Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

LummaStealer dropped via fake updates from itch.io and Patreon

0
Medium
Published: Mon Dec 08 2025 (12/08/2025, 17:25:04 UTC)
Source: AlienVault OTX General

Description

A malicious campaign is targeting indie game platforms Itch. io and Patreon by posting fake update links in comments, which lead to downloads of LummaStealer malware. This malware uses advanced anti-analysis techniques to evade detection, including checks for virtual machines, specific usernames, and malware analysis processes. The payload is delivered via a nexe-compiled JavaScript file that drops and loads a DLL variant of LummaStealer. Despite efforts to remove malicious accounts, attackers continuously create new ones, indicating an ongoing and persistent threat. The campaign primarily targets users seeking game updates, exploiting trust in indie game communities. No known exploits in the wild have been reported yet, but the malware’s stealth and persistence pose a medium-level risk. European organizations involved in gaming, digital content creation, or using these platforms could be impacted, especially those with less mature security controls. Mitigation requires targeted detection of fake update links, monitoring of platform comments, and enhanced endpoint defenses against DLL injection and obfuscated JavaScript. Countries with active indie game development and strong Patreon/Itch.

AI-Powered Analysis

AILast updated: 12/09/2025, 12:58:35 UTC

Technical Analysis

This threat involves a malware campaign distributing LummaStealer via fake update links posted on indie game platforms Itch.io and Patreon. Attackers create new accounts to spam comments on legitimate game pages, claiming to offer updates through Patreon links. These links lead to downloads containing a nexe-compiled JavaScript file, which acts as a dropper for a DLL variant of LummaStealer. LummaStealer is a credential and information stealer known for its stealth capabilities. The malware employs multiple anti-analysis techniques, such as detecting virtual machine environments, checking for specific usernames, and scanning for processes commonly used in malware analysis, to avoid sandbox detection and forensic investigation. The use of nexe (Node.js executable) compiled JavaScript adds complexity and obfuscation, making static and dynamic analysis more difficult. The DLL payload is injected into processes to steal sensitive data stealthily. Despite platform efforts to remove malicious accounts, attackers persistently create new ones, indicating a sustained campaign. No CVE or known exploits in the wild have been reported, but the campaign’s ongoing nature and sophisticated evasion techniques suggest a medium severity threat. The campaign targets users of indie game platforms, which could include developers, gamers, and content creators, potentially leading to credential theft, data exfiltration, and further compromise of user systems.

Potential Impact

European organizations involved in indie game development, digital content creation, or those using platforms like Itch.io and Patreon are at risk of credential theft and data compromise. The malware’s ability to evade detection through anti-analysis techniques increases the likelihood of prolonged undetected presence, potentially leading to significant data breaches or unauthorized access to sensitive accounts. Compromised credentials could be leveraged for further attacks, including financial fraud or lateral movement within networks. The campaign’s persistence and use of social engineering via trusted platforms increase the risk of successful infection. Smaller studios or individual developers with limited cybersecurity resources are particularly vulnerable. The impact extends beyond individual users to organizations if infected endpoints connect to corporate networks. Additionally, the theft of intellectual property or personal data could have reputational and regulatory consequences under GDPR for European entities. The medium severity rating reflects the balance between the targeted nature of the attack and the potential for significant data loss or operational disruption.

Mitigation Recommendations

1. Implement advanced monitoring of comments and user-generated content on platforms like Itch.io and Patreon to detect and block suspicious links or spam accounts. 2. Educate users and developers about the risks of downloading updates from unofficial or unsolicited links, emphasizing verification through official channels. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying nexe-compiled JavaScript execution and DLL injection behaviors. 4. Use behavioral analytics to detect anti-analysis evasion techniques and unusual process activity indicative of malware presence. 5. Enforce multi-factor authentication (MFA) on all accounts associated with these platforms to reduce the impact of credential theft. 6. Collaborate with platform providers to improve account creation verification and spam detection mechanisms to reduce malicious account proliferation. 7. Regularly update and patch software and maintain strong network segmentation to limit malware spread. 8. Utilize threat intelligence feeds to block known malicious hashes and indicators related to LummaStealer. 9. Conduct regular security awareness training focused on social engineering tactics used in gaming communities. 10. Establish incident response plans specifically addressing malware delivered via social engineering on community platforms.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.gdatasoftware.com/blog/2025/12/38310-lumma-stealer-itchio-patreon"]
Adversary
null
Pulse Id
693709f04b22710487f819a0
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5d69ba949fad11730a160425f2620ba5
hash7cbbed38bd42c198d0e0df514b29c5500956d95b
hash102b99b00a60f33246bd89bd2b3cb9cfae2844d453484e932b3a5ca634fb308c
hash1d405b03bc5913b6b43c06550ef0b9b02196b270625e4dc5fa0c37e8a424be25
hash79250523a057a7dd9a6080099c8c2f83eb683ab9b37ecab149fc73524f7c4bd1
hash80e538cabade94e1883f9e72bb608dc02f79808aec48136b5bbb00c2a1717f64
hasha2bacb00dfdb338b496d3128705f76c8cc935e6bd33e06271fb3e34d769d0a2b

Threat ID: 693819561b76610347bfb39f

Added to database: 12/9/2025, 12:43:02 PM

Last enriched: 12/9/2025, 12:58:35 PM

Last updated: 12/11/2025, 6:57:01 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats