickFix campaigns using fake CAPTCHA pages, GitHub repository abuse, and social media promotions.
AI Analysis
Technical Summary
Lumma Stealer is a type of information-stealing malware that has re-emerged shortly after its takedown in May 2025. This malware is designed to covertly harvest sensitive information such as user credentials, private files, and other valuable data from infected systems. The operators behind Lumma Stealer have enhanced its stealth capabilities and diversified its distribution and infrastructure methods to avoid detection and takedown efforts. The malware is distributed primarily through social engineering tactics, including fake cracked software downloads, deceptive websites, social media promotions, and campaigns exploiting fake CAPTCHA pages (ClickFix campaigns). Additionally, the threat actors abuse legitimate platforms such as GitHub repositories to host malicious payloads or facilitate distribution, complicating detection and mitigation efforts. The infrastructure supporting Lumma Stealer has shifted towards Russian-based cloud services, which may provide resilience against takedown attempts and complicate attribution. The malware is marketed as malware-as-a-service (MaaS), allowing a broad range of cybercriminals to deploy it without needing advanced technical skills. The use of multiple evasion techniques, including obfuscation, encrypted communications, and diversified command-and-control (C2) channels, enables the malware to remain undetected for longer periods. The threat actor group associated with Lumma Stealer is identified as Water Kurita. The malware leverages various MITRE ATT&CK techniques such as credential access (T1056.001), command and scripting interpreter (T1059.001), user execution (T1204), and data exfiltration (T1041), among others, highlighting its sophisticated operational capabilities. Although no specific affected software versions are listed, the infection vector primarily targets end users through social engineering and software piracy channels.
Potential Impact
For European organizations, Lumma Stealer poses a significant risk to confidentiality and integrity of sensitive data. The malware’s ability to steal credentials can lead to unauthorized access to corporate networks, financial systems, and personal accounts, potentially resulting in data breaches, financial fraud, and identity theft. The use of fake cracked software and social media as infection vectors means that employees downloading unauthorized software or engaging with deceptive online content are at heightened risk. The stealthy nature of the malware increases the likelihood of prolonged undetected presence within networks, enabling attackers to conduct further reconnaissance or lateral movement. The shift to Russian-based cloud infrastructure for C2 may complicate incident response and attribution for European entities, especially given geopolitical tensions that could affect cooperation with service providers. Additionally, the MaaS model lowers the barrier to entry for cybercriminals, potentially increasing the volume and diversity of attacks targeting European users. Organizations in sectors with high-value data, such as finance, healthcare, and government, are particularly vulnerable to the consequences of credential theft and data exfiltration. The malware’s abuse of legitimate platforms like GitHub also raises concerns about supply chain security and the integrity of software development environments in Europe.
Mitigation Recommendations
European organizations should implement targeted measures beyond generic advice to mitigate Lumma Stealer risks. First, enforce strict policies against the use of unauthorized or cracked software, combined with user education campaigns highlighting the risks of downloading software from untrusted sources and engaging with suspicious social media content. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying stealthy malware behaviors, including credential dumping and unusual network communications, especially those involving cloud services based in high-risk jurisdictions. Monitor and restrict outbound traffic to known malicious or suspicious domains and cloud services, with particular attention to Russian-based infrastructure. Implement multi-factor authentication (MFA) across all critical systems to reduce the impact of credential theft. Regularly audit and harden GitHub repositories and other development platforms to prevent abuse by threat actors, including enforcing repository access controls and scanning for malicious code. Conduct phishing simulations and awareness training focused on recognizing deceptive CAPTCHA pages and social engineering tactics used in ClickFix campaigns. Establish robust incident response plans that include procedures for rapid containment and forensic analysis of infections involving MaaS malware. Finally, collaborate with European cybersecurity information sharing organizations to stay updated on emerging indicators of compromise and threat actor tactics related to Lumma Stealer.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
Indicators of Compromise
- domain: narrathfpt.top
- domain: sqgzl.xyz
- domain: urarfx.xyz
- hash: 74b167589a4538bfed6dce17038b0cca
- hash: 8411fff2a95c11777a401b380727a5ff
- hash: 1cb620ea7a2c0dfb9d3779f0b2732b2a877fbc1f
- hash: 53974feb0513c224f89ad012c4213e862fa0f55f
- hash: 5a6acd95d8e321faee3bd97511f3545f6e75f7fd
- hash: e326762359914743e5d9e3e8320e5be2182b1c0c
- hash: edcf430af107ef18bcc3ed435791e1345a77031f
- hash: f0cad047feaffa05295b82fb36cf111fbf0662e6
- hash: f445555717a928a5e029dbf87b7a002e3d03b4c3
- hash: 388f910e662f69c7ab6fcf5e938ba813cf92c7794e5c3a6ad29c2d9276921ed3
- hash: 64f6c0c0fd736c4a82f545aadc7a1c49d4cea77b14f4b526ef9da56a606eeb3d
- hash: fa8be0ce6f177965a5cd2db80e57c49fb31083bd4ddcb052def24cfbf48d65b5
- url: http://cbakk.xyz/ajng-
- url: http://cexpxg.xyz/airq-
- url: http://citellcagt.top/gjtu-
- url: http://diecam.top/laur-
- url: http://dkkig.xyz/xjau-
- url: http://dzyzb.xyz/anby-
- url: http://escczlv.top/bufi-
- url: http://korxddl.top/qidz-
- url: http://lnofi.xyz/qoei-
- url: http://localixbiw.top/zlpa-
- url: http://lodib.xyz/towq-
- url: http://narrathfpt.top/tekq-
- url: http://nbcsfar.xyz/tpxz-
- url: http://plapwf.top/agnb-
- url: http://reckdp.pics/xiar-
- url: http://ryxpq.xyz/tpaz-
- url: http://sqgzl.xyz/taoa-
- url: http://stochalyqp.xyz/alfp-
- url: http://swenku.xyz/gaok-
- url: http://trsuv.xyz/gait-
- url: http://urarfx.xyz/twox-
- url: http://ycvduc.xyz/trie-
- url: https://softwarescr.info/dl
- url: https://ui3.fit/WeX.ini
- url: https://vfy2.help
- domain: cbakk.xyz
- domain: cexpxg.xyz
- domain: citellcagt.top
- domain: diecam.top
- domain: dkkig.xyz
- domain: dzyzb.xyz
- domain: escczlv.top
- domain: fiuylj.top
- domain: korxddl.top
- domain: lnofi.xyz
- domain: localixbiw.top
- domain: lodib.xyz
- domain: nbcsfar.xyz
- domain: plapwf.top
- domain: reckdp.pics
- domain: ryxpq.xyz
- domain: softwarescr.info
- domain: stochalyqp.xyz
- domain: swenku.xyz
- domain: trsuv.xyz
- domain: ycvduc.xyz
Back to Business: Lumma Stealer Returns with Stealthier Methods
Description
Lumma Stealer, an information-stealing malware, has resurfaced shortly after its takedown in May 2025. The cybercriminals behind it are now employing more covert tactics and expanding their reach. The malware is being distributed through discreet channels and uses stealthier evasion techniques. Lumma Stealer can steal sensitive data such as credentials and private files, and is marketed as a malware-as-a-service. Users are lured to download it through fake cracked software, deceptive websites, and social media posts. The malware's infrastructure has been diversified, with a shift towards using Russian-based cloud services. Recent campaigns include fake crack downloads, ClickFix campaigns using fake CAPTCHA pages, GitHub repository abuse, and social media promotions.
