Lumma infostealer malware has resurged after a law enforcement operation that seized 2,300 domains, demonstrating the resilience of cybercriminal networks. Despite setbacks, Lumma quickly rebuilt its infrastructure and resumed operations using new hosting providers like Selectel. #LummaStealer #Infostealer #Selectel
Keypoints
- Lumma malware operation recovered quickly after law enforcement seized its domains.
- The malwareβs infrastructure was rebuilt within weeks using alternative cloud providers, notably Selectel.
- Lumma uses multiple distribution channels, including fake cracks, malvertising, compromised websites, and social media.
- Distribution methods include fake CAPTCHA pages, GitHub repositories, and promoted cracked software on YouTube and Facebook.
- Law enforcement actions alone do not deter the profitability and resilience of MaaS operations like Lumma.