Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
A malicious campaign exploiting Google Groups to distribute Lumma Stealer and Ninja Browser malware has been uncovered. The attackers infiltrate industry-related forums, posting seemingly legitimate technical discussions with embedded malicious download links. For Windows users, the payload is Lumma Stealer, a credential-harvesting malware. Linux users are directed to download a trojanized Chromium-based browser called Ninja Browser, which installs malicious extensions and persistence mechanisms. The campaign utilizes Google's trusted ecosystem to bypass security measures and increase user confidence. Over 4,000 malicious Google Groups and 3,500 Google-hosted URLs have been identified in this global operation, posing significant risks to organizations including credential theft, account takeover, and remote command execution.
AI Analysis
Technical Summary
This campaign exploits Google Groups, a widely trusted collaboration platform, to distribute two distinct malware payloads targeting Windows and Linux users. The attackers infiltrate industry-specific forums within Google Groups, posting technical discussions that appear legitimate but contain embedded links to malicious downloads hosted on Google infrastructure and attacker-controlled domains. For Windows systems, the payload is Lumma Stealer, a sophisticated credential-stealing malware designed to harvest saved passwords, cookies, and other sensitive authentication data. For Linux systems, the attackers distribute a trojanized Chromium-based browser named Ninja Browser. This malicious browser installs harmful extensions and persistence mechanisms, enabling long-term access and control over the infected system. The campaign uses social engineering to exploit user trust in Google’s ecosystem, effectively bypassing many traditional security controls that rely on domain reputation and URL filtering. The operation is extensive, involving over 4,000 malicious Google Groups and 3,500 Google-hosted URLs, indicating a large-scale, coordinated effort. The malware’s capabilities include credential theft, which can lead to account takeover, and remote command execution, allowing attackers to execute arbitrary commands on compromised hosts. Indicators of compromise include specific IP addresses (152.42.139.18, 89.111.170.100) and domains (healgeni.live, nb-download.com, nbdownload.space, ninja-browser.com) associated with the campaign. The campaign’s tactics align with MITRE ATT&CK techniques such as T1543 (Create or Modify System Process), T1539 (Steal Web Session Cookie), T1547 (Boot or Logon Autostart Execution), T1071 (Application Layer Protocol), T1176 (Browser Extensions), T1555 (Credentials from Password Stores), T1059 (Command and Scripting Interpreter), T1204 (User Execution), T1566 (Phishing), T1027 (Obfuscated Files or Information), T1573 (Encrypted Channel), and T1056 (Input Capture). No known exploits in the wild or specific CVEs are associated with this campaign yet.
Potential Impact
European organizations face significant risks from this campaign due to the widespread use of Google Groups for professional collaboration and information sharing. Credential theft can lead to unauthorized access to corporate networks, cloud services, and sensitive data, resulting in data breaches and financial losses. The trojanized Ninja Browser on Linux systems threatens the integrity and availability of critical infrastructure and development environments, especially in sectors relying on Linux-based systems. The use of Google’s trusted platform increases the likelihood of successful social engineering, potentially bypassing perimeter defenses and endpoint protections. Remote command execution capabilities enable attackers to deploy additional malware, move laterally within networks, and exfiltrate data. The campaign’s scale and stealthy distribution method could lead to prolonged undetected compromises, increasing remediation costs and reputational damage. Organizations in sectors such as finance, technology, manufacturing, and government are particularly at risk due to their reliance on Google services and the value of their credentials and intellectual property.
Mitigation Recommendations
1. Implement strict monitoring and filtering of Google Groups traffic and URLs, including blocking or flagging downloads from suspicious or newly registered domains linked to the campaign. 2. Educate employees and users about the risks of downloading software from unverified sources, emphasizing caution with links in forums and collaboration platforms, even if hosted on trusted domains. 3. Deploy endpoint detection and response (EDR) solutions capable of detecting credential-stealing behaviors and persistence mechanisms typical of Lumma Stealer and trojanized browsers. 4. Enforce multi-factor authentication (MFA) across all critical systems and cloud services to mitigate the impact of credential theft. 5. Regularly audit and restrict browser extensions, especially on Linux systems, to prevent unauthorized installation of malicious add-ons. 6. Use application whitelisting to prevent execution of unauthorized software, including trojanized browsers. 7. Conduct threat hunting exercises focusing on indicators of compromise such as the identified IP addresses and domains. 8. Collaborate with Google to report malicious groups and URLs for takedown and enhanced detection. 9. Maintain up-to-date threat intelligence feeds and integrate them into security information and event management (SIEM) systems for proactive alerting. 10. Harden Linux environments by limiting user privileges and monitoring for unusual process creations or network connections.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
Indicators of Compromise
- ip: 152.42.139.18
- ip: 89.111.170.100
- domain: healgeni.live
- domain: nb-download.com
- domain: nbdownload.space
- domain: ninja-browser.com
Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
Description
A malicious campaign exploiting Google Groups to distribute Lumma Stealer and Ninja Browser malware has been uncovered. The attackers infiltrate industry-related forums, posting seemingly legitimate technical discussions with embedded malicious download links. For Windows users, the payload is Lumma Stealer, a credential-harvesting malware. Linux users are directed to download a trojanized Chromium-based browser called Ninja Browser, which installs malicious extensions and persistence mechanisms. The campaign utilizes Google's trusted ecosystem to bypass security measures and increase user confidence. Over 4,000 malicious Google Groups and 3,500 Google-hosted URLs have been identified in this global operation, posing significant risks to organizations including credential theft, account takeover, and remote command execution.
AI-Powered Analysis
Technical Analysis
This campaign exploits Google Groups, a widely trusted collaboration platform, to distribute two distinct malware payloads targeting Windows and Linux users. The attackers infiltrate industry-specific forums within Google Groups, posting technical discussions that appear legitimate but contain embedded links to malicious downloads hosted on Google infrastructure and attacker-controlled domains. For Windows systems, the payload is Lumma Stealer, a sophisticated credential-stealing malware designed to harvest saved passwords, cookies, and other sensitive authentication data. For Linux systems, the attackers distribute a trojanized Chromium-based browser named Ninja Browser. This malicious browser installs harmful extensions and persistence mechanisms, enabling long-term access and control over the infected system. The campaign uses social engineering to exploit user trust in Google’s ecosystem, effectively bypassing many traditional security controls that rely on domain reputation and URL filtering. The operation is extensive, involving over 4,000 malicious Google Groups and 3,500 Google-hosted URLs, indicating a large-scale, coordinated effort. The malware’s capabilities include credential theft, which can lead to account takeover, and remote command execution, allowing attackers to execute arbitrary commands on compromised hosts. Indicators of compromise include specific IP addresses (152.42.139.18, 89.111.170.100) and domains (healgeni.live, nb-download.com, nbdownload.space, ninja-browser.com) associated with the campaign. The campaign’s tactics align with MITRE ATT&CK techniques such as T1543 (Create or Modify System Process), T1539 (Steal Web Session Cookie), T1547 (Boot or Logon Autostart Execution), T1071 (Application Layer Protocol), T1176 (Browser Extensions), T1555 (Credentials from Password Stores), T1059 (Command and Scripting Interpreter), T1204 (User Execution), T1566 (Phishing), T1027 (Obfuscated Files or Information), T1573 (Encrypted Channel), and T1056 (Input Capture). No known exploits in the wild or specific CVEs are associated with this campaign yet.
Potential Impact
European organizations face significant risks from this campaign due to the widespread use of Google Groups for professional collaboration and information sharing. Credential theft can lead to unauthorized access to corporate networks, cloud services, and sensitive data, resulting in data breaches and financial losses. The trojanized Ninja Browser on Linux systems threatens the integrity and availability of critical infrastructure and development environments, especially in sectors relying on Linux-based systems. The use of Google’s trusted platform increases the likelihood of successful social engineering, potentially bypassing perimeter defenses and endpoint protections. Remote command execution capabilities enable attackers to deploy additional malware, move laterally within networks, and exfiltrate data. The campaign’s scale and stealthy distribution method could lead to prolonged undetected compromises, increasing remediation costs and reputational damage. Organizations in sectors such as finance, technology, manufacturing, and government are particularly at risk due to their reliance on Google services and the value of their credentials and intellectual property.
Mitigation Recommendations
1. Implement strict monitoring and filtering of Google Groups traffic and URLs, including blocking or flagging downloads from suspicious or newly registered domains linked to the campaign. 2. Educate employees and users about the risks of downloading software from unverified sources, emphasizing caution with links in forums and collaboration platforms, even if hosted on trusted domains. 3. Deploy endpoint detection and response (EDR) solutions capable of detecting credential-stealing behaviors and persistence mechanisms typical of Lumma Stealer and trojanized browsers. 4. Enforce multi-factor authentication (MFA) across all critical systems and cloud services to mitigate the impact of credential theft. 5. Regularly audit and restrict browser extensions, especially on Linux systems, to prevent unauthorized installation of malicious add-ons. 6. Use application whitelisting to prevent execution of unauthorized software, including trojanized browsers. 7. Conduct threat hunting exercises focusing on indicators of compromise such as the identified IP addresses and domains. 8. Collaborate with Google to report malicious groups and URLs for takedown and enhanced detection. 9. Maintain up-to-date threat intelligence feeds and integrate them into security information and event management (SIEM) systems for proactive alerting. 10. Harden Linux environments by limiting user privileges and monitoring for unusual process creations or network connections.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.bleepingcomputer.com/news/security/ctm360-lumma-stealer-and-ninja-browser-malware-campaign-abusing-google-groups/","https://www.ctm360.com/reports/ninja-browser-lumma-infostealer"]
- Adversary
- null
- Pulse Id
- 6992f518e91138231dcf4d24
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip152.42.139.18 | — | |
ip89.111.170.100 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainhealgeni.live | — | |
domainnb-download.com | — | |
domainnbdownload.space | — | |
domainninja-browser.com | — |
Threat ID: 6992f9abbda29fb02f68dd2f
Added to database: 2/16/2026, 11:04:11 AM
Last enriched: 2/16/2026, 11:18:32 AM
Last updated: 2/20/2026, 10:00:11 PM
Views: 241
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Android threats using GenAI usher in a new era
MediumMaltrail IOC for 2026-02-20
MediumFBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
MediumPromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
MediumThreatFox IOCs for 2026-02-19
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.