AI-Powered Analysis
Technical Analysis
Lumma Stealer is a type of information-stealing malware that has re-emerged shortly after its takedown in May 2025. This malware is designed to covertly harvest sensitive information such as user credentials, private files, and other valuable data from infected systems. The operators behind Lumma Stealer have enhanced its stealth capabilities and diversified its distribution and infrastructure methods to avoid detection and takedown efforts. The malware is distributed primarily through social engineering tactics, including fake cracked software downloads, deceptive websites, social media promotions, and campaigns exploiting fake CAPTCHA pages (ClickFix campaigns). Additionally, the threat actors abuse legitimate platforms such as GitHub repositories to host malicious payloads or facilitate distribution, complicating detection and mitigation efforts. The infrastructure supporting Lumma Stealer has shifted towards Russian-based cloud services, which may provide resilience against takedown attempts and complicate attribution. The malware is marketed as malware-as-a-service (MaaS), allowing a broad range of cybercriminals to deploy it without needing advanced technical skills. The use of multiple evasion techniques, including obfuscation, encrypted communications, and diversified command-and-control (C2) channels, enables the malware to remain undetected for longer periods. The threat actor group associated with Lumma Stealer is identified as Water Kurita. The malware leverages various MITRE ATT&CK techniques such as credential access (T1056.001), command and scripting interpreter (T1059.001), user execution (T1204), and data exfiltration (T1041), among others, highlighting its sophisticated operational capabilities. Although no specific affected software versions are listed, the infection vector primarily targets end users through social engineering and software piracy channels.
Potential Impact
For European organizations, Lumma Stealer poses a significant risk to confidentiality and integrity of sensitive data. The malware’s ability to steal credentials can lead to unauthorized access to corporate networks, financial systems, and personal accounts, potentially resulting in data breaches, financial fraud, and identity theft. The use of fake cracked software and social media as infection vectors means that employees downloading unauthorized software or engaging with deceptive online content are at heightened risk. The stealthy nature of the malware increases the likelihood of prolonged undetected presence within networks, enabling attackers to conduct further reconnaissance or lateral movement. The shift to Russian-based cloud infrastructure for C2 may complicate incident response and attribution for European entities, especially given geopolitical tensions that could affect cooperation with service providers. Additionally, the MaaS model lowers the barrier to entry for cybercriminals, potentially increasing the volume and diversity of attacks targeting European users. Organizations in sectors with high-value data, such as finance, healthcare, and government, are particularly vulnerable to the consequences of credential theft and data exfiltration. The malware’s abuse of legitimate platforms like GitHub also raises concerns about supply chain security and the integrity of software development environments in Europe.
Mitigation Recommendations
European organizations should implement targeted measures beyond generic advice to mitigate Lumma Stealer risks. First, enforce strict policies against the use of unauthorized or cracked software, combined with user education campaigns highlighting the risks of downloading software from untrusted sources and engaging with suspicious social media content. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying stealthy malware behaviors, including credential dumping and unusual network communications, especially those involving cloud services based in high-risk jurisdictions. Monitor and restrict outbound traffic to known malicious or suspicious domains and cloud services, with particular attention to Russian-based infrastructure. Implement multi-factor authentication (MFA) across all critical systems to reduce the impact of credential theft. Regularly audit and harden GitHub repositories and other development platforms to prevent abuse by threat actors, including enforcing repository access controls and scanning for malicious code. Conduct phishing simulations and awareness training focused on recognizing deceptive CAPTCHA pages and social engineering tactics used in ClickFix campaigns. Establish robust incident response plans that include procedures for rapid containment and forensic analysis of infections involving MaaS malware. Finally, collaborate with European cybersecurity information sharing organizations to stay updated on emerging indicators of compromise and threat actor tactics related to Lumma Stealer.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trendmicro.com/en_us/research/25/g/lumma-stealer-returns.html"]
- Adversary
- Water Kurita
- Pulse Id
- 688096076e36d7d6fea700fa
- Threat Score
- null
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainnarrathfpt.top | — | |
domainsqgzl.xyz | — | |
domainurarfx.xyz | — | |
domaincbakk.xyz | — | |
domaincexpxg.xyz | — | |
domaincitellcagt.top | — | |
domaindiecam.top | — | |
domaindkkig.xyz | — | |
domaindzyzb.xyz | — | |
domainescczlv.top | — | |
domainfiuylj.top | — | |
domainkorxddl.top | — | |
domainlnofi.xyz | — | |
domainlocalixbiw.top | — | |
domainlodib.xyz | — | |
domainnbcsfar.xyz | — | |
domainplapwf.top | — | |
domainreckdp.pics | — | |
domainryxpq.xyz | — | |
domainsoftwarescr.info | — | |
domainstochalyqp.xyz | — | |
domainswenku.xyz | — | |
domaintrsuv.xyz | — | |
domainycvduc.xyz | — |
Hash
Value | Description | Copy |
---|---|---|
hash74b167589a4538bfed6dce17038b0cca | — | |
hash8411fff2a95c11777a401b380727a5ff | — | |
hash1cb620ea7a2c0dfb9d3779f0b2732b2a877fbc1f | — | |
hash53974feb0513c224f89ad012c4213e862fa0f55f | — | |
hash5a6acd95d8e321faee3bd97511f3545f6e75f7fd | — | |
hashe326762359914743e5d9e3e8320e5be2182b1c0c | — | |
hashedcf430af107ef18bcc3ed435791e1345a77031f | — | |
hashf0cad047feaffa05295b82fb36cf111fbf0662e6 | — | |
hashf445555717a928a5e029dbf87b7a002e3d03b4c3 | — | |
hash388f910e662f69c7ab6fcf5e938ba813cf92c7794e5c3a6ad29c2d9276921ed3 | — | |
hash64f6c0c0fd736c4a82f545aadc7a1c49d4cea77b14f4b526ef9da56a606eeb3d | — | |
hashfa8be0ce6f177965a5cd2db80e57c49fb31083bd4ddcb052def24cfbf48d65b5 | — |
Url
Value | Description | Copy |
---|---|---|
urlhttp://cbakk.xyz/ajng- | — | |
urlhttp://cexpxg.xyz/airq- | — | |
urlhttp://citellcagt.top/gjtu- | — | |
urlhttp://diecam.top/laur- | — | |
urlhttp://dkkig.xyz/xjau- | — | |
urlhttp://dzyzb.xyz/anby- | — | |
urlhttp://escczlv.top/bufi- | — | |
urlhttp://korxddl.top/qidz- | — | |
urlhttp://lnofi.xyz/qoei- | — | |
urlhttp://localixbiw.top/zlpa- | — | |
urlhttp://lodib.xyz/towq- | — | |
urlhttp://narrathfpt.top/tekq- | — | |
urlhttp://nbcsfar.xyz/tpxz- | — | |
urlhttp://plapwf.top/agnb- | — | |
urlhttp://reckdp.pics/xiar- | — | |
urlhttp://ryxpq.xyz/tpaz- | — | |
urlhttp://sqgzl.xyz/taoa- | — | |
urlhttp://stochalyqp.xyz/alfp- | — | |
urlhttp://swenku.xyz/gaok- | — | |
urlhttp://trsuv.xyz/gait- | — | |
urlhttp://urarfx.xyz/twox- | — | |
urlhttp://ycvduc.xyz/trie- | — | |
urlhttps://softwarescr.info/dl | — | |
urlhttps://ui3.fit/WeX.ini | — | |
urlhttps://vfy2.help | — |
Threat ID: 6880a8b8ad5a09ad002324cd
Added to database: 7/23/2025, 9:17:44 AM
Last enriched: 7/23/2025, 9:33:55 AM
Last updated: 7/23/2025, 1:59:07 PM
Views: 3
Related Threats
Illusory Wishes: China-nexus APT Targets the Tibetan Community
MediumNET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods
MediumCoyote in the Wild: First-Ever Malware That Abuses UI Automation
MediumThreatFox IOCs for 2025-07-22
MediumThreatFox IOCs for 2025-07-21
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